CN110858250A - Desensitization encryption method for sending information by mobile equipment chat tool - Google Patents
Desensitization encryption method for sending information by mobile equipment chat tool Download PDFInfo
- Publication number
- CN110858250A CN110858250A CN201810977467.XA CN201810977467A CN110858250A CN 110858250 A CN110858250 A CN 110858250A CN 201810977467 A CN201810977467 A CN 201810977467A CN 110858250 A CN110858250 A CN 110858250A
- Authority
- CN
- China
- Prior art keywords
- service
- auxiliary
- class
- content
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 86
- 238000000586 desensitisation Methods 0.000 title claims abstract description 16
- 238000003672 processing method Methods 0.000 claims abstract description 11
- 230000007246 mechanism Effects 0.000 claims abstract description 8
- 230000006399 behavior Effects 0.000 claims abstract description 4
- 238000012544 monitoring process Methods 0.000 claims description 13
- 238000011423 initialization method Methods 0.000 claims description 8
- 230000000007 visual effect Effects 0.000 claims description 5
- 230000008859 change Effects 0.000 claims description 4
- 238000012550 audit Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims 2
- 230000006870 function Effects 0.000 description 24
- 230000007547 defect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008093 supporting effect Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000035939 shock Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Information Transfer Between Computers (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
A desensitization encryption method for sending information by a mobile device chat tool comprises the following steps: the first step is as follows: defining a Service class in an android, and then enabling the class to inherit from an auxiliary class; the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; the third step: implementing an auxiliary service event processing method and an auxiliary service terminal method in a subclass service; the fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone setting, and then opening the auxiliary class; the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; the invention can acquire and monitor the content input by the soft keyboard and then carry out mandatory encryption desensitization on the sensitive words designed in the monitored content.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a desensitization encryption method for sending information by a mobile device chat tool.
Background
At present, the efforts of disclosure protection of sensitive information and tracing of disclosure personnel in departments or institutions with higher disclosure are increasing, for example, instant messaging software is not allowed to be used in related departments or some related disclosure or sensitive characters are sent to third party forums, and the sent character contents are monitored so as to execute related examination mechanisms and trace the disclosure personnel.
Within existing solutions, it is common to force modifications of the transmitted content by the root handset and then use an xposed framework or the like, or not allow use of certain modules of the application.
Any desired data can be acquired to a great extent through a root mode, and the functions which can be realized only by a plurality of system layers can be realized through the improvement of the authority after the root, such as: the three-party data forcibly modifies or disables some functions of the three-party application, but the scheme is that the android device acquires the root authority, the physical characteristics of hardware and the standards of various hardware manufacturers are different, and the mobile phone after the root has great potential safety hazard and is easily invaded by trojans and viruses.
Disclosure of Invention
In order to solve the technical defects, the invention provides a desensitization encryption method for sending information by a mobile device chatting tool. According to the method and the device, the android device is not required to acquire Root authority, and the input content can be well monitored as long as the user inputs the content by using the software disk on the android device. The invention can acquire and monitor the content input by the soft keyboard and then carry out mandatory encryption desensitization on the sensitive words designed in the monitored content.
In order to achieve the purpose, the invention adopts the technical scheme that: a desensitization encryption method for sending information by a mobile device chat tool comprises the following steps:
the first step is as follows: defining a service class in an android, then enabling the service class to inherit from an auxiliary class, rewriting a service connection configuration initialization method, an auxiliary service event processing method and an auxiliary service terminal method in the auxiliary class in the service class, and elaborating in detail the aims of achieving the function of using the auxiliary class to audit pictures, achieving the monitoring of sent pictures and releasing and storing after monitoring the sent pictures in the rewriting method;
the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; adding a binding auxiliary service authority into a declared service class, adding a meta-data tag into the declared service, and defining and configuring a name and a resource configuration file in the tag;
the third step: implementing an auxiliary service event processing method and an auxiliary service terminal method in a subclass service;
the fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone, and then opening the auxiliary class to execute the method in the third step to perform monitoring and auditing of the character series;
the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; if the content acquired from the fourth step contains a secret-related field strategy, forcibly executing the steps of copying, cutting, desensitizing and pasting from the character input box by using an auxiliary function to realize the desensitizing method of the sensitive vocabulary;
and a sixth step: and adding a method for detecting whether the auxiliary function is started or not in the android program to be applied, wherein the method can remind a user to start and execute the step in the fourth step after the auxiliary function is closed in the application.
In order to further realize the invention, the technical scheme can be also adopted as follows: the contents to be configured in the second step comprise interface changes which are interesting to the service, a feedback mode is defined, whether the service can access the contents in the active window or not is defined, and a time interval for receiving events is defined. The method implemented in the subclass service in the third step is also a service connection configuration initialization method. The method implemented in the subclass service in the third step also has an auxiliary function closing method. The interesting interface changes comprise window opening, sliding, focus changing and long pressing; defining a feedback mode to be voice playing, vibration or visual feedback; the time interval for accepting an event is defined to be one hundred milliseconds.
The invention has the beneficial effects that:
the method mainly adopts auxiliary function type Android access in an Android system to realize the acquisition of the contents of all nodes of view in a screen, button click events of an input method soft keyboard and character contents typed by the soft keyboard, so that the acquired contents are monitored, whether the violation phenomenon occurs in the input contents is judged according to a self-defined examination mechanism, and a sent desensitization field or vocabulary is forcibly changed into a symbol, so that the aim that the designed sensitive vocabulary cannot be sent out is fulfilled.
The method avoids the defects that the equipment must Root and the special requirements on equipment hardware and manufacturer customized system standards are needed on the basis that the content sent by the three-party application can be forcibly changed by utilizing the Root authority, the user can acquire the input content when inputting the content by using the soft keyboard, then forcibly encrypts and desensitizes the sensitive vocabulary designed in the input content, and the method can achieve good supporting effect on various input methods and the system default Google input method soft keyboard.
The method and the device can acquire any text content input by the user through the input method soft keyboard, can adapt to any android equipment capable of installing the input method, and have no limit on the android system to be compatible with various high and low version systems and various android customization systems. When a user on the equipment uses an instant tool for chatting or uses a third party forum, a microblog and the like to input text content by using an input method soft keyboard, the user can acquire and monitor the input content and then forcibly encrypt and desensitize sensitive words designed in the monitored content.
According to the method and the device, the android device is not required to acquire Root authority, and the input content can be well monitored as long as the user inputs the content by using the software disk on the android device. The method has no hard requirements on android equipment hardware, an android system-based deep customization system of each large mobile phone manufacturer and installed software, and has strong universality. The invention does not need to use a third-party framework to forcibly modify the self realization mechanism of the interception application, can be realized by the instant chat application installed on the android device, and has high practicability.
Drawings
FIG. 1 is a block flow diagram of a first step of the present invention;
FIG. 2 is a block flow diagram of the present invention;
FIG. 3 is a block diagram of a method for implementing the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The English abbreviations or technical nouns involved in the present embodiment are explained as follows:
service is a component that runs in the background for an indefinite period of time without interacting with the user, and is invisible with nothing interfacing. We can start a Service to play music or to record the change of location of the geographical information or start a Service to run and listen for some action at all times.
metadata is a set of name-value pairs (name-value pair) for use by a parent component, so that a corresponding meta-data element should be defined in the corresponding component. I.e. if metadata is to be used in activity, then meta-data must be defined in the activity declaration of android manifest.
Access availability: many Android users have different ways to interact with the cell phone due to various conditions. This includes users who are unable to see a complete screen or use a touch screen due to visual, physical, and age problems, and users who are less hearing able who are unable to receive voice messages and prompts. Android provides Accessibility functionality and services that help these users to operate the device more easily, including text-to-speech (which does not support Chinese), tactile feedback, gestural manipulation, trackball and joystick manipulation. Developers can make use of these services to make programs better. Developers may build their own Accessibility services, which may enhance usability, such as voice prompts, physical feedback, and other optional modes of operation. The Accessibility service may provide these enhanced functionality for all applications, a group of applications, or a single application.
Event sources: for events generated by an interface control, we generally refer to the control as an event source.
Android (Android): the operating system is a Linux-based free and open source code operating system, is mainly used for mobile equipment such as smart phones and tablet computers, and is led and developed by Google corporation and the open mobile phone alliance.
onServiceConnected: service connection configuration initialization method.
onAccessibilityEvent: a method for assisting in the handling of service events.
onInterrupt: a method for assisting a service terminal.
onUnbind: method for auxiliary function shutdown.
A desensitization encryption method for sending information by a mobile device chat tool, as shown in fig. 1 to 2, comprising the following steps:
the first step is as follows: defining a Service class in an android, then enabling the class to inherit from an auxiliary class, and rewriting three methods in the auxiliary class in the Service class, wherein the three methods are a Service connection configuration initialization method (onServiceConnected), an auxiliary Service event processing method (onaccessibivievent) and an auxiliary Service terminal method (onintercept); detailed explanation is respectively realized in the rewriting method on how to realize the desensitization encryption method, how to use the auxiliary class to complete the realization of the desensitization encryption method function, how to realize the monitoring of the input content and how to release and store after monitoring the data, and the flow of the step is shown in fig. 1; the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; adding a binding auxiliary service authority into a declared service class, adding a meta-data tag into the declared service, and defining and configuring a name and a resource configuration file in the tag; the specific configuration content is as follows:
(1) the service is interested in which changes in the interface, i.e. which event notifications, such as window open, slide, focus change, long press, etc., within the present technology we need the notifications defined herein to be get layout type focus notifications and text layout content change notifications.
(2) Defining feedback means, such as voice play, vibration or visual feedback, where the defined notification means of visual feedback is needed within the present technology.
(3) If you want to obtain the formatting of the frame content in the service, here the technology needs to set its value to true.
(4) The time interval for accepting the event is defined, and the time interval can be customized according to requirements, and a time format is calculated by taking milliseconds as a unit, wherein the time format is set to be one hundred milliseconds in the technology.
The added meta-data tag configuration information may be defined in the resource file, or may be configured in the defined Service, generally in the Service class rewritten Service connection configuration initialization method.
The third step: an auxiliary service event processing method (onaccessibirityevent) and an auxiliary service terminal method (onanterrupt) are realized in the subclass service;
an auxiliary service event processing method (onaccesibilitityevent) is a core method of the present invention, wherein a parameter event encapsulates information from an interface-related event, for example, an event type of the event can be obtained, and different processing modes are selected according to the starting type, most functions of the desensitization encryption method for sending information by a chat tool of the present invention are monitored by the method memorability, when a monitored picture layout event is registered, when the event occurs or is called, the defined auxiliary service event processing method is notified, for example: when the user uses the chatting tool to send pictures, the auxiliary service event processing method is called, then corresponding processing is carried out in the auxiliary service event processing method, the state that the user sends the pictures can be monitored, and then screen capture operation is carried out.
If the event source is a tree structure, a set of all values with a text attribute on the tree is acquired at the moment, and then the content input by the user can be acquired through the event source which is currently touched and executed and the text information and the text set of the event source.
The onInterrupt method is invoked when the system wants to interrupt the response returned by the accessibility service, and is invoked many times throughout the life cycle.
The fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone, and then opening the auxiliary class to execute the method in the third step to perform monitoring and auditing of the character series;
the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; if the content acquired from the fourth step contains a secret-related field strategy, forcibly executing the steps of copying, cutting, desensitizing and pasting from the character input box by using an auxiliary function to realize the desensitizing method of the sensitive vocabulary;
and a sixth step: and adding a method for detecting whether the auxiliary function is started in the program, wherein the method can remind a user to start and execute the step in the fourth step after the auxiliary function is closed.
The method mainly adopts auxiliary function type Android access in an Android system to realize the acquisition of the contents of all nodes of view in a screen, button click events of an input method soft keyboard and character contents typed by the soft keyboard, so that the acquired contents are monitored, whether the violation phenomenon occurs in the input contents is judged according to a self-defined examination mechanism, and a sent desensitization field or vocabulary is forcibly changed into a symbol, so that the aim that the designed sensitive vocabulary cannot be sent out is fulfilled.
The method avoids the defects that the equipment must Root and the special requirements on equipment hardware and manufacturer customized system standards are needed on the basis that the content sent by the three-party application can be forcibly changed by utilizing the Root authority, the user can acquire the input content when inputting the content by using the soft keyboard, then forcibly encrypts and desensitizes the sensitive vocabulary designed in the input content, and the method can achieve good supporting effect on various input methods and the system default Google input method soft keyboard.
The method and the device can acquire any text content input by the user through the input method soft keyboard, can adapt to any android equipment capable of installing the input method, and have no limit on the android system to be compatible with various high and low version systems and various android customization systems. When a user on the equipment uses an instant tool for chatting or uses a third party forum, a microblog and the like to input text content by using an input method soft keyboard, the user can acquire and monitor the input content and then forcibly encrypt and desensitize sensitive words designed in the monitored content.
The method implemented in the subclass service in the third step of the present invention may further include a service connection configuration initialization method (onServiceConnected). The system will call this method when the connection to the service is successful, in which method an initialization can be done, for example the sound shock management of the device, or a configuration can be done using the service information configuration method.
The method implemented in the subclass service in the third step of the present invention may also have an auxiliary function shutdown method (onUnbind). This accessibility service is invoked when the system is about to shut down. In this method some work is done to release resources.
As shown in fig. 3, the implementation method of the present invention is:
step 1) downloading a strategy built in a server at a mobile terminal, wherein the strategy is a command for executing picture audit.
And 2) judging whether the current strategy contains the sub-strategy of the confidential field, if so, indicating that the client is required to execute a scheme of inputting character monitoring, and then desensitizing sensitive words on the basis of character monitoring.
And judging whether the auxiliary function of the current application is started, if so, monitoring for acquiring the text content is executed, and if not, the program automatically opens a set-auxiliary function interface to find the corresponding application name for selection.
When the judgment of whether the auxiliary function is started or not is carried out, the judgment method is put in one service for carrying out judgment at any time, so that the user can be reminded that the auxiliary function is not started at the same time when the auxiliary function is closed, and the user is guided to set the auxiliary function for checking the corresponding application.
And 3) opening any application needing to write the content by using the soft keyboard, inputting the content to be edited in the popped soft keyboard, and monitoring all the contents from the first character to the last character input by the program.
And 4) according to the sensitive words in the secret-related field strategy issued by the server, performing steps of copying, cutting, desensitizing and pasting on all the character contents input in the input frame monitored in the step 3) to perform desensitization operation on the data.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments or portions thereof without departing from the spirit and scope of the invention.
Claims (7)
1. A desensitization encryption method for sending information by a mobile device chat tool is characterized by comprising the following steps:
the first step is as follows: defining a service class in an android, then enabling the service class to inherit from an auxiliary class, rewriting a service connection configuration initialization method, an auxiliary service event processing method and an auxiliary service terminal method in the auxiliary class in the service class, and elaborating in detail the aims of achieving the function of using the auxiliary class to audit pictures, achieving the monitoring of sent pictures and releasing and storing after monitoring the sent pictures in the rewriting method;
the second step is that: further declaring the service class in the first step in a configuration file automatically generated by the android project; adding a binding auxiliary service authority into a declared service class, adding a meta-data tag into the declared service, and defining and configuring a name and a resource configuration file in the tag;
the third step: implementing an auxiliary service event processing method and an auxiliary service terminal method in a subclass service;
the fourth step: finding the auxiliary class realized in the third step by the auxiliary function in the mobile phone, and then opening the auxiliary class to execute the method in the third step to perform monitoring and auditing of the character series;
the fifth step: according to a strategy of a secret field issued from a server, then, according to the monitored text content, starting an examination mechanism, and judging whether the content is monitored to have violation behaviors or not; if the content acquired from the fourth step contains a secret-related field strategy, forcibly executing the steps of copying, cutting, desensitizing and pasting from the character input box by using an auxiliary function to realize the desensitizing method of the sensitive vocabulary;
and a sixth step: and adding a method for detecting whether the auxiliary function is started or not in the android program to be applied, wherein the method can remind a user to start and execute the step in the fourth step after the auxiliary function is closed in the application.
2. The method of claim 1, wherein the encryption is applied to a mobile device chat facility for desensitizing the transmission of messages, wherein: the contents to be configured in the second step comprise interface changes which are interesting to the service, a feedback mode is defined, whether the service can access the contents in the active window or not is defined, and a time interval for receiving events is defined.
3. The method of claim 1, wherein the encryption is applied to a mobile device chat facility for desensitizing the transmission of messages, wherein: the method implemented in the subclass service in the third step is also a service connection configuration initialization method.
4. A method of desensitising encryption of messages sent by a mobile device chat facility according to claim 1 or 3, characterised in that: the method implemented in the subclass service in the third step also has an auxiliary function closing method.
5. The method of claim 2, wherein the encryption is applied to a mobile device chat facility for sending messages, and wherein: the interface changes that are of interest to the service include window opening, sliding, focus change, and long press.
6. A method of desensitising encryption of messages sent by a mobile device chat facility according to claim 2 or 5, characterised in that: the defined feedback mode is voice playing, vibration or visual feedback.
7. The method of claim 6, wherein the encryption is applied to a mobile device chat facility for sending messages, and wherein: the time interval defining the acceptance event is one hundred milliseconds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810977467.XA CN110858250A (en) | 2018-08-24 | 2018-08-24 | Desensitization encryption method for sending information by mobile equipment chat tool |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810977467.XA CN110858250A (en) | 2018-08-24 | 2018-08-24 | Desensitization encryption method for sending information by mobile equipment chat tool |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110858250A true CN110858250A (en) | 2020-03-03 |
Family
ID=69635706
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810977467.XA Pending CN110858250A (en) | 2018-08-24 | 2018-08-24 | Desensitization encryption method for sending information by mobile equipment chat tool |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110858250A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113468620A (en) * | 2021-07-21 | 2021-10-01 | 赞同科技股份有限公司 | Method and device for realizing safety keyboard |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104850241A (en) * | 2015-05-28 | 2015-08-19 | 北京奇点机智信息技术有限公司 | Mobile terminal and text input method thereof |
CN106603540A (en) * | 2016-12-21 | 2017-04-26 | 北京天融信网络安全技术有限公司 | Method and device for monitoring instant communication information |
CN106845218A (en) * | 2016-12-22 | 2017-06-13 | 山东华软金盾软件股份有限公司 | A kind of word auditing method of mobile device |
US20170316220A1 (en) * | 2015-01-21 | 2017-11-02 | Secure Islands Technologies Ltd | Method for allowing data classification in inflexible software development environments |
-
2018
- 2018-08-24 CN CN201810977467.XA patent/CN110858250A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170316220A1 (en) * | 2015-01-21 | 2017-11-02 | Secure Islands Technologies Ltd | Method for allowing data classification in inflexible software development environments |
CN104850241A (en) * | 2015-05-28 | 2015-08-19 | 北京奇点机智信息技术有限公司 | Mobile terminal and text input method thereof |
CN106603540A (en) * | 2016-12-21 | 2017-04-26 | 北京天融信网络安全技术有限公司 | Method and device for monitoring instant communication information |
CN106845218A (en) * | 2016-12-22 | 2017-06-13 | 山东华软金盾软件股份有限公司 | A kind of word auditing method of mobile device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113468620A (en) * | 2021-07-21 | 2021-10-01 | 赞同科技股份有限公司 | Method and device for realizing safety keyboard |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10257334B1 (en) | Wireless device gesture detection and operational control | |
US7774713B2 (en) | Dynamic user experience with semantic rich objects | |
CN109491567B (en) | Message reply method, device, terminal and storage medium | |
US20150334118A1 (en) | Method and apparatus for clearing notification icon, and storage medium | |
CN114237399B (en) | Haptic feedback method, apparatus, medium, and device | |
US20190005228A1 (en) | Trusted and untrusted code execution in a workflow | |
CN112732386A (en) | Message processing method, device, terminal and storage medium | |
CN110574006B (en) | System and method for automatically synchronizing responses and conditions on a device | |
US20240086849A1 (en) | Creating tracked issue using issue-creation emoji icon | |
JP2024508452A (en) | Hosting event-based applications | |
TWI658401B (en) | Mobile communication device based on virtual mobile infrastructure and related input method switching methods thereof | |
CN107436802B (en) | Control method, system, medium and computing device for application program | |
CN111970192B (en) | Information editing method and device based on session group | |
CN110858250A (en) | Desensitization encryption method for sending information by mobile equipment chat tool | |
CN107515666A (en) | A kind of data managing method and terminal | |
WO2022037627A1 (en) | Integrated management method, apparatus and system for artificial intelligence applications | |
CN110858174A (en) | Picture auditing method for mobile device chat software | |
CN109189536A (en) | A kind of terminal applies display methods and system | |
CN108897479A (en) | A kind of terminal touch control method and system | |
CN113343138A (en) | Rollback interception method and device, intelligent terminal and storage medium | |
WO2012055176A1 (en) | Processing method for mobile terminal and mobile terminal | |
US11659021B2 (en) | Asynchronous distributed modular function calling | |
WO2024131568A1 (en) | Session information processing method and related device | |
WO2023154833A1 (en) | Encoding/decoding user interface interactions | |
Anumula | Auto profile |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200303 |
|
RJ01 | Rejection of invention patent application after publication |