Application protection method, device and terminal

An application program and terminal technology, applied in the network field, can solve problems such as information leakage

Active Publication Date: 2017-02-15
XIAOMI INC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the protected application program is already running when the password protection interface is started, the protected application program may leak information in the application program by playing sound or other means, the present disclosure provides an application program protection method , devices and terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application protection method, device and terminal
  • Application protection method, device and terminal
  • Application protection method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In order to make the purpose, technical solution and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present disclosure are used to explain the present disclosure, but not to limit the present disclosure.

[0076] Embodiments of the present disclosure provide an application program protection method, device, and terminal. The embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings.

[0077] Please refer to figure 1 , which shows an exemplary method flowchart of the application program protection method provided by an embodiment of the present disclosure. In this embodiment, the application program protection method is applied to a terminal capable of running application programs for illustration. The application program protection method includes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to an application program protection method, device and terminal, and belongs to the field of terminal security. The method includes: intercepting the start request, and the start request is used to request to start the application program; determining whether the application program to be started needs to be protected according to the start request; if the application program needs to be protected, start the protection interface. This disclosure starts the protection interface when detecting that the application program to be started needs to be protected, and restarts the application program when receiving the release signal corresponding to the protection interface; It is already in the running state, resulting in the possibility of leaking the information in the application through playing sound, etc., so that when it is detected that the started application needs to be protected, it directly starts the protection interface without starting the application, so as to completely and completely The effect of protecting the application.

Description

technical field [0001] The present disclosure relates to the field of network technologies, and in particular to an application program protection method, device and terminal. Background technique [0002] With the development of electronic technology, digital products are more and more widely used in various fields of life and work. The mobile phone is closely related to people's life, because various application programs in the mobile phone store relatively private content, and users usually do not want people other than themselves to see these content, so these application programs need to be protected. [0003] Usually, the system checks the system startup log or circularly queries the running applications. When it detects that the application that has just started or is running is an application that needs to be protected, the password protection interface will be overlaid on the protected application. On the user interface of the application, when the password corresp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/51
CPCG06F21/12G06F21/51G06F21/6281G06F21/10G06F21/36G06F3/048G06F9/445G06F21/629G06F2221/2137G06F2221/2147G06F2221/2141
Inventor 杨亮王文林万钰臻
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products