Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for isolating applications through data

A data isolation and data technology, applied in the field of communication, can solve the problems of not being able to find QQ, waste network traffic, occupy mobile phone memory, etc., and achieve the effect of protecting privacy, facilitating reuse, and saving terminal memory and network traffic

Inactive Publication Date: 2014-09-03
SHANGHAI ZHUO YOU NETWORK TECH
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But in the process of using, the above method has the following disadvantages. When the visitor wants to run the QQ that has been hidden, because he cannot find the QQ icon, he will mistakenly think that the owner has not installed QQ, and will reinstall a QQ, which will repeat the installation. The same application takes up extra phone memory and wastes network traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for isolating applications through data
  • Method and system for isolating applications through data
  • Method and system for isolating applications through data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0036] The first embodiment of the present invention relates to a method for isolating application usage data. The specific process is as figure 1 shown, including the following steps:

[0037] Step 101: When entering the guest mode, end all applications running before entering the guest mode.

[0038] Step 102: After ent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of communications and discloses a method and system for isolating applications through data. The method includes the following steps that when a user enters a visitor mode, all the applications running before the user enters the visitor mode are ended; after the user enters the visitor mode, a directory for storing host data generated in the application running process before the user enters the visitor mode is hidden; when the hidden applications of the directory for storing host data are run in the visitor mode, a directory for storing visitor data generated by running the applications is generated; before the user exits the visitor mode, the directory for storing visitor data is deleted; the directory for storing host data is displayed again. Compared with the prior art, not only does a terminal reserve data used when the applications are run by a terminal host, but also the privacy of the terminal host can be effectively protected.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and a system for isolating application usage data. Background technique [0002] In real life, we usually encounter such a problem. When someone borrows our mobile phone to open an application, such as QQ, and usually uses the account and password of the QQ before the account and / or password dialog box already exists, we Usually you don’t want others to know your account number and password, especially your password, but you don’t want to have to manually enter your account number and / or password every time you log in to this application, especially if you forget what your account number and / or password are , there is no way to log in to the app. [0003] In order to overcome this defect of the terminal, a normal mode and a guest mode are set in the terminal in the prior art. In the normal mode, even if you log out of the application, the account and password will still exist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209
Inventor 李林杨虎
Owner SHANGHAI ZHUO YOU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products