Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Application hiding control method and device

A control method and target application technology, applied in the field of application hiding control methods and devices, can solve problems such as inability to hide applications, poor user experience, and abnormal operation of background applications, and achieve the effect of complete hiding and fast startup speed

Active Publication Date: 2015-02-25
BEIJING QIHOO TECH CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the first method adds a verification link, it will obviously cause the effect of no silver here, attracting the attention of others, and cannot achieve the purpose of completely hiding the application, and the user experience is also poor due to the verification link
[0007] The second method will cause the hidden application to fail to start normally, and its background application cannot run normally. It needs to be loaded through the so-called parasitic application after running, and even needs to rely on specific conditions to start normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application hiding control method and device
  • Application hiding control method and device
  • Application hiding control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0061] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the security control technology of intelligent equipment and discloses an application hiding control method. The method comprises the first step of determining a target application to be hidden, the second step of transmitting a broadcast message representing that the target application is deleted, and the third step of intercepting an access instruction of a starter process to the target application and correspondingly returning a null value to the process of the starter for the target application so as to hide a shortcut icon of the target application in the starter. Furthermore, the method can include the following supplementary steps of determining a hidden target application to be displayed and transmitting a broadcast message representing that the hidden target application is added so as to display a shortcut icon of the target application in the starter. By means of the method, the application program can be hidden in the starter, and follow-up normal running of the application program is not influenced. The application hiding control method can be applied to an Android operating system and can also be applied to an operating system environment provided with a similar framework or mechanism.

Description

technical field [0001] The invention relates to a security control technology of an intelligent device, in particular to an application hiding control method and device. Background technique [0002] Taking the Android platform as an example, the mobile terminal device provides a user interface through a launcher to realize human-computer interaction with the user. The launcher provides a desktop on which icons of installed applications can be displayed. By clicking on these icons, the corresponding application can be started. For privacy protection, users sometimes do not want certain applications to be discovered or run by unauthorized persons, so as to protect their personal privacy. In the prior art, two methods are generally adopted for protection: [0003] The first way is to add a program lock to the program. When the user clicks on the relevant icon, a verification program will be run first, and only after the password verification is passed, the real target applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/629
Inventor 杨威曹阳窦文科符传坚藏春晖
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products