Operational copy hiding method and device based on application multi-open

A copy and privacy technology, applied in the computer field, can solve the problems of privacy account security and lack of privacy, and achieve the effect of improving user experience, improving privacy, and improving security.

Inactive Publication Date: 2016-12-07
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, in order to solve the technical problem of insufficient security and privacy of the private account in the scheme of double-opening or multiple-opening of applications in the traditional technology, a running copy hiding method based on multiple-opening of applications is proposed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operational copy hiding method and device based on application multi-open
  • Operational copy hiding method and device based on application multi-open
  • Operational copy hiding method and device based on application multi-open

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] In order to solve the technical problem of insufficient security and privacy of the private account in the scheme of double-opening or multiple-opening of applications in the traditional technology, in this embodiment, a method for hiding running copies based on multiple-opening of applications is proposed. The realization of can depend on computer program, and this computer program can be run on the computer system based on Von Neumann system, and this compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an operational copy hiding method based on application multi-open. The operational copy hiding method comprises the following steps of: receiving an application multi-open instruction, and starting at least two operational copies of an application corresponding to the application multi-open instruction, wherein the at least two operational copies correspond to different login account numbers; determining a privacy operational copy in the displayed operational copies according to an input privacy copy assignment instruction; and detecting fingerprint input of users, and hiding the privacy operational copy when the fingerprint input is matched with pre-recorded reference fingerprints corresponding to the login account number corresponding to the privacy operational copy. The embodiment of the invention further discloses an operational copy hiding device based on application multi-open. By means of the operational copy hiding method and device based on application multi-open disclosed by the invention, the security of user privacy data can be improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for hiding running copies based on multiple application openings. Background technique [0002] With the development of the mobile Internet and the enrichment of functions of smart phones, users have more and more requirements for applications on terminals such as smart phones. In the process of using the terminal, the user may need to log in to the same application with multiple accounts at the same time. For example, in social software such as Weibo, WeChat, and whatsapp, users need to separate work accounts from life accounts, and also need to receive and process related news about work accounts and life accounts at the same time; or game players have multiple accounts in one game, And each account corresponds to a role in the game, such as mage, warrior, priest, etc. The experience corresponding to each role is different, and in most cases, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6245
Inventor 刘东海庞敏
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products