Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private application program starting method and device

An application and privacy technology, applied in the field of communication, can solve the problems of inability to guarantee application privacy security, user privacy leakage, etc., to achieve the effect of improving experience, protecting privacy security, and strong privacy

Inactive Publication Date: 2017-03-29
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the shortcut icons and application names of existing application programs are generally directly displayed in the main interface of the mobile terminal, anyone can directly determine the type and content of the application program through the shortcut icons and application names. The security issue of user privacy leakage caused by being opened, browsed or operated by others
[0003] In the prior art, in order to solve the above-mentioned existing problems, it is usually adopted to prevent malicious use and view the application program of the mobile terminal by setting a password to the mobile terminal operating system, thereby protecting the privacy of the application program; but if the mobile terminal When it is in the unlocked state, the application program is always exposed in its main interface. If the mobile terminal is obtained by others at this time, there is still the problem that the privacy security of the mobile terminal application program cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private application program starting method and device
  • Private application program starting method and device
  • Private application program starting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0052] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a private application program starting method and device. The method comprises the following steps of: detecting a trigger operation carried out on a disguised application icon of any private application program by a user, and displaying a starting verification interface matched with an application scene pointed by the disguised application icon; receiving password information input by the user through the starting verification interface and verifying the received password information; and when the continuous verification failure frequency of the password information is greater than a predetermined threshold value, starting a shooting application program to shoot the user. According to the technical scheme of the invention, the private application program displays the starting verification interface matched with the application scene pointed by the disguised application icon if a second person except the user of terminal touches the private application program when a screen of the terminal is unlocked, so that the second person cannot know the real content information of the private application program, and the second person does not think that the private application program is disguised or encrypted, thereby achieving a relatively high disguise effect.

Description

technical field [0001] The present invention relates to the field of communication technology, and in particular, the present invention relates to a method for starting a privacy application program and a device for starting a privacy application program. Background technique [0002] The Internet has entered a mature era, and more and more attention has been paid to the communication between the network and users, making smart mobile terminals gradually become a must-have for most Internet users, and various corresponding applications have emerged as the times require . However, since the shortcut icons and application names of existing application programs are generally directly displayed in the main interface of the mobile terminal, anyone can directly determine the type and content of the application program through the shortcut icons and application names. The security issue of user privacy leakage caused by being opened by others to browse or operate. [0003] In the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/445G06F21/31G06F21/46G06F21/51
CPCG06F9/44505G06F21/31G06F21/46G06F21/51G06F2221/2133
Inventor 刘刚纪纲郭帅陈佩翰徐利军郭宗赣
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products