[go: up one dir, main page]

CN106778096A - The camouflage method and mobile terminal of a kind of application program - Google Patents

The camouflage method and mobile terminal of a kind of application program Download PDF

Info

Publication number
CN106778096A
CN106778096A CN201611233325.XA CN201611233325A CN106778096A CN 106778096 A CN106778096 A CN 106778096A CN 201611233325 A CN201611233325 A CN 201611233325A CN 106778096 A CN106778096 A CN 106778096A
Authority
CN
China
Prior art keywords
application program
pattern
topology
dendrogram
entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611233325.XA
Other languages
Chinese (zh)
Inventor
陈睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201611233325.XA priority Critical patent/CN106778096A/en
Publication of CN106778096A publication Critical patent/CN106778096A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention discloses the camouflage method and mobile terminal of a kind of application program, and methods described can disguise oneself as the second application program the first application program, including:The topology file of first application program, the first dendrogram of generation are read, and reads the topology file of second application program, generate the second dendrogram;Generate the hash table for recording first dendrogram and the second dendrogram corresponding relation;If first application program is activated, data are obtained from first application program, and the corresponding entrance of second application program and pattern are searched from the hash table;The data are bolted together with the corresponding pattern.The present invention can enable the first application program be presented with the pattern of the second application program, and lifting user uses the privacy of application program.

Description

The camouflage method and mobile terminal of a kind of application program
Technical field
The present invention relates to field of terminal technology, more particularly to a kind of application program camouflage method and mobile terminal.
Background technology
The development of application APP embodies the development of mobile terminal to a certain extent, with the development of mobile terminal, Many represent form and manifestation mode come the need for meeting under user's special scenes using having had.User can in actual life Can encounter following scene:As user is currently in use an application program, but user is not intended to by other friends in use Friend sees that is, some see that user is currently in use application program movement eventually when user always comes and goes in great number in use End.
The content of the invention
Camouflage method and mobile terminal it is a primary object of the present invention to propose a kind of application program, it is intended to propose a kind of The realization of camouflage applications program, i.e., when user is currently in use certain application program, user can be applied this by this programme Program camouflage turns into other application programs, when having other friends or passerby by seeing, it is found that user uses it His application program, rather than application.
To achieve the above object, the present invention proposes a kind of camouflage method of application program, is applied to mobile terminal, its feature It is that methods described can disguise oneself as the second application program the first application program, including:
The topology file of first application program is read, the first dendrogram is generated, and read second application program Topology file, generate the second dendrogram;
Generate the hash table for recording first dendrogram and the second dendrogram corresponding relation;
If first application program is activated, data are obtained from first application program, and from the hash The corresponding entrance of second application program and pattern are searched in table;
The data are bolted together with the corresponding pattern.
Alternatively, the topology file of the first application program of the parsing, the first dendrogram of generation includes:
Obtain the main-inlet of first application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in In one structure;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And The m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in m In+1 structure;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command;
Or, the topology file of the second application program of the parsing, generating the second dendrogram includes:
Obtain the main-inlet of second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in In one structure;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And The m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in m In+1 structure;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
Alternatively, if first application program is activated, data are obtained from first application program, from The corresponding entrance of second application program and pattern are searched in the hash table to be included:
If searching less than the corresponding counterpart and pattern, the default style of second application program is returned.
Alternatively, the hash table bag generated for recording first dendrogram and the second dendrogram corresponding relation Include:
First application program topology file corresponding with second application program is stored in a node.
Alternatively, the topology file of parsing first application program, generates the first dendrogram;Parse described second The topology file of application program, generates the second dendrogram;Including:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read The topology file of first application program is taken, second thread goes to read the topology file of second application program.
Additionally, to achieve the above object, the present invention also provides a kind of mobile terminal, it is characterised in that including:
Reading unit, the topology file for reading first application program generates the first dendrogram, and read described The topology file of the second application program, generates the second dendrogram;
Corresponding unit, for generating the hash table for recording first dendrogram and the second dendrogram corresponding relation;
Start unit, if being activated for first application program, data is obtained from first application program, And the corresponding entrance of second application program and pattern are searched from the hash table;
The start unit is additionally operable to be bolted together the data with the corresponding pattern.
Alternatively, the reading unit is used for:
Obtain the main-inlet of first application program or the second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in In one structure;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And The m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in m In+1 structure;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
Alternatively, if the start unit is additionally operable to search less than the corresponding counterpart and pattern, described the is returned The default style of two application programs.
Alternatively, the corresponding unit is additionally operable to first application program cloth corresponding with second application program Office file is stored in a node.
Alternatively, the reading unit is used for:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read The topology file of first application program is taken, second thread goes to read the topology file of second application program.
The camouflage method and mobile terminal of application program proposed by the present invention, make user also can arbitrarily be visited in specific scene Application program is asked, so as to improve the use habit of user.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram of the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the schematic flow sheet of one embodiment of the camouflage method of application program in the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of another embodiment of the camouflage method of application program in the embodiment of the present invention;
Fig. 4 is the schematic diagram of the dendrogram of another embodiment of the camouflage method of application program in the embodiment of the present invention;
Fig. 5 is the structural representation of one embodiment of mobile terminal in the embodiment of the present invention;
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the invention is realized referring now to Description of Drawings.In follow-up description, use For represent element such as " module ", " part " or " unit " suffix only for being conducive to explanation of the invention, itself Not specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram for realizing the optional intelligent terminal of each embodiment one of the invention.
Intelligent terminal 100 can include wireless communication unit 110, A/V (audio/video) input block 120, user input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190 Etc..
Fig. 1 shows the mobile terminal 1 00 with various assemblies, it should be understood that being not required for implementing all showing The component for going out.More or less component can alternatively be implemented.The element of mobile terminal 1 00 will be discussed in more detail below.
Wireless communication unit 110 can generally include one or more assemblies, and it allows mobile terminal 1 00 and radio communication Radio communication between system or network.For example, wireless communication unit 110 can include that broadcasting reception module 111, movement are logical At least one of letter module 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 is received.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of DMB (DMB) The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast Receiver module 111 can receive signal and broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111 Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video Broadcast-hand-held (DVB-H), Radio Data System, the received terrestrial digital broadcasting integrated service of forward link media (MediaFLO@) Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module 115 typical case is GPS (global positioning system).According to current technology, GPS calculate from three or more satellites away from Information application triangulation from information and correct time information and for calculating, so as to according to longitude, latitude and height Degree calculates three-dimensional current location information exactly.Currently, three satellites are used simultaneously for calculating the method for position and temporal information And the position by using other satellite correction calculating and the error of temporal information.Additionally, GPS can be by real time Continuous plus current location information carrys out calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121 Microphone wind 122, the static map that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus The view data of piece or video is processed.Picture frame after treatment may be displayed on display unit 151.At camera 121 Picture frame after reason can be stored in memory 160 (or other storage mediums) or carried out via wireless communication unit 110 Send, two or more cameras 121 can be provided according to the construction of mobile terminal 1 00.Microphone wind 122 can be in telephone relation Sound (voice data) is received via microphone wind 122 in pattern, logging mode, speech recognition mode etc. operational mode, and And can be voice data by such acoustic processing.Audio (voice) data after treatment can be in the feelings of telephone calling model The form that being converted under condition can be sent to mobile communication base station via mobile communication module 112 is exported.Microphone wind 122 can be real Various types of noises elimination (or suppression) algorithms are applied to eliminate (or suppression) product during receiving and sending audio signal Raw noise or interference.
User input unit 130 can generate key input data to control mobile terminal 1 00 according to the order of user input Various operations.User input unit 130 allow the various types of information of user input, and can include keyboard, metal dome, Touch pad (for example, detection due to being touched caused by resistance, pressure, electric capacity etc. change sensitive component), roller, shake Bar etc..Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, (for example, mobile terminal 1 00 opens or closes shape State), the presence or absence of the contact (that is, touch input) of the position of mobile terminal 1 00, user for mobile terminal 1 00, mobile terminal The acceleration or deceleration movement of 100 orientation, mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00 The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 can include proximity transducer 141.
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for reception and come from The input (for example, data message, electric power etc.) of the external device (ED) and input that will be received is transferred in mobile terminal 1 00 One or more elements can be used for transmitting data between mobile terminal 1 00 and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity Power provides to the path of mobile terminal 1 00 from base or can serve as allowing the various command signals being input into from base to pass through it It is transferred to the path of mobile terminal 1 00.Can serve as recognizing mobile terminal 1 00 from the various command signals or electric power of base input Whether signal base on is accurately fitted within.Output unit 150 is configured to be provided with vision, audio and/or tactile manner Output signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include aobvious Show unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, show video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit 151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired implementation method, mobile terminal 1 00 can include two or more display units (or other display devices), for example, moving Dynamic terminal 100 can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect Touch input pressure and touch input position and touch input area.
Dio Output Modules 152 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00 It is that wireless communication unit 110 is received or in memory when under the isotypes such as formula, speech recognition mode, broadcast reception mode In 160 store voice data transducing audio signal and be output as sound.And, dio Output Modules 152 can provide with The audio output of the specific function correlation that mobile terminal 1 00 is performed is (for example, call signal receives sound, message sink sound etc. Deng).Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output and be notified to mobile terminal 1 00 with by event.Typical event can be with Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit 153 can in a different manner provide output with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating Output is provided, when calling, message or some other entrance communication (incoming communication) are received, alarm list Unit 153 can provide tactile output (that is, vibrating) to notify to user.Exported by providing such tactile, even if When in pocket of the mobile phone of user in user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the treatment and control operation performed by controller 180 etc., Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And, memory 160 can store the vibration of various modes on being exported when touching and being applied to touch-screen and audio signal Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data Communication, video calling etc. related control and treatment.In addition, controller 180 can be included for reproducing (or playback) many matchmakers The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or can be structured as and control Device 180 is separated.Controller 180 can be with execution pattern identifying processing, the handwriting input that will be performed on the touchscreen or picture Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Appropriate electric power needed for part and component.
Various implementation methods described herein can be with use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implement for hardware, implementation method described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein At least one in electronic unit is implemented, and in some cases, such implementation method can be implemented in controller 180. For software implementation, the implementation method of such as process or function can with allow to perform the single of at least one function or operation Software module is implemented.Software code can be come by the software application (or program) write with any appropriate programming language Implement, software code can be stored in memory 160 and performed by controller 180.
So far, oneself according to its function through describing mobile terminal 1 00.In addition, the mobile terminal 1 00 in the embodiment of the present invention Can be such as folded form, board-type, oscillating-type, sliding-type and other various types of mobile terminals, not do herein specifically Limit.
Based on above-mentioned mobile terminal hardware configuration, the inventive method each embodiment is proposed.
As shown in Fig. 2 first embodiment of the invention provides a kind of camouflage method of application program, mobile terminal is applied to, Methods described can disguise oneself as the second application program the first application program, and user pretends into application program, and selection will be pretended The first application program and the second application program to be disguised oneself as and click on determination, camouflage method is specifically included:
S201, beginning;
S202, the topology file for reading first application program, generate the first dendrogram, and read second application The topology file of program, generates the second dendrogram;
S203, generate hash table for recording first dendrogram and the second dendrogram corresponding relation;
The hash table records two application programs and is laid out corresponding relation respectively, in another embodiment of the invention, can It is stored in a node with by first application program topology file corresponding with second application program;If i.e. The main-inlet of one application program is that the tree node Nodea0 that main activity sets up and the main activity of the second application program set up Several sections of point Nodeb0, then can notify user pretend completed;
Whether S204, detection first application program are activated, if so, then entering step S205;If otherwise such as step Shown in S207, terminate process;
S205, from first application program data are obtained, second application program is searched from the hash table Corresponding entrance and pattern;
In the specific implementation, if searching less than the corresponding counterpart and pattern, described second can be returned and applies journey The default style of sequence;
S206, the data are bolted together with the corresponding pattern;
S207, end process.
In the present embodiment, if the first application program starts to start, can be from the first application program in activity Server gets on to obtain data, and camouflage applications procedure service is returned to by by the data of the first application requests MaskServiceManager, the service tree-shaped system opening relationships table h before, finds the second application program corresponding The corresponding patterns of activity, activity in the second application program and corresponding pattern are loaded out to being presented to user.
Second embodiment of the invention provides a kind of camouflage method of application program, is applied to mobile terminal, and the method includes The step of step includes is identical with the S201 to S207 referred in first embodiment, and as detailed above, here is omitted.
Unlike, as shown in figure 3, in the present embodiment, in step S202, reading the layout text of first application program Part, the first dendrogram of generation is specifically included:
S301, beginning;
S302, the main-inlet for obtaining first application program, i.e., main activity;
The first topology file layout and the first pattern of S303, the expandable mark language XML of the acquisition main-inlet Theme, and be stored in first structure body;
Whether S304, parsing first topology file have the related instruction of skip command;If so, then entering step S305;If it is not, then as depicted at step 309, terminating process;
S305, acquisition redirect the title of entrance;And the of the corresponding expandable mark language XML of entrance is redirected described in parsing Two topology files and the second pattern, and be stored in the second structure;And the head of second structure points to first sample Formula;
Whether S306, parsing m topology files have the related instruction of skip command;If so, then entering step S307;If It is no, then as depicted at step 309, terminate process;
S307, acquisition redirect the title of entrance;And the of the corresponding expandable mark language XML of entrance is redirected described in parsing M+1 topology files and m+1 patterns, and be stored in m+1 structures;And the head of the m+1 structures points to m samples Formula;Wherein, m=2;
S308, m=m+1 is made, and return to step S25, until the m topology files do not have the related finger of skip command Order.
So all of activity can be traveled through completion, now generate a dendrogram as shown in Figure 4.
In step S202, the topology file of second application program is read, generate the specific steps of the second dendrogram Method with generation the first dendrogram specific steps method it is identical, only step S302, obtain be not the first application program Main-inlet, but the main-inlet of the second application program.
Third embodiment of the invention provides a kind of camouflage method of application program, is applied to mobile terminal, and the method includes The step of step includes is identical with the S201 to S207 referred in first embodiment, and as detailed above, here is omitted.
Unlike, as shown in figure 3, in the present embodiment, step S202 in the specific implementation, can be in system service First thread and the second thread are opened in system_service processes, wherein, the first thread goes reading described first to answer With the topology file of program, second thread goes to read the topology file of second application program.The specific method of reading The step of referring in second embodiment S301 to S309 is referred to, as detailed above, be will not be repeated here.
The camouflage method to the application program in the embodiment of the present invention is described above, below to the embodiment of the present invention In mobile terminal be described.
As shown in figure 5, fourth embodiment of the invention proposes a kind of mobile terminal, the first application program can be disguised oneself as second Application program, for example, user pretends into application program, and chooses the first application program to be pretended and to be disguised oneself as second Application program simultaneously clicks on determination, and the mobile terminal includes reading unit 10, corresponding unit 20, start unit 30;Wherein:
Reading unit 10 is used to read the topology file of first application program, generates the first dendrogram, and read institute The topology file of the second application program is stated, the second dendrogram is generated;
Corresponding unit 20 is used to generate the hash table for recording first dendrogram and the second dendrogram corresponding relation; The hash table records two application programs and is laid out corresponding relation respectively, in another embodiment of the invention, can described in First application program topology file corresponding with second application program is stored in a node;If i.e. first applies journey The main-inlet of sequence is the several sections of points that the tree node Nodea0 that main activity sets up and the main activity of the second application program set up Nodeb0, then can notify that user pretends to have completed;
If start unit 30 is activated for first application program, number is obtained from first application program According to, and the corresponding entrance of second application program and pattern are searched from the hash table;Start unit 30 is additionally operable to and will The data are bolted together with the corresponding pattern.In the specific implementation, if searching less than the corresponding counterpart and sample Formula, then can return to the default style of second application program;
In the present embodiment, if the first application program starts to start, can be from the first application program in activity Server gets on to obtain data, and camouflage applications procedure service is returned to by by the data of the first application requests MaskServiceManager, the service tree-shaped system opening relationships table h before, finds the second application program corresponding The corresponding patterns of activity, activity in the second application program and corresponding pattern are loaded out to being presented to user.
Fifth embodiment of the invention proposes a kind of mobile terminal, including reading unit 10, corresponding unit 20, start unit 30。
Reading in reading unit 10, corresponding unit 20, start unit 30 in the present embodiment and above-mentioned fourth embodiment Unit 10, corresponding unit 20, start unit 30 are identical, and as detailed above, here is omitted.
Unlike, in the present embodiment, reading unit 10 specifically for:
Obtain the main-inlet of first application program or the second application program, i.e., main activity;
The first topology file layout and the first pattern theme of the expandable mark language XML of the main-inlet are obtained, And be stored in first structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If acquisition redirects the title of entrance;And parse It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
So all of activity can be traveled through completion, now generate a dendrogram as shown in Figure 4.
Sixth embodiment of the invention proposes a kind of mobile terminal, including reading unit 10, corresponding unit 20, start unit 30。
Reading in reading unit 10, corresponding unit 20, start unit 30 in the present embodiment and above-mentioned fourth embodiment Unit 10, corresponding unit 20, start unit 30 are identical, and as detailed above, here is omitted.
Unlike, in the present embodiment, reading unit 10 is used for:Opened in system service system_service processes First thread and the second thread, the first thread go to read the topology file of first application program, second thread Remove to read the topology file of second application program.
The camouflage method and mobile terminal of application program proposed by the present invention, can turn into the by the camouflage of the first application program Two application programs, when having other friends or passerby by seeing, it is found that user uses the second application program, Er Fei One application program.Store such as is strolled when user is currently in use Taobao, but user is not desired to be found to be currently in use Taobao and use by other people Family wishes that other people think that user is currently in use wechat, and then user first first can apply journey by what Taobao was set to be pretended Sequence, the second application program is set to by wechat;Take the topology file and topology file for reading wechat and Taobao respectively, and by the cloth Office file is saved in corresponding hash table, in this way, after Taobao is activated, now application program is obtained from Taobao's server Data, and corresponding pattern is obtained from hash table, pattern and data are bolted together, if it find that data are not corresponding Pattern, then using the pattern of acquiescence;So that the first application program can be presented with the pattern of the second application program, lifting user makes With the privacy of application program.
It should be noted that herein, term " including ", "comprising" or its any other variant be intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also include other key elements being not expressly set out, or also include for this process, method, article or device institute are intrinsic Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably implementation method.Based on such understanding, technical scheme is substantially done to prior art in other words The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used to so that a station terminal equipment (can be mobile phone, computer, clothes Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of camouflage method of application program, is applied to mobile terminal, it is characterised in that methods described can apply journey by first Sequence disguises oneself as the second application program, including:
The topology file of first application program is read, the first dendrogram is generated, and read the cloth of second application program Office file, generates the second dendrogram;
Generate the hash table for recording first dendrogram and the second dendrogram corresponding relation;
If first application program is activated, data are obtained from first application program, and from the hash table Search the corresponding entrance of second application program and pattern;
The data are bolted together with the corresponding pattern.
2. the camouflage method of application program according to claim 1, it is characterised in that the cloth of the application program of the parsing first Office file, the first dendrogram of generation includes:
Obtain the main-inlet of first application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in the first knot In structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And Second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in second In structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And parse It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command;
Or, the topology file of the second application program of the parsing, generating the second dendrogram includes:
Obtain the main-inlet of second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in the first knot In structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And Second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in second In structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And parse It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
3. the camouflage method of application program according to claim 1, it is characterised in that if the first application program quilt Start, then obtain data from first application program, second application program is searched from the hash table corresponding Entrance and pattern include:
If searching less than the corresponding counterpart and pattern, the default style of second application program is returned.
4. the camouflage method of application program according to claim 1, it is characterised in that the generation is used to record described first Dendrogram includes with the hash table of the second dendrogram corresponding relation:
First application program topology file corresponding with second application program is stored in a node.
5. the camouflage method of application program according to claim 1, it is characterised in that parsing first application program Topology file, generate the first dendrogram;The topology file of second application program is parsed, the second dendrogram is generated;Including:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read institute The topology file of the first application program is stated, second thread goes to read the topology file of second application program.
6. a kind of mobile terminal, it is characterised in that including:
Reading unit, the topology file for reading first application program generates the first dendrogram, and read described second The topology file of application program, generates the second dendrogram;
Corresponding unit, for generating the hash table for recording first dendrogram and the second dendrogram corresponding relation;
Start unit, if being activated for first application program, obtains data from first application program, and from The corresponding entrance of second application program and pattern are searched in the hash table,
The start unit is additionally operable to be bolted together the data with the corresponding pattern.
7. mobile terminal according to claim 6, it is characterised in that the reading unit is used for:
Obtain the main-inlet of first application program or the second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in the first knot In structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And Second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in second In structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And parse It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
8. mobile terminal according to claim 6, it is characterised in that if the start unit is additionally operable to search right less than described The counterpart and pattern answered, then return to the default style of second application program.
9. mobile terminal according to claim 6, it is characterised in that the corresponding unit is additionally operable to apply journey by described first Sequence topology file corresponding with second application program is stored in a node.
10. mobile terminal according to claim 6, it is characterised in that the reading unit is used for:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read institute The topology file of the first application program is stated, second thread goes to read the topology file of second application program.
CN201611233325.XA 2016-12-28 2016-12-28 The camouflage method and mobile terminal of a kind of application program Pending CN106778096A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611233325.XA CN106778096A (en) 2016-12-28 2016-12-28 The camouflage method and mobile terminal of a kind of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611233325.XA CN106778096A (en) 2016-12-28 2016-12-28 The camouflage method and mobile terminal of a kind of application program

Publications (1)

Publication Number Publication Date
CN106778096A true CN106778096A (en) 2017-05-31

Family

ID=58922592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611233325.XA Pending CN106778096A (en) 2016-12-28 2016-12-28 The camouflage method and mobile terminal of a kind of application program

Country Status (1)

Country Link
CN (1) CN106778096A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220538A (en) * 2017-06-27 2017-09-29 广东欧珀移动通信有限公司 Payment application management method, device and mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120316888A1 (en) * 2011-06-08 2012-12-13 The Nasdaq Omx Group, Inc. Apparatus and method for issuing a news release while filing an sec filing
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application
CN104685510A (en) * 2012-09-28 2015-06-03 国际商业机器公司 Identifying whether application is malicious

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120316888A1 (en) * 2011-06-08 2012-12-13 The Nasdaq Omx Group, Inc. Apparatus and method for issuing a news release while filing an sec filing
CN104685510A (en) * 2012-09-28 2015-06-03 国际商业机器公司 Identifying whether application is malicious
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107220538A (en) * 2017-06-27 2017-09-29 广东欧珀移动通信有限公司 Payment application management method, device and mobile terminal

Similar Documents

Publication Publication Date Title
CN104917896A (en) Data pushing method and terminal equipment
CN105718071A (en) Terminal and method for recommending associational words in input method
CN106941443A (en) One population historical record checks terminal and method
CN106911850A (en) Mobile terminal and its screenshotss method
CN106789589A (en) One kind shares processing method, device and terminal
CN106791027A (en) A kind of terminal based on audio-frequency information searches device and method
CN105100477B (en) Terminal notifying device and method
CN106993093A (en) A kind of image processing apparatus and method
CN106850080A (en) The sending method and mobile terminal of a kind of associated person information
CN106791187A (en) A kind of mobile terminal and NFC method
CN106598538A (en) Method and system for updating instruction set
CN106791039A (en) A kind of mobile terminal location device and method
CN106775336A (en) A kind of content duplication method, device and terminal
CN106657579A (en) Content sharing method, device and terminal
CN106527685A (en) Control method and device for terminal application
CN106445148A (en) Method and device for triggering terminal application
CN105049916A (en) Video recording method and device
CN106775673A (en) Many account entering devices and method of a kind of application program
CN106777251A (en) A kind of file management method and device
CN106790941A (en) A kind of way of recording and device
CN107249072A (en) Mobile terminal and its chain operation start method
CN106776845A (en) A kind of information flow adaptive management method and terminal
CN106534498A (en) Control device and method of application folder and mobile terminal
CN106778096A (en) The camouflage method and mobile terminal of a kind of application program
CN106789600A (en) The sharing method and terminal of a kind of picture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication