CN106778096A - The camouflage method and mobile terminal of a kind of application program - Google Patents
The camouflage method and mobile terminal of a kind of application program Download PDFInfo
- Publication number
- CN106778096A CN106778096A CN201611233325.XA CN201611233325A CN106778096A CN 106778096 A CN106778096 A CN 106778096A CN 201611233325 A CN201611233325 A CN 201611233325A CN 106778096 A CN106778096 A CN 106778096A
- Authority
- CN
- China
- Prior art keywords
- application program
- pattern
- topology
- dendrogram
- entrance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 239000004744 fabric Substances 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 14
- 230000015654 memory Effects 0.000 description 14
- 238000004891 communication Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 5
- 230000005236 sound signal Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000000712 assembly Effects 0.000 description 2
- 238000000429 assembly Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001629 suppression Effects 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 241000256844 Apis mellifera Species 0.000 description 1
- 241001062009 Indigofera Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 230000002463 transducing effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention discloses the camouflage method and mobile terminal of a kind of application program, and methods described can disguise oneself as the second application program the first application program, including:The topology file of first application program, the first dendrogram of generation are read, and reads the topology file of second application program, generate the second dendrogram;Generate the hash table for recording first dendrogram and the second dendrogram corresponding relation;If first application program is activated, data are obtained from first application program, and the corresponding entrance of second application program and pattern are searched from the hash table;The data are bolted together with the corresponding pattern.The present invention can enable the first application program be presented with the pattern of the second application program, and lifting user uses the privacy of application program.
Description
Technical field
The present invention relates to field of terminal technology, more particularly to a kind of application program camouflage method and mobile terminal.
Background technology
The development of application APP embodies the development of mobile terminal to a certain extent, with the development of mobile terminal,
Many represent form and manifestation mode come the need for meeting under user's special scenes using having had.User can in actual life
Can encounter following scene:As user is currently in use an application program, but user is not intended to by other friends in use
Friend sees that is, some see that user is currently in use application program movement eventually when user always comes and goes in great number in use
End.
The content of the invention
Camouflage method and mobile terminal it is a primary object of the present invention to propose a kind of application program, it is intended to propose a kind of
The realization of camouflage applications program, i.e., when user is currently in use certain application program, user can be applied this by this programme
Program camouflage turns into other application programs, when having other friends or passerby by seeing, it is found that user uses it
His application program, rather than application.
To achieve the above object, the present invention proposes a kind of camouflage method of application program, is applied to mobile terminal, its feature
It is that methods described can disguise oneself as the second application program the first application program, including:
The topology file of first application program is read, the first dendrogram is generated, and read second application program
Topology file, generate the second dendrogram;
Generate the hash table for recording first dendrogram and the second dendrogram corresponding relation;
If first application program is activated, data are obtained from first application program, and from the hash
The corresponding entrance of second application program and pattern are searched in table;
The data are bolted together with the corresponding pattern.
Alternatively, the topology file of the first application program of the parsing, the first dendrogram of generation includes:
Obtain the main-inlet of first application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in
In one structure;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance
Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in
In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And
The m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in m
In+1 structure;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command;
Or, the topology file of the second application program of the parsing, generating the second dendrogram includes:
Obtain the main-inlet of second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in
In one structure;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance
Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in
In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And
The m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in m
In+1 structure;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
Alternatively, if first application program is activated, data are obtained from first application program, from
The corresponding entrance of second application program and pattern are searched in the hash table to be included:
If searching less than the corresponding counterpart and pattern, the default style of second application program is returned.
Alternatively, the hash table bag generated for recording first dendrogram and the second dendrogram corresponding relation
Include:
First application program topology file corresponding with second application program is stored in a node.
Alternatively, the topology file of parsing first application program, generates the first dendrogram;Parse described second
The topology file of application program, generates the second dendrogram;Including:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read
The topology file of first application program is taken, second thread goes to read the topology file of second application program.
Additionally, to achieve the above object, the present invention also provides a kind of mobile terminal, it is characterised in that including:
Reading unit, the topology file for reading first application program generates the first dendrogram, and read described
The topology file of the second application program, generates the second dendrogram;
Corresponding unit, for generating the hash table for recording first dendrogram and the second dendrogram corresponding relation;
Start unit, if being activated for first application program, data is obtained from first application program,
And the corresponding entrance of second application program and pattern are searched from the hash table;
The start unit is additionally operable to be bolted together the data with the corresponding pattern.
Alternatively, the reading unit is used for:
Obtain the main-inlet of first application program or the second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in
In one structure;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance
Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in
In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And
The m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in m
In+1 structure;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
Alternatively, if the start unit is additionally operable to search less than the corresponding counterpart and pattern, described the is returned
The default style of two application programs.
Alternatively, the corresponding unit is additionally operable to first application program cloth corresponding with second application program
Office file is stored in a node.
Alternatively, the reading unit is used for:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read
The topology file of first application program is taken, second thread goes to read the topology file of second application program.
The camouflage method and mobile terminal of application program proposed by the present invention, make user also can arbitrarily be visited in specific scene
Application program is asked, so as to improve the use habit of user.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram of the mobile terminal for realizing each embodiment of the invention;
Fig. 2 is the schematic flow sheet of one embodiment of the camouflage method of application program in the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of another embodiment of the camouflage method of application program in the embodiment of the present invention;
Fig. 4 is the schematic diagram of the dendrogram of another embodiment of the camouflage method of application program in the embodiment of the present invention;
Fig. 5 is the structural representation of one embodiment of mobile terminal in the embodiment of the present invention;
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the invention is realized referring now to Description of Drawings.In follow-up description, use
For represent element such as " module ", " part " or " unit " suffix only for being conducive to explanation of the invention, itself
Not specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP
The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement
Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram for realizing the optional intelligent terminal of each embodiment one of the invention.
Intelligent terminal 100 can include wireless communication unit 110, A/V (audio/video) input block 120, user input
Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190
Etc..
Fig. 1 shows the mobile terminal 1 00 with various assemblies, it should be understood that being not required for implementing all showing
The component for going out.More or less component can alternatively be implemented.The element of mobile terminal 1 00 will be discussed in more detail below.
Wireless communication unit 110 can generally include one or more assemblies, and it allows mobile terminal 1 00 and radio communication
Radio communication between system or network.For example, wireless communication unit 110 can include that broadcasting reception module 111, movement are logical
At least one of letter module 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server
Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent
The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information
And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting
Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 is received.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of DMB (DMB)
The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast
Receiver module 111 can receive signal and broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111
Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video
Broadcast-hand-held (DVB-H), Radio Data System, the received terrestrial digital broadcasting integrated service of forward link media (MediaFLO@)
Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/
Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice
Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module
115 typical case is GPS (global positioning system).According to current technology, GPS calculate from three or more satellites away from
Information application triangulation from information and correct time information and for calculating, so as to according to longitude, latitude and height
Degree calculates three-dimensional current location information exactly.Currently, three satellites are used simultaneously for calculating the method for position and temporal information
And the position by using other satellite correction calculating and the error of temporal information.Additionally, GPS can be by real time
Continuous plus current location information carrys out calculating speed information.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121
Microphone wind 122, the static map that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus
The view data of piece or video is processed.Picture frame after treatment may be displayed on display unit 151.At camera 121
Picture frame after reason can be stored in memory 160 (or other storage mediums) or carried out via wireless communication unit 110
Send, two or more cameras 121 can be provided according to the construction of mobile terminal 1 00.Microphone wind 122 can be in telephone relation
Sound (voice data) is received via microphone wind 122 in pattern, logging mode, speech recognition mode etc. operational mode, and
And can be voice data by such acoustic processing.Audio (voice) data after treatment can be in the feelings of telephone calling model
The form that being converted under condition can be sent to mobile communication base station via mobile communication module 112 is exported.Microphone wind 122 can be real
Various types of noises elimination (or suppression) algorithms are applied to eliminate (or suppression) product during receiving and sending audio signal
Raw noise or interference.
User input unit 130 can generate key input data to control mobile terminal 1 00 according to the order of user input
Various operations.User input unit 130 allow the various types of information of user input, and can include keyboard, metal dome,
Touch pad (for example, detection due to being touched caused by resistance, pressure, electric capacity etc. change sensitive component), roller, shake
Bar etc..Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, (for example, mobile terminal 1 00 opens or closes shape
State), the presence or absence of the contact (that is, touch input) of the position of mobile terminal 1 00, user for mobile terminal 1 00, mobile terminal
The acceleration or deceleration movement of 100 orientation, mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00
The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed
The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 can include proximity transducer 141.
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know
Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for reception and come from
The input (for example, data message, electric power etc.) of the external device (ED) and input that will be received is transferred in mobile terminal 1 00
One or more elements can be used for transmitting data between mobile terminal 1 00 and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity
Power provides to the path of mobile terminal 1 00 from base or can serve as allowing the various command signals being input into from base to pass through it
It is transferred to the path of mobile terminal 1 00.Can serve as recognizing mobile terminal 1 00 from the various command signals or electric power of base input
Whether signal base on is accurately fitted within.Output unit 150 is configured to be provided with vision, audio and/or tactile manner
Output signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include aobvious
Show unit 151, dio Output Modules 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity
During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file
Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern
Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, show video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit
151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
Desired implementation method, mobile terminal 1 00 can include two or more display units (or other display devices), for example, moving
Dynamic terminal 100 can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect
Touch input pressure and touch input position and touch input area.
Dio Output Modules 152 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00
It is that wireless communication unit 110 is received or in memory when under the isotypes such as formula, speech recognition mode, broadcast reception mode
In 160 store voice data transducing audio signal and be output as sound.And, dio Output Modules 152 can provide with
The audio output of the specific function correlation that mobile terminal 1 00 is performed is (for example, call signal receives sound, message sink sound etc.
Deng).Dio Output Modules 152 can include loudspeaker, buzzer etc..
Alarm unit 153 can provide output and be notified to mobile terminal 1 00 with by event.Typical event can be with
Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit
153 can in a different manner provide output with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating
Output is provided, when calling, message or some other entrance communication (incoming communication) are received, alarm list
Unit 153 can provide tactile output (that is, vibrating) to notify to user.Exported by providing such tactile, even if
When in pocket of the mobile phone of user in user, user also can recognize that the generation of various events.Alarm unit 153
The output of the generation of notification event can be provided via display unit 151 or dio Output Modules 152.
Memory 160 can store software program for the treatment and control operation performed by controller 180 etc., Huo Zheke
Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And
And, memory 160 can store the vibration of various modes on being exported when touching and being applied to touch-screen and audio signal
Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many
Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection
The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data
Communication, video calling etc. related control and treatment.In addition, controller 180 can be included for reproducing (or playback) many matchmakers
The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or can be structured as and control
Device 180 is separated.Controller 180 can be with execution pattern identifying processing, the handwriting input that will be performed on the touchscreen or picture
Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Appropriate electric power needed for part and component.
Various implementation methods described herein can be with use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implemented.Implement for hardware, implementation method described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein
At least one in electronic unit is implemented, and in some cases, such implementation method can be implemented in controller 180.
For software implementation, the implementation method of such as process or function can with allow to perform the single of at least one function or operation
Software module is implemented.Software code can be come by the software application (or program) write with any appropriate programming language
Implement, software code can be stored in memory 160 and performed by controller 180.
So far, oneself according to its function through describing mobile terminal 1 00.In addition, the mobile terminal 1 00 in the embodiment of the present invention
Can be such as folded form, board-type, oscillating-type, sliding-type and other various types of mobile terminals, not do herein specifically
Limit.
Based on above-mentioned mobile terminal hardware configuration, the inventive method each embodiment is proposed.
As shown in Fig. 2 first embodiment of the invention provides a kind of camouflage method of application program, mobile terminal is applied to,
Methods described can disguise oneself as the second application program the first application program, and user pretends into application program, and selection will be pretended
The first application program and the second application program to be disguised oneself as and click on determination, camouflage method is specifically included:
S201, beginning;
S202, the topology file for reading first application program, generate the first dendrogram, and read second application
The topology file of program, generates the second dendrogram;
S203, generate hash table for recording first dendrogram and the second dendrogram corresponding relation;
The hash table records two application programs and is laid out corresponding relation respectively, in another embodiment of the invention, can
It is stored in a node with by first application program topology file corresponding with second application program;If i.e.
The main-inlet of one application program is that the tree node Nodea0 that main activity sets up and the main activity of the second application program set up
Several sections of point Nodeb0, then can notify user pretend completed;
Whether S204, detection first application program are activated, if so, then entering step S205;If otherwise such as step
Shown in S207, terminate process;
S205, from first application program data are obtained, second application program is searched from the hash table
Corresponding entrance and pattern;
In the specific implementation, if searching less than the corresponding counterpart and pattern, described second can be returned and applies journey
The default style of sequence;
S206, the data are bolted together with the corresponding pattern;
S207, end process.
In the present embodiment, if the first application program starts to start, can be from the first application program in activity
Server gets on to obtain data, and camouflage applications procedure service is returned to by by the data of the first application requests
MaskServiceManager, the service tree-shaped system opening relationships table h before, finds the second application program corresponding
The corresponding patterns of activity, activity in the second application program and corresponding pattern are loaded out to being presented to user.
Second embodiment of the invention provides a kind of camouflage method of application program, is applied to mobile terminal, and the method includes
The step of step includes is identical with the S201 to S207 referred in first embodiment, and as detailed above, here is omitted.
Unlike, as shown in figure 3, in the present embodiment, in step S202, reading the layout text of first application program
Part, the first dendrogram of generation is specifically included:
S301, beginning;
S302, the main-inlet for obtaining first application program, i.e., main activity;
The first topology file layout and the first pattern of S303, the expandable mark language XML of the acquisition main-inlet
Theme, and be stored in first structure body;
Whether S304, parsing first topology file have the related instruction of skip command;If so, then entering step
S305;If it is not, then as depicted at step 309, terminating process;
S305, acquisition redirect the title of entrance;And the of the corresponding expandable mark language XML of entrance is redirected described in parsing
Two topology files and the second pattern, and be stored in the second structure;And the head of second structure points to first sample
Formula;
Whether S306, parsing m topology files have the related instruction of skip command;If so, then entering step S307;If
It is no, then as depicted at step 309, terminate process;
S307, acquisition redirect the title of entrance;And the of the corresponding expandable mark language XML of entrance is redirected described in parsing
M+1 topology files and m+1 patterns, and be stored in m+1 structures;And the head of the m+1 structures points to m samples
Formula;Wherein, m=2;
S308, m=m+1 is made, and return to step S25, until the m topology files do not have the related finger of skip command
Order.
So all of activity can be traveled through completion, now generate a dendrogram as shown in Figure 4.
In step S202, the topology file of second application program is read, generate the specific steps of the second dendrogram
Method with generation the first dendrogram specific steps method it is identical, only step S302, obtain be not the first application program
Main-inlet, but the main-inlet of the second application program.
Third embodiment of the invention provides a kind of camouflage method of application program, is applied to mobile terminal, and the method includes
The step of step includes is identical with the S201 to S207 referred in first embodiment, and as detailed above, here is omitted.
Unlike, as shown in figure 3, in the present embodiment, step S202 in the specific implementation, can be in system service
First thread and the second thread are opened in system_service processes, wherein, the first thread goes reading described first to answer
With the topology file of program, second thread goes to read the topology file of second application program.The specific method of reading
The step of referring in second embodiment S301 to S309 is referred to, as detailed above, be will not be repeated here.
The camouflage method to the application program in the embodiment of the present invention is described above, below to the embodiment of the present invention
In mobile terminal be described.
As shown in figure 5, fourth embodiment of the invention proposes a kind of mobile terminal, the first application program can be disguised oneself as second
Application program, for example, user pretends into application program, and chooses the first application program to be pretended and to be disguised oneself as second
Application program simultaneously clicks on determination, and the mobile terminal includes reading unit 10, corresponding unit 20, start unit 30;Wherein:
Reading unit 10 is used to read the topology file of first application program, generates the first dendrogram, and read institute
The topology file of the second application program is stated, the second dendrogram is generated;
Corresponding unit 20 is used to generate the hash table for recording first dendrogram and the second dendrogram corresponding relation;
The hash table records two application programs and is laid out corresponding relation respectively, in another embodiment of the invention, can described in
First application program topology file corresponding with second application program is stored in a node;If i.e. first applies journey
The main-inlet of sequence is the several sections of points that the tree node Nodea0 that main activity sets up and the main activity of the second application program set up
Nodeb0, then can notify that user pretends to have completed;
If start unit 30 is activated for first application program, number is obtained from first application program
According to, and the corresponding entrance of second application program and pattern are searched from the hash table;Start unit 30 is additionally operable to and will
The data are bolted together with the corresponding pattern.In the specific implementation, if searching less than the corresponding counterpart and sample
Formula, then can return to the default style of second application program;
In the present embodiment, if the first application program starts to start, can be from the first application program in activity
Server gets on to obtain data, and camouflage applications procedure service is returned to by by the data of the first application requests
MaskServiceManager, the service tree-shaped system opening relationships table h before, finds the second application program corresponding
The corresponding patterns of activity, activity in the second application program and corresponding pattern are loaded out to being presented to user.
Fifth embodiment of the invention proposes a kind of mobile terminal, including reading unit 10, corresponding unit 20, start unit
30。
Reading in reading unit 10, corresponding unit 20, start unit 30 in the present embodiment and above-mentioned fourth embodiment
Unit 10, corresponding unit 20, start unit 30 are identical, and as detailed above, here is omitted.
Unlike, in the present embodiment, reading unit 10 specifically for:
Obtain the main-inlet of first application program or the second application program, i.e., main activity;
The first topology file layout and the first pattern theme of the expandable mark language XML of the main-inlet are obtained,
And be stored in first structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the name for redirecting entrance
Claim;And second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and be stored in
In second structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If acquisition redirects the title of entrance;And parse
It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots
In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
So all of activity can be traveled through completion, now generate a dendrogram as shown in Figure 4.
Sixth embodiment of the invention proposes a kind of mobile terminal, including reading unit 10, corresponding unit 20, start unit
30。
Reading in reading unit 10, corresponding unit 20, start unit 30 in the present embodiment and above-mentioned fourth embodiment
Unit 10, corresponding unit 20, start unit 30 are identical, and as detailed above, here is omitted.
Unlike, in the present embodiment, reading unit 10 is used for:Opened in system service system_service processes
First thread and the second thread, the first thread go to read the topology file of first application program, second thread
Remove to read the topology file of second application program.
The camouflage method and mobile terminal of application program proposed by the present invention, can turn into the by the camouflage of the first application program
Two application programs, when having other friends or passerby by seeing, it is found that user uses the second application program, Er Fei
One application program.Store such as is strolled when user is currently in use Taobao, but user is not desired to be found to be currently in use Taobao and use by other people
Family wishes that other people think that user is currently in use wechat, and then user first first can apply journey by what Taobao was set to be pretended
Sequence, the second application program is set to by wechat;Take the topology file and topology file for reading wechat and Taobao respectively, and by the cloth
Office file is saved in corresponding hash table, in this way, after Taobao is activated, now application program is obtained from Taobao's server
Data, and corresponding pattern is obtained from hash table, pattern and data are bolted together, if it find that data are not corresponding
Pattern, then using the pattern of acquiescence;So that the first application program can be presented with the pattern of the second application program, lifting user makes
With the privacy of application program.
It should be noted that herein, term " including ", "comprising" or its any other variant be intended to non-row
His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and
And also include other key elements being not expressly set out, or also include for this process, method, article or device institute are intrinsic
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably implementation method.Based on such understanding, technical scheme is substantially done to prior art in other words
The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used to so that a station terminal equipment (can be mobile phone, computer, clothes
Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of camouflage method of application program, is applied to mobile terminal, it is characterised in that methods described can apply journey by first
Sequence disguises oneself as the second application program, including:
The topology file of first application program is read, the first dendrogram is generated, and read the cloth of second application program
Office file, generates the second dendrogram;
Generate the hash table for recording first dendrogram and the second dendrogram corresponding relation;
If first application program is activated, data are obtained from first application program, and from the hash table
Search the corresponding entrance of second application program and pattern;
The data are bolted together with the corresponding pattern.
2. the camouflage method of application program according to claim 1, it is characterised in that the cloth of the application program of the parsing first
Office file, the first dendrogram of generation includes:
Obtain the main-inlet of first application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in the first knot
In structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And
Second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in second
In structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And parse
It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots
In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command;
Or, the topology file of the second application program of the parsing, generating the second dendrogram includes:
Obtain the main-inlet of second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in the first knot
In structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And
Second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in second
In structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And parse
It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots
In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
3. the camouflage method of application program according to claim 1, it is characterised in that if the first application program quilt
Start, then obtain data from first application program, second application program is searched from the hash table corresponding
Entrance and pattern include:
If searching less than the corresponding counterpart and pattern, the default style of second application program is returned.
4. the camouflage method of application program according to claim 1, it is characterised in that the generation is used to record described first
Dendrogram includes with the hash table of the second dendrogram corresponding relation:
First application program topology file corresponding with second application program is stored in a node.
5. the camouflage method of application program according to claim 1, it is characterised in that parsing first application program
Topology file, generate the first dendrogram;The topology file of second application program is parsed, the second dendrogram is generated;Including:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read institute
The topology file of the first application program is stated, second thread goes to read the topology file of second application program.
6. a kind of mobile terminal, it is characterised in that including:
Reading unit, the topology file for reading first application program generates the first dendrogram, and read described second
The topology file of application program, generates the second dendrogram;
Corresponding unit, for generating the hash table for recording first dendrogram and the second dendrogram corresponding relation;
Start unit, if being activated for first application program, obtains data from first application program, and from
The corresponding entrance of second application program and pattern are searched in the hash table,
The start unit is additionally operable to be bolted together the data with the corresponding pattern.
7. mobile terminal according to claim 6, it is characterised in that the reading unit is used for:
Obtain the main-inlet of first application program or the second application program;
First topology file and the first pattern of the expandable mark language XML of the main-inlet are obtained, and is stored in the first knot
In structure body;
Parse whether first topology file has the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And
Second topology file and the second pattern of the corresponding expandable mark language XML of entrance are redirected described in parsing, and is stored in second
In structure;And the head of second structure points to first pattern;
Parse whether m topology files have the related instruction of skip command;If so, then obtaining the title for redirecting entrance;And parse
It is described to redirect the m+1 topology files and m+1 patterns of the corresponding expandable mark language XML of entrance, and it is stored in m+1 knots
In structure body;And the head of the m+1 structures points to m patterns;Wherein, m=2;
M=m+1 is made, and repeats previous step, until the m topology files do not have the related instruction of skip command.
8. mobile terminal according to claim 6, it is characterised in that if the start unit is additionally operable to search right less than described
The counterpart and pattern answered, then return to the default style of second application program.
9. mobile terminal according to claim 6, it is characterised in that the corresponding unit is additionally operable to apply journey by described first
Sequence topology file corresponding with second application program is stored in a node.
10. mobile terminal according to claim 6, it is characterised in that the reading unit is used for:
First thread and the second thread are opened in system service system_service processes, the first thread goes to read institute
The topology file of the first application program is stated, second thread goes to read the topology file of second application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611233325.XA CN106778096A (en) | 2016-12-28 | 2016-12-28 | The camouflage method and mobile terminal of a kind of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611233325.XA CN106778096A (en) | 2016-12-28 | 2016-12-28 | The camouflage method and mobile terminal of a kind of application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106778096A true CN106778096A (en) | 2017-05-31 |
Family
ID=58922592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611233325.XA Pending CN106778096A (en) | 2016-12-28 | 2016-12-28 | The camouflage method and mobile terminal of a kind of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778096A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107220538A (en) * | 2017-06-27 | 2017-09-29 | 广东欧珀移动通信有限公司 | Payment application management method, device and mobile terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120316888A1 (en) * | 2011-06-08 | 2012-12-13 | The Nasdaq Omx Group, Inc. | Apparatus and method for issuing a news release while filing an sec filing |
CN103778363A (en) * | 2014-01-20 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for protecting application |
CN104685510A (en) * | 2012-09-28 | 2015-06-03 | 国际商业机器公司 | Identifying whether application is malicious |
-
2016
- 2016-12-28 CN CN201611233325.XA patent/CN106778096A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120316888A1 (en) * | 2011-06-08 | 2012-12-13 | The Nasdaq Omx Group, Inc. | Apparatus and method for issuing a news release while filing an sec filing |
CN104685510A (en) * | 2012-09-28 | 2015-06-03 | 国际商业机器公司 | Identifying whether application is malicious |
CN103778363A (en) * | 2014-01-20 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for protecting application |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107220538A (en) * | 2017-06-27 | 2017-09-29 | 广东欧珀移动通信有限公司 | Payment application management method, device and mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104917896A (en) | Data pushing method and terminal equipment | |
CN105718071A (en) | Terminal and method for recommending associational words in input method | |
CN106941443A (en) | One population historical record checks terminal and method | |
CN106911850A (en) | Mobile terminal and its screenshotss method | |
CN106789589A (en) | One kind shares processing method, device and terminal | |
CN106791027A (en) | A kind of terminal based on audio-frequency information searches device and method | |
CN105100477B (en) | Terminal notifying device and method | |
CN106993093A (en) | A kind of image processing apparatus and method | |
CN106850080A (en) | The sending method and mobile terminal of a kind of associated person information | |
CN106791187A (en) | A kind of mobile terminal and NFC method | |
CN106598538A (en) | Method and system for updating instruction set | |
CN106791039A (en) | A kind of mobile terminal location device and method | |
CN106775336A (en) | A kind of content duplication method, device and terminal | |
CN106657579A (en) | Content sharing method, device and terminal | |
CN106527685A (en) | Control method and device for terminal application | |
CN106445148A (en) | Method and device for triggering terminal application | |
CN105049916A (en) | Video recording method and device | |
CN106775673A (en) | Many account entering devices and method of a kind of application program | |
CN106777251A (en) | A kind of file management method and device | |
CN106790941A (en) | A kind of way of recording and device | |
CN107249072A (en) | Mobile terminal and its chain operation start method | |
CN106776845A (en) | A kind of information flow adaptive management method and terminal | |
CN106534498A (en) | Control device and method of application folder and mobile terminal | |
CN106778096A (en) | The camouflage method and mobile terminal of a kind of application program | |
CN106789600A (en) | The sharing method and terminal of a kind of picture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |