[go: up one dir, main page]

CN112445539A - Method, device, electronic equipment and storage medium for identifying disguised music playing - Google Patents

Method, device, electronic equipment and storage medium for identifying disguised music playing Download PDF

Info

Publication number
CN112445539A
CN112445539A CN201910824464.7A CN201910824464A CN112445539A CN 112445539 A CN112445539 A CN 112445539A CN 201910824464 A CN201910824464 A CN 201910824464A CN 112445539 A CN112445539 A CN 112445539A
Authority
CN
China
Prior art keywords
music
music playing
application program
data
playing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910824464.7A
Other languages
Chinese (zh)
Inventor
王文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201910824464.7A priority Critical patent/CN112445539A/en
Publication of CN112445539A publication Critical patent/CN112445539A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a method, a device, electronic equipment and a storage medium for identifying the playing of disguised music, wherein the method comprises the following steps: acquiring music playing data sent by a terminal application program; determining whether the music playing data is in a preset empty music data range; if the music playing data are determined to be in the preset empty music data range, the music playing data sent by the application program are determined to be disguised music playing, so that the problem that the application program drills the music playing loophole in the terminal operating system to achieve the purpose of keeping the application program alive is solved, the problem that the application program drills the music playing loophole to occupy the operating system resources is solved, the operating system resources are saved, and the user experience is improved.

Description

Method, device, electronic equipment and storage medium for identifying disguised music playing
Technical Field
The embodiment of the invention relates to the field of information identification, in particular to a method and a device for identifying the playing of disguised music, electronic equipment and a storage medium.
Background
At present, part of operating systems, such as Android systems, have low supervision on application programs, and all the application programs want to survive all the time and are not recycled by the operating systems, so that each application program presents more importance to the operating systems in a way of thinking to the greatest extent. Disguised music playing is an effective means: music playing is an important function of electronic equipment such as mobile phones, and if an application program plays music, an operating system treats the application program with high priority and allocates resources of all parties as much as possible for the application program to use.
The inventor discovers that in the process of implementing the invention: more and more application programs start to drill the vulnerability of music playing to achieve the aim of keeping themselves alive, and the method of the application programs is to call a standard audio playing interface of an operating system, but empty music is played, namely, a user cannot hear the music playing, and the operating system recognizes that the application program is playing music.
Disclosure of Invention
In order to solve at least one of the problems of the prior art,
in a first aspect, at least one embodiment of the present invention provides a method for identifying a masquerading music play, including:
acquiring music playing data sent by a terminal application program;
determining whether the music playing data is in a preset empty music data range;
and if the music playing data are determined to be in the preset empty music data range, determining the music playing data sent by the application program as the disguised music playing.
In some embodiments, after determining that the music playing data sent by the terminal application is masquerading music playing, the method further includes:
according to a terminal operating system recovery mechanism, recovering an application program corresponding to music playing data; or terminating the application program corresponding to the music playing data according to a preset mechanism of the terminal.
In some embodiments, the above method further comprises:
and if the music playing data are determined not to be in the preset empty music data range, determining the music playing data sent by the application program to be normal music playing.
In some embodiments, the above method further comprises:
and if the music playing data sent by the application program is the disguised music playing, adding a disguised playing label to the application program, and removing the playing state.
And if the music playing data sent by the application program is normal music playing, adding a normal playing label to the application program.
In some embodiments, before acquiring the music playing data sent by the terminal application, the method includes:
and determining that the terminal is in the screen-off state and does not receive the operation information of the user within the preset time.
In some embodiments, determining whether to be consistent with preset null music data according to the music play data includes:
and acquiring the feature code of the music playing data, and judging whether the feature code is in a preset empty music data range.
In some embodiments, obtaining the music playing data sent by the application program comprises:
and acquiring music playing data sent to the audio playing interface by an application program from a standard audio playing interface of an operating system.
In a second aspect, an embodiment of the present invention provides an apparatus for identifying a masquerading music play, including:
an acquisition module: the music playing data acquisition module is used for acquiring music playing data sent by an application program;
a first determination module: the music playing data is used for determining whether the music playing data is in a preset empty music data range or not;
a second determination module: and if the music playing data is determined to be in a preset empty music data range, determining that the music playing data sent by the application program is camouflage music playing.
In a third aspect, an embodiment of the present invention provides an electronic device, including: a processor and a memory;
the processor is operable to execute the steps of the method of identifying masquerading music plays as described above by calling a program or instructions stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores a program or instructions for causing a computer to execute the steps of the above method for identifying a masquerading music playing.
The embodiment of the invention has the advantages that: acquiring music playing data sent by a terminal application program; determining whether the music playing data is in a preset empty music data range; if the music playing data are determined to be in the preset empty music data range, the music playing data sent by the application program are determined to be disguised music playing, so that the problem that the application program drills the music playing loophole to achieve the purpose of keeping the music playing alive is solved, the problem that the application program drills the music playing loophole to occupy the operating system resources is solved, the operating system resources are saved, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a flowchart illustrating a method for identifying a masquerading music playing according to an embodiment of the present invention;
fig. 2 is a second flowchart illustrating a method for identifying a masquerading music playing according to an embodiment of the present invention;
fig. 3 is a third schematic flowchart illustrating a method for identifying a masquerading music playing according to an embodiment of the present invention;
fig. 4 is a fourth flowchart illustrating a method for recognizing a masquerading music playing according to an embodiment of the present invention;
fig. 5 is a fifth flowchart illustrating a method for recognizing a play of disguised music according to an embodiment of the present invention;
fig. 6 is a sixth schematic flowchart illustrating a method for recognizing a play of disguised music according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a device for recognizing a disguised music player according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, the present invention will be further described in detail with reference to the accompanying drawings and examples. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. The specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the invention, are within the scope of the invention.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The technical scheme provided by the embodiment of the invention mainly aims at solving the problem that the application program used on the existing intelligent terminal has music playing disguised, and the inventor researches and discovers that the problem is mainly that more and more application programs start to drill the vulnerability of music playing in some operating systems, such as an android system, so as to achieve the purpose of keeping the application programs alive.
Fig. 1 is a flowchart illustrating a method for identifying a masquerading music playing according to an embodiment of the present invention.
In a first aspect, at least one embodiment of the present invention provides a method for identifying a masquerading music play, which includes the following steps in conjunction with fig. 1:
s101, music playing data sent by a terminal application program are obtained.
Specifically, the terminal of the embodiment of the invention can be a mobile phone, a tablet, a notebook computer; the application program can be any application program installed on the terminal, such as pay music, tremble music, WeChat music, QQ music, Internet music, cool dog music and the like, the music playing data of the embodiment of the invention is the music playing data sent by the application program to the Audio playing interface, and the Audio playing interface can be an Audio interface commonly used by an operating system; the music playing data of the embodiment of the invention is characterized by playing music data.
And S102, determining whether the music playing data is in a preset empty music data range.
Specifically, the music playing data in the embodiment of the present invention is music data in a playing state, and whether the music playing data is within a preset empty music data range is determined by analyzing the music playing data in the playing state; therefore, whether the music playing data is music playing data in a disguised playing state or music data in a normal playing state is determined, and the preset empty music data range in the embodiment of the invention is a data range obtained through a plurality of tests.
And S103, if the music playing data are determined to be in the preset empty music data range, determining the music playing data sent by the application program as camouflage music playing.
Specifically, the embodiment of the present invention obtains specific data by analyzing the music data in the playing state, compares the specific data with the preset empty music data range, and determines that the music playing data is a masquerading music playing if the specific value falls within the preset empty music data range.
Fig. 2 is a second flowchart illustrating a method for identifying a masquerading music playing according to an embodiment of the present invention.
Optionally, in some embodiments, with reference to fig. 2, the method further includes:
s201, after the music playing data sent by the terminal application program is determined to be the disguised music playing, the method further comprises the following steps:
s202, recovering the application program corresponding to the music playing data according to a terminal operating system recovery mechanism; or terminating the application program corresponding to the music playing data according to a terminal preset mechanism.
In this embodiment, after determining that the music playing data sent by the terminal application program is masquerading music playing, determining that the application program has a malicious keep-alive situation, and thus recovering the application program corresponding to the music playing data according to a terminal operating system recovery mechanism; or terminating the application program corresponding to the music playing data according to a terminal preset mechanism. Here, the application program corresponding to the music playing data is recovered, and the application program corresponding to the music playing data is terminated, which both refer to the situation that malicious keep-alive exists in the keep-alive application program, or thereby the purpose that the application program drills the bug of music playing to achieve own keep-alive is solved, and the problem that the bug of the application program drilling music playing occupies the resources of the operating system is solved, thereby saving the resources of the operating system and improving the user experience.
Fig. 3 is a third flowchart illustrating a method for recognizing a play of disguised music according to an embodiment of the present invention. Unlike the embodiment shown in fig. 1, which determines that the music playing data sent by the application program is masquerading music playing, in this embodiment, with reference to fig. 3, the following steps may also be included:
and S301, if the music playing data is determined not to be in the preset empty music data range.
S302, determining the music playing data sent by the application program as normal music playing.
Specifically, in the embodiment of the present invention, specific data is obtained by analyzing music data in a playing state, the specific data is compared with a preset empty music data range, and if the specific value does not fall within the preset empty music data range, the preset empty music data range of the embodiment of the present invention is a data range obtained through multiple tests, so as to determine that the music playing data is normal music playing.
In this embodiment, by using the above technical solution, if the application program that normally plays music is determined, the music playing is continued, so that the normal operation of the application program that normally plays music can be ensured.
Fig. 4 is a fourth flowchart illustrating a method for recognizing a play of disguised music according to an embodiment of the present invention.
In some embodiments, for example, in step 103 in fig. 1, it is determined that the music playing data is within the preset empty music data range, and with reference to fig. 4, the method may further include:
s401: and if the music playing data sent by the application program is the disguised music playing, adding a disguised playing label to the application program, and removing the playing state.
Specifically, in this embodiment, a specific numerical value is obtained by analyzing music playing data sent by an application program in a playing state, and the specific numerical value is compared with a preset empty music data range, and if the specific numerical value falls within the preset empty music data range, it is determined that the music playing data is masquerading music playing.
Fig. 5 is a fifth flowchart illustrating a method for recognizing the play of disguised music according to an embodiment of the present invention.
With reference to fig. 5, for example, in step 302 in fig. 3, it is determined that the music playing data is not within the preset empty music data range, the method may further include:
s501, if the music playing data sent by the application program is normal music playing, adding a normal playing label to the application program.
Specifically, in the embodiment of the present invention, a specific numerical value is obtained by analyzing music data sent by an application program in a playing state, and the specific numerical value is compared with a preset empty music data range, and if the specific numerical value does not fall within the preset empty music data range, the music playing data is determined to be a normal music playing, and the application program in the playing state is played.
In some embodiments, before acquiring the music playing data sent by the terminal application, the method may further include: and determining that the terminal is in the screen-off state and does not receive the operation information of the user within the preset time. Acquiring music playing data sent by a terminal application program;
determining whether the music playing data is in a preset empty music data range;
and if the music playing data are determined to be in the preset empty music data range, determining the music playing data sent by the application program as camouflage music playing.
Specifically, in the embodiment of the present invention, by selecting a suitable time, for example, when the terminal is in the screen-off state and does not receive the operation information of the user within a preset time, the music playing data sent by the terminal application program is obtained, because the terminal is in the screen-off state and the user does not operate the terminal within a preset time period, the preset time period in the embodiment of the present invention may be 15 minutes, 30 minutes, 45 minutes, and one hour, the specific time period in the embodiment of the present invention is flexibly determined and is not limited by uniqueness, and the probability that the played music data is empty music data at this time is higher, so that the accuracy of disguised and identified music playing is improved.
Fig. 6 is a sixth flowchart illustrating a method for recognizing the play of disguised music according to an embodiment of the present invention.
In some embodiments, in conjunction with fig. 6, determining whether to be consistent with the preset null music data according to the music play data includes:
s601, acquiring the feature code of the music playing data.
And S602, judging whether the feature code is in a preset empty music data range.
Specifically, the music playing data in the embodiment of the present invention is the music data being played, and the feature code of the music data being played is extracted, where if the extracted feature code is 0000 and the preset empty music data range is 0000 to 0001, it may be determined that the feature code of the music data being played falls within the preset empty music data range, so as to determine that the music data being played is the masquerading music playing.
In some embodiments, obtaining the music playing data sent by the application program comprises:
and acquiring music playing data sent by the application program to the standard audio playing interface from the standard audio playing interface of the operating system.
The operating system of the embodiment of the invention can be an android operating system, and the standard Audio playing interface of the embodiment of the invention can be an Audio interface, so that whether the music playing data sent by the application program is in a preset empty music data range or not is determined by acquiring the music playing data sent by the application program to the standard Audio playing interface, and whether the situation of disguised music playing exists or not is further identified.
Fig. 7 is a schematic structural diagram of a device for recognizing a disguised music player according to an embodiment of the present invention.
In a second aspect, in conjunction with fig. 7, an embodiment of the present invention provides an apparatus for identifying a masquerading music playing apparatus, where the apparatus for identifying a masquerading music playing apparatus includes an obtaining module 701, a first determining module 702, and a third determining module 703.
The obtaining module 701 is configured to obtain music playing data sent by a terminal application.
Specifically, the music playing data sent by the terminal application program is obtained through the obtaining module, the terminal of the embodiment of the invention can be a mobile phone, a tablet or a notebook computer, the application program can be any application program installed on the terminal, such as pay music, tremble, WeChat, QQ music, Internet music, cool dog music and the like, the music playing data of the embodiment of the invention is music playing data sent by the application program to an audio playing interface, and the music playing data is characterized by being played.
The first determining module 702 is used to determine whether the music playing data is within the preset empty music data range.
Specifically, the first determining module determines whether the music playing data is within a preset empty music data range, the music playing data in the embodiment of the present invention is music data in a playing state, the first determining module determines whether the music playing data is music in a disguised playing state or music data in a normal playing state by analyzing whether the music playing data is within the preset empty music data range, and the preset empty music data range in the embodiment of the present invention is a data range obtained through a plurality of tests.
The second determining module 703 is configured to determine that the music playing data sent by the application program is a masquerading music playing if it is determined that the music playing data is within a preset empty music data range.
Specifically, in the embodiment of the present invention, the second determining module analyzes the music data in the playing state to obtain specific data, compares the specific data with the preset empty music data range, and determines that the music playing data is the disguised music playing if the specific value falls within the preset empty music data range. The device for identifying the play of the disguised music provided by the embodiment of the invention can execute the steps of the method embodiment and achieve the corresponding technical effect.
In a third aspect, an embodiment of the present invention provides an electronic device, including: a processor and a memory;
the processor is used to perform the steps of the method as described above by calling a program or instructions stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, which is characterized in that the computer-readable storage medium stores a program or instructions, and the program or instructions make a computer execute the steps of the above method.
Fig. 8 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention, as shown in fig. 8, the electronic device may include a mobile phone and a PAD intelligent terminal, and the electronic device includes:
one or more processors 801, one processor 801 being illustrated in FIG. 8; a memory 802; the electronic device may further include: an input device 803 and an output device 804.
The processor 801, the memory 802, the input device 803 and the output device 804 in the electronic apparatus may be connected by a bus or other means, and fig. 8 illustrates an example of connection by a bus.
The memory 802 is a non-transitory computer-readable storage medium, and can be used to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the interface display method of the application program in the embodiment of the present invention (for example, the obtaining module 701, the first determining module 702, and the second determining module 703 shown in fig. 7). The processor 801 executes various functional applications of the server and data processing by running software programs, instructions, and modules stored in the memory 802, that is, implements the interface display method of the above-described method embodiment.
The memory 802 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device, and the like. Further, the memory 802 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 802 optionally includes memory located remotely from the processor 801, which may be connected to the terminal device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input unit 803 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function controls of the electronic device. The output device 804 may include a display device such as a display screen.
An embodiment of the present invention further provides a computer-readable storage medium, which stores a program or instructions, where the program or instructions cause a computer to execute a method for identifying masquerading music playing, where the method includes:
acquiring music playing data sent by a terminal application program;
determining whether the music playing data is in a preset empty music data range;
and if the music playing data are determined to be in the preset empty music data range, determining the music playing data sent by the application program as the disguised music playing.
Optionally, the computer executable instruction, when executed by the computer processor, may be further used to execute the technical solution for identifying the masquerading music playing provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that although some embodiments described herein include some features included in other embodiments instead of others, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments.
Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope defined by the appended claims.

Claims (10)

1. A method of identifying a masquerading music play, the method comprising:
acquiring music playing data sent by a terminal application program;
determining whether the music playing data is in a preset empty music data range;
and if the music playing data are determined to be in the preset empty music data range, determining that the music playing data sent by the application program are disguised music playing.
2. The method of claim 1, wherein after determining that the music playing data sent by the terminal application is a masquerading music playing, further comprising:
according to a terminal operating system recovery mechanism, recovering an application program corresponding to the music playing data;
or terminating the application program corresponding to the music playing data according to a preset mechanism of the terminal.
3. The method of claim 1, further comprising:
and if the music playing data is determined not to be in the preset empty music data range, determining that the music playing data sent by the application program is normal music playing.
4. The method of claim 3, further comprising:
and if the music playing data sent by the application program is disguised music playing, adding a disguised playing label to the application program, and removing the playing state.
And if the music playing data sent by the application program is normal music playing, adding a normal playing label to the application program.
5. The method of claim 1, wherein before acquiring the music playing data sent by the terminal application, the method comprises:
and determining that the terminal is in a screen extinguishing state and does not receive the operation information of the user within a preset time.
6. The method of claim 1, wherein the determining whether the music playing data is consistent with the preset empty music data according to the music playing data comprises:
and acquiring the feature code of the music playing data, and judging whether the feature code is in a preset empty music data range.
7. The method of claim 1, wherein the obtaining the music playing data sent by the application program comprises:
and acquiring music playing data sent to the audio playing interface by an application program from a standard audio playing interface of an operating system.
8. An apparatus for recognizing a masquerading music play, comprising:
an acquisition module: the music playing data acquisition module is used for acquiring music playing data sent by an application program;
a first determination module: the music playing data is used for determining whether the music playing data is in a preset empty music data range or not;
a second determination module: and if the music playing data is determined to be in a preset empty music data range, determining that the music playing data sent by the application program is camouflage music playing.
9. An electronic device, comprising: the method comprises the following steps: a processor and a memory;
the processor is adapted to perform the steps of the method of any one of claims 1 to 7 by calling a program or instructions stored in the memory.
10. A computer-readable storage medium, characterized in that it stores a program or instructions for causing a computer to carry out the steps of the method according to any one of claims 1 to 7.
CN201910824464.7A 2019-09-02 2019-09-02 Method, device, electronic equipment and storage medium for identifying disguised music playing Withdrawn CN112445539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910824464.7A CN112445539A (en) 2019-09-02 2019-09-02 Method, device, electronic equipment and storage medium for identifying disguised music playing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910824464.7A CN112445539A (en) 2019-09-02 2019-09-02 Method, device, electronic equipment and storage medium for identifying disguised music playing

Publications (1)

Publication Number Publication Date
CN112445539A true CN112445539A (en) 2021-03-05

Family

ID=74734215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910824464.7A Withdrawn CN112445539A (en) 2019-09-02 2019-09-02 Method, device, electronic equipment and storage medium for identifying disguised music playing

Country Status (1)

Country Link
CN (1) CN112445539A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117789760A (en) * 2022-09-20 2024-03-29 荣耀终端有限公司 Method and device for identifying keep-alive audio stream

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1062585A1 (en) * 1998-03-18 2000-12-27 Datamark Technologies PTE Ltd Method and apparatus for camouflaging data
JP2005099264A (en) * 2003-09-24 2005-04-14 Yamaha Corp Music playing program
CN1839375A (en) * 2003-07-07 2006-09-27 密码研究公司 Reprogrammable security for controlling piracy and enabling interactive content
CN103281591A (en) * 2013-06-03 2013-09-04 贝壳网际(北京)安全技术有限公司 Method and device for playing flash video through browser and mobile terminal
CN103532972A (en) * 2013-10-25 2014-01-22 苏州大拿信息技术有限公司 Method for running APP in background in IOS (iphone operation system)
CN104461555A (en) * 2014-12-22 2015-03-25 浪潮软件集团有限公司 Method for directly controlling each playing application in Home application
CN107203597A (en) * 2017-05-05 2017-09-26 青岛海信移动通信技术股份有限公司 The display methods and device of the lyrics under a kind of screen lock state
CN107844342A (en) * 2017-11-21 2018-03-27 广东欧珀移动通信有限公司 Management-control method, device and the storage medium and mobile terminal of application program keep-alive
CN107861608A (en) * 2017-11-21 2018-03-30 广东欧珀移动通信有限公司 System notification service control method, device, terminal device and storage medium
CN109766178A (en) * 2019-01-16 2019-05-17 四川科瑞软件有限责任公司 A kind of application process keep-alive system and method under Android system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1062585A1 (en) * 1998-03-18 2000-12-27 Datamark Technologies PTE Ltd Method and apparatus for camouflaging data
CN1839375A (en) * 2003-07-07 2006-09-27 密码研究公司 Reprogrammable security for controlling piracy and enabling interactive content
JP2005099264A (en) * 2003-09-24 2005-04-14 Yamaha Corp Music playing program
CN103281591A (en) * 2013-06-03 2013-09-04 贝壳网际(北京)安全技术有限公司 Method and device for playing flash video through browser and mobile terminal
CN103532972A (en) * 2013-10-25 2014-01-22 苏州大拿信息技术有限公司 Method for running APP in background in IOS (iphone operation system)
CN104461555A (en) * 2014-12-22 2015-03-25 浪潮软件集团有限公司 Method for directly controlling each playing application in Home application
CN107203597A (en) * 2017-05-05 2017-09-26 青岛海信移动通信技术股份有限公司 The display methods and device of the lyrics under a kind of screen lock state
CN107844342A (en) * 2017-11-21 2018-03-27 广东欧珀移动通信有限公司 Management-control method, device and the storage medium and mobile terminal of application program keep-alive
CN107861608A (en) * 2017-11-21 2018-03-30 广东欧珀移动通信有限公司 System notification service control method, device, terminal device and storage medium
CN109766178A (en) * 2019-01-16 2019-05-17 四川科瑞软件有限责任公司 A kind of application process keep-alive system and method under Android system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
颜宏冰 等: ""安卓应用中无声音频的收集与检测"", 《计算机系统应用》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117789760A (en) * 2022-09-20 2024-03-29 荣耀终端有限公司 Method and device for identifying keep-alive audio stream

Similar Documents

Publication Publication Date Title
CN108804299B (en) Application program exception handling method and device
US10176327B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN106127030A (en) Method and device for interface control
US9268939B2 (en) Method and apparatus for determining virus-infected files
CN105630551A (en) Method and device for installing application software and electronic equipment
CN104539514A (en) Information filtering method and device
WO2018176835A1 (en) Barrage management method and apparatus, memory and server
US20200177593A1 (en) Generating a custom blacklist for a listening device based on usage
WO2017012241A1 (en) File inspection method, device, apparatus and non-volatile computer storage medium
CN104640116B (en) A kind of fraud text message means of defence and communication terminal
CN111641554B (en) A message processing method, device and computer-readable storage medium
CN108052407A (en) A kind of application crash means of defence, device, equipment and storage medium
CN108989864B (en) Wheat connecting method, device, equipment and storage medium
CN109145589B (en) Application program acquisition method and device
CN106155746A (en) Installation file processing method and device and server
CN109450869B (en) A business security protection method based on user feedback
US9973471B2 (en) Protection method and computer system thereof for firewall apparatus disposed to application layer
EP3486823A1 (en) System notification service control method, apparatus, terminal device, and storage medium
CN108572866A (en) Application program management method, application program management device and mobile terminal
CN112445539A (en) Method, device, electronic equipment and storage medium for identifying disguised music playing
CN111030974A (en) APT attack event detection method, device and storage medium
WO2016175443A1 (en) Method and apparatus for information search using voice recognition
CN112685255B (en) Interface monitoring method, device, electronic equipment and storage medium
CN105912935A (en) Advertisement detection method and advertisement detection apparatus
US11093300B1 (en) Method, electronic device and computer program product for processing information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210305

WW01 Invention patent application withdrawn after publication