CN107295177B - Application disabling method and device and terminal equipment - Google Patents

Application disabling method and device and terminal equipment Download PDF

Info

Publication number
CN107295177B
CN107295177B CN201710500655.9A CN201710500655A CN107295177B CN 107295177 B CN107295177 B CN 107295177B CN 201710500655 A CN201710500655 A CN 201710500655A CN 107295177 B CN107295177 B CN 107295177B
Authority
CN
China
Prior art keywords
application
short message
disabling
message application
current default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710500655.9A
Other languages
Chinese (zh)
Other versions
CN107295177A (en
Inventor
李东蔚
张俊
帅朝春
林志泳
梅小虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710500655.9A priority Critical patent/CN107295177B/en
Publication of CN107295177A publication Critical patent/CN107295177A/en
Application granted granted Critical
Publication of CN107295177B publication Critical patent/CN107295177B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)

Abstract

The invention is suitable for the technical field of information detection, and provides an application disabling method, an application disabling device and terminal equipment, wherein the application disabling method comprises the following steps: receiving an application starting instruction, wherein the application starting instruction carries an application identifier; starting the corresponding application according to the application starting instruction; judging whether the application is a designated application according to the application identifier, wherein the designated application is an application related to user property information; when the application is the designated application, detecting whether the current default short message application is the short message application of the system; and when the current default short message application is not the short message application of the system, forbidding the started application. By the method, the safety of the property of the user can be improved.

Description

Application disabling method and device and terminal equipment
Technical Field
The invention belongs to the technical field of information detection, and particularly relates to an application disabling method, an application disabling device and terminal equipment.
Background
At present, the payment function realized by the payment application of the mobile terminal (such as a mobile phone) is more and more popular, but when the payment is carried out by the mobile terminal, the payment is related to the money expenditure of the user, so the security of the payment process is very important for the user. If the user cannot obtain the security assurance during the payment, for example, if the user has the problems of account loss and password leakage during the payment, the property security of the user will be threatened, resulting in serious loss to the user.
However, the security of the payment process is not processed safely at the present stage, and many three-party applications may perform some illegal operations in the payment process of the user, so that the property security of the user is threatened.
Therefore, it is necessary to provide a new method to solve the above technical problems.
Disclosure of Invention
In view of this, embodiments of the present invention provide an application disabling method, an application disabling device, and a terminal device, so as to solve the problem that, in the prior art, there is no effective security detection when running an application related to a property, so that the property of a user is threatened by security.
A first aspect of an embodiment of the present invention provides an application disabling method, including:
receiving an application starting instruction, wherein the application starting instruction carries an application identifier;
starting the corresponding application according to the application starting instruction;
judging whether the application is a designated application according to the application identifier, wherein the designated application is an application related to user property information;
when the application is the designated application, detecting whether the current default short message application is the short message application of the system;
and when the current default short message application is not the short message application of the system, forbidding the started application.
A second aspect of an embodiment of the present invention provides an application disabling apparatus, including:
the application starting instruction receiving unit is used for receiving an application starting instruction, and the application starting instruction carries an application identifier;
the application starting unit is used for starting the corresponding application according to the application starting instruction;
the specified application judging unit is used for judging whether the application is a specified application according to the application identifier, and the specified application is an application related to user property information;
a default short message application detection unit, configured to detect whether a current default short message application is a short message application of a system when the application is a designated application;
and the application forbidding unit is used for forbidding the started application when the current default short message application is not the short message application of the system.
A third aspect of the embodiments of the present invention provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of any one of the application disabling methods when executing the computer program.
A fourth aspect of embodiments of the present invention provides a computer-readable storage medium, in which a computer program is stored, which, when executed by a processor, implements the steps of any of the application disabling methods.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
when the current default short message application is not the short message application of the system, the mobile terminal may have the risk of short message interception, and the designated application is the application related to the property information of the user, so that the risk of short message interception can be avoided by forbidding the started designated application, and the property safety of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an application disabling method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an application disabling apparatus according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 shows a flowchart of an application disabling method according to an embodiment of the present invention, which is detailed as follows:
step S11, receiving an application starting instruction, wherein the application starting instruction carries an application identifier.
Specifically, the user may issue an application start instruction by double-clicking an application icon displayed on the screen of the mobile terminal. The application identifier is used for uniquely identifying the application, and comprises any one of an application name, an application icon, an application package name and the like.
Fig. 2 shows a schematic diagram of a mobile terminal comprising a memory 201, a processor 202, an input device 203, an output device 204, a bus 205.
And step S12, starting the corresponding application according to the application starting instruction.
And step S13, judging whether the application is a designated application according to the application identifier, wherein the designated application is an application related to the user property information.
Specifically, when the application is started, whether the started application is the designated application is judged, and because the application is started simultaneously, the subsequent virus application detection time can be greatly shortened. The designated applications are primarily applications that relate to the user's property information, such as banking-related applications, stock and fund-related applications, payment-related payment-like applications (e.g., Taobao, WeChat), and so forth.
And step S14, when the application is the designated application, detecting whether the current default short message application is the short message application of the system.
Optionally, before step S14, if a default short message application modification instruction is received, the modified information of the third party application (such as the package name of the third party application) corresponding to the short message application is stored in the short message application modification database. Correspondingly, step S14 is specifically to detect whether the information of the third-party application stored in the short message application modification database is information corresponding to the short message application of the system, determine that the current default short message application is the short message application of the system if the information is the information corresponding to the short message application of the system, and otherwise determine that the current default short message application is not the short message application of the system.
When the user uses the application related to the user property information, the user usually uses the functions related to data modification of the application, such as the transfer function using the application, and when the transfer function of the application is used, in order to improve the security of the transfer, the application sends short message information (the short message information usually comprises an authentication code) to the system of the mobile terminal, at this time, if the current default short message application is not the short message application of the system, the system cannot receive the short message information sent by the application, namely, the risk that the short message information is intercepted exists, so that the property security of the user is threatened.
And step S15, when the current default short message application is not the short message application of the system, forbidding the started application.
Specifically, disabling the launched application includes disabling all functions of the launched application, or disabling a portion of the functions of the launched application. Of course, this may be selected depending on user or system settings whether to disable the full functionality of the launched application or to disable part of the functionality of the launched application.
Optionally, when the partial function of the started application is disabled, the step S15 includes:
when the current default short message application is not the short message application of the system, disabling the functions related to data modification in the started application, wherein the functions related to data modification comprise: transfer function, payment function, login or withdrawal password modification function.
It is to be noted that, when the function related to data modification in the application is disabled, the function unrelated to data modification in the application, such as the account viewing function, the friend information viewing function, or the like, is not disabled.
When the function related to data modification in the application is used, the application usually sends short message information to the default short message application, so that the function related to data modification in the application is only forbidden, and the property safety of a user can be guaranteed, and the user can also be guaranteed to acquire information from the specified application.
Optionally, in order to further improve the security of the user property, when the function irrelevant to the data modification in the application is not disabled and the user exits the application (i.e. the started specific application), the user is prompted to modify the login password, the withdrawal password, the transfer password, and the like of the application.
Optionally, after the step S15, the method includes:
and prompting the user that the current default short message application is not the short message application of the system, and suggesting a risk repair. Specifically, when the risk repair is proposed, a short message application restoring button of the system is displayed, and after a user touches the short message application restoring button of the system, the risk repair function is realized.
At this time, after the prompting that the current default short message application of the user is not the short message application of the system and suggesting a risk of repair, the method includes:
and receiving a short message application reduction instruction of the system, and modifying the current default short message application into the system default short message application according to the short message application reduction instruction of the system. Specifically, a user sends a short message application restoration instruction of the system by touching a screen position where a short message application restoration button of the system is located, and the mobile terminal modifies the current non-system-default short message application into the system-default short message application. Certainly, if the short message application modification database exists, the information of the short message application (i.e. the modified short message application) which is defaulted by the system is written into the short message application modification database.
In addition, an exit button may be additionally displayed to facilitate selection of an item by the user. And if the user sends an application quitting instruction by touching the screen position where the quitting button is located, directly quitting the started application. Optionally, if the short message application restoring instruction of the system is not received within the preset time length, and the application quitting instruction is not received, the user is prompted to select a button between a short message application restoring button and a quitting button of the system to execute the operation.
Optionally, after the modification is successful (i.e. the sms application of the system is restored), the user is prompted to restart the application, or the application is automatically started.
Optionally, when the current default short message application is not a short message application of the system, the method for disabling the application further includes:
and A1, searching a third-party application corresponding to the current default short message application. In order to quickly find the third-party application, firstly, application information (such as the package name of the application) with a short message receiving function in the application installed on the mobile terminal is counted, all the counted application information with the short message receiving function is compared with the current default short message application information, and if the application information is consistent with the current default short message application information, the application with the application information consistent with the current default short message application information is judged to be the third-party application corresponding to the current default short message application. Because the number of the applications with the short message receiving function is less than that of all the applications installed on the mobile terminal, the method can greatly improve the searching speed of the third-party application.
A2, judging whether the third-party application is a virus application or not, and when the third-party application is the virus application, recommending to uninstall the third-party application. Specifically, the third-party application is scanned by the virus scanning engine to determine whether the third-party application is a virus application. For example, an actual installation path of the third-party application is scanned, and if the actual installation path of the third-party application is different from an installation path selected or defaulted by the user, it is determined that the third-party application is a virus application. And when the third-party application is judged to be the virus application, recommending to uninstall the third-party application. Optionally, when the third-party application is recommended to be uninstalled, an uninstall button corresponding to the uninstall third-party application is displayed, and when the user touches the uninstall button to send an uninstall instruction, the mobile terminal uninstalls the third-party application.
In the embodiment of the invention, an application starting instruction is received, the application starting instruction carries an application identifier, a corresponding application is started according to the application starting instruction, whether the application is a designated application is judged according to the application identifier, the designated application is an application related to user property information, when the application is the designated application, whether a current default short message application is a short message application of a system is detected, and when the current default short message application is not the short message application of the system, the started application is forbidden. When the current default short message application is not the short message application of the system, the mobile terminal may have the risk of short message interception, and the designated application is the application related to the property information of the user, so that the risk of short message interception can be avoided by forbidding the started designated application, and the property safety of the user is improved.
Fig. 3 is a schematic structural diagram of an application disabling device according to an embodiment of the present invention, and for convenience of description, only the portions related to the embodiment of the present invention are shown.
The application disabling apparatus includes: an application starting instruction receiving unit 31, an application starting unit 32, a specified application judging unit 33, a default short message application detecting unit 34, and an application disabling unit 35. Wherein:
the application starting instruction receiving unit 31 is configured to receive an application starting instruction, where the application starting instruction carries an identifier of an application.
The application identifier is used for uniquely identifying the application, and comprises any one of an application name, an application icon, an application package name and the like.
And the application starting unit 32 is configured to start a corresponding application according to the application starting instruction.
And a designated application judging unit 33, configured to judge whether the application is a designated application according to the identifier of the application, where the designated application is an application related to user property information.
The designated applications are primarily applications that relate to the user's property information, such as banking-related applications, stock and fund-related applications, payment-related payment-like applications (e.g., Taobao, WeChat), and so forth.
And a default short message application detection unit 34, configured to detect whether the current default short message application is a short message application of the system when the application is the designated application.
Optionally, the application disabling means comprises:
and the information storage unit of the third-party application is used for storing the information of the third-party application (such as the package name of the third-party application) corresponding to the modified short message application into the short message application modification database when a default short message application modification instruction is received.
In a corresponding manner, the first and second electrodes are,
the default short message application detecting unit 34 is specifically configured to detect whether the information of the third-party application stored in the short message application modification database is information corresponding to the short message application of the system, determine that the current default short message application is the short message application of the system if the information is the information corresponding to the short message application of the system, and determine that the current default short message application is not the short message application of the system if the information is the information corresponding to the short message application of the system.
And an application disabling unit 35, configured to disable the started application when the current default short message application is not the short message application of the system.
Specifically, disabling the launched application includes disabling all functions of the launched application, or disabling a portion of the functions of the launched application. Of course, this may be selected depending on user or system settings whether to disable the full functionality of the launched application or to disable part of the functionality of the launched application.
Optionally, when disabling a part of functions of the started application, the application disabling unit 35 is specifically configured to:
when the current default short message application is not the short message application of the system, disabling the functions related to data modification in the started application, wherein the functions related to data modification comprise: transfer function, payment function, login or withdrawal password modification function.
It is to be noted that, when the function related to data modification in the application is disabled, the function unrelated to data modification in the application, such as the account viewing function, the friend information viewing function, or the like, is not disabled.
Optionally, in order to further improve the security of the property of the user, when the function unrelated to the data modification in the application is not disabled and the user exits the application (i.e. the started specific application), the application disabling apparatus includes: the password modification prompting unit is used for prompting a user to modify a login password, a withdrawal password, a transfer password and the like of the application.
Optionally, the application disabling means comprises:
and the risk repair suggestion unit is used for prompting that the current default short message application is not the short message application of the system and suggesting risk repair. Specifically, when the risk repair is proposed, a short message application restoring button of the system is displayed, and after a user touches the short message application restoring button of the system, the risk repair function is realized.
Optionally, the application disabling means comprises:
and the default short message application restoration unit is used for receiving a short message application restoration instruction of the system and modifying the current default short message application into the system default short message application according to the short message application restoration instruction of the system. Specifically, a user sends a short message application restoration instruction of the system by touching a screen position where a short message application restoration button of the system is located, and the mobile terminal modifies the current non-system-default short message application into the system-default short message application. Certainly, if the short message application modification database exists, the information of the short message application (i.e. the modified short message application) which is defaulted by the system is written into the short message application modification database.
In addition, an exit button may be additionally displayed to facilitate selection of an item by the user. At this time, the application disabling means includes:
and the application quitting unit is used for directly quitting the started application when the user sends out an application quitting instruction by touching the screen position where the quitting button is located.
Optionally, the application disabling means comprises:
and the operation selection unit is used for prompting a user to select a button between a short message application restoration button and an exit button of the system to execute operation when judging that the short message application restoration instruction of the system is not received within the preset time length and the application exit instruction is not received.
Optionally, when the current default short message application is not a short message application of the system, the application disabling apparatus further includes:
and the third party application searching unit is used for searching the third party application corresponding to the current default short message application. In order to quickly find the third-party application, firstly, application information (such as the package name of the application) with a short message receiving function in the application installed on the mobile terminal is counted, all the counted application information with the short message receiving function is compared with the current default short message application information, and if the application information is consistent with the current default short message application information, the application with the application information consistent with the current default short message application information is judged to be the third-party application corresponding to the current default short message application.
And the third-party application recommending and unloading unit is used for judging whether the third-party application is a virus application or not and recommending and unloading the third-party application when the third-party application is the virus application. Specifically, the third-party application is scanned by the virus scanning engine to determine whether the third-party application is a virus application. For example, an actual installation path of the third-party application is scanned, and if the actual installation path of the third-party application is different from an installation path selected or defaulted by the user, it is determined that the third-party application is a virus application.
In the embodiment of the invention, when the current default short message application is not the short message application of the system, the mobile terminal may have the risk of intercepting the short message, and the appointed application is the application related to the property information of the user, so that the risk of intercepting the short message can be avoided by forbidding the started appointed application, thereby improving the property safety of the user.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Fig. 4 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 4, the terminal device 4 of this embodiment includes: a processor 40, a memory 41 and a computer program 42 stored in said memory 41 and executable on said processor 40. The processor 40, when executing the computer program 42, implements the steps in the various application disabling method embodiments described above, such as the steps S11-S15 shown in fig. 1. Alternatively, the processor 40, when executing the computer program 42, implements the functions of the modules/units in the above-mentioned device embodiments, such as the functions of the units 31 to 35 shown in fig. 3.
Illustratively, the computer program 42 may be partitioned into one or more modules/units that are stored in the memory 41 and executed by the processor 40 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 42 in the terminal device 4. For example, the computer program 42 may be divided into an application start instruction receiving unit, an application start unit, a designated application judging unit, a default short message application detecting unit, and an application disabling unit, and the specific functions of each unit are as follows:
the application starting instruction receiving unit is used for receiving an application starting instruction, and the application starting instruction carries an application identifier;
the application starting unit is used for starting the corresponding application according to the application starting instruction;
the specified application judging unit is used for judging whether the application is a specified application according to the application identifier, and the specified application is an application related to user property information;
a default short message application detection unit, configured to detect whether a current default short message application is a short message application of a system when the application is a designated application;
and the application forbidding unit is used for forbidding the started application when the current default short message application is not the short message application of the system.
The terminal device 4 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 40, a memory 41. Those skilled in the art will appreciate that fig. 4 is merely an example of a terminal device 4 and does not constitute a limitation of terminal device 4 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 40 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 41 may be an internal storage unit of the terminal device 4, such as a hard disk or a memory of the terminal device 4. The memory 41 may also be an external storage device of the terminal device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 4. Further, the memory 41 may also include both an internal storage unit and an external storage device of the terminal device 4. The memory 41 is used for storing the computer program and other programs and data required by the terminal device. The memory 41 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method for application disablement, comprising:
receiving an application starting instruction, wherein the application starting instruction carries an application identifier, and the application identifier is used for uniquely identifying an application and comprises an application name, an application icon or an application package name;
starting the corresponding application according to the application starting instruction;
judging whether the application is a designated application according to the application identifier, wherein the designated application is an application related to user property information;
when the application is the designated application, detecting whether the current default short message application is the short message application of the system;
and when the current default short message application is not the short message application of the system, forbidding the started application.
2. The method for disabling an application according to claim 1, wherein after disabling the started application when the current default short message application is not a short message application of a system, comprising:
and prompting the user that the current default short message application is not the short message application of the system, and suggesting a risk repair.
3. The method of claim 2, wherein after prompting the user that the current default short message application is not a system short message application and suggesting a risk fix, comprising:
and receiving a short message application reduction instruction of the system, and modifying the current default short message application into the system default short message application according to the short message application reduction instruction of the system.
4. The application disabling method of claim 2, wherein when the current default short messaging application is not a system short messaging application, the application disabling method further comprises:
searching a third party application corresponding to the current default short message application;
and judging whether the third-party application is a virus application or not, and recommending to uninstall the third-party application when the third-party application is the virus application.
5. The method for disabling an application according to any one of claims 1 to 4, wherein the disabling the started application when the current default short message application is not a short message application of a system comprises:
when the current default short message application is not the short message application of the system, disabling the functions related to data modification in the started application, wherein the functions related to data modification comprise: transfer function, payment function, login or withdrawal password modification function.
6. An application disabling apparatus, comprising:
the application starting instruction receiving unit is used for receiving an application starting instruction, and the application starting instruction carries an application identifier, wherein the application identifier is used for uniquely identifying an application and comprises an application name, an application icon or an application package name;
the application starting unit is used for starting the corresponding application according to the application starting instruction;
the specified application judging unit is used for judging whether the application is a specified application according to the application identifier, and the specified application is an application related to user property information;
a default short message application detection unit, configured to detect whether a current default short message application is a short message application of a system when the application is a designated application;
and the application forbidding unit is used for forbidding the started application when the current default short message application is not the short message application of the system.
7. The application disabling device of claim 6, wherein the application disabling device comprises:
and the risk repair suggestion unit is used for prompting that the current default short message application is not the short message application of the system and suggesting risk repair.
8. The application disabling device of claim 7, wherein the application disabling device comprises:
and the default short message application restoration unit is used for receiving a short message application restoration instruction of the system and modifying the current default short message application into the system default short message application according to the short message application restoration instruction of the system.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201710500655.9A 2017-06-27 2017-06-27 Application disabling method and device and terminal equipment Active CN107295177B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710500655.9A CN107295177B (en) 2017-06-27 2017-06-27 Application disabling method and device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710500655.9A CN107295177B (en) 2017-06-27 2017-06-27 Application disabling method and device and terminal equipment

Publications (2)

Publication Number Publication Date
CN107295177A CN107295177A (en) 2017-10-24
CN107295177B true CN107295177B (en) 2020-01-24

Family

ID=60098101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710500655.9A Active CN107295177B (en) 2017-06-27 2017-06-27 Application disabling method and device and terminal equipment

Country Status (1)

Country Link
CN (1) CN107295177B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113795000B (en) * 2021-09-08 2023-01-10 号百信息服务有限公司 Method and system for distinguishing authorization takeover by short message application

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999718A (en) * 2011-09-16 2013-03-27 腾讯科技(深圳)有限公司 Payment webpage modification preventing method and device
CN104268475A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running system
CN104376263A (en) * 2014-12-09 2015-02-25 北京奇虎科技有限公司 Application behavior intercepting method and application behavior intercepting device
US9373267B2 (en) * 2011-04-08 2016-06-21 Wombat Security Technologies, Inc. Method and system for controlling context-aware cybersecurity training
CN106453808A (en) * 2015-08-13 2017-02-22 中兴通讯股份有限公司 Method and apparatus for processing terminal data
CN106845977A (en) * 2016-12-29 2017-06-13 深圳市金立通信设备有限公司 A kind of method of payment and terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047701B (en) * 2006-03-27 2011-08-17 北京握奇数据系统有限公司 System and method for ensuring safety operation of applied program
CN102937913B (en) * 2012-10-12 2016-08-24 广东欧珀移动通信有限公司 A kind of method and device managing default application
GB201417565D0 (en) * 2014-10-03 2014-11-19 Moqom Ltd Identity and risk management system and method
CN106557688A (en) * 2016-11-17 2017-04-05 广东欧珀移动通信有限公司 The method and device of management default application
CN106682485A (en) * 2016-11-29 2017-05-17 维沃移动通信有限公司 Method for processing verification code and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9373267B2 (en) * 2011-04-08 2016-06-21 Wombat Security Technologies, Inc. Method and system for controlling context-aware cybersecurity training
CN102999718A (en) * 2011-09-16 2013-03-27 腾讯科技(深圳)有限公司 Payment webpage modification preventing method and device
CN104268475A (en) * 2014-09-30 2015-01-07 北京奇虎科技有限公司 Application running system
CN104376263A (en) * 2014-12-09 2015-02-25 北京奇虎科技有限公司 Application behavior intercepting method and application behavior intercepting device
CN106453808A (en) * 2015-08-13 2017-02-22 中兴通讯股份有限公司 Method and apparatus for processing terminal data
CN106845977A (en) * 2016-12-29 2017-06-13 深圳市金立通信设备有限公司 A kind of method of payment and terminal

Also Published As

Publication number Publication date
CN107295177A (en) 2017-10-24

Similar Documents

Publication Publication Date Title
CN106156619B (en) Application security protection method and device
CN112235321B (en) Short message verification code anti-brushing method and device
EP3270317B1 (en) Dynamic security module server device and operating method thereof
CN109889487B (en) Processing method and device for external equipment access terminal
CN112738046B (en) One-key login method, terminal and system server
CN111149106A (en) Apparatus and method for key authentication using multiple device certificates
CN112231702A (en) Application protection method, device, equipment and medium
CN107480513B (en) Authentication implementation method and device, computer device and readable storage medium
JP2019518285A (en) Method and terminal for enhancing information security
CN107292613B (en) Mobile payment protection method and device and mobile terminal
US9626676B2 (en) Secured online transactions
US20170372311A1 (en) Secure payment-protecting method and related electronic device
CN107295177B (en) Application disabling method and device and terminal equipment
CN107509180B (en) Method for automatically encrypting short message, storage device and mobile terminal
CN107368337B (en) Application downloading method and device and terminal equipment
CN109699030B (en) Unmanned aerial vehicle authentication method, device, equipment and computer readable storage medium
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN111596929A (en) Burning method, device, system, equipment and medium
CN107220546B (en) Application running method and device and terminal equipment
CN107368738B (en) Root prevention method and Root prevention device for intelligent equipment
CN109508535B (en) Firmware security authentication method and device and payment terminal
CN108810233B (en) Malicious incoming call identification method and device
CN111261827A (en) Battery anti-theft method and device
CN105335673A (en) Information safety processing method and device
JP6910377B2 (en) Identity verification method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant