CN107894909B - Method, device and storage medium for limiting Activity starting - Google Patents

Method, device and storage medium for limiting Activity starting Download PDF

Info

Publication number
CN107894909B
CN107894909B CN201711243204.8A CN201711243204A CN107894909B CN 107894909 B CN107894909 B CN 107894909B CN 201711243204 A CN201711243204 A CN 201711243204A CN 107894909 B CN107894909 B CN 107894909B
Authority
CN
China
Prior art keywords
activity
preset
belongs
application
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711243204.8A
Other languages
Chinese (zh)
Other versions
CN107894909A (en
Inventor
喻伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201711243204.8A priority Critical patent/CN107894909B/en
Publication of CN107894909A publication Critical patent/CN107894909A/en
Application granted granted Critical
Publication of CN107894909B publication Critical patent/CN107894909B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure is directed to a method, an apparatus, and a storage medium for restricting Activity startup, so as to solve a problem of system scheduling error caused by randomly opening transparent Activity in related technologies. The disclosed method for restricting Activity launching comprises the following steps: after receiving an Activity start request, judging whether the terminal is in a screen locking state at present; under the condition that the terminal is in a screen locking state, judging whether the Activity belongs to the preset start-prohibited Activity; if the Activity belongs to the preset Activities for prohibiting starting, prohibiting starting the Activity; and if the Activity does not belong to the preset Activities for prohibiting starting, starting the Activity. The stability of the terminal system is improved.

Description

Method, device and storage medium for limiting Activity starting
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, and a storage medium for restricting Activity initiation.
Background
In the related art, in order to improve the Activity, some apps in the terminal monitor a screen locking event of the system, open a transparent Activity after the apps monitor the screen locking event of the system, and then destroy the transparent Activity when the user unlocks the terminal. In the case where only one App in the terminal takes such measures, the influence on the system is not great. However, if a plurality of apps exist in the terminal, the scheduling of the system may be affected, and even if the user sees that the App presented on the terminal screen is not the locked screen after unlocking the terminal, the App is presented on the terminal screen. For example, the user locks the screen on the desktop, and the terminal screen presents the last App opened by the user before locking the screen after unlocking. This seriously affects the user experience.
Disclosure of Invention
In order to overcome the problem that the system scheduling is wrong due to the fact that the Activity is randomly started by the application in the related technology, the invention provides a method, a device and a storage medium for limiting the Activity starting.
According to a first aspect of the present disclosure, there is provided a method of restricting Activity initiation, comprising: after receiving an Activity start request, judging whether the terminal is in a screen locking state at present; under the condition that the terminal is in a screen locking state, judging whether the Activity belongs to preset start-prohibited Activity; if the Activity belongs to the preset Activities for prohibiting starting, prohibiting the Activities from starting; and if the Activity does not belong to the preset Activities which are prohibited to be started, allowing the Activity to be started.
Optionally, the step of determining whether the Activity belongs to a preset startup prohibited Activity includes: judging whether the Activity belongs to an application recorded in a preset blacklist or not; and if the Activity belongs to the application recorded in the preset blacklist, determining that the Activity belongs to a preset startup prohibition Activity.
Optionally, the method further comprises: after the step of allowing the Activity to start, judging whether the property of the Activity is transparent or not; if the attribute of the Activity is transparent, adding the identifier of the application corresponding to the Activity into the blacklist; if the attribute of the Activity is not transparent, judging whether the size of the Activity is within a preset numerical range or not, judging the attribute of the application to which the Activity belongs, and adding the identifier of the application to which the Activity belongs to the blacklist when the size of the Activity is within the preset numerical range and the attribute of the application to which the Activity belongs is the third-party application.
Optionally, the method further comprises: after the step of allowing the Activity to start, determining the number of times that the application to which the Activity belongs starts the Activity within a preset time period, and if the number of times exceeds a preset number of times, adding the identifier of the application to the blacklist.
Optionally, the method further comprises: after the step of allowing the Activity to start, uploading the information of the Activity to a cloud server.
According to a second aspect of the present disclosure, there is provided an apparatus for restricting Activity initiation, comprising: the first judgment module is configured to judge whether the terminal is in a screen locking state at present after receiving the Activity starting request; the second judging module is configured to judge whether the Activity belongs to preset startup-prohibited Activity or not under the condition that the terminal is in a screen locking state; the first processing module is configured to prohibit the Activity from starting when the Activity belongs to preset starting prohibition Activity; the second processing module is configured to allow the Activity to be started when the Activity does not belong to the preset starting prohibition Activity.
Optionally, the second determining module includes: the judging unit is configured to judge whether the Activity belongs to the application recorded in a preset blacklist; a determining unit configured to determine that the Activity belongs to a preset prohibited-to-start Activity when the Activity belongs to the application recorded in the preset blacklist.
Optionally, the apparatus further comprises: a third judging module configured to judge whether the property of the Activity is transparent after the step of allowing the Activity to start is executed; the first adding module is configured to add the identifier of the application corresponding to the Activity into the blacklist when the attribute of the Activity is transparent; the second adding module is configured to judge whether the size of the Activity is within a preset numerical range or not when the property of the Activity is not transparent, judge the property of the application to which the Activity belongs, and add the identifier of the application to which the Activity belongs to the blacklist when the size of the Activity is within the preset numerical range and the property of the application to which the Activity belongs is a third-party application.
Optionally, the apparatus further comprises: a third adding module configured to determine, after executing the step of allowing the Activity to start, the number of times that an application to which the Activity belongs starts the Activity within a preset time period, and add the identifier of the application to the blacklist if the number of times exceeds a preset number of times.
Optionally, the apparatus further comprises: an upload module configured to upload information of the Activity to a cloud server after the step of allowing the Activity to start.
According to a third aspect of the present disclosure, there is provided an apparatus for restricting Activity initiation, comprising: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to: after receiving an Activity start request, judging whether the terminal is in a screen locking state at present; under the condition that the terminal is in a screen locking state, judging whether the Activity belongs to preset start-prohibited Activity; if the Activity belongs to the preset Activities for prohibiting starting, prohibiting the Activities from starting; and if the Activity does not belong to the preset Activities which are prohibited to be started, allowing the Activity to be started.
According to a fourth aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of the first aspect of the present disclosure.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: when the terminal is in the screen locking state, whether the application is allowed to open the Activity is determined according to whether the Activity requested to be opened by the application belongs to the preset Activity which is prohibited to be opened, so that the influence on the scheduling of a terminal system caused by the random opening of the Activity when the terminal is in the screen locking state can be effectively avoided, and the stability of the system is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating a method of restricting Activity initiation according to an exemplary embodiment of the present application.
FIG. 2 is a block diagram illustrating an apparatus for restricting Activity initiation according to an exemplary embodiment of the present application.
FIG. 3 is a block diagram illustrating another apparatus for restricting Activity initiation according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
An embodiment of the present application provides a method for restricting Activity launching, and fig. 1 is a flowchart illustrating a method for restricting Activity launching according to an exemplary embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S11: after receiving an Activity start request, judging whether the terminal is in a screen locking state at present;
step S12: under the condition that the terminal is in a screen locking state, judging whether the Activity belongs to the preset start-prohibited Activity;
step S13: if the Activity belongs to the preset Activity for prohibiting starting, prohibiting the Activity starting;
step S14: and if the Activity does not belong to the preset Activities for prohibiting starting, the Activity is allowed to start.
In one embodiment, the step of determining whether the Activity belongs to the preset startup prohibited Activity comprises: judging whether the Activity belongs to the application recorded in the preset blacklist or not; if the Activity belongs to the application recorded in the preset blacklist, it is determined that the Activity belongs to the preset startup prohibition Activity, for example, the preset startup prohibition Activity may be the Activity belonging to the preset App that prohibits the startup of the Activity when the terminal is in the lock screen state. For example, the preset blacklist records an identification of the application. An application may correspond to different activities with different names. The preset blacklist can be stored in the terminal, can be stored in the cloud, and can be updated by the terminal or the cloud.
The method for limiting Activity launching of the embodiment of the application may further include a maintenance operation on the blacklist on the basis of the above steps S11 to S14. The maintenance operation on the blacklist comprises the following steps: after the system executes the step of allowing the Activity to start, judging whether the attribute of the Activity allowing the start is transparent or not; if the attribute of the Activity is transparent, adding the identifier of the application corresponding to the Activity into a blacklist; if the attribute of the Activity is not transparent, judging whether the size of the Activity is in a preset numerical range or not, and judging the attribute of the application to which the Activity belongs, and adding the identifier of the application to which the Activity belongs to a blacklist when the size of the Activity is in the preset numerical range and the attribute of the application to which the Activity belongs is a third-party application, wherein when the size of the Activity is in the preset numerical range, the Activity is non-transparent, but one Activity which is not easily perceived by a user is, for example, an Activity which exists only in the form of displaying a certain color on a terminal display screen, and the size of the Activity is often in a numerical range, so that the embodiment utilizes the size of the Activity to identify and inhibit the Activity from being opened.
The method for restricting Activity initiation of the embodiment of the present application may further include another operation of maintaining a blacklist: after the step of allowing the Activity to start is executed, determining the number of times that the application to which the Activity is allowed to start starts the Activity within a preset time period, for example, the number of times that the application to which the Activity belongs starts the Activity within the preset time period, or the total number of times that any Activity is started, and if the number of times exceeds the preset number of times, adding the identifier of the application to a blacklist.
The Activity limiting method according to the embodiment of the present application may further include: after the step of allowing Activity initiation, uploading the information of Activity to a cloud server. On the basis, any one of the above maintenance operations on the blacklist can be executed by the cloud control. In addition, the maintenance operation on the blacklist can be completed by the terminal or the local server. The information of the Activity may include attribute information of the Activity, a name of the Activity, or may further include an identifier of an application to which the Activity belongs.
In one example, the flow of the method for restricting Activity initiation of the present application includes: maintaining a blacklist in the cloud control, wherein an application identifier is recorded in the blacklist, matching the application identifier requesting to start the transparent Activity with the application identifier recorded in the blacklist if the transparent Activity requests to start in a screen locking state of the terminal, prohibiting the transparent Activity from starting if a matching result indicates that the application identifier requesting to start the transparent Activity exists in the blacklist, and allowing the transparent Activity to start if the matching result indicates that the application identifier requesting to start the transparent Activity is no longer in the blacklist, and uploading the Activity information to the cloud server. And the cloud end periodically updates the blacklist according to the uploaded Activity information.
According to the method for limiting Activity startup, whether the application is allowed to start Activity is determined according to whether the Activity which is requested to be started when the terminal is in the lock screen state belongs to the preset Activities which are prohibited to be started, so that the influence on the scheduling of a terminal system caused by the fact that the application randomly starts Activity when the terminal is in the lock screen state can be effectively avoided, and the stability of the system is improved.
An embodiment of the present application further provides an apparatus for restricting Activity launching, and fig. 2 is a block diagram of the apparatus for restricting Activity launching according to an exemplary embodiment of the present application, and as shown in fig. 2, the apparatus 20 includes:
the first judging module 21 is configured to judge whether the terminal is currently in a screen locking state after receiving the Activity starting request;
the second judging module 22 is configured to judge whether the Activity belongs to the preset start-prohibited Activity or not under the condition that the terminal is in the screen-locking state;
the first processing module 23 is configured to prohibit Activity starting when the Activity belongs to preset startup prohibition Activity;
and the second processing module 24 is configured to allow the Activity to start when the Activity does not belong to the preset start-prohibited Activity.
In an exemplary embodiment, the second determining module 22 includes: the judging unit is configured to judge whether the Activity belongs to the application recorded in the preset blacklist; the determining unit is configured to determine that the Activity belongs to the preset startup prohibited Activity when the Activity belongs to the application recorded in the preset blacklist.
Optionally, the apparatus 20 for limiting Activity initiation according to the embodiment of the present application may further include: a third judgment module configured to judge whether the property of Activity is transparent after the second processing module 24 executes the step of allowing Activity to start; the first adding module is configured to add the application identifier corresponding to the Activity to the blacklist when the third judging module judges that the attribute of the Activity is transparent; the second adding module is configured to judge whether the size of the Activity is within a preset numerical range or not and judge the attribute of the application to which the Activity belongs when the third judging module judges that the attribute of the Activity is not transparent, and add the identifier of the application to which the Activity belongs to a blacklist when the size of the Activity is within the preset numerical range and the attribute of the application to which the Activity belongs is the third-party application.
Optionally, the apparatus 20 for limiting Activity initiation according to the embodiment of the present application further includes: and the third adding module is configured to determine the number of times the Activity is started by the application to which the Activity belongs within a preset time period after the step of allowing the Activity to be started is executed, and add the identifier of the application to the blacklist if the number of times the Activity is started by the application to which the Activity belongs within the preset time period exceeds the preset number of times.
Optionally, the apparatus 20 for limiting Activity initiation according to the embodiment of the present application further includes: an upload module configured to upload information of Activity to a server after the step of allowing Activity to launch.
Embodiments of the present application also provide another apparatus for restricting Activity initiation, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to execute the method for restricting Activity initiation of the embodiment of the present application.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present application also provides a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of restricting Activity initiation provided by the present disclosure.
FIG. 3 is a block diagram illustrating an apparatus 300 for restricting Activity initiation, according to an exemplary embodiment. For example, the apparatus 300 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 3, the apparatus 300 may include one or more of the following components: a processing component 302, a memory 304, a power component 306, a multimedia component 308, an audio component 310, an input/output (I/O) interface 312, a sensor component 314, and a communication component 316.
The processing component 302 generally controls overall operation of the device 300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 302 may include one or more processors 320 to execute instructions to perform all or a portion of the steps of the method of restricting Activity initiation described above. Further, the processing component 302 can include one or more modules that facilitate interaction between the processing component 302 and other components. For example, the processing component 302 may include a multimedia module to facilitate interaction between the multimedia component 308 and the processing component 302.
The memory 304 is configured to store various types of data to support operations at the apparatus 300. Examples of such data include instructions for any application or method operating on device 300, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 304 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 306 provide power to the various components of device 300. The power components 306 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the apparatus 300.
The multimedia component 308 includes a screen that provides an output interface between the device 300 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 308 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 300 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 310 is configured to output and/or input audio signals. For example, audio component 310 includes a Microphone (MIC) configured to receive external audio signals when apparatus 300 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 304 or transmitted via the communication component 316. In some embodiments, audio component 310 also includes a speaker for outputting audio signals.
The I/O interface 312 provides an interface between the processing component 302 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 314 includes one or more sensors for providing various aspects of status assessment for the device 300. For example, sensor assembly 314 may detect an open/closed state of device 300, the relative positioning of components, such as a display and keypad of device 300, the change in position of device 300 or a component of device 300, the presence or absence of user contact with device 300, the orientation or acceleration/deceleration of device 300, and the change in temperature of device 300. Sensor assembly 314 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 314 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 316 is configured to facilitate wired or wireless communication between the apparatus 300 and other devices. The device 300 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 316 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 316 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described method of limiting Activity initiation.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as the memory 304, comprising instructions executable by the processor 320 of the device 300 to perform the above-described method of limiting Activity initiation. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
According to the device for limiting Activity starting, whether the application is allowed to start the Activity is determined according to whether the Activity which is requested to be started when the terminal is in the lock screen state belongs to the preset Activity which is prohibited from being started, so that the influence on the scheduling of a terminal system caused by the fact that the application randomly starts the Activity when the terminal is in the lock screen state can be effectively avoided, and the stability of the system is improved.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method for restricting Activity initiation, comprising:
after receiving an Activity start request, judging whether the terminal is in a screen locking state at present;
under the condition that the terminal is in a screen locking state, judging whether the Activity belongs to preset start-prohibited Activity;
if the Activity belongs to the preset Activities for prohibiting starting, prohibiting the Activities from starting;
if the Activity does not belong to the preset Activities which are prohibited to be started, allowing the Activity to be started;
wherein the step of judging whether the Activity belongs to the preset startup prohibited Activity comprises the following steps:
judging whether the Activity belongs to an application recorded in a preset blacklist or not;
if the Activity belongs to the application recorded in the preset blacklist, determining that the Activity belongs to a preset startup prohibition Activity;
the method further comprises the following steps: after the step of allowing the Activity to start, judging whether the property of the Activity is transparent or not;
and if the attribute of the Activity is transparent, adding the identifier of the application corresponding to the Activity into the blacklist.
2. The method of limiting Activity initiation of claim 1, further comprising:
if the attribute of the Activity is not transparent, judging whether the size of the Activity is within a preset numerical range or not, judging the attribute of the application to which the Activity belongs, and adding the identifier of the application to which the Activity belongs to the blacklist when the size of the Activity is within the preset numerical range and the attribute of the application to which the Activity belongs is a third-party application.
3. The method of limiting Activity initiation of claim 1, further comprising:
after the step of allowing the Activity to start, determining the number of times that the application to which the Activity belongs starts the Activity within a preset time period, and if the number of times exceeds a preset number of times, adding the identifier of the application to the blacklist.
4. The method of restricting Activity launching according to any one of claims 1 to 3, further comprising:
after the step of allowing the Activity to start, uploading the information of the Activity to a cloud server.
5. An apparatus for restricting Activity initiation, comprising:
the first judgment module is configured to judge whether the terminal is in a screen locking state at present after receiving the Activity starting request;
the second judging module is configured to judge whether the Activity belongs to preset startup-prohibited Activity or not under the condition that the terminal is in a screen locking state;
the first processing module is configured to prohibit the Activity from starting when the Activity belongs to preset starting prohibition Activity;
the second processing module is configured to allow the Activity to start when the Activity does not belong to the preset starting prohibition Activity;
wherein, the second judging module comprises:
the judging unit is configured to judge whether the Activity belongs to the application recorded in a preset blacklist;
the determining unit is configured to determine that the Activity belongs to a preset prohibited-start Activity when the Activity belongs to the application recorded in the preset blacklist;
the device further comprises:
a third judging module configured to judge whether the property of the Activity is transparent after the step of allowing the Activity to start is executed;
the first adding module is configured to add the identifier of the application corresponding to the Activity to the blacklist when the attribute of the Activity is transparent.
6. The apparatus for restricting Activity initiation according to claim 5, further comprising:
the second adding module is configured to judge whether the size of the Activity is within a preset numerical range or not when the property of the Activity is not transparent, judge the property of the application to which the Activity belongs, and add the identifier of the application to which the Activity belongs to the blacklist when the size of the Activity is within the preset numerical range and the property of the application to which the Activity belongs is a third-party application.
7. The apparatus for restricting Activity initiation according to claim 5, further comprising:
a third adding module configured to determine, after executing the step of allowing the Activity to start, the number of times that an application to which the Activity belongs starts the Activity within a preset time period, and add the identifier of the application to the blacklist if the number of times exceeds a preset number of times.
8. The apparatus for restricting Activity initiation according to any of claims 5-7, further comprising:
an upload module configured to upload information of the Activity to a cloud server after the step of allowing the Activity to start.
9. An apparatus for restricting Activity initiation, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
after receiving an Activity start request, judging whether the terminal is in a screen locking state at present;
under the condition that the terminal is in a screen locking state, judging whether the Activity belongs to preset start-prohibited Activity;
if the Activity belongs to the preset Activities for prohibiting starting, prohibiting the Activities from starting;
if the Activity does not belong to the preset Activities which are prohibited to be started, allowing the Activity to be started;
wherein the step of judging whether the Activity belongs to the preset startup prohibited Activity comprises the following steps:
judging whether the Activity belongs to an application recorded in a preset blacklist or not;
if the Activity belongs to the application recorded in the preset blacklist, determining that the Activity belongs to a preset startup prohibition Activity;
the processor is further configured to:
after the step of allowing the Activity to start, judging whether the property of the Activity is transparent or not;
and if the attribute of the Activity is transparent, adding the identifier of the application corresponding to the Activity into the blacklist.
10. A computer-readable storage medium, on which computer program instructions are stored, which program instructions, when executed by a processor, carry out the steps of the method according to any one of claims 1 to 4.
CN201711243204.8A 2017-11-30 2017-11-30 Method, device and storage medium for limiting Activity starting Active CN107894909B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711243204.8A CN107894909B (en) 2017-11-30 2017-11-30 Method, device and storage medium for limiting Activity starting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711243204.8A CN107894909B (en) 2017-11-30 2017-11-30 Method, device and storage medium for limiting Activity starting

Publications (2)

Publication Number Publication Date
CN107894909A CN107894909A (en) 2018-04-10
CN107894909B true CN107894909B (en) 2020-06-02

Family

ID=61807329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711243204.8A Active CN107894909B (en) 2017-11-30 2017-11-30 Method, device and storage medium for limiting Activity starting

Country Status (1)

Country Link
CN (1) CN107894909B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810949B (en) * 2018-07-11 2022-05-24 奇安信科技集团股份有限公司 Management and control wifi hotspot processing method and terminal
CN110389789A (en) * 2019-07-17 2019-10-29 Oppo广东移动通信有限公司 A kind of application control method, equipment and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105306743A (en) * 2015-09-30 2016-02-03 小米科技有限责任公司 Screen control method and device
CN106127030A (en) * 2016-06-22 2016-11-16 广东欧珀移动通信有限公司 A kind of interface control method and device
CN106648855A (en) * 2016-11-21 2017-05-10 武汉斗鱼网络科技有限公司 Method and device for controlling application program of terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106095517A (en) * 2016-06-28 2016-11-09 宇龙计算机通信科技(深圳)有限公司 The method and device that a kind of end application runs
CN107302789B (en) * 2017-06-21 2021-04-16 上海集赫电子商务有限公司 Method and system for improving battery endurance of android device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105306743A (en) * 2015-09-30 2016-02-03 小米科技有限责任公司 Screen control method and device
CN106127030A (en) * 2016-06-22 2016-11-16 广东欧珀移动通信有限公司 A kind of interface control method and device
CN106648855A (en) * 2016-11-21 2017-05-10 武汉斗鱼网络科技有限公司 Method and device for controlling application program of terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
【腾讯Bugly干货分享】Android 进程保活招式大全;腾讯-张兴华;《https://segmentfault.com/a/1190000006251859?utm_medium=referral&utm_source=tuicool》;20160812;1-19 *

Also Published As

Publication number Publication date
CN107894909A (en) 2018-04-10

Similar Documents

Publication Publication Date Title
US9588805B2 (en) Method and terminal device for controlling background application
EP3188066B1 (en) A method and an apparatus for managing an application
EP3099042B1 (en) Methods and devices for sending cloud card
CN105224349B (en) Application program deletion prompting method and device
US10292004B2 (en) Method, device and medium for acquiring location information
EP3151117A1 (en) Method and device for delaying information broadcasting
CN107798231B (en) Display method and device of operation interface, terminal and storage medium
EP3136699A1 (en) Method and device for connecting external equipment
US20160294805A1 (en) Method and terminal device for accessing network
CN108629178B (en) Resource access authority configuration method and device of application program
CN107491681B (en) Fingerprint information processing method and device
CN108011990B (en) Contact management method and device
CN104850643B (en) Picture comparison method and device
CN107894909B (en) Method, device and storage medium for limiting Activity starting
CN107656616B (en) Input interface display method and device and electronic equipment
CN107632835B (en) Application installation method and device
EP2985697A1 (en) Method and device for controlling router plug-in
CN106201738B (en) System broadcast calling method and device
CN106506808B (en) Method and device for prompting communication message
US20170147593A1 (en) Contact managing method and apparatus, and storage medium
US9674768B2 (en) Method and device for accessing wireless network
CN107885464B (en) Data storage method, device and computer readable storage medium
CN107357643B (en) Application calling method and device and computer readable storage medium
CN106060104B (en) Application management method and device
US20170316039A1 (en) Information acquisition method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant