CN111143819A - Application locking method and device and computer storage medium - Google Patents

Application locking method and device and computer storage medium Download PDF

Info

Publication number
CN111143819A
CN111143819A CN201911267714.8A CN201911267714A CN111143819A CN 111143819 A CN111143819 A CN 111143819A CN 201911267714 A CN201911267714 A CN 201911267714A CN 111143819 A CN111143819 A CN 111143819A
Authority
CN
China
Prior art keywords
application
terminal
locking
locked
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911267714.8A
Other languages
Chinese (zh)
Inventor
许士环
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201911267714.8A priority Critical patent/CN111143819A/en
Publication of CN111143819A publication Critical patent/CN111143819A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an application locking method, an application locking device and a computer storage medium, wherein the application locking method comprises the following steps: a terminal sends a registration request, wherein the registration request comprises a device identifier and a communication identifier of the terminal; the terminal receives a locking instruction, wherein the locking instruction comprises locking application information used for indicating that an application is required to be locked or the application is not required to be locked; and the terminal locks the application in the terminal according to the locking application information. The application locking method, the application locking device and the computer storage medium can flexibly and freely lock the application in the terminal according to actual requirements, are convenient and fast to operate and effectively improve the use experience of a user.

Description

Application locking method and device and computer storage medium
Technical Field
The present invention relates to the field of terminals, and in particular, to an application locking method and apparatus, and a computer storage medium.
Background
With the development of internet technology, in order to meet the flexible demand for terminal management, remote control of a terminal, such as locking of applications in the terminal, may often be achieved through a remote control technology. However, in the related art, the locking of the applications in the terminal can only lock all the applications in the terminal at the same time or lock each application one by one, and the operation is cumbersome, which reduces the user experience.
Disclosure of Invention
The invention aims to provide an application locking method, an application locking device and a computer storage medium, which can flexibly and freely lock an application in a terminal according to actual requirements, are convenient to operate and effectively improve the use experience of a user.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an application locking method, which is applied to a terminal, and the method includes:
sending a registration request, wherein the registration request comprises a device identifier and a communication identifier of the terminal;
receiving a locking instruction, wherein the locking instruction comprises locking application information used for indicating that an application needs to be locked or the application does not need to be locked;
and locking the application in the terminal according to the locking application information.
As one of the implementation manners, if the locking application information is an application identifier corresponding to at least one application to be locked, the terminal locks the application corresponding to the application identifier;
and if the application locking information is at least one application identifier corresponding to the application which does not need to be locked, the terminal locks other applications except the application corresponding to the application identifier.
As an implementation manner, the locking the application in the terminal according to the locking application information includes:
after receiving an application starting instruction, judging whether the application to be started is an application needing to be locked or an application not needing to be locked according to the application locking information;
and if the application to be started belongs to the application needing to be locked or does not belong to the application needing not to be locked, locking the application to be started.
As an embodiment, before receiving the lock instruction, the method further includes:
receiving the identity of the terminal returned based on the registration request;
the receiving a lock instruction includes:
sending a locking query request carrying the identity of the terminal;
and receiving a locking instruction returned based on the locking inquiry request.
As one implementation manner, the terminal has an android operating system, the communication identifier includes a google advertising system identifier and/or a terminal number, and the device identifier includes an international mobile equipment identifier.
As one embodiment, the lock instruction further includes lock time information; the locking the application in the terminal according to the locking application information includes:
and locking the application in the terminal according to the locking application information and the locking time information.
As one of the implementation modes, the method further comprises the following steps:
when the unlocking condition is detected to be met, unlocking the locked application in the terminal; the unlocking condition comprises the end of the locking time and/or the receiving of an unlocking instruction.
As an embodiment, after receiving the lock instruction, the method further includes:
and storing the locking instruction to a protection partition of the terminal.
In a second aspect, an embodiment of the present invention provides an application locking method, which is applied to a server, and the method includes:
receiving a registration request sent by a terminal, wherein the registration request comprises a device identifier and a communication identifier of the terminal;
responding to the registration request, and generating an identity identifier of the terminal according to the equipment identifier and the communication identifier;
and sending a locking instruction to the terminal based on the identity of the terminal, wherein the locking instruction comprises locking application information used for indicating that the application is required to be locked or the application is not required to be locked.
As an implementation manner, after generating the identity identifier of the terminal according to the device identifier and the communication identifier, the method further includes:
sending the identity of the terminal to the terminal;
the sending a locking instruction to the terminal based on the identity of the terminal includes:
receiving a locking query request which is sent by the terminal and carries an identity of the terminal;
and sending a locking instruction to the terminal according to the identity of the terminal.
As an embodiment, the sending a lock instruction to the terminal based on the identity of the terminal includes:
and when the terminal is detected to be locked, a locking instruction is sent to the terminal in real time or periodically based on the identity of the terminal.
In one embodiment, the lock instruction further includes lock time information.
In a third aspect, an embodiment of the present invention provides an application locking device, where the application locking device includes: a processor and a memory for storing a computer program capable of running on the processor; wherein the processor, when executing the computer program, implements the application locking method according to the first aspect or the second aspect.
In a fourth aspect, an embodiment of the present invention provides a computer storage medium storing a computer program, where the computer program, when executed by a processor, implements the application locking method according to the first aspect or the second aspect.
The embodiment of the invention provides an application locking method, an application locking device and a computer storage medium, wherein the application locking method comprises the following steps: a terminal sends a registration request, wherein the registration request comprises a device identifier and a communication identifier of the terminal; the terminal receives a locking instruction, wherein the locking instruction comprises locking application information used for indicating that an application is required to be locked or the application is not required to be locked; and the terminal locks the application in the terminal according to the locking application information. Therefore, after the terminal receives the locking instruction which comprises the locking application information used for indicating that the application is required to be locked or the application is not required to be locked, the application in the terminal is locked according to the locking application information, namely the application is required to be locked or the application except the application which is not required to be locked is locked, the application in the terminal is flexibly and freely locked according to actual requirements, the operation is convenient and fast, and the use experience of a user is effectively improved.
Drawings
Fig. 1 is a schematic diagram of an application environment of an application locking method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an application locking method according to an embodiment of the present invention;
FIG. 3 is a first diagram illustrating an exemplary implementation of lock-in;
FIG. 4 is a second diagram illustrating application of locking in an embodiment of the present invention;
FIG. 5 is a flowchart illustrating another application locking method according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of an application locking system according to an embodiment of the present invention;
fig. 7 is an interaction diagram of an application locking method according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an application locking device according to an embodiment of the present invention.
Detailed Description
The technical scheme of the invention is further elaborated by combining the drawings and the specific embodiments in the specification. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
Referring to fig. 1, an application environment of the application locking method provided in the embodiment of the present invention is schematically illustrated, and includes a terminal 10 and a server 11, where applications including but not limited to office applications, entertainment applications, chat applications, and the like, may run in the terminal 10, and the terminal 10 may be a mobile phone, a tablet computer, a notebook computer, a personal digital assistant, and the like. The server 11 may be one server, a server cluster formed by a plurality of servers, or a cloud computing service center. The terminal 10 may establish a communication connection with the server 11 through a network, which may be a wireless network or a wired network. Here, fig. 1 shows a case where the terminal 10 is a mobile phone and the terminal 10 establishes a communication connection with the server 11 through a wireless network. In addition, 1 terminal in fig. 1 is only one schematic terminal, and in practical application, the number of terminals may be more, so that the number is not limited herein.
Referring to fig. 2, a flowchart of an application locking method provided in an embodiment of the present invention is illustrated, where the method may be applied to the terminal 10 shown in fig. 1, and the method includes the following steps:
step S101: a terminal sends a registration request, wherein the registration request comprises a device identifier and a communication identifier of the terminal;
in this embodiment, a case where a terminal transmits a registration request to a server will be described as an example. Here, the terminal has a control application program, and the control application program can control at least one other application of the terminal to which the control application program belongs, such as locking and unlocking the application in the terminal. The control application may provide a user interface for a user to interact with the terminal, and the user interface may display a control identifier for triggering a control command, such as a function button for triggering registration. Or after the terminal installs a control application program, the control application program actively triggers the terminal to send a registration request to a server. The purpose of sending the registration request to the server by the terminal may be to request that the terminal be registered and activated in the server, so as to facilitate the server to manage the terminal, and the like. Here, the device identifier is used to identify the identity of the terminal, and the device identifier may be configured based on actual requirements, for example, the device identifier may be an ID or a model of the corresponding terminal, or may be a mobile device identification code of the corresponding terminal, such as an IMEI, an MEID, or the like. The communication identifier is used for identifying the identity of the terminal when the terminal communicates with the outside, and can be a terminal number, namely a number corresponding to an SIM card inserted into the terminal, a Google advertisement system identification code and the like. In an embodiment, if the terminal is a mobile terminal with an android operating system, the communication identifier includes a google advertising system identifier and/or a terminal number, and the device identifier includes an international mobile equipment identifier. That is, when the terminal is a mobile terminal having an android operating system, the registration request may include an international mobile equipment identity and a google advertising system identity of the terminal, or may include an international mobile equipment identity and a terminal number of the terminal, or may include an international mobile equipment identity, a google advertising system identity and a terminal number of the terminal. Correspondingly, the server can send messages such as short messages to the terminal according to the terminal number of the terminal, or the server can push messages to the terminal according to the Google advertising system identification code of the terminal. It can be understood that, because the identification code of the google advertising system and the identification code of the international mobile equipment are usually unique and are not easy to be tampered, the uniqueness of the registration of the terminal by the server can be ensured, and further, the accurate control is realized.
Step S102: the terminal receives a locking instruction, wherein the locking instruction comprises locking application information used for indicating that an application is required to be locked or the application is not required to be locked;
specifically, the terminal receives a locking instruction sent by the server based on the identity generated by the terminal registration. Here, the locking instruction sent by the terminal receiving server based on the identifier generated by the terminal registration may be a locking instruction sent by the terminal receiving server in real time, at irregular time, or periodically based on the identifier generated by the terminal registration, or a locking instruction returned by the receiving server based on the identifier generated by the terminal registration after the terminal sends a locking query request to the server. It is to be understood that the locking application information may include an identifier of the application to be locked or an identifier of the application not to be locked, where the identifier of the application is used to identify the identity of the application, and specifically may be a name of the application, a name of the installation package, an icon, and the like. In addition, the locking instruction may further include locking time information, where the locking time information may include a locking start time and a locking end time, and if the current time reaches the locking start time, it indicates that the application in the terminal needs to be locked, and if the current time reaches the locking end time, it indicates that the application in the terminal needs to be locked.
In an embodiment, before the terminal receives the lock instruction, the method further includes:
receiving the identity of the terminal returned based on the registration request;
the terminal receives a locking instruction, and comprises the following steps:
sending a locking query request carrying the identity of the terminal;
and receiving a locking instruction returned based on the locking inquiry request.
Specifically, after sending a registration request to a server, a terminal receives an identity of the terminal, which is generated based on the registration request and returned by the server; then, the terminal sends a locking query request carrying the identity of the terminal to the server to query whether an application needing to be locked or an application not needing to be locked exists in the terminal, namely, whether the server needs to lock the application in the terminal is queried; and finally, the terminal receives a locking instruction returned by the server based on the locking inquiry request.
Here, after the terminal receives the identity of the terminal returned by the server, the terminal may send a lock query request to the server in real time, at irregular time, or periodically, and know which applications in the terminal need to be locked in time. In addition, the terminal may send a registration request to the server after receiving an inquiry operation input by the user. The terminal may also send a lock query request to the server after the user inputs a query operation through the user interface of the control application. It should be noted that, according to the difference of the communication identifiers, the locking instruction may be sent to the terminal by the server through a short message or a push message, or the like, that is, the terminal receives the locking instruction may receive a short message or a push message including the locking instruction, and further obtains the locking instruction from the short message or the push message. Therefore, the terminal actively sends the locking query request to the server and timely acquires the information of the application needing to be locked or the application not needing to be locked in the terminal, so that the accuracy and timeliness of application locking are ensured, and the use experience of a user is further improved.
Step S103: and the terminal locks the application in the terminal according to the locking application information.
Specifically, the terminal locks the application in the terminal according to the locking application information in the locking instruction obtained in step S102, so as to flexibly and freely lock the application in the terminal according to actual requirements.
It should be noted that, if the locking instruction further includes locking time information, the locking the application in the terminal according to the locking application information includes: and locking the application in the terminal according to the locking application information and the locking time information. That is, the terminal locks the application in the terminal according to the locking application information under the condition that the locking time information is satisfied. For example, if the locking start time included in the locking time information is 12:00 am on 1 st 2019, the terminal locks the application in the terminal according to the locking application information when the current time reaches the locking start time. Therefore, the application in the terminal is locked according to the locking application information and the locking time information, operation convenience is further improved, and user experience is further improved.
In one embodiment, if the application locking information is at least one application identifier corresponding to an application to be locked, the terminal locks the application corresponding to the application identifier; and if the application locking information is at least one application identifier corresponding to the application which does not need to be locked, the terminal locks other applications except the application corresponding to the application identifier. Specifically, when the locking application information is an application identifier corresponding to at least one application to be locked, the terminal locks the corresponding application according to the application identifier corresponding to the at least one application to be locked. Or when the locking application information is at least one application identifier corresponding to an application which does not need to be locked, the terminal does not lock the corresponding application according to the application identifier corresponding to the at least one application which does not need to be locked, and locks other applications except the corresponding application. Referring to fig. 3, taking the terminal as a smart phone as an example, assuming that the smart phone is purchased by the user by stages, the user needs to pay every month on time, and the smart phone can display an interface containing information such as the remaining payment amount, the remaining payment time, and the payment progress according to the payment condition to remind the user of paying every month on time, so as to prevent the smart phone from being locked. If the user does not pay on time, the merchant can control the smart phone through the server, for example, the server can use applications such as WeChat, telephone, short message and the like as applications needing to be locked, and control the smart phone to not use the applications needing to be locked in a mode of issuing a locking instruction. Therefore, the application in the terminal is flexibly locked according to the requirement, and the use experience of a user is effectively improved.
In an embodiment, the locking the application in the terminal according to the locking application information includes:
after receiving an application starting instruction, judging whether the application to be started is an application needing to be locked or an application not needing to be locked according to the application locking information;
and if the application to be started belongs to the application needing to be locked or does not belong to the application needing not to be locked, locking the application to be started.
Specifically, after receiving an application start instruction, the terminal acquires information of an application to be started, such as a name, and judges whether the application to be started is an application to be locked or an application not to be locked corresponding to the application locking information, and if the application to be started belongs to the application to be locked or does not belong to the application not to be locked, the application to be started is locked, so that a user cannot normally use the application to be started; and if the application to be started does not belong to the application needing to be locked or the application needing not to be locked, the application to be started is not locked, so that a user can normally use the application to be started. It can be understood that, when the terminal receives the locking instruction, the application to be locked or the application not to be locked may not be installed in the terminal, and in order to avoid that the application meeting the locking condition cannot be completely locked, the terminal may detect whether the application needs to be locked when the application is started, and then execute the corresponding operation according to the detection result. Therefore, the comprehensiveness and accuracy of application locking can be improved, and the use experience of a user is further improved. Referring to fig. 4, which is a schematic diagram of application locking in the embodiment of the present invention, taking the terminal as a smart phone as an example, a user purchases a smart phone by stages, a seller of the smart phone installs a control application in advance in the smart phone to lock an application in the terminal when the user does not pay on time, assuming that the user does not pay on time, at this time, the control application receives a locking instruction including an application white list and the application white list includes an application A, B, C, and if the control application detects that the user needs to open the application D, the control application locks the application D so that the user cannot open the application D, and can send a corresponding reminding message.
In summary, in the application locking method provided in the above embodiment, after receiving a locking instruction that includes locking application information for indicating that an application needs to be locked or does not need to be locked and is sent by a server, a terminal locks an application in the terminal according to the locking application information, that is, locks the application that needs to be locked or locks an application other than the application that does not need to be locked, so that the application in the terminal is flexibly and freely locked according to actual needs, and the method is convenient and fast to operate, and effectively improves user experience.
In one embodiment, the application locking method further includes:
when the terminal detects that an unlocking condition is met, unlocking the locked application in the terminal; the unlocking condition comprises the end of the locking time and/or the receiving of an unlocking instruction sent by the server.
It can be understood that, if the lock instruction includes lock time information and the lock time information includes lock end time, the terminal unlocks the locked application in the terminal after the current time exceeds the lock end time, that is, after the lock time is ended, so that the locked application in the terminal is resumed to run. And if the terminal receives an unlocking instruction sent by the server, the terminal unlocks the locked application in the terminal so as to enable the locked application in the terminal to recover to run. Therefore, when the terminal confirms that the unlocking condition is met, the locked application in the terminal is unlocked in time, the operation is flexible, and the user experience is further improved.
In an embodiment, after the terminal receives the lock instruction, the method further includes: and the terminal stores the locking instruction to a protection partition of the terminal. Here, the terminal may be pre-partitioned into a protection partition, and the protection partition has characteristics of high security and the like, so that the terminal is not easily tampered. The terminal stores the locking instruction to a protection partition of the terminal, and can ensure that the locking instruction is not easy to be tampered, so that the safety of the locking instruction is improved, and the application is effectively locked.
Referring to fig. 5, a flowchart of an application locking method provided in an embodiment of the present invention is illustrated, where the method may be applied to the server 11 shown in fig. 1, and the method includes the following steps:
step S201: a server receives a registration request sent by a terminal, wherein the registration request comprises a device identifier and a communication identifier of the terminal;
here, the registration request may be triggered by a control application program that the user of the terminal has through the terminal, or may be actively triggered by the control application program to send to the server after the terminal installs a control application program. The registration request may be regarded as a request for registering and activating the terminal in the server, so as to facilitate management of the terminal by the server, and the like. The device identifier is used to identify the identity of the terminal, and the device identifier may be configured based on actual requirements, for example, the device identifier may be an ID or a model of the corresponding terminal, or may be a mobile device identifier of the corresponding terminal, such as an IMEI, an MEID, or the like. The communication identifier is used for identifying the identity of the terminal when the terminal communicates with the outside, and can be a terminal number, namely a number corresponding to an SIM card inserted into the terminal, a Google advertisement system identification code and the like. In an embodiment, if the terminal is a mobile terminal with an android operating system, the communication identifier includes a google advertising system identifier and/or a terminal number, and the device identifier includes an international mobile equipment identifier. Correspondingly, the server can send messages such as short messages to the terminal according to the terminal number of the terminal, or the server can push messages to the terminal according to the Google advertising system identification code of the terminal.
Step S202: the server responds to the registration request and generates an identity identifier of the terminal according to the equipment identifier and the communication identifier;
here, the server generates the identity of the terminal according to the device identifier and the communication identifier, and may encrypt the device identifier and the communication identifier to generate the identity of the terminal. It should be noted that the server may reversely derive the corresponding device identifier and communication identifier according to the identity identifier of the terminal. Taking the communication identifier as a google advertising system identifier and the equipment identifier as an example, the server encrypts the google advertising system identifier and the international mobile equipment identifier of the terminal to generate the identity identifier of the terminal. For each terminal, the server is unique to the identity generated by that terminal.
Step S203: and the server sends a locking instruction to the terminal based on the identity of the terminal, wherein the locking instruction comprises locking application information used for indicating that the application is required to be locked or the application is not required to be locked.
Here, the server sends the locking instruction to the terminal based on the identity of the terminal, may be that the server actively sends the locking instruction to the terminal based on the identity of the terminal, or may be that the server responds to the request of the terminal based on the identity of the terminal and sends the locking instruction to the terminal. In an embodiment, the sending a lock instruction to the terminal based on the identity of the terminal includes: and when the terminal is detected to be locked, a locking instruction is sent to the terminal in real time or periodically based on the identity of the terminal. It can be understood that, after the server receives a management instruction that needs to lock the terminal and is sent by a management client, or when it is detected that the terminal meets the locked condition, that means the server detects that the terminal needs to be locked, the server sends a locking instruction to the terminal in real time or periodically based on the identity of the terminal. For example, the server obtains the communication identifier of the terminal according to the identity identifier of the terminal, and sends a locking instruction to the terminal based on the communication identifier of the terminal. For example, if the communication identifier of the terminal is a google advertisement system identification code of the terminal, the server may push the locking instruction to the terminal through a push server according to the google advertisement system identification code. Therefore, when the server detects that the terminal needs to be locked, the server actively sends a locking instruction to the terminal in real time or periodically based on the identity of the terminal so as to lock the terminal in time, and the operation is flexible and good.
In an embodiment, after generating the identity identifier of the terminal according to the device identifier and the communication identifier, the method further includes: sending the identity of the terminal to the terminal; the sending a locking instruction to the terminal based on the identity of the terminal includes: receiving a locking query request which is sent by the terminal and carries an identity of the terminal; and sending a locking instruction to the terminal according to the identity of the terminal. Specifically, after generating the identity of the terminal according to the device identifier and the communication identifier, the server sends the identity of the terminal to the terminal, and after receiving a lock query request which is sent by the terminal and carries the identity of the terminal, acquires a lock instruction corresponding to the identity of the terminal according to a correspondence between a lock instruction set by the identity query of the terminal and the identity of the terminal, and then sends the lock instruction to the terminal. It can be understood that, under the influence of an external environment such as a network, the server may not be able to directly and actively send the lock instruction to the terminal or may fail to send the lock instruction, in which case the server may not be able to effectively control the terminal. Therefore, the terminal can be locked in time, and the operation is flexible and good.
In summary, in the application locking method provided in the above embodiment, after receiving a registration request including a device identifier and a communication identifier of a terminal sent by the terminal, the server generates the identity identifier of the terminal, and sends a locking instruction to the terminal based on the identity identifier of the terminal, so as to lock an application that needs to be locked in the terminal or lock an application other than the application that does not need to be locked, thereby flexibly and freely locking the application in the terminal according to actual needs, and the method is convenient and fast to operate, and effectively improves user experience.
Based on the same inventive concept of the foregoing embodiment, referring to fig. 6, a schematic structural diagram of an application locking system provided in an embodiment of the present invention is shown, where the application locking system includes a terminal 20 and a server 21; the terminal 20 is configured to implement the application locking method applied to the terminal in the foregoing embodiment, and the server 21 is configured to implement the application locking method applied to the server in the foregoing embodiment. In particular, the amount of the solvent to be used,
the terminal 20 is configured to send a registration request including the device identifier and the communication identifier of the terminal 20 to the server 21; and receiving a locking instruction sent by the server 21, where the locking instruction includes locking application information used to indicate that an application needs to be locked or an application does not need to be locked, and locking the application in the terminal 20 according to the locking application information.
The server 21 is configured to receive a registration request sent by the terminal 20; generating an identity of the terminal 20 according to the device identifier and the communication identifier; and sending a locking instruction to the terminal 20 based on the identity of the terminal 20.
In summary, after the terminal completes registration and receives a locking instruction which is sent by the server and includes locking application information used for indicating that an application needs to be locked or the application does not need to be locked, the application in the terminal is locked according to the locking application information, that is, the application needs to be locked or an application except the application which does not need to be locked is locked, so that the application in the terminal is flexibly and freely locked according to actual requirements, the operation is convenient and fast, and the user experience is effectively improved.
Based on the same inventive concept of the foregoing embodiment, this embodiment describes in detail the technical solutions of the foregoing embodiment by using specific examples, where in this embodiment, the terminal is a mobile phone with an android operating system, and the terminal has a client controlling an application as an example. Referring to fig. 7, an interaction diagram of an application locking method provided in the embodiment of the present invention includes the following steps:
step S301: a client sends a registration request to a server;
step S302: the server returns a registration identifier to the client;
step S303: the server issues a screen locking control enabling instruction and an App white list to the client;
step S304: the client writes the screen locking control enabling instruction and the App white list into a local storage;
step S305: monitoring interface switching broadcast of the AMS by the client;
step S306: after receiving the broadcast, the client judges whether the switched App is in a white list;
step S307: if the screen is not in the white list, popping up a screen locking interface;
step S308: the server issues a screen locking releasing control instruction to the client;
step S309: and the client relieves the interface switching monitoring and closes the screen locking function.
The following takes the name of the client as the PayTrigger App as an example to explain the specific scenario of the above scheme, and the specific scenario includes the following processes:
1) the user opens a PayTrigger App installed on the mobile phone;
2) the user clicks a registration button of the PayTrigger App, a registration request comprising an IMEI and a GAID of the mobile phone is sent to the server, the server generates a character string DeviceTag which can uniquely determine the registration identifier of the mobile phone according to the IMEI and the GAID of the mobile phone, and simultaneously the server sends the DeviceTag to the PayTrigger App of the mobile phone;
3) when the server determines that the mobile phone corresponding to the DeviceTag needs to be locked, the server sends an instruction for limiting the use of an App switch to a PayTrigger App of the mobile phone, and simultaneously sends App white list information allowed to be used;
4) after receiving an App switch limiting instruction and App white list information allowed to be used, which are sent by a server, a PayTrigger App of the mobile phone stores the App switch limiting instruction and the App white list information allowed to be used in a protection partition of the mobile phone;
5) when monitoring the switching of each App interface, the Activity Manager Service of the Android system layer sends a system broadcast to the PayTrigger App, wherein the system broadcast comprises application program name information of the App to be displayed;
6) and when the PayTrigger App receives an interface switching broadcast sent by the Android system layer, starting an interface locking judgment program. If the name of the application program sent in the broadcast is in the App white list allowed to be used, nothing is done; and if the application name in the broadcast is not in the App white list allowed to be used, popping up a window of a PayTriggerApp custom screen locking interface, and realizing the locking of the specific App.
Here, the server may send the "App use limit switch" and the "App white list allowed to be used" to the Pay Trigger App in real time, and the Pay Trigger App performs screen locking determination according to the latest configuration after receiving the "App use limit switch" and the "App white list allowed to be used".
In summary, by acquiring information such as IMEI and GAID of a mobile phone, the information is recombined into an ID, which can uniquely identify the mobile phone. The ID information of the mobile phone is registered in the server, then the server can send an instruction to the mobile phone through the ID information, and an application program list allowed to be used by the mobile phone is issued to the mobile phone, so that apps of the mobile phone can be controlled to be normally opened, and a screen locking interface can be popped up when the apps are opened, so that the use of the application program in the mobile phone is limited. For example, if a business wants to prevent employees from using a private App in a mobile phone customized by the business, a white list of apps allowed to be used may be defined on the server side, and apps other than the white list may be restricted from being used. For the mobile phone purchased by installments, when the payment period of the user reaches and is still not paid, the user can only use the most basic App, such as the App of Settings, launchers and the like, by setting the server side. When payment is completed, the restriction on the use of App is released. For the scene that the children use the mobile phone, the App white list is set in the server, so that the children are limited to only use the App in the white list.
Based on the same inventive concept as the previous embodiment, an embodiment of the present invention provides an application locking device, as shown in fig. 8, including: a processor 110 and a memory 111 for storing computer programs capable of running on the processor 110; the processor 110 illustrated in fig. 8 is not used to refer to the number of the processors 110 as one, but is only used to refer to the position relationship of the processor 110 relative to other devices, and in practical applications, the number of the processors 110 may be one or more; similarly, the memory 111 illustrated in fig. 8 is also used in the same sense, that is, only used to refer to the position relationship of the memory 111 relative to other devices, and in practical applications, the number of the memory 111 may be one or more. The processor 110 is configured to implement the application locking method when running the computer program.
The application locking device may further include: at least one network interface 112. The various components in the application lock are coupled together by a bus system 113. It will be appreciated that the bus system 113 is used to enable communications among the components. The bus system 113 includes a power bus, a control bus, and a status signal bus in addition to the data bus. For clarity of illustration, however, the various buses are labeled as bus system 113 in FIG. 8.
The memory 111 may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM, Double Data Rate Synchronous Dynamic Random Access Memory), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), Synchronous link Dynamic Random Access Memory (SLDRAM, Synchronous Dynamic Random Access Memory), Direct Memory (DRmb Random Access Memory, Random Access Memory). The memory 111 described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
The memory 111 in the embodiment of the present invention is used to store various types of data to support the operation of the application locking means. Examples of such data include: any computer program for operating on the application locking means, such as operating systems and application programs; contact data; telephone book data; a message; a picture; video, etc. The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs may include various application programs such as a Media Player (Media Player), a Browser (Browser), etc. for implementing various application services. Here, the program that implements the method of the embodiment of the present invention may be included in an application program.
Based on the same inventive concept of the foregoing embodiments, this embodiment further provides a computer storage medium, where a computer program is stored in the computer storage medium, where the computer storage medium may be a Memory such as a magnetic random access Memory (FRAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a flash Memory (flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read Only Memory (CD-ROM), and the like; or may be a variety of devices including one or any combination of the above memories, such as a mobile phone, computer, tablet device, personal digital assistant, etc. When the computer program stored in the computer storage medium is run by a processor, the application locking method is realized. Please refer to the description of the embodiment shown in fig. 2 or fig. 5 for a specific step flow realized when the computer program is executed by the processor, which is not described herein again.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
As used herein, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, including not only those elements listed, but also other elements not expressly listed.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. An application locking method applied to a terminal, the method comprising:
sending a registration request, wherein the registration request comprises a device identifier and a communication identifier of the terminal;
receiving a locking instruction, wherein the locking instruction comprises locking application information used for indicating that an application needs to be locked or the application does not need to be locked;
and locking the application in the terminal according to the locking application information.
2. The method according to claim 1, wherein if the application locking information is an application identifier corresponding to at least one application to be locked, the terminal locks the application corresponding to the application identifier;
and if the application locking information is at least one application identifier corresponding to the application which does not need to be locked, the terminal locks other applications except the application corresponding to the application identifier.
3. The method of claim 1, wherein the locking the application in the terminal according to the locked application information comprises:
after receiving an application starting instruction, judging whether the application to be started is an application needing to be locked or an application not needing to be locked according to the application locking information;
and if the application to be started belongs to the application needing to be locked or does not belong to the application needing not to be locked, locking the application to be started.
4. The method of claim 1, wherein prior to receiving the lock instruction, further comprising:
receiving the identity of the terminal returned based on the registration request;
the receiving a lock instruction includes:
sending a locking query request carrying the identity of the terminal;
and receiving a locking instruction returned based on the locking inquiry request.
5. The method according to claim 1, wherein the terminal is a mobile terminal with an android operating system, the communication identifier comprises a google advertising system identifier and/or a terminal number, and the device identifier comprises an international mobile equipment identifier.
6. The method of claim 1, wherein the lock instruction further comprises lock time information; the locking the application in the terminal according to the locking application information includes:
and locking the application in the terminal according to the locking application information and the locking time information.
7. The method of claim 1 or 6, further comprising:
when the unlocking condition is detected to be met, unlocking the locked application in the terminal; the unlocking condition comprises the end of the locking time and/or the receiving of an unlocking instruction.
8. The method of claim 1, wherein after receiving the lock instruction, further comprising:
and storing the locking instruction to a protection partition of the terminal.
9. An application locking device, comprising: a processor and a memory for storing a computer program operable on the processor, wherein the processor, when executing the computer program, implements the application locking method as claimed in any one of claims 1 to 8.
10. A computer storage medium, characterized in that a computer program is stored which, when executed by a processor, implements the application locking method according to any one of claims 1 to 8.
CN201911267714.8A 2019-12-11 2019-12-11 Application locking method and device and computer storage medium Pending CN111143819A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911267714.8A CN111143819A (en) 2019-12-11 2019-12-11 Application locking method and device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911267714.8A CN111143819A (en) 2019-12-11 2019-12-11 Application locking method and device and computer storage medium

Publications (1)

Publication Number Publication Date
CN111143819A true CN111143819A (en) 2020-05-12

Family

ID=70518138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911267714.8A Pending CN111143819A (en) 2019-12-11 2019-12-11 Application locking method and device and computer storage medium

Country Status (1)

Country Link
CN (1) CN111143819A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560116A (en) * 2020-12-04 2021-03-26 Oppo(重庆)智能科技有限公司 Function control method, device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560116A (en) * 2020-12-04 2021-03-26 Oppo(重庆)智能科技有限公司 Function control method, device and storage medium

Similar Documents

Publication Publication Date Title
US9130927B2 (en) Single certificate service system and operational method thereof
CN105610949B (en) Resource data use permission sharing method, device and system
US9584494B2 (en) Terminal and server for applying security policy, and method of controlling the same
EP3525410B1 (en) Account login method, apparatus, and server
TWI761385B (en) Device configuration method, device, and system
CN110602216B (en) Method and device for using single account by multiple terminals, cloud server and storage medium
RU2630553C2 (en) Method, instrumentation, and device for adding connected expansion to address book
CN108595919B (en) Software activation method, device, system and storage medium
US10733685B1 (en) Private information disclosure consent management system
CN102870093A (en) System and methods for remote maintenance of multiple clients in an electronic network using virtualization and attestation
CN105516071A (en) Method for verifying safety of business operation, device, terminal and server
CN111355723B (en) Single sign-on method, device, equipment and readable storage medium
CN106134230A (en) The management domain that remote content on mobile information apparatus and configuration control
CN111833507B (en) Visitor authentication method, device, equipment and computer readable storage medium
US8881309B2 (en) Systems for finding a lost transient storage device
CN103827884A (en) Application authentication policy for plurality of computing devices
CN105308907B (en) Installation package authorization method and device
CN107645582B (en) Information changing method, terminal equipment and computer readable medium
US20220198466A1 (en) Deadline management server, agent program, and terminal rental system
CN111143819A (en) Application locking method and device and computer storage medium
CN113747190A (en) Live broadcast data processing method, device, equipment and storage medium
CN108696864B (en) Virtual number request and transmission method, device and storage medium
CN104468635A (en) Upgrading authentication method and system for user permission in network platform
CN114996577A (en) Service management method, device, apparatus, storage medium, and program product
JP2013137595A (en) Content access management system, content access management method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination