CN111221586A - Privacy cleaning method for application program, readable storage medium and terminal equipment - Google Patents

Privacy cleaning method for application program, readable storage medium and terminal equipment Download PDF

Info

Publication number
CN111221586A
CN111221586A CN201811327567.4A CN201811327567A CN111221586A CN 111221586 A CN111221586 A CN 111221586A CN 201811327567 A CN201811327567 A CN 201811327567A CN 111221586 A CN111221586 A CN 111221586A
Authority
CN
China
Prior art keywords
application program
target application
preset
privacy
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811327567.4A
Other languages
Chinese (zh)
Inventor
刘洲和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201811327567.4A priority Critical patent/CN111221586A/en
Publication of CN111221586A publication Critical patent/CN111221586A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a privacy cleaning method of an application program, a readable storage medium and terminal equipment, wherein the privacy cleaning method of the application program comprises the following steps: acquiring the use condition of a target application program or the use state of terminal equipment; the target application program is an application program in a preset privacy cleaning list; judging whether the use condition of the target application program meets a preset data cleaning rule or judging whether the use state of the terminal equipment meets the preset data cleaning rule or not; and if so, clearing the application data generated in the running process of the target application program according to a preset data clearing mode. The privacy cleaning method of the application program can automatically and effectively clean the application data generated in the running process of the target application program, reduces the risk of privacy leakage, and simultaneously improves the utilization rate of the memory and the user experience.

Description

Privacy cleaning method for application program, readable storage medium and terminal equipment
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a privacy clearing method for an application program, a readable storage medium, and a terminal device.
Background
With the continuous development of internet technology, terminal devices (such as smart phones, personal computers, etc.) have gradually become the most popular internet access terminals in people's lives, users can handle a lot of matters in work, study, life, etc. through the terminal devices, more and more applications (such as mobile phone software, computer software, etc.) related to the personal privacy, work privacy, information security, etc. of users are run on the terminal devices, and when the applications run, application data, such as user input history, browsing traces, video playing records, etc., can be generated, and the application data can be stored in a specific path on the terminal devices, not only occupy memory, but also cause great damage and negative influence on users no matter they are intentionally stolen or unintentionally seen, in order to prevent the privacy from being revealed or reasonably use memory, sometimes, the user does not want to leave the use trace after using the application program, so it is necessary to clean up the application data generated when the application program runs.
Therefore, how to effectively clean the application data generated in the running process of the application program to reduce the risk of privacy leakage and improve the utilization rate of the memory and the user experience at the same time is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The invention mainly aims to provide an application privacy cleaning method, a readable storage medium and terminal equipment, wherein the application privacy cleaning method can automatically and effectively clean application data generated in the running process of a target application program, reduces the risk of privacy leakage, and simultaneously improves the utilization rate of a memory and user experience.
The invention provides a privacy cleaning method of an application program, which comprises the following steps:
acquiring the use condition of a target application program or the use state of terminal equipment; the target application program is an application program in a preset privacy cleaning list;
judging whether the use condition of the target application program meets a preset data cleaning rule or judging whether the use state of the terminal equipment meets the preset data cleaning rule or not;
and if so, clearing the application data generated in the running process of the target application program according to a preset data clearing mode.
Further, the step of determining whether the usage status of the target application program meets a preset data cleaning rule includes:
judging whether the target application program exits the running state or not;
and if the target application program exits the running state, determining that the use condition of the target application program meets a preset data cleaning rule.
Further, the step of judging whether the use condition of the target application program meets a preset data cleaning rule includes the following steps:
judging whether the running time of the target application program exceeds a preset time;
and if the running time of the target application program exceeds the preset time, determining that the use condition of the target application program meets the preset data cleaning rule.
Further, the step of judging whether the use condition of the target application program meets a preset data cleaning rule includes the following steps:
judging whether the time length of the target application program after the target application program exits the running state exceeds a preset time length or not;
and if the time length of the target application program after the target application program exits the running state exceeds the preset time length, determining that the use condition of the target application program meets the preset data cleaning rule.
Further, the step of judging whether the usage status of the target application program meets a preset data cleaning rule includes the steps of:
judging whether the data volume of the application data generated in the running process of the target application program is larger than a preset threshold value or not;
and if the data volume of the application data generated in the running process of the target application program is larger than a preset threshold value, determining that the use condition of the target application program meets a preset data cleaning rule.
Further, the step of judging whether the use state of the terminal device meets the preset data cleaning rule includes the step of restarting the use state of the terminal device, including:
judging whether the terminal equipment is in a restarting state or not;
and if the terminal equipment is in the restarting state, determining that the use state of the terminal equipment meets a preset data cleaning rule.
Further, the step of clearing the application data generated in the running process of the target application program according to a preset data clearing mode comprises the following steps:
detecting the content containing preset keywords in the application data;
sending a request for whether the content containing the preset keywords is reserved or not so that the user can make a selection according to the request;
receiving a selection instruction made by a user, and clearing other contents except the contents containing the preset keywords in the application data if the selection instruction made by the user is reserved; and if the selection instruction made by the user is not reserved, clearing all contents in the application data.
Further, before the step of obtaining the use status of the target application or the use state of the terminal device, the method further includes:
receiving an operation instruction made by a user to the application program;
and adding the application program to the privacy cleaning list according to the operation instruction.
Further, before the step of obtaining the use status of the target application or the use state of the terminal device, the method further includes:
respectively acquiring historical use data of each application program in a preset time period;
detecting whether historical use data contains preset keywords or not;
if the historical use data contains preset keywords, judging whether the times of the preset keywords in the historical use data exceed the preset times or not;
and if the times of the preset keywords appearing in the historical use data exceed the preset times, associating the corresponding application program to the privacy cleaning list.
Further, before the step of associating the corresponding application program to the privacy clear list, the method further includes:
sending out a prompt whether to agree to associate the corresponding application program to a privacy clear list so that a user can make a selection according to the prompt;
and receiving a selection instruction made by the user, and if the selection instruction made by the user is an agreement, executing the operation of associating the corresponding application program to the privacy cleaning list.
The invention also provides a readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the method for clearing the privacy of the application program is realized.
The invention also provides a terminal device, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the privacy clearing method of the application program.
The invention has the beneficial effects that: the privacy cleaning method of the application program can be used for the application program which is not expected to leave a use trace by a user or the application program which is easy to generate privacy application data, the application program is put into a preset privacy cleaning list to be used as a target application program, when the use condition of the target application program or the use state of the terminal equipment meets a preset data cleaning rule, unnecessary application data or application data with privacy generated in the running process of the target application program are automatically cleaned according to a preset data cleaning mode, the application data generated in the running process of the target application program can be effectively cleaned, the risk of privacy leakage is reduced, and meanwhile the use ratio of a memory and the user experience are improved.
Drawings
FIG. 1 is a flow chart illustrating a method for privacy clearing of an application in accordance with one embodiment of the present invention;
FIG. 2 is a flow diagram illustrating the designation of an application as a target application in one implementation of the invention;
fig. 3 is a flow chart illustrating a process of erasing application data generated during the operation of a target application program according to a predetermined data erasing manner in an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, an embodiment of the present invention provides a privacy cleaning method for an application program, including the following steps:
s11, acquiring the use state of the target application program or the use state of the terminal equipment; the target application program is an application program in a preset privacy cleaning list;
s12, judging whether the use condition of the target application program meets a preset data cleaning rule or judging whether the use state of the terminal equipment meets the preset data cleaning rule;
if yes, executing S13, and clearing the application data generated in the running process of the target application program according to a preset data clearing mode.
In the above S11, the privacy clearance list is preset in the system of the terminal device, and is used to mark the target application included in the privacy clearance list so as to distinguish the target application from applications in other locations, where the target application may be an application that the user does not wish to leave a use trace, such as social software, shopping software, payment software, etc., or an application that is easy to generate privacy application data, such as video software, tool software (e.g., a browser), etc., and the user may designate any application as the target application by putting it into the privacy clearance list as needed.
In an alternative embodiment, before the step of acquiring the use status of the target application or the use state of the terminal device, the application may be designated as the target application in the following manner:
s11a, receiving an operation instruction made by a user to the application program;
and S11b, adding the application program to the privacy cleaning list according to the operation instruction.
In this embodiment, the user may manually designate an application as a target application as needed, and specifically, before using a certain application, the user may make an operation instruction to add the application to a preset privacy clearance list by an addition method, a drag-in method, or the like as needed, so as to designate the application as the target application.
Referring to fig. 2, in an alternative embodiment, before the step of acquiring the usage status of the target application or the usage state of the terminal device, the application may be further designated as the target application in the following manner:
s07, respectively acquiring historical use data of each application program in a preset time period;
s08, detecting whether the historical use data contains preset keywords or not;
s09, if the historical use data contains the preset keywords, judging whether the times of the preset keywords in the historical use data exceed the preset times or not;
and S10, if the times of the preset keywords appearing in the historical use data exceed the preset times, associating the corresponding application program to the privacy cleaning list.
In the above S07, the preset time period may be determined according to the actual needs of the user, for example, the preset time period may be 3 days, 5 days, 7 days, etc., which is not limited specifically, and specifically, for example, the preset time period may be 3 days, and the historical usage data generated by each application on the terminal device during the three days is obtained one by one every 3 days, where the applications include target applications (i.e., applications included in the privacy list) and non-target applications (i.e., applications not included in the privacy list).
In the above S08, the predetermined keyword may be determined according to the actual needs of the user, for example, the predetermined keyword may be set to be a secret and private word such as "amount", "card number", "password" and the like that the user considers to be sensitive or the user does not want to find by others.
In the above S09, the preset number may be determined according to the actual needs of the user, for example, the preset number may be 1, 3, 5, 10, and the like, which is not limited in particular.
In S10, specifically, for example, the preset time period is 3 days, the preset keyword is "password", and the preset number of times is 3, when it is detected that a certain application program contains the word "password" in the historical usage data of the three days, it is further determined whether the number of times of occurrence of the word "password" in the historical usage data of the application program exceeds 3, and when it is detected that the number of times of occurrence of the word "password" in the historical usage data of the application program exceeds 3, the application program may be automatically associated to the preset privacy clearance list through the background.
In the embodiment, whether the application program with the preset keyword appearing times in the historical use data exceeding the preset times is associated to the privacy clear list or not is determined by detecting the appearing frequency of the preset keyword in the historical use data, so that the application program which is easy to generate the privacy application data can be accurately and automatically added to the preset privacy clear list according to the requirements of a user, meanwhile, the trouble of manual addition is avoided, and the user experience is improved.
Optionally, before the step of associating the corresponding application program to the privacy clear list, the method further includes:
s10a, sending out a prompt whether to agree to associate the corresponding application program to the privacy cleaning list so that the user can make a selection according to the prompt;
and S10b, receiving a selection instruction made by the user, and if the selection instruction made by the user is an agreement, executing the operation of associating the corresponding application program to the privacy cleaning list.
In this embodiment, before automatically associating an application program in which a preset keyword appears in historical usage data more than a preset number of times into a privacy clearance list, a prompt message may be sent to a user to provide a user with a self-decision right, so that a user experience may be improved, specifically, whether the user agrees to associate the corresponding application program into the privacy clearance list may be prompted in a form of a pop-up dialog box, where the dialog box is provided with two option buttons of "yes" and "no" for the user to select by himself, for example, when the user clicks the option button of "yes" in the dialog box, a selection instruction made by the user is agreement, and when the user clicks the option button of "no" in the dialog box, a selection instruction made by the user is disagreement; and when the selection instruction made by the user is agreement, automatically associating the corresponding application program to the privacy cleaning list through the background.
In S12, the usage status of the target application includes the usage status of the target application in the running state and the usage status of the target application in the non-running state; the use state of the terminal device may be a standby state or an operating state, or may be a shutdown state or a restart state; for example, a callback interface may be implanted in the target application program, the occurrence of the startup/exit state switching is detected through the callback interface, and when the startup state is detected, it is determined that the target application program is in the running state; when the exit state is detected, determining that the target application program is in the non-running state; when it is determined that the use status of the target application or the use status of the terminal device satisfies the preset data cleansing rule, the process proceeds to S13.
In an optional embodiment, the usage status of the target application includes whether the target application exits from the running state, and at this time, it may be determined whether the usage status of the target application satisfies the preset data cleaning rule in the following manner:
s12a, judging whether the target application program exits the running state;
and S12b, if the target application program exits the running state, determining that the use condition of the target application program meets the preset data cleaning rule.
In this embodiment, specifically, a callback interface may be implanted in the target application, the occurrence of the startup/exit state switching is detected through the callback interface, when the exit state is detected, it is determined that the target application has exited the running state, and thus it is determined that the usage of the target application satisfies the preset data cleansing rule, and then S13 may be entered.
In an optional embodiment, the usage status of the target application includes an operation duration of the target application in an operation state, and at this time, it may be determined whether the usage status of the target application satisfies a preset data cleaning rule in the following manner:
s12c, judging whether the running time of the target application program exceeds the preset time;
s12d, if the running time of the target application program exceeds the preset time, determining that the use condition of the target application program meets the preset data cleaning rule.
In this embodiment, specifically, when the target application is started, the start time of the target application is recorded in real time, after the start time of the target application is obtained, the current operation time of the target application is detected, and then the current operation time of the target application is subtracted from the current operation time of the target application, so as to obtain the operation duration of the target application, and then the operation duration of the target application is compared with a preset duration, so as to determine whether the operation duration of the target application exceeds the preset duration, where the preset duration may be determined according to actual needs, for example, the preset duration may be set to 10 minutes, 20 minutes, 30 minutes, and the like, without specific limitation, and when the operation duration of the target application is determined to exceed the preset duration, it may be determined that the usage condition of the target application meets the preset data cleaning rule, and then S13 may be performed.
In an optional embodiment, the usage status of the target application includes a time length after the target application exits from the running state, and at this time, it may be determined whether the usage status of the target application satisfies a preset data cleaning rule in the following manner:
s12e, judging whether the time length of the target application program after exiting the running state exceeds the preset time length;
s12f, if the time length after the target application program exits the running state exceeds the preset time length, determining that the use condition of the target application program meets the preset data cleaning rule.
In this embodiment, specifically, a callback interface may be implanted in the target application program, the occurrence of the startup/exit state switching is detected through the callback interface, when the exit state is detected, it is determined that the target application program has exited the running state, at this time, it is further determined whether the time length after the target application program exits the running state exceeds a preset time length, specifically, after the target application program exits the running state, the exit time of the target application program is recorded in real time, after the exit time of the target application program is obtained, the time length after the target application program exits the running state is obtained by detecting the current display time of the terminal device in real time, and then subtracting the current display time from the current display time, and then comparing the time length after the target application program exits the running state with the preset time length, it is determined whether the time length after the target application program exits the running state exceeds the preset time length, the preset time duration may be determined according to actual needs, for example, the preset time duration may be set to 1 hour, 2 hours, 3 hours, and the like, which is not limited specifically, and when the time duration after the target application program exits the running state is determined to exceed the preset time duration, it may be determined that the use condition of the target application program meets the preset data cleaning rule, and then the operation may proceed to S13.
In an optional embodiment, the usage status of the target application includes a data amount of application data generated during the running process of the target application, and at this time, it may be determined whether the usage status of the target application satisfies a preset data cleaning rule in the following manner:
s12g, judging whether the data volume of the application data generated in the running process of the target application program is larger than a preset threshold value;
s12h, if the data volume of the application data generated in the running process of the target application program is larger than a preset threshold value, determining that the use condition of the target application program meets a preset data cleaning rule.
In this embodiment, the application data is continuously generated during the running process of the target application program, the generated application data is generally stored in a specific path in a text manner, for example, in a specific folder, specifically, the data amount of the application data generated during the running process of the target application program can be determined by detecting the memory occupied space of the specific folder, and then comparing the data amount with a preset threshold, so as to determine whether the data amount of the application data generated during the running process of the target application program is greater than the preset threshold, where the preset threshold can be determined according to actual needs, for example, the preset threshold can be set to 1M (i.e. 1024 bytes), 10M, 100M, and the like, and is not particularly limited, when it is determined that the data amount of the application data generated during the running process of the target application program is greater than the preset threshold, it is thus determined that the usage of the target application satisfies the preset data cleansing rule, at which point S13 may be entered.
In an optional embodiment, the usage state of the terminal device includes a restart state, and at this time, it may be determined whether the usage state of the terminal device satisfies a preset data cleaning rule in the following manner:
s12i, judging whether the terminal equipment is in a restarting state;
and S12j, if the terminal device is in the restart state, determining that the use state of the terminal device meets the preset data cleaning rule.
In this embodiment, the reason that the terminal device is in the restart state may be shutdown restart performed by a user or shutdown restart caused by a failure of the terminal device itself after the target application program exits or during the running of the target application program, and when it is detected that the terminal device is currently in the restart state, it may be determined that the use condition of the target application program satisfies a preset data cleaning rule, and at this time, S13 may be entered.
In the above S13, when it is determined that the usage status of the target application or the usage state of the terminal device meets the preset data clearing rule, the application data generated in the running process of the target application is cleared according to the preset data clearing manner, so as to achieve the purposes of reducing the risk of privacy leakage and improving the utilization rate of the memory.
Referring to fig. 3, in an alternative embodiment, the step of clearing the application data generated during the running process of the target application program in a preset data clearing manner includes:
s131, detecting the content containing the preset keywords in the application data;
s132, sending a request for reserving the content containing the preset keywords or not so that the user can make a selection according to the request;
s133, receiving a selection instruction made by a user, and clearing other contents except the contents containing the preset keywords in the application data if the selection instruction made by the user is reserved; and if the selection instruction made by the user is not reserved, clearing all contents in the application data.
In the above S131, the preset keyword may be determined according to the actual needs of the user, for example, the preset keyword may be a word such as "meeting record", "mobile phone number", and the like, which is important but not private.
In the above S132, when it is detected that the application data includes the content of the preset keyword, a request is sent to the user whether to keep the content including the preset keyword, specifically, for example, the preset keyword is "mobile phone number", and when it is detected that "this is a mobile phone number of xiaoming classmate: XXX ", the user may be reminded whether to choose to keep the content containing the preset keyword" mobile phone number "in the form of a pop-up dialog box.
In the above S133, specifically, the user may be prompted by a pop-up dialog box to select whether to reserve the content of the application data containing the preset keyword, where the dialog box is provided with two option buttons of "yes" and "no" for the user to select by himself, for example, when the user clicks the option button of "yes" in the dialog box, it indicates that the selection instruction made by the user is reserved, and when the user clicks the option button of "no" in the dialog box, it indicates that the selection instruction made by the user is not reserved; furthermore, when the selection instruction made by the user is retention, the rest contents except the contents containing the preset keywords in the application data are automatically removed through the background, so that unnecessary application data and privacy application data can be removed, the purposes of reducing privacy disclosure risks and improving the memory utilization rate are achieved, meanwhile, the contents which the user wants to retain can be automatically retained, and the user experience is improved; when the selection instruction made by the user is not reserved, all contents in the application data are automatically removed through the background, so that the user can complete comprehensive cleaning of unnecessary application data and privacy application data without manual operation, the risk of privacy disclosure is reduced, and meanwhile, the memory utilization rate and the user experience are improved.
Therefore, the privacy cleaning method of the application program can be used as a target application program by putting the application program which is not expected to leave a use trace by a user or the application program which is easy to generate privacy application data into a preset privacy cleaning list, when the use condition of the target application program meets a preset data cleaning rule, for example, when the target application program is quitted for use, or when the time length after the target application program is quitted for use reaches a certain time length, or when the use time of the target application program reaches a certain time, or when the terminal device is in a restarting state, or when the amount of application data generated in the running process of the target application program is too large, unnecessary application data or application data with privacy generated in the running process of the target application program is cleaned in a preset data cleaning mode, the method and the device have the advantages that the application data generated in the running process of the target application program can be effectively cleaned, the risk of privacy leakage is reduced, and meanwhile, the utilization rate of the memory and the user experience are improved.
An embodiment of the present invention further provides a readable storage medium, where a computer program is stored on the readable storage medium, and when the computer program is executed by a processor, the method for clearing privacy of an application program in any of the above embodiments is implemented.
The embodiment of the present invention further provides a terminal device, which includes a memory, a processor, and a computer program that is stored in the memory and is executable on the processor, and when the processor executes the computer program, the privacy clearing method of the application program in any of the above embodiments is implemented.
Those skilled in the art will appreciate that the terminal device described in the embodiments of the present invention is a device referred to above for performing one or more of the methods described in the present application. These devices may be specially designed and manufactured for the required purposes, or they may comprise known devices in general-purpose computers. These devices have stored therein computer programs or applications that are selectively activated or reconfigured. Such a computer program may be stored in a device (e.g., computer) readable medium, including, but not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magnetic-optical disks, ROMs (Read-only memories), RAMs (Random Access memories), EPROMs (erase E-program E Read-On-y memories), EEPROMs (E-erase i ca E-program E Read-On-y memories), flash memories, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a bus. That is, a readable storage medium includes any medium that stores or transmits information in a form readable by a device (e.g., a computer).
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A privacy cleaning method for an application program is characterized by comprising the following steps:
acquiring the use condition of a target application program or the use state of terminal equipment; the target application program is an application program in a preset privacy clear list;
judging whether the use condition of the target application program meets a preset data cleaning rule or not, or judging whether the use state of the terminal equipment meets the preset data cleaning rule or not;
and if so, clearing the application data generated in the running process of the target application program according to a preset data clearing mode.
2. The method according to claim 1, wherein the usage status includes whether the target application exits an operating state, and the step of determining whether the usage status of the target application satisfies a preset data cleaning rule includes:
judging whether the target application program exits the running state or not;
and if the target application program exits the running state, determining that the use condition of the target application program meets a preset data cleaning rule.
3. The method according to claim 1, wherein the usage status includes a running duration of the target application in a running state, and the step of determining whether the usage status of the target application satisfies a preset data cleaning rule includes:
judging whether the running time of the target application program exceeds a preset time;
and if the running time of the target application program exceeds the preset time, determining that the use condition of the target application program meets the preset data cleaning rule.
4. The method according to claim 1, wherein the usage status includes a time length after the target application exits from a running state, and the step of determining whether the usage status of the target application satisfies a preset data cleaning rule includes:
judging whether the time length of the target application program after the target application program exits the running state exceeds a preset time length or not;
and if the time length of the target application program after the target application program exits the running state exceeds the preset time length, determining that the service condition of the target application program meets the preset data cleaning rule.
5. The method according to claim 1, wherein the usage status includes a data amount of application data generated during the running of the target application, and the step of determining whether the usage status of the target application satisfies a preset data cleaning rule includes:
judging whether the data volume of the application data generated in the running process of the target application program is larger than a preset threshold value or not;
and if the data volume of the application data generated in the running process of the target application program is larger than a preset threshold value, determining that the use condition of the target application program meets a preset data cleaning rule.
6. The privacy cleaning method for application programs according to claim 1, wherein the usage state of the terminal device includes a restart state, and the step of determining whether the usage state of the terminal device satisfies a preset data cleaning rule includes:
judging whether the terminal equipment is in a restarting state or not;
and if the terminal equipment is in a restarting state, determining that the use state of the terminal equipment meets a preset data cleaning rule.
7. The privacy cleaning method for the application program according to any one of claims 1 to 6, wherein the step of cleaning the application data generated in the running process of the target application program according to a preset data cleaning mode comprises:
detecting the content containing preset keywords in the application data;
sending a request for whether the content containing the preset keywords is reserved or not so that a user can make a selection according to the request;
receiving a selection instruction made by a user, and clearing the rest contents except the contents containing the preset keywords in the application data if the selection instruction made by the user is reserved; and if the selection instruction made by the user is not reserved, clearing all contents in the application data.
8. The privacy cleaning method for the application program according to any one of claims 1 to 6, wherein the step of obtaining the use condition of the target application program or the use state of the terminal device is preceded by the steps of:
receiving an operation instruction made by a user to the application program;
and adding the application program to the privacy clear list according to the operation instruction.
9. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when being executed by a processor, implements the privacy scrubbing method of an application program according to any one of claims 1 to 8.
10. A terminal device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the privacy scrubbing method for an application program according to any one of claims 1 to 8 when executing the computer program.
CN201811327567.4A 2018-11-08 2018-11-08 Privacy cleaning method for application program, readable storage medium and terminal equipment Withdrawn CN111221586A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811327567.4A CN111221586A (en) 2018-11-08 2018-11-08 Privacy cleaning method for application program, readable storage medium and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811327567.4A CN111221586A (en) 2018-11-08 2018-11-08 Privacy cleaning method for application program, readable storage medium and terminal equipment

Publications (1)

Publication Number Publication Date
CN111221586A true CN111221586A (en) 2020-06-02

Family

ID=70808537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811327567.4A Withdrawn CN111221586A (en) 2018-11-08 2018-11-08 Privacy cleaning method for application program, readable storage medium and terminal equipment

Country Status (1)

Country Link
CN (1) CN111221586A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113849133A (en) * 2021-09-29 2021-12-28 珠海格力电器股份有限公司 Processing method and device of private data, electronic equipment and storage medium
CN114143574A (en) * 2020-09-04 2022-03-04 深圳市雷鸟网络传媒有限公司 Method for cleaning storage space, storage medium and terminal equipment
CN115457708A (en) * 2022-09-05 2022-12-09 青岛黄海学院 Intelligent logistics pickup system based on big data and analysis method thereof

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1569108A1 (en) * 2004-02-26 2005-08-31 Research In Motion Limited Data protection for applications on a mobile electronic device
US20070055890A1 (en) * 2005-09-06 2007-03-08 Research In Motion Limited System and method for management of plaintext data in a mobile data processing device
CN103412901A (en) * 2013-07-26 2013-11-27 北京奇虎科技有限公司 Method and device for clearing historical records
US20150134913A1 (en) * 2013-11-14 2015-05-14 Cheetah Mobile Inc. Method and apparatus for cleaning files in a mobile terminal and associated mobile terminal
CN104765856A (en) * 2015-04-21 2015-07-08 北京奇虎科技有限公司 Method and device for reserving user selection state
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program
CN107506243A (en) * 2017-09-01 2017-12-22 惠州Tcl移动通信有限公司 Using processing method, mobile terminal and the storage medium for taking memory space
CN107506211A (en) * 2017-08-18 2017-12-22 广东欧珀移动通信有限公司 Terminal device, application program data storage management method, device, storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1569108A1 (en) * 2004-02-26 2005-08-31 Research In Motion Limited Data protection for applications on a mobile electronic device
US20070055890A1 (en) * 2005-09-06 2007-03-08 Research In Motion Limited System and method for management of plaintext data in a mobile data processing device
CN103412901A (en) * 2013-07-26 2013-11-27 北京奇虎科技有限公司 Method and device for clearing historical records
US20150134913A1 (en) * 2013-11-14 2015-05-14 Cheetah Mobile Inc. Method and apparatus for cleaning files in a mobile terminal and associated mobile terminal
CN104765856A (en) * 2015-04-21 2015-07-08 北京奇虎科技有限公司 Method and device for reserving user selection state
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program
CN107506211A (en) * 2017-08-18 2017-12-22 广东欧珀移动通信有限公司 Terminal device, application program data storage management method, device, storage medium
CN107506243A (en) * 2017-09-01 2017-12-22 惠州Tcl移动通信有限公司 Using processing method, mobile terminal and the storage medium for taking memory space

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114143574A (en) * 2020-09-04 2022-03-04 深圳市雷鸟网络传媒有限公司 Method for cleaning storage space, storage medium and terminal equipment
CN114143574B (en) * 2020-09-04 2023-12-05 深圳市雷鸟网络传媒有限公司 Method for cleaning storage space, storage medium and terminal equipment
CN113849133A (en) * 2021-09-29 2021-12-28 珠海格力电器股份有限公司 Processing method and device of private data, electronic equipment and storage medium
CN113849133B (en) * 2021-09-29 2023-09-12 珠海格力电器股份有限公司 Processing method and device of privacy data, electronic equipment and storage medium
CN115457708A (en) * 2022-09-05 2022-12-09 青岛黄海学院 Intelligent logistics pickup system based on big data and analysis method thereof

Similar Documents

Publication Publication Date Title
EP2843979B1 (en) Method and apparatus for preventing sound recording during the call
CN111221586A (en) Privacy cleaning method for application program, readable storage medium and terminal equipment
US9131374B1 (en) Knowledge-based authentication for restricting access to mobile devices
CN103164229A (en) Method and device for clearing progresses of mobile terminal
CN103092700A (en) Internal memory cleaning method and cleaning device and terminal device
CN105224421B (en) Data backup method and device and electronic equipment
CN106776908B (en) Data cleaning method and device and terminal
CN106708616A (en) Process control method and process control device
WO2017008415A1 (en) Apparatus and method for launching mobile applications from a lock screen
CN107291472A (en) The processing method and processing device of the prompting message of application program
CN110308951B (en) Processing method and device for starting interface card pause, equipment and storage medium
CN105095004B (en) Information processing method and electronic equipment
CN107066536B (en) Comment determining method and device
CN111143830A (en) Method and device for limiting application use, terminal equipment and storage medium
CN107704337B (en) Factory setting restoring method, mobile terminal and device with storage function
CN104732150B (en) A kind of mobile terminal-opening method and device
CN101320389B (en) File management method and apparatus
CN102256275A (en) Method and mobile communication terminal for power failure protection in factory resetting process
CN111400037A (en) Memory management method and device, computer storage medium and terminal
CN103246558A (en) Application management method and device
CN113312662B (en) Message processing method and device and electronic equipment
CN104978179B (en) Application management method and device
CN111638917A (en) Application start limiting method, device and storage medium
CN111859881A (en) Data processing method, device, electronic equipment and medium
CN111177527A (en) Application message management method, computer-readable storage medium and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20200602