CN111310161B - Application management method and device and computer readable storage medium - Google Patents
Application management method and device and computer readable storage medium Download PDFInfo
- Publication number
- CN111310161B CN111310161B CN202010063276.XA CN202010063276A CN111310161B CN 111310161 B CN111310161 B CN 111310161B CN 202010063276 A CN202010063276 A CN 202010063276A CN 111310161 B CN111310161 B CN 111310161B
- Authority
- CN
- China
- Prior art keywords
- hotspot
- application management
- application
- management
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Abstract
The application provides an application management method, an application management device and a computer readable storage medium, wherein the application management method comprises the following steps: acquiring hotspot identification information of a target hotspot accessed by a terminal; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.
Description
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an application management method and apparatus, and a computer-readable storage medium.
Background
With the continuous terminal technology, the terminal use requirements of users in daily work and life are continuously improved, and correspondingly, the users also put forward higher and higher requirements on the terminal use safety.
Currently, in the related art, a user usually sets an authority for an application in a terminal by using a security protection application such as a security center and a security manager on the terminal, so as to implement security control on the terminal application, for example, to control a certain application to be inaccessible or hidden on a desktop. However, this application management method requires a user to perform a conscious operation, and thus, when managing an application in actual applications, both the immediacy of operation and the convenience of operation are low.
Disclosure of Invention
The embodiment of the application management method and device and a computer readable storage medium at least can solve the problem that in the related technology, a user needs to use a security protection type application to set the permission of the related application to perform application management, and the operation instantaneity and the operation convenience of application management are low.
A first aspect of an embodiment of the present application provides an application management method, including:
acquiring hotspot identification information of a target hotspot accessed by a terminal;
determining corresponding application management authority according to the hotspot identification information;
and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal.
A second aspect of the embodiments of the present application provides an application management apparatus, including:
the acquisition module is used for acquiring hotspot identification information of a target hotspot accessed by the terminal;
the determining module is used for determining the corresponding application management authority according to the hotspot identification information;
and the management module is used for calling a corresponding application management strategy based on the application management authority so as to manage the application on the terminal.
A third aspect of embodiments of the present application provides an electronic apparatus, including: the application management method includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the application management method provided in the first aspect of the embodiments of the present application.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium, on which a computer program is stored, where when the computer program is executed by a processor, the steps in the application management method provided in the first aspect of the embodiments of the present application are implemented.
As can be seen from the above, according to the application management method, apparatus, and computer-readable storage medium provided in the present application, hotspot identification information of a target hotspot to which a terminal is accessed is obtained; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.
Drawings
Fig. 1 is a schematic basic flowchart of an application management method according to a first embodiment of the present application;
fig. 2 is a schematic flowchart of a method for determining application management permission according to a first embodiment of the present application;
fig. 3 is a schematic flowchart of a pipe understanding and removing method according to a first embodiment of the present disclosure;
fig. 4 is a schematic flowchart of another method for releasing management according to the first embodiment of the present application;
fig. 5 is a detailed flowchart of an application management method according to a second embodiment of the present application;
fig. 6 is a schematic diagram illustrating program modules of an application management apparatus according to a third embodiment of the present application;
fig. 7 is a schematic diagram of program modules of another application management apparatus according to a third embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the present invention more apparent and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to solve the defect that the operation timeliness and the operation convenience of application management are low due to the fact that a user needs to set the permission of a related application by using a security protection type application to perform application management in the related art, a first embodiment of the present application provides an application management method, for example, fig. 1 is a basic flowchart of the application management method provided in this embodiment, and the application management method includes the following steps:
Specifically, in practical applications, hot spots, that is, wireless access points, are more and more popular, which can provide users with greater convenience for communication and use, and because the hot spots can be simultaneously accessed by multiple users, certain danger is brought to the use safety of the terminals of the users. Based on this, in this embodiment, after the terminal accesses the hotspot, the unique identifier (for example, a hotspot name, a hotspot ID, a hotspot physical address, and the like) of the hotspot is acquired, so as to sense the current terminal usage environment, which is beneficial to subsequently managing the application on the terminal. It should be noted that the preferred hotspot of the present embodiment may be a WiFi hotspot.
And step 102, determining corresponding application management authority according to the hotspot identification information.
Specifically, in this embodiment, the application management authority in the current hotspot access scenario is determined based on the hotspot identifier, and the application management authority of this embodiment is used to instruct to correspondingly manage the application on the terminal.
In some embodiments of this embodiment, determining the corresponding application management authority according to the hotspot identification information includes: inquiring a preset authority index table according to the hotspot identification information, wherein the authority index table comprises a mapping relation between the hotspot identification information and the application management authority; and when the result is inquired, determining the inquired application management authority as the application management authority corresponding to the hotspot identification information.
Specifically, in this embodiment, a corresponding relationship between different hotspot identification information and application management permissions may be preset, and then after the identification information of the accessed hotspot is determined, the corresponding relationship may be queried to obtain the corresponding application management permission.
Further, in some embodiments of this embodiment, after querying the preset authority index table, the method further includes: and when the result is not inquired, determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information.
Specifically, in practical applications, it is difficult to ensure that mapping of application management permissions is performed on all hotspots that may be accessed by the terminal in the preset permission index table, so that when a hotspot currently accessed by the terminal is a hotspot that is accessed for the first time or an unknown hotspot, a result may not be queried in the permission index table, that is, the application management permission cannot be determined according to the permission index table.
Further, in some embodiments of this embodiment, before determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information, the method further includes: evaluating an access risk coefficient of the target hotspot based on the hotspot identification information; when the access risk coefficient is lower than a preset coefficient threshold value, determining a preset standby application management authority as an application management authority corresponding to the hotspot identification information; and when the access risk coefficient is higher than a preset coefficient threshold value, the control terminal switches to access the operator network from the target hotspot.
Specifically, in this embodiment, when a result cannot be queried in the foregoing permission index table based on the hotspot identifier, it is indicated that the currently accessed hotspot is a first-time accessed hotspot or an unknown hotspot, in this case, the currently accessed hotspot may be an unsafe hotspot, and the terminal may encounter a use security problem during use, and based on this, the risk assessment may be further performed on the currently accessed hotspot, where when the access risk of the access point is high, the terminal is controlled to disconnect from the current hotspot and switch to an operator network (e.g., a 4G network, etc.), so as to ensure that the terminal is in a secure network environment, and when the access risk of the access point is low, the connection between the terminal and the current hotspot may be maintained, and the terminal application is managed by using a standby application management permission, so as to ensure the use security of the terminal in the current hotspot access scene.
And 103, calling a corresponding application management strategy based on the application management authority to manage the application on the terminal.
Specifically, according to the embodiment, the corresponding application management policy is called to automatically manage the terminal application according to the application management authority corresponding to the currently accessed hotspot, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of the terminal use in different scenes is fully ensured.
In some implementations of this embodiment, the application management policy includes at least one of: the application display management strategy, the application operation management strategy, the application function management strategy and the application data transmission management strategy.
Specifically, the management of the present embodiment includes enable management or disable management, where the enable is used to indicate opening, enabling, and activating, and the disable is used to indicate closing, disabling, and the like, in the present embodiment, an application display management policy, that is, a display/hide of an application on a control terminal, for example, the terminal is provided with A, B, C three applications, and when a first application management policy is adopted, the application may be displayed corresponding to a control a application, and then B, C application may be correspondingly hidden, and when a second application management policy is adopted, the application may be displayed corresponding to a control B, C application, and then the application a may be correspondingly hidden; the application operation management policy comprises: on one hand, the application running on the terminal is controlled to quit, for example, the currently running payment application is controlled to quit running, and on the other hand, the non-running application is controlled to start running, for example, the intelligent home control application is controlled to start running; the application function management strategy comprises the step of controlling certain functions of a specific application on the terminal to be used in an open mode or forbidden to be used in a forbidden mode, and the application data transmission management strategy comprises the step of allowing data transmission or forbidding data transmission when the application runs, wherein the data transmission can be the data transmission between the terminal and a background server or the data transmission between the terminal and other terminals.
As shown in fig. 2, which is a schematic flow chart of the method for determining application management permission according to the present embodiment, in some embodiments of the present embodiment, determining a corresponding application management permission according to hotspot identification information specifically includes the following steps:
and step 203, distributing corresponding application management authority according to the determined authority level.
Specifically, in this embodiment, in addition to determining the corresponding specific application management authority based on the hotspot identification information query authority index table, the application management authority may also be determined based on the historical access condition of the terminal and the currently accessed hotspot, and it should be understood that the access attribute of this embodiment may be the total accumulated access times, the total accumulated access duration, and the like. The present embodiment may evaluate the permission level corresponding to the required application management permission based on the historical access attribute of the terminal accessing the current hotspot, and configure the application management permission correspondingly. Because the embodiment can determine the specific application management authority only based on the authority level, and the corresponding application management authority can be preset for each authority level in practical application, the data required to be preset can be managed more conveniently compared with the method of directly setting the corresponding application management authority for each hotspot identification information.
As shown in fig. 3, as a flowchart of a management understanding and removing method provided in this embodiment, in some embodiments of this embodiment, after managing an application on a terminal, the method further includes the following steps:
and 303, when the hotspot security verification result indicates security permission, performing release processing on the application management based on the security permission.
Specifically, in this embodiment, while the terminal application is managed to ensure that the terminal is in a safe use environment, because the use of the terminal application is subjected to relevant regulations, the relevant normal use requirements of the user may not be met. In this embodiment, a management release flow is triggered based on a management release instruction sent from the outside, and in order to ensure that the use safety of the terminal can be guaranteed when the corresponding application management is released, the embodiment requests the background to perform safety verification on a hotspot currently accessed by the terminal based on the management release instruction, and when it is determined that the hotspot currently accessed by the terminal meets the safety use requirement by obtaining the safety permission, the application management is released, and correspondingly, if the hotspot safety verification result indicates a safety risk, the application management can be refused to be released. It should be understood that the application management release of the present embodiment may be a global release or a partial release, where the global release is to globally release the current application management policy, and the partial release is to only release part of the application management policies.
In addition, it should be noted that, in practical applications, management release may also be performed based on other implementation manners, for example, a related management release option may be provided in the terminal, so that a user may input a corresponding management release instruction to control management release, or when it is detected that the terminal is disconnected from the target hotspot, the previously-acting application management policy may be controlled to be disabled, and application management may be globally released.
As shown in fig. 4, which is a flowchart of another management release method provided in this embodiment, in some embodiments of this embodiment, further performing release processing on application management based on security permission specifically includes the following steps:
Specifically, after receiving the hotspot security verification result fed back by the background, the hotspot security verification result may further perform a hierarchical indication on the security permission, so that the application management release may be performed more finely. In this embodiment, different security permission levels correspond to different management releasing policies, for example, the security permission level a corresponds to a partial management releasing policy, and the security permission level B corresponds to a global management releasing policy, and certainly, the partial management releasing policy may be further subdivided into different types of partial management releasing policies, which may be determined according to actual usage scenarios and will not be described herein again.
Based on the technical scheme of the embodiment of the application, hotspot identification information of a target hotspot accessed by a terminal is acquired; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.
The method in fig. 5 is a detailed application management method provided in a second embodiment of the present application, and the application management method includes:
In this embodiment, after the terminal accesses the hotspot, the unique identifier (e.g., a hotspot name, a hotspot ID, a hotspot physical address, etc.) of the hotspot is acquired, so as to sense the current terminal usage environment, which is beneficial to subsequently managing the application on the terminal.
In this embodiment, the access attribute may be a total number of accumulated accesses by the terminal to the target hotspot, a total duration of the accumulated accesses, and the like.
In this embodiment, the permission level corresponding to the required application management permission may be evaluated based on the historical access attribute of the terminal accessing the current hotspot, and the application management permission may be configured correspondingly.
And 504, calling a corresponding application management strategy to manage the application on the terminal based on the application management authority corresponding to the determined authority level.
In this embodiment, different rights management levels are preset, and each rights management level corresponds to a specific application management rights type. In addition, the application management policy of the embodiment includes at least one of the following: the application display management strategy, the application operation management strategy, the application function management strategy and the application data transmission management strategy.
And 505, sending a hotspot security verification request carrying hotspot identification information to a background server when receiving the management release instruction.
In this embodiment, while the terminal application is managed to ensure that the terminal is in a safe use environment, the use of the terminal application is subjected to relevant regulations, which may cause that the relevant normal use requirements of the user cannot be met.
And 507, when the hotspot security verification result indicates security permission, performing release processing on the application management based on the security permission.
In this embodiment, a background is requested to perform security verification on a hotspot currently accessed by a terminal based on a management release instruction, and when it is determined that the hotspot currently accessed by the terminal meets the security use requirement by obtaining security permission, the application management is released, correspondingly, if a hotspot security verification result indicates a security risk, the application management may be refused to be released, and the release of the application management in this embodiment may be global release or partial release.
It should be understood that, the size of the serial number of each step in this embodiment does not mean the execution sequence of the step, and the execution sequence of each step should be determined by its function and inherent logic, and should not be limited uniquely to the implementation process of the embodiment of the present application.
The embodiment of the application discloses an application management method, which comprises the steps of obtaining hotspot identification information of a target hotspot accessed by a terminal; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. By implementing the application management method and the application management system, the application management authority is determined correspondingly according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured; in addition, the application management authority is correspondingly determined based on the historical access conditions of the terminal and the currently accessed hotspot, and the determined application management strategy can be more accurately adapted to a real-time hotspot access scene; in addition, the management understanding mechanism provided by the application can ensure the use safety of the terminal and meet the necessary use requirements of users at the same time.
Fig. 6 is a diagram of an application management apparatus according to a third embodiment of the present application. The application management apparatus may be used to implement the application management method in the foregoing embodiments. As shown in fig. 6, the application management apparatus mainly includes:
an obtaining module 601, configured to obtain hotspot identification information of a target hotspot to which a terminal is accessed;
a determining module 602, configured to determine a corresponding application management authority according to the hotspot identification information;
the management module 603 is configured to invoke a corresponding application management policy based on the application management permission, and manage the application on the terminal.
In some embodiments of this embodiment, the determining module 602 is specifically configured to: according to the hotspot identification information, inquiring the access attribute of the terminal accessing the target hotspot in a preset historical time period; determining a corresponding authority level based on the access attribute and a mapping relation between the preset access attribute and the authority level; and distributing corresponding application management authority according to the determined authority level.
In other embodiments of this embodiment, the determining module 602 is specifically configured to: inquiring a preset authority index table according to the hotspot identification information; the authority index table comprises a mapping relation between hotspot identification information and application management authority; when the result is inquired, the inquired application management authority is determined as the application management authority corresponding to the hotspot identification information; and when the result is not inquired, determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information.
As shown in fig. 7, another application management apparatus provided in this embodiment is further provided, in some embodiments of this embodiment, the application management apparatus further includes: an evaluation module 604 and a switching module 605, wherein the evaluation module 604 is configured to: before the preset standby application management authority is determined as the application management authority corresponding to the hotspot identification information, the access risk coefficient of the target hotspot is evaluated based on the hotspot identification information. Correspondingly, when the access risk coefficient is lower than the preset coefficient threshold, the determining module 602 correspondingly performs a function of determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information; the switching module 605 is configured to: and when the access risk coefficient is higher than a preset coefficient threshold value, the control terminal switches to access the operator network from the target hotspot.
In some implementations of this embodiment, the application management policy includes at least one of: the method comprises the steps of applying a display management strategy, an application operation management strategy, an application function management strategy and an application data transmission management strategy; wherein the management comprises enabling management or disabling management.
Referring to fig. 7 again, in some embodiments of the present embodiment, the application management apparatus further includes: a release module 606, configured to send a hotspot security verification request carrying hotspot identification information to a background server after managing an application on a terminal and when receiving a management release instruction; receiving a hotspot security verification result corresponding to the target hotspot responded by the background server based on the hotspot security verification request; and when the hotspot security verification result indicates security permission, performing release processing on the application management based on the security permission.
Further, in some embodiments of this embodiment, when the release module 606 performs release processing on application management based on security permission, it is specifically configured to: determining a security clearance level corresponding to the security clearance; determining a corresponding management release policy according to the security permission level; and performing corresponding release processing on the application management based on the management release policy.
It should be noted that, the application management methods in the first and second embodiments can be implemented based on the application management device provided in this embodiment, and it can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working process of the application management device described in this embodiment may refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
According to the application management device provided by the embodiment, hotspot identification information of a target hotspot accessed by a terminal is acquired; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.
Referring to fig. 8, fig. 8 is an electronic device according to a fourth embodiment of the present disclosure. The electronic device can be used for realizing the application management method in the foregoing embodiment. As shown in fig. 8, the electronic device mainly includes:
a memory 801, a processor 802, a bus 803, and computer programs stored on the memory 801 and executable on the processor 802, the memory 801 and the processor 802 being connected by the bus 803. The processor 802, when executing the computer program, implements the application management method in the foregoing embodiments. Wherein the number of processors may be one or more.
The Memory 801 may be a high-speed Random Access Memory (RAM) Memory or a non-volatile Memory (non-volatile Memory), such as a disk Memory. The memory 801 is used to store executable program code, and the processor 802 is coupled to the memory 801.
Further, an embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium may be an electronic device provided in the foregoing embodiments, and the computer-readable storage medium may be a memory in the foregoing embodiment shown in fig. 8.
The computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the application management method in the foregoing embodiments. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a RAM, a magnetic disk, or an optical disk.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a readable storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned readable storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In view of the above description of the application management method, apparatus and computer-readable storage medium provided by the present application, those skilled in the art will recognize that the scope of the present application can be varied from the specific embodiments of the present application.
Claims (8)
1. An application management method, comprising:
acquiring hotspot identification information of a target hotspot accessed by a terminal;
determining corresponding application management authority according to the hotspot identification information;
calling a corresponding application management strategy based on the application management authority to manage the application on the terminal;
when a management release instruction is received, a hotspot security verification request carrying the hotspot identification information is sent to a background server;
receiving a hotspot security verification result corresponding to the target hotspot responded by the background server based on the hotspot security verification request;
when the hotspot security verification result indicates security permission, determining a security permission level corresponding to the security permission; determining a corresponding management releasing strategy according to the security permission grade; and performing corresponding release processing on the application management based on the management release strategy.
2. The application management method according to claim 1, wherein the determining the corresponding application management authority according to the hotspot identification information comprises:
according to the hotspot identification information, inquiring the access attribute of the terminal accessing the target hotspot within a preset historical time period;
determining a corresponding authority level based on the access attribute and a mapping relation between a preset access attribute and the authority level;
and distributing corresponding application management authority according to the determined authority level.
3. The application management method of claim 1, wherein the determining the corresponding application management authority according to the hotspot identification information comprises:
inquiring a preset authority index table according to the hotspot identification information; the authority index table comprises a mapping relation between hotspot identification information and application management authority;
when a result is inquired, confirming the inquired application management authority as the application management authority corresponding to the hotspot identification information;
and when the result is not inquired, determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information.
4. The method according to claim 3, wherein before determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information, the method further comprises:
evaluating an access risk coefficient of the target hotspot based on the hotspot identification information;
when the access risk coefficient is lower than a preset coefficient threshold, executing the step of determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information;
and when the access risk coefficient is higher than a preset coefficient threshold value, controlling the terminal to switch and access the target hotspot to an operator network.
5. The application management method of claim 1, wherein the application management policy comprises at least one of: the method comprises the steps of applying a display management strategy, an application operation management strategy, an application function management strategy and an application data transmission management strategy; wherein the management comprises enabling management or disabling management.
6. An application management apparatus, comprising:
the acquisition module is used for acquiring hotspot identification information of a target hotspot accessed by the terminal;
the determining module is used for determining the corresponding application management authority according to the hotspot identification information;
the management module is used for calling a corresponding application management strategy based on the application management authority so as to manage the application on the terminal;
the release module is used for sending a hotspot security verification request carrying the hotspot identification information to a background server when receiving a management release instruction; receiving a hotspot security verification result corresponding to the target hotspot responded by the background server based on the hotspot security verification request; when the hotspot security verification result indicates security permission, determining a security permission level corresponding to the security permission; determining a corresponding management release strategy according to the security permission level; and performing corresponding release processing on the application management based on the management release strategy.
7. An electronic device, comprising: the system comprises a memory, a processor and a bus, wherein the bus is used for realizing connection communication between the memory and the processor; the processor is configured to execute a computer program stored on the memory, and when the processor executes the computer program, the processor implements the steps of the method of any one of claims 1 to 5.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010063276.XA CN111310161B (en) | 2020-01-20 | 2020-01-20 | Application management method and device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010063276.XA CN111310161B (en) | 2020-01-20 | 2020-01-20 | Application management method and device and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111310161A CN111310161A (en) | 2020-06-19 |
CN111310161B true CN111310161B (en) | 2022-11-25 |
Family
ID=71148959
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010063276.XA Active CN111310161B (en) | 2020-01-20 | 2020-01-20 | Application management method and device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111310161B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111856961B (en) * | 2020-07-31 | 2023-04-28 | 深圳市欧瑞博科技股份有限公司 | Intelligent device control method and device based on permission and electronic device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106156645A (en) * | 2015-03-30 | 2016-11-23 | 中兴通讯股份有限公司 | Terminal data protection method, terminal and equipment |
CN106658489A (en) * | 2016-09-30 | 2017-05-10 | 广东欧珀移动通信有限公司 | Terminal application processing method, device and mobile terminal |
CN109246693A (en) * | 2018-07-13 | 2019-01-18 | 维沃移动通信有限公司 | A kind of control method and terminal of application program |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8230480B2 (en) * | 2004-04-26 | 2012-07-24 | Avaya Inc. | Method and apparatus for network security based on device security status |
CN107493576B (en) * | 2016-06-12 | 2020-09-18 | 上海连尚网络科技有限公司 | Method and apparatus for determining security information for a wireless access point |
CN107182055B (en) * | 2017-06-22 | 2021-01-26 | 深圳传音通讯有限公司 | Mobile terminal network connection processing method and mobile terminal |
-
2020
- 2020-01-20 CN CN202010063276.XA patent/CN111310161B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106156645A (en) * | 2015-03-30 | 2016-11-23 | 中兴通讯股份有限公司 | Terminal data protection method, terminal and equipment |
CN106658489A (en) * | 2016-09-30 | 2017-05-10 | 广东欧珀移动通信有限公司 | Terminal application processing method, device and mobile terminal |
CN109246693A (en) * | 2018-07-13 | 2019-01-18 | 维沃移动通信有限公司 | A kind of control method and terminal of application program |
Also Published As
Publication number | Publication date |
---|---|
CN111310161A (en) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107995215B (en) | Control method and device of intelligent household equipment and cloud platform server | |
CN109918924A (en) | The control method and system of dynamic access permission | |
CN108427649B (en) | Access management method, terminal device, system and storage medium of USB interface | |
CN111382421A (en) | Service access control method, system, electronic device and storage medium | |
JP5544005B2 (en) | Token management method for digital rights management | |
CN110289965B (en) | Application program service management method and device | |
CN110858833A (en) | Access control policy configuration method, device and system and storage medium | |
CN111310161B (en) | Application management method and device and computer readable storage medium | |
CN105262823A (en) | Method, apparatus and system for controlling terminal | |
CN110941853A (en) | Database permission control method, computer equipment and storage medium | |
JP4576449B2 (en) | Switch device and copy control method | |
CN112286911B (en) | Database management method and device, equipment and storage medium | |
EP2232402B1 (en) | Method for moving rights object and method for managing rights of issuing rights object and system thereof | |
CN108270798B (en) | Mobile terminal equipment safety management system | |
CN111182536A (en) | SIM card state detection method, device, network equipment and storage medium | |
CN115174177A (en) | Authority management method, device, electronic apparatus, storage medium and program product | |
CN104349506A (en) | Association management method, wireless access device and system | |
CN115879156A (en) | Dynamic desensitization method, device, electronic equipment and storage medium | |
CN112000968A (en) | Access control method and device, storage medium and electronic device | |
CN114021104A (en) | USB device control method and device and electronic device | |
Cisco | Monitoring CMCCs | |
CN115622723A (en) | Device access control method and device, electronic device and storage medium | |
CN111208743A (en) | Intelligent household equipment, control method thereof and intelligent household system | |
CN107438033A (en) | A kind of method and system for controlling client access NAS | |
CN117119024A (en) | Third party equipment control method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |