CN111310161B - Application management method and device and computer readable storage medium - Google Patents

Application management method and device and computer readable storage medium Download PDF

Info

Publication number
CN111310161B
CN111310161B CN202010063276.XA CN202010063276A CN111310161B CN 111310161 B CN111310161 B CN 111310161B CN 202010063276 A CN202010063276 A CN 202010063276A CN 111310161 B CN111310161 B CN 111310161B
Authority
CN
China
Prior art keywords
hotspot
application management
application
management
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010063276.XA
Other languages
Chinese (zh)
Other versions
CN111310161A (en
Inventor
王川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN202010063276.XA priority Critical patent/CN111310161B/en
Publication of CN111310161A publication Critical patent/CN111310161A/en
Application granted granted Critical
Publication of CN111310161B publication Critical patent/CN111310161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

The application provides an application management method, an application management device and a computer readable storage medium, wherein the application management method comprises the following steps: acquiring hotspot identification information of a target hotspot accessed by a terminal; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.

Description

Application management method and device and computer readable storage medium
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an application management method and apparatus, and a computer-readable storage medium.
Background
With the continuous terminal technology, the terminal use requirements of users in daily work and life are continuously improved, and correspondingly, the users also put forward higher and higher requirements on the terminal use safety.
Currently, in the related art, a user usually sets an authority for an application in a terminal by using a security protection application such as a security center and a security manager on the terminal, so as to implement security control on the terminal application, for example, to control a certain application to be inaccessible or hidden on a desktop. However, this application management method requires a user to perform a conscious operation, and thus, when managing an application in actual applications, both the immediacy of operation and the convenience of operation are low.
Disclosure of Invention
The embodiment of the application management method and device and a computer readable storage medium at least can solve the problem that in the related technology, a user needs to use a security protection type application to set the permission of the related application to perform application management, and the operation instantaneity and the operation convenience of application management are low.
A first aspect of an embodiment of the present application provides an application management method, including:
acquiring hotspot identification information of a target hotspot accessed by a terminal;
determining corresponding application management authority according to the hotspot identification information;
and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal.
A second aspect of the embodiments of the present application provides an application management apparatus, including:
the acquisition module is used for acquiring hotspot identification information of a target hotspot accessed by the terminal;
the determining module is used for determining the corresponding application management authority according to the hotspot identification information;
and the management module is used for calling a corresponding application management strategy based on the application management authority so as to manage the application on the terminal.
A third aspect of embodiments of the present application provides an electronic apparatus, including: the application management method includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the application management method provided in the first aspect of the embodiments of the present application.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium, on which a computer program is stored, where when the computer program is executed by a processor, the steps in the application management method provided in the first aspect of the embodiments of the present application are implemented.
As can be seen from the above, according to the application management method, apparatus, and computer-readable storage medium provided in the present application, hotspot identification information of a target hotspot to which a terminal is accessed is obtained; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.
Drawings
Fig. 1 is a schematic basic flowchart of an application management method according to a first embodiment of the present application;
fig. 2 is a schematic flowchart of a method for determining application management permission according to a first embodiment of the present application;
fig. 3 is a schematic flowchart of a pipe understanding and removing method according to a first embodiment of the present disclosure;
fig. 4 is a schematic flowchart of another method for releasing management according to the first embodiment of the present application;
fig. 5 is a detailed flowchart of an application management method according to a second embodiment of the present application;
fig. 6 is a schematic diagram illustrating program modules of an application management apparatus according to a third embodiment of the present application;
fig. 7 is a schematic diagram of program modules of another application management apparatus according to a third embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the present invention more apparent and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to solve the defect that the operation timeliness and the operation convenience of application management are low due to the fact that a user needs to set the permission of a related application by using a security protection type application to perform application management in the related art, a first embodiment of the present application provides an application management method, for example, fig. 1 is a basic flowchart of the application management method provided in this embodiment, and the application management method includes the following steps:
step 101, acquiring hotspot identification information of a target hotspot accessed by a terminal.
Specifically, in practical applications, hot spots, that is, wireless access points, are more and more popular, which can provide users with greater convenience for communication and use, and because the hot spots can be simultaneously accessed by multiple users, certain danger is brought to the use safety of the terminals of the users. Based on this, in this embodiment, after the terminal accesses the hotspot, the unique identifier (for example, a hotspot name, a hotspot ID, a hotspot physical address, and the like) of the hotspot is acquired, so as to sense the current terminal usage environment, which is beneficial to subsequently managing the application on the terminal. It should be noted that the preferred hotspot of the present embodiment may be a WiFi hotspot.
And step 102, determining corresponding application management authority according to the hotspot identification information.
Specifically, in this embodiment, the application management authority in the current hotspot access scenario is determined based on the hotspot identifier, and the application management authority of this embodiment is used to instruct to correspondingly manage the application on the terminal.
In some embodiments of this embodiment, determining the corresponding application management authority according to the hotspot identification information includes: inquiring a preset authority index table according to the hotspot identification information, wherein the authority index table comprises a mapping relation between the hotspot identification information and the application management authority; and when the result is inquired, determining the inquired application management authority as the application management authority corresponding to the hotspot identification information.
Specifically, in this embodiment, a corresponding relationship between different hotspot identification information and application management permissions may be preset, and then after the identification information of the accessed hotspot is determined, the corresponding relationship may be queried to obtain the corresponding application management permission.
Further, in some embodiments of this embodiment, after querying the preset authority index table, the method further includes: and when the result is not inquired, determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information.
Specifically, in practical applications, it is difficult to ensure that mapping of application management permissions is performed on all hotspots that may be accessed by the terminal in the preset permission index table, so that when a hotspot currently accessed by the terminal is a hotspot that is accessed for the first time or an unknown hotspot, a result may not be queried in the permission index table, that is, the application management permission cannot be determined according to the permission index table.
Further, in some embodiments of this embodiment, before determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information, the method further includes: evaluating an access risk coefficient of the target hotspot based on the hotspot identification information; when the access risk coefficient is lower than a preset coefficient threshold value, determining a preset standby application management authority as an application management authority corresponding to the hotspot identification information; and when the access risk coefficient is higher than a preset coefficient threshold value, the control terminal switches to access the operator network from the target hotspot.
Specifically, in this embodiment, when a result cannot be queried in the foregoing permission index table based on the hotspot identifier, it is indicated that the currently accessed hotspot is a first-time accessed hotspot or an unknown hotspot, in this case, the currently accessed hotspot may be an unsafe hotspot, and the terminal may encounter a use security problem during use, and based on this, the risk assessment may be further performed on the currently accessed hotspot, where when the access risk of the access point is high, the terminal is controlled to disconnect from the current hotspot and switch to an operator network (e.g., a 4G network, etc.), so as to ensure that the terminal is in a secure network environment, and when the access risk of the access point is low, the connection between the terminal and the current hotspot may be maintained, and the terminal application is managed by using a standby application management permission, so as to ensure the use security of the terminal in the current hotspot access scene.
And 103, calling a corresponding application management strategy based on the application management authority to manage the application on the terminal.
Specifically, according to the embodiment, the corresponding application management policy is called to automatically manage the terminal application according to the application management authority corresponding to the currently accessed hotspot, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of the terminal use in different scenes is fully ensured.
In some implementations of this embodiment, the application management policy includes at least one of: the application display management strategy, the application operation management strategy, the application function management strategy and the application data transmission management strategy.
Specifically, the management of the present embodiment includes enable management or disable management, where the enable is used to indicate opening, enabling, and activating, and the disable is used to indicate closing, disabling, and the like, in the present embodiment, an application display management policy, that is, a display/hide of an application on a control terminal, for example, the terminal is provided with A, B, C three applications, and when a first application management policy is adopted, the application may be displayed corresponding to a control a application, and then B, C application may be correspondingly hidden, and when a second application management policy is adopted, the application may be displayed corresponding to a control B, C application, and then the application a may be correspondingly hidden; the application operation management policy comprises: on one hand, the application running on the terminal is controlled to quit, for example, the currently running payment application is controlled to quit running, and on the other hand, the non-running application is controlled to start running, for example, the intelligent home control application is controlled to start running; the application function management strategy comprises the step of controlling certain functions of a specific application on the terminal to be used in an open mode or forbidden to be used in a forbidden mode, and the application data transmission management strategy comprises the step of allowing data transmission or forbidding data transmission when the application runs, wherein the data transmission can be the data transmission between the terminal and a background server or the data transmission between the terminal and other terminals.
As shown in fig. 2, which is a schematic flow chart of the method for determining application management permission according to the present embodiment, in some embodiments of the present embodiment, determining a corresponding application management permission according to hotspot identification information specifically includes the following steps:
step 201, inquiring access attribute of a terminal accessing a target hotspot within a preset historical time period according to hotspot identification information;
step 202, determining a corresponding authority level based on the access attribute and a mapping relation between a preset access attribute and the authority level;
and step 203, distributing corresponding application management authority according to the determined authority level.
Specifically, in this embodiment, in addition to determining the corresponding specific application management authority based on the hotspot identification information query authority index table, the application management authority may also be determined based on the historical access condition of the terminal and the currently accessed hotspot, and it should be understood that the access attribute of this embodiment may be the total accumulated access times, the total accumulated access duration, and the like. The present embodiment may evaluate the permission level corresponding to the required application management permission based on the historical access attribute of the terminal accessing the current hotspot, and configure the application management permission correspondingly. Because the embodiment can determine the specific application management authority only based on the authority level, and the corresponding application management authority can be preset for each authority level in practical application, the data required to be preset can be managed more conveniently compared with the method of directly setting the corresponding application management authority for each hotspot identification information.
As shown in fig. 3, as a flowchart of a management understanding and removing method provided in this embodiment, in some embodiments of this embodiment, after managing an application on a terminal, the method further includes the following steps:
step 301, when receiving a management release instruction, sending a hotspot security verification request carrying hotspot identification information to a background server;
step 302, receiving a hotspot security verification result corresponding to a target hotspot responded by a background server based on a hotspot security verification request;
and 303, when the hotspot security verification result indicates security permission, performing release processing on the application management based on the security permission.
Specifically, in this embodiment, while the terminal application is managed to ensure that the terminal is in a safe use environment, because the use of the terminal application is subjected to relevant regulations, the relevant normal use requirements of the user may not be met. In this embodiment, a management release flow is triggered based on a management release instruction sent from the outside, and in order to ensure that the use safety of the terminal can be guaranteed when the corresponding application management is released, the embodiment requests the background to perform safety verification on a hotspot currently accessed by the terminal based on the management release instruction, and when it is determined that the hotspot currently accessed by the terminal meets the safety use requirement by obtaining the safety permission, the application management is released, and correspondingly, if the hotspot safety verification result indicates a safety risk, the application management can be refused to be released. It should be understood that the application management release of the present embodiment may be a global release or a partial release, where the global release is to globally release the current application management policy, and the partial release is to only release part of the application management policies.
In addition, it should be noted that, in practical applications, management release may also be performed based on other implementation manners, for example, a related management release option may be provided in the terminal, so that a user may input a corresponding management release instruction to control management release, or when it is detected that the terminal is disconnected from the target hotspot, the previously-acting application management policy may be controlled to be disabled, and application management may be globally released.
As shown in fig. 4, which is a flowchart of another management release method provided in this embodiment, in some embodiments of this embodiment, further performing release processing on application management based on security permission specifically includes the following steps:
step 401, determining a security permission level corresponding to the security permission;
step 402, determining a corresponding management release policy according to the security permission level;
step 403, performing a correspondence cancellation process on the application management based on the management cancellation policy.
Specifically, after receiving the hotspot security verification result fed back by the background, the hotspot security verification result may further perform a hierarchical indication on the security permission, so that the application management release may be performed more finely. In this embodiment, different security permission levels correspond to different management releasing policies, for example, the security permission level a corresponds to a partial management releasing policy, and the security permission level B corresponds to a global management releasing policy, and certainly, the partial management releasing policy may be further subdivided into different types of partial management releasing policies, which may be determined according to actual usage scenarios and will not be described herein again.
Based on the technical scheme of the embodiment of the application, hotspot identification information of a target hotspot accessed by a terminal is acquired; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.
The method in fig. 5 is a detailed application management method provided in a second embodiment of the present application, and the application management method includes:
step 501, acquiring hotspot identification information of a target hotspot accessed by a terminal.
In this embodiment, after the terminal accesses the hotspot, the unique identifier (e.g., a hotspot name, a hotspot ID, a hotspot physical address, etc.) of the hotspot is acquired, so as to sense the current terminal usage environment, which is beneficial to subsequently managing the application on the terminal.
Step 502, according to the hotspot identification information, inquiring the access attribute of the terminal accessing the target hotspot within a preset historical time period.
In this embodiment, the access attribute may be a total number of accumulated accesses by the terminal to the target hotspot, a total duration of the accumulated accesses, and the like.
Step 503, determining a corresponding authority level based on the access attribute and the mapping relationship between the preset access attribute and the authority level.
In this embodiment, the permission level corresponding to the required application management permission may be evaluated based on the historical access attribute of the terminal accessing the current hotspot, and the application management permission may be configured correspondingly.
And 504, calling a corresponding application management strategy to manage the application on the terminal based on the application management authority corresponding to the determined authority level.
In this embodiment, different rights management levels are preset, and each rights management level corresponds to a specific application management rights type. In addition, the application management policy of the embodiment includes at least one of the following: the application display management strategy, the application operation management strategy, the application function management strategy and the application data transmission management strategy.
And 505, sending a hotspot security verification request carrying hotspot identification information to a background server when receiving the management release instruction.
In this embodiment, while the terminal application is managed to ensure that the terminal is in a safe use environment, the use of the terminal application is subjected to relevant regulations, which may cause that the relevant normal use requirements of the user cannot be met.
Step 506, receiving a hotspot security verification result corresponding to the target hotspot responded by the background server based on the hotspot security verification request.
And 507, when the hotspot security verification result indicates security permission, performing release processing on the application management based on the security permission.
In this embodiment, a background is requested to perform security verification on a hotspot currently accessed by a terminal based on a management release instruction, and when it is determined that the hotspot currently accessed by the terminal meets the security use requirement by obtaining security permission, the application management is released, correspondingly, if a hotspot security verification result indicates a security risk, the application management may be refused to be released, and the release of the application management in this embodiment may be global release or partial release.
It should be understood that, the size of the serial number of each step in this embodiment does not mean the execution sequence of the step, and the execution sequence of each step should be determined by its function and inherent logic, and should not be limited uniquely to the implementation process of the embodiment of the present application.
The embodiment of the application discloses an application management method, which comprises the steps of obtaining hotspot identification information of a target hotspot accessed by a terminal; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. By implementing the application management method and the application management system, the application management authority is determined correspondingly according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured; in addition, the application management authority is correspondingly determined based on the historical access conditions of the terminal and the currently accessed hotspot, and the determined application management strategy can be more accurately adapted to a real-time hotspot access scene; in addition, the management understanding mechanism provided by the application can ensure the use safety of the terminal and meet the necessary use requirements of users at the same time.
Fig. 6 is a diagram of an application management apparatus according to a third embodiment of the present application. The application management apparatus may be used to implement the application management method in the foregoing embodiments. As shown in fig. 6, the application management apparatus mainly includes:
an obtaining module 601, configured to obtain hotspot identification information of a target hotspot to which a terminal is accessed;
a determining module 602, configured to determine a corresponding application management authority according to the hotspot identification information;
the management module 603 is configured to invoke a corresponding application management policy based on the application management permission, and manage the application on the terminal.
In some embodiments of this embodiment, the determining module 602 is specifically configured to: according to the hotspot identification information, inquiring the access attribute of the terminal accessing the target hotspot in a preset historical time period; determining a corresponding authority level based on the access attribute and a mapping relation between the preset access attribute and the authority level; and distributing corresponding application management authority according to the determined authority level.
In other embodiments of this embodiment, the determining module 602 is specifically configured to: inquiring a preset authority index table according to the hotspot identification information; the authority index table comprises a mapping relation between hotspot identification information and application management authority; when the result is inquired, the inquired application management authority is determined as the application management authority corresponding to the hotspot identification information; and when the result is not inquired, determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information.
As shown in fig. 7, another application management apparatus provided in this embodiment is further provided, in some embodiments of this embodiment, the application management apparatus further includes: an evaluation module 604 and a switching module 605, wherein the evaluation module 604 is configured to: before the preset standby application management authority is determined as the application management authority corresponding to the hotspot identification information, the access risk coefficient of the target hotspot is evaluated based on the hotspot identification information. Correspondingly, when the access risk coefficient is lower than the preset coefficient threshold, the determining module 602 correspondingly performs a function of determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information; the switching module 605 is configured to: and when the access risk coefficient is higher than a preset coefficient threshold value, the control terminal switches to access the operator network from the target hotspot.
In some implementations of this embodiment, the application management policy includes at least one of: the method comprises the steps of applying a display management strategy, an application operation management strategy, an application function management strategy and an application data transmission management strategy; wherein the management comprises enabling management or disabling management.
Referring to fig. 7 again, in some embodiments of the present embodiment, the application management apparatus further includes: a release module 606, configured to send a hotspot security verification request carrying hotspot identification information to a background server after managing an application on a terminal and when receiving a management release instruction; receiving a hotspot security verification result corresponding to the target hotspot responded by the background server based on the hotspot security verification request; and when the hotspot security verification result indicates security permission, performing release processing on the application management based on the security permission.
Further, in some embodiments of this embodiment, when the release module 606 performs release processing on application management based on security permission, it is specifically configured to: determining a security clearance level corresponding to the security clearance; determining a corresponding management release policy according to the security permission level; and performing corresponding release processing on the application management based on the management release policy.
It should be noted that, the application management methods in the first and second embodiments can be implemented based on the application management device provided in this embodiment, and it can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working process of the application management device described in this embodiment may refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
According to the application management device provided by the embodiment, hotspot identification information of a target hotspot accessed by a terminal is acquired; determining corresponding application management authority according to the hotspot identification information; and calling a corresponding application management strategy based on the application management authority to manage the application on the terminal. Through the implementation of the scheme, the application management authority is determined according to the hotspot accessed by the terminal to automatically perform application management, so that the operation instantaneity and the operation convenience of the application management are effectively improved, and the safety of using the terminal in different scenes is fully ensured.
Referring to fig. 8, fig. 8 is an electronic device according to a fourth embodiment of the present disclosure. The electronic device can be used for realizing the application management method in the foregoing embodiment. As shown in fig. 8, the electronic device mainly includes:
a memory 801, a processor 802, a bus 803, and computer programs stored on the memory 801 and executable on the processor 802, the memory 801 and the processor 802 being connected by the bus 803. The processor 802, when executing the computer program, implements the application management method in the foregoing embodiments. Wherein the number of processors may be one or more.
The Memory 801 may be a high-speed Random Access Memory (RAM) Memory or a non-volatile Memory (non-volatile Memory), such as a disk Memory. The memory 801 is used to store executable program code, and the processor 802 is coupled to the memory 801.
Further, an embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium may be an electronic device provided in the foregoing embodiments, and the computer-readable storage medium may be a memory in the foregoing embodiment shown in fig. 8.
The computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the application management method in the foregoing embodiments. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a RAM, a magnetic disk, or an optical disk.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a readable storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned readable storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In view of the above description of the application management method, apparatus and computer-readable storage medium provided by the present application, those skilled in the art will recognize that the scope of the present application can be varied from the specific embodiments of the present application.

Claims (8)

1. An application management method, comprising:
acquiring hotspot identification information of a target hotspot accessed by a terminal;
determining corresponding application management authority according to the hotspot identification information;
calling a corresponding application management strategy based on the application management authority to manage the application on the terminal;
when a management release instruction is received, a hotspot security verification request carrying the hotspot identification information is sent to a background server;
receiving a hotspot security verification result corresponding to the target hotspot responded by the background server based on the hotspot security verification request;
when the hotspot security verification result indicates security permission, determining a security permission level corresponding to the security permission; determining a corresponding management releasing strategy according to the security permission grade; and performing corresponding release processing on the application management based on the management release strategy.
2. The application management method according to claim 1, wherein the determining the corresponding application management authority according to the hotspot identification information comprises:
according to the hotspot identification information, inquiring the access attribute of the terminal accessing the target hotspot within a preset historical time period;
determining a corresponding authority level based on the access attribute and a mapping relation between a preset access attribute and the authority level;
and distributing corresponding application management authority according to the determined authority level.
3. The application management method of claim 1, wherein the determining the corresponding application management authority according to the hotspot identification information comprises:
inquiring a preset authority index table according to the hotspot identification information; the authority index table comprises a mapping relation between hotspot identification information and application management authority;
when a result is inquired, confirming the inquired application management authority as the application management authority corresponding to the hotspot identification information;
and when the result is not inquired, determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information.
4. The method according to claim 3, wherein before determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information, the method further comprises:
evaluating an access risk coefficient of the target hotspot based on the hotspot identification information;
when the access risk coefficient is lower than a preset coefficient threshold, executing the step of determining the preset standby application management authority as the application management authority corresponding to the hotspot identification information;
and when the access risk coefficient is higher than a preset coefficient threshold value, controlling the terminal to switch and access the target hotspot to an operator network.
5. The application management method of claim 1, wherein the application management policy comprises at least one of: the method comprises the steps of applying a display management strategy, an application operation management strategy, an application function management strategy and an application data transmission management strategy; wherein the management comprises enabling management or disabling management.
6. An application management apparatus, comprising:
the acquisition module is used for acquiring hotspot identification information of a target hotspot accessed by the terminal;
the determining module is used for determining the corresponding application management authority according to the hotspot identification information;
the management module is used for calling a corresponding application management strategy based on the application management authority so as to manage the application on the terminal;
the release module is used for sending a hotspot security verification request carrying the hotspot identification information to a background server when receiving a management release instruction; receiving a hotspot security verification result corresponding to the target hotspot responded by the background server based on the hotspot security verification request; when the hotspot security verification result indicates security permission, determining a security permission level corresponding to the security permission; determining a corresponding management release strategy according to the security permission level; and performing corresponding release processing on the application management based on the management release strategy.
7. An electronic device, comprising: the system comprises a memory, a processor and a bus, wherein the bus is used for realizing connection communication between the memory and the processor; the processor is configured to execute a computer program stored on the memory, and when the processor executes the computer program, the processor implements the steps of the method of any one of claims 1 to 5.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN202010063276.XA 2020-01-20 2020-01-20 Application management method and device and computer readable storage medium Active CN111310161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010063276.XA CN111310161B (en) 2020-01-20 2020-01-20 Application management method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010063276.XA CN111310161B (en) 2020-01-20 2020-01-20 Application management method and device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111310161A CN111310161A (en) 2020-06-19
CN111310161B true CN111310161B (en) 2022-11-25

Family

ID=71148959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010063276.XA Active CN111310161B (en) 2020-01-20 2020-01-20 Application management method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111310161B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111856961B (en) * 2020-07-31 2023-04-28 深圳市欧瑞博科技股份有限公司 Intelligent device control method and device based on permission and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156645A (en) * 2015-03-30 2016-11-23 中兴通讯股份有限公司 Terminal data protection method, terminal and equipment
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN109246693A (en) * 2018-07-13 2019-01-18 维沃移动通信有限公司 A kind of control method and terminal of application program

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8230480B2 (en) * 2004-04-26 2012-07-24 Avaya Inc. Method and apparatus for network security based on device security status
CN107493576B (en) * 2016-06-12 2020-09-18 上海连尚网络科技有限公司 Method and apparatus for determining security information for a wireless access point
CN107182055B (en) * 2017-06-22 2021-01-26 深圳传音通讯有限公司 Mobile terminal network connection processing method and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156645A (en) * 2015-03-30 2016-11-23 中兴通讯股份有限公司 Terminal data protection method, terminal and equipment
CN106658489A (en) * 2016-09-30 2017-05-10 广东欧珀移动通信有限公司 Terminal application processing method, device and mobile terminal
CN109246693A (en) * 2018-07-13 2019-01-18 维沃移动通信有限公司 A kind of control method and terminal of application program

Also Published As

Publication number Publication date
CN111310161A (en) 2020-06-19

Similar Documents

Publication Publication Date Title
CN107995215B (en) Control method and device of intelligent household equipment and cloud platform server
CN109918924A (en) The control method and system of dynamic access permission
CN108427649B (en) Access management method, terminal device, system and storage medium of USB interface
CN111382421A (en) Service access control method, system, electronic device and storage medium
JP5544005B2 (en) Token management method for digital rights management
CN110289965B (en) Application program service management method and device
CN110858833A (en) Access control policy configuration method, device and system and storage medium
CN111310161B (en) Application management method and device and computer readable storage medium
CN105262823A (en) Method, apparatus and system for controlling terminal
CN110941853A (en) Database permission control method, computer equipment and storage medium
JP4576449B2 (en) Switch device and copy control method
CN112286911B (en) Database management method and device, equipment and storage medium
EP2232402B1 (en) Method for moving rights object and method for managing rights of issuing rights object and system thereof
CN108270798B (en) Mobile terminal equipment safety management system
CN111182536A (en) SIM card state detection method, device, network equipment and storage medium
CN115174177A (en) Authority management method, device, electronic apparatus, storage medium and program product
CN104349506A (en) Association management method, wireless access device and system
CN115879156A (en) Dynamic desensitization method, device, electronic equipment and storage medium
CN112000968A (en) Access control method and device, storage medium and electronic device
CN114021104A (en) USB device control method and device and electronic device
Cisco Monitoring CMCCs
CN115622723A (en) Device access control method and device, electronic device and storage medium
CN111208743A (en) Intelligent household equipment, control method thereof and intelligent household system
CN107438033A (en) A kind of method and system for controlling client access NAS
CN117119024A (en) Third party equipment control method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant