CN113626804A - Application program processing method, mobile terminal and storage medium - Google Patents

Application program processing method, mobile terminal and storage medium Download PDF

Info

Publication number
CN113626804A
CN113626804A CN202110904403.9A CN202110904403A CN113626804A CN 113626804 A CN113626804 A CN 113626804A CN 202110904403 A CN202110904403 A CN 202110904403A CN 113626804 A CN113626804 A CN 113626804A
Authority
CN
China
Prior art keywords
application program
mobile terminal
application
access
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110904403.9A
Other languages
Chinese (zh)
Inventor
肖凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN202110904403.9A priority Critical patent/CN113626804A/en
Publication of CN113626804A publication Critical patent/CN113626804A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a processing method of an application program, a mobile terminal and a storage medium, wherein the method comprises the following steps: acquiring running information of a mobile terminal, wherein the mobile terminal comprises first running information and/or second running information of an application program; and managing and controlling the operation authority of the mobile terminal according to the first operation information and/or the second operation information. The method and the device can improve the accuracy of the application program which has threat to the user data security.

Description

Application program processing method, mobile terminal and storage medium
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a processing method of an application program, a mobile terminal, and a storage medium.
Background
When a user uses a part of functions in an application, the user needs to authorize the application so that the application can access corresponding user data. For example, a user may use the navigation function of a navigation application when the user allows the navigation application to access the user's location data.
In some implementations, after a user authorizes an application, the user may turn off authorization of the application for security of user data. For example, the user may select an application that affects user data security in a settings page of the mobile terminal and turn off authorization of the application in the corresponding privacy settings. In the process of conceiving and implementing the application, the inventor finds that at least the following problems exist, when the user closes the authorization of the application program, the user cannot accurately determine which application programs in the setting page can affect the safety of the user data, and further the accuracy of determining the application programs with higher influence on the safety of the user data is lower.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
In view of the above technical problems, the present application provides an application processing method, a mobile terminal, and a storage medium, which are used to solve the technical problem that the accuracy of determining an application that has a high impact on user data security is low.
In order to solve the above technical problem, the present application provides a method for processing an application program, which is applied to a mobile terminal, and includes:
s11, obtaining operation information of the mobile terminal, wherein the mobile terminal comprises first operation information and/or second operation information of the application program;
s12, managing and controlling the operation authority of the mobile terminal according to the first operation information and/or the second operation information.
Optionally, the S12, including:
outputting prompt information corresponding to the operation information according to the first operation information and/or the second operation information;
and responding to the operation of the prompt message, and managing and controlling the operation authority of the application program.
Optionally, outputting, according to the operation information, prompt information corresponding to the operation information, where the prompt information includes:
determining or generating prompt information when at least one of the following conditions is met, and displaying the prompt information:
the first running information is historical access frequency of the application program to the data of the mobile terminal, and the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold value; alternatively, the first and second electrodes may be,
the second running information is the starting times of the application program in a preset time period, and the starting times of the application program in the preset time period are smaller than or equal to a second threshold value.
Optionally, the prompt message includes at least one of the following:
denying an access instruction of the application;
allowing access to instructions while the application is in use;
allowing the instruction when the application program accesses the current time;
providing a virtual login instruction to the application program;
instructions to reserve all permissions of the application;
an instruction to close all permissions of the application.
Optionally, when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold, the prompt information includes: the application access instruction is denied and/or the access instruction is allowed when the application is in use.
Optionally, when the number of times of starting the application program in a preset time period is less than or equal to the second threshold, the prompt message includes: the instruction for reserving all the authorities of the application program and the instruction for closing all the authorities of the application program.
Optionally, when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold and the number of times of starting the application program in a preset time period is less than or equal to the second threshold, the prompt information includes: the access instruction of the application program is refused and/or the access instruction is allowed when the application program is used.
Optionally, after the historical access frequency of the application program to the user data is greater than or equal to a first threshold, the method further includes:
obtaining an access type of the application program, wherein optionally, the access type includes private data access and non-private data access;
when the access type is privacy data access, outputting at least one instruction as follows: the method comprises the steps of refusing an access instruction of the application program, allowing the access instruction when the application program is used, allowing the instruction when the application program accesses the current time, and providing a virtual login instruction for the application program.
The application also provides a processing device of the application program, and the device comprises a first acquisition module and a management module:
the first acquisition module is used for acquiring the operation information of the mobile terminal, wherein the operation information comprises the historical access frequency of an application program in the mobile terminal to the data of the mobile terminal and/or the starting times of the application program in a preset time period;
and the management module is used for managing the access authority of the application program to the data of the mobile terminal according to the running information.
Optionally, the management module is specifically configured to:
determining or generating and displaying prompt information corresponding to the operation information according to the operation information;
and responding to the operation of the prompt message, and managing the access authority of the application program to the data of the mobile terminal.
Optionally, the management module is specifically configured to:
determining or generating prompt information when at least one of the following conditions is met, and displaying the prompt information:
the historical access frequency of the application program to the mobile terminal data is greater than or equal to a first threshold value; alternatively, the first and second electrodes may be,
the starting times of the application program in the preset time period are less than or equal to a second threshold value.
Optionally, the prompt message includes at least one of the following:
denying an access instruction of the application;
allowing access to instructions while the application is in use;
allowing the instruction when the application program accesses the current time;
providing a virtual login instruction to the application program;
instructions to reserve all permissions of the application;
an instruction to close all permissions of the application.
Optionally, when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold, the prompt information includes: the access instruction of the application program is refused and/or the access instruction is allowed when the application program is used.
Optionally, when the number of times of starting the application program in a preset time period is less than or equal to the second threshold, the prompt message includes: the instruction for reserving all the authorities of the application program and the instruction for closing all the authorities of the application program.
Optionally, when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold and the number of times of starting the application program in a preset time period is less than or equal to the second threshold, the prompt information includes: the access instruction of the application program is refused and/or the access instruction is allowed when the application program is used.
Optionally, the apparatus further includes a second obtaining module, where the second obtaining module is configured to:
obtaining the access type of the application program, wherein the access type comprises private data access and non-private data access;
when the access type is privacy data access, outputting at least one instruction as follows: the method comprises the steps of refusing an access instruction of the application program, allowing the access instruction when the application program is used, allowing the instruction when the application program accesses the current time, and providing a virtual login instruction for the application program.
The present application further provides a mobile terminal, including: the device comprises a memory and a processor, wherein the memory stores processing programs of application programs, and the processing programs of the application programs realize the method when being executed by the processor.
The present application also provides a computer storage medium storing a computer program which, when executed by a processor, implements the method as described above.
As described above, the application processing method, the mobile terminal and the storage medium of the application are applied to the mobile terminal, obtain the operation information of the mobile terminal, where the mobile terminal includes the first operation information and/or the second operation information of the application, and manage and control the operation permission of the mobile terminal according to the first operation information and/or the second operation information. By the method, the application program which influences the data security of the mobile terminal can be accurately determined through the first running information and the second running information of the application program, and the accuracy of determining the application program which threatens the data security of the mobile terminal is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic hardware structure diagram of a mobile terminal implementing various embodiments of the present application;
fig. 2 is a communication network system architecture diagram according to an embodiment of the present application;
fig. 3 is a schematic view of an application scenario provided in an embodiment of the present application;
fig. 4 is a flowchart illustrating a processing method of an application according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a historical access frequency provided by an embodiment of the present application;
fig. 6 is a schematic diagram of a prompt message provided in an embodiment of the present application;
FIG. 7 is a schematic diagram of another hint information provided in an embodiment of the present application;
fig. 8 is a schematic diagram of a process for managing access rights according to an embodiment of the present application;
fig. 9 is a schematic flowchart of another processing method for an application according to an embodiment of the present application;
FIG. 10 is a schematic diagram of another hint information provided in an embodiment of the present application;
fig. 11 is a process diagram of a processing method of an application according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of a processing device for an application according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of another processing device for an application according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings. With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of an element by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element, and further, where similarly-named elements, features, or elements in different embodiments of the disclosure may have the same meaning, or may have different meanings, that particular meaning should be determined by their interpretation in the embodiment or further by context with the embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," and/or "comprising," when used in this specification, specify the presence of stated features, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, operations, elements, components, items, species, and/or groups thereof. The terms "or," "and/or," "including at least one of the following," and the like, as used herein, are to be construed as inclusive or mean any one or any combination. For example, "includes at least one of: A. b, C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C ", again for example," A, B or C "or" A, B and/or C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C'. An exception to this definition will occur only when a combination of elements, functions or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that, in this document, the reference numbers such as S11, S12, etc. are used for the purpose of more clearly and briefly describing the corresponding contents, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S12 first and then S11, etc. in the specific implementation, but these shall be within the protection scope of the present application.
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
The mobile terminal may be implemented in various forms. For example, the mobile terminal described in the present application may include mobile terminals such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and fixed terminals such as a Digital TV, a desktop computer, and the like.
The following description will be given taking a mobile terminal as an example, and it will be understood by those skilled in the art that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present application, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and optionally, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Optionally, the light sensor includes an ambient light sensor that may adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 1061 and/or the backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Alternatively, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Optionally, the touch detection device detects a touch orientation of a user, detects a signal caused by a touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Optionally, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited thereto.
Alternatively, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a program storage area and a data storage area, and optionally, the program storage area may store an operating system, an application program (such as a sound playing function, an image playing function, and the like) required by at least one function, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor and a modem processor, optionally, the application processor mainly handles operating systems, user interfaces, application programs, etc., and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present application, a communication network system on which the mobile terminal of the present application is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present disclosure, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Optionally, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Alternatively, the eNodeB2021 may be connected with other enodebs 2022 through a backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. Optionally, the MME2031 is a control node that handles signaling between the UE201 and the EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present application is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, various embodiments of the present application are provided.
In the related art, in order for a user to normally use a program, the program is authorized so that the program can access user data. For security of user data, the user may selectively turn off authorization for partially used applications. For example, the user may select an application that affects user data security in a settings page of the mobile terminal and turn off authorization of the application in the corresponding privacy settings. However, when the user closes the authorization of the application program, the user cannot accurately determine which application programs in the setting page may affect the security of the user data, and thus the accuracy of determining the application programs having a higher impact on the security of the user data is low.
In order to solve the technical problem in the related art that it is determined that the accuracy of an application program which has a higher influence on the security of user data is low, an embodiment of the present application provides an application program processing method, where a mobile terminal obtains a historical access frequency of the application program on data of the mobile terminal and/or a startup frequency of the application program within a preset time period, optionally, the data of the mobile terminal may be user data in the mobile terminal, and when the application program frequently accesses the user data within a short time period, it indicates that the application program will influence the security of the user data, or when the application program is not used within a long time period, it indicates that the application program is an emergency application program, and if the user has authorized such an application program, the application program will also influence the security of the user data, and at this time, the mobile terminal determines or generates a prompt message to prompt the user whether to adjust the authorization of the application program, the method and the device improve the safety of the user data, can accurately determine the influence degree of the application program on the safety of the user data, and further improve the accuracy of determining the application program threatening the safety of the user data.
For easy understanding, a specific application scenario of the embodiment of the present application is described below with reference to fig. 3.
Fig. 3 is a schematic view of an application scenario provided in an embodiment of the present application. Please refer to fig. 3, which includes: a mobile terminal. When the mobile terminal acquires the operation information of the mobile terminal, the mobile terminal can determine whether to determine or generate prompt information according to the operation information of the mobile terminal so as to prompt a user whether to change the authorization information of the application program. For example, if the application has accessed the user data in the background 30 times in the history period, the mobile terminal determines or generates a prompt message including a prompt of "the application has accessed the user data in the background 30 times in the history period, whether to confirm continued permission" and an icon permitted and a rejection icon when used. When the user clicks the allowed icon in use, the application program can only access the user data in use, and when the user clicks the rejected icon, the application program cannot access the user data. Therefore, whether the application program can affect the safety of the user data or not is accurately determined by combining the access frequency of the application program to the user data in the historical period, and the accuracy of determining the application program threatening the safety of the user data is further improved.
The technical means shown in the present application will be described in detail below with reference to specific examples. Alternatively, the following embodiments may exist alone or in combination with each other, and the description thereof will not be repeated in different embodiments for the same or similar contents.
Fig. 4 is a flowchart illustrating a processing method of an application according to an embodiment of the present application. Referring to fig. 4, the method may include:
and S11, acquiring the operation information of the mobile terminal, wherein the mobile terminal comprises the first operation information and/or the second operation information of the application program.
The execution main body of the embodiment of the application can be a mobile terminal, and can also be a processing device of an application program arranged in the mobile terminal. Alternatively, the processing means of the application program may be implemented by software, or by a combination of software and hardware.
Alternatively, the mobile terminal may be any device having a data processing function and a data display function. For example, the mobile terminal may be a tablet computer, a notebook computer, a mobile phone, and the like.
Optionally, the first operation information is a historical access frequency of an application program in the mobile terminal to data of the mobile terminal, and the second operation information is a starting frequency of the application program in a preset time period. Alternatively, the application program may be a program installed in the mobile terminal. For example, the applications may include social-type applications, media-type applications, game-type applications, and the like. Alternatively, the data of the mobile terminal may be user data. For example, the user data may be information stored in the mobile terminal, and the user data may include contact information, a short message in the mobile terminal, location information of the user, information of a memory in the mobile terminal, and the like.
Alternatively, the access to the user data by the application may be after the application has been authorized, or the access to the user data by the application may be unauthorized and the application requests access to the user data.
The historical access frequency of the application program to the data of the mobile terminal is the access frequency of the application program to the data of the mobile terminal in the historical period. For example, if an application accesses user data 50 times in the past 1 hour, the historical access frequency is 50 times per hour; if the application accesses user data 30 times in the past day, the historical access frequency is 30 times per day. Alternatively, the history period may be a preset period. For example, the historical period may be the past 1 hour, the past 1 day, or the past 1 week, which is not limited in the embodiment of the present application. For example, if the historical period is the last 3 hours, the historical access frequency may be times/hour; if the historical period is past 1 day, the historical access frequency can be times/day; if the historical period is the past 1 week, the historical access frequency may be times/week. Alternatively, the historical access frequency may be a fixed unit. For example, the unit of the historical access frequency is times/hour, and if the number of times the application program accesses the user data is 720 times in the past 3 days, the historical access frequency is 10 times per hour.
Alternatively, in the actual application process, the historical access frequency of the application program to the data of the mobile terminal may be the access frequency of the application program to the data of the mobile terminal in the past 1 day. For example, if an application accesses user data 30 times in 1 day, the historical access frequency is 30 times per day.
In practical applications, the historical access frequency of the application program to the data of the mobile terminal can be obtained from the log information of the application program, and the user can also view the historical access frequency in the privacy page of the mobile terminal.
Fig. 5 is a schematic diagram of a history access frequency according to an embodiment of the present application. Please refer to fig. 5, which includes a mobile terminal. The privacy page of the mobile terminal comprises sensitive authority. For example, sensitive permissions include reading or modifying contacts, user location information, and sound recordings, 3 applications have acquired permission to read or modify contacts, 5 applications have acquired permission to access user location information, and 10 applications have acquired permission to access sound recordings.
Referring to fig. 5, when the user clicks the usage record, the privacy page of the mobile terminal jumps to the usage record page. Alternatively, the usage record page may display the frequency of access to user data by the application for the current day. For example, the usage record page includes information that the mobile terminal has allowed the navigation application to attempt to read contact information for the current day, the navigation application accesses the local file 10 times for the current day, and the navigation application accesses the sound recording 12 times for the current day.
Referring to fig. 5, when the user clicks the navigation application to access the audio record, the usage record page of the mobile terminal jumps to the permission page, and the permission of the navigation application to access the audio record can be controlled in the user permission page. For example, when the user clicks on the decline icon in the permission page, the navigation application cannot access the sound recording, when the user clicks on the permission icon, the navigation application can continue to access the sound recording, when the user clicks on the permission icon, the navigation application can access the sound recording when in use, and the navigation application cannot access the sound recording in the background.
The starting times of the application program in the preset time period are used for indicating whether the application program is the common software or not. For example, if the number of times the application is started in the past 30 days is 0, the application is the emergency software; if the starting times of the application program in the past 30 days are 30 times, the application program is not commonly used in software.
Alternatively, the mobile terminal may acquire the operation information of the application program in log information of the application program. For example, when an application accesses user data, the application records this access in log information, along with the results of this access to the user data. For example, if the application fails to access the user data, the log information of the application records that the application fails to access the user data this time.
And S12, managing and controlling the operation authority of the mobile terminal according to the first operation information and/or the second operation information.
The operation authority is the access authority of the application program in the mobile terminal to the data of the mobile terminal. For example, if the application program has the access right of the user data, the application program can access the user data; if the application program does not have the access authority of the user data, the application program cannot access the user data. Optionally, when the application program does not have the access right of the user data, the access of the application program to the user data is the access right for requesting to acquire the user data.
The operation authority of the mobile terminal can be managed and controlled according to the following feasible implementation modes: and outputting prompt information corresponding to the operation information according to the first operation information and/or the second operation information. Optionally, the prompt message is used to prompt the user whether the access right of the application program needs to be adjusted. For example, when the mobile terminal outputs the prompt message, the mobile terminal displays the prompt message on the screen, and the user can operate the displayed prompt message to adjust the access authority of the application program to the user data.
The prompt message comprises at least one of the following: the method comprises the steps of refusing an access instruction of the application program, allowing the access instruction when the application program is used, allowing the access instruction when the application program is accessed at this time, providing a virtual login instruction for the application program, reserving an instruction of all the authorities of the application program and closing the instruction of all the authorities of the application program.
Optionally, the access instruction of the application program is rejected for closing the access right of the application program to the data of the mobile terminal. For example, when an access instruction of an application program is denied to be opened, the application program cannot access the corresponding user data. For example, if an instruction to deny the navigation application access to the user's location information is turned on, the navigation application cannot acquire the user's location information in any case.
The access instruction is allowed to be used for closing the access right of the application program to the data of the mobile terminal in the background when the application program is used. For example, if the access command is allowed to be turned on when the application is used, the application can access the corresponding user data when the user uses the application, and the application cannot access the corresponding user data when the user does not use the application. For example, if an instruction that allows the navigation application to access the location information of the user during use is started, the navigation application cannot acquire the location information of the user when the navigation application is closed, and the navigation application can acquire the location information of the user when the user uses the navigation function of the navigation application.
The permission instruction during the current access of the application program is an instruction that the application program can access the data of the corresponding mobile terminal once when the application program is used. For example, if an instruction for allowing access to the location information of the user when the navigation application is accessed this time is started, the navigation application can only access the location information of the user when the navigation application is used this time, and the navigation application cannot acquire the location information of the user when the navigation application is used next time.
Providing virtual login instructions to the application program is used for providing virtual data to the application program to obtain the use right of the application program. Optionally, the virtual user data may be blank user data or user data modified by the user. For example, when an application needs to access contact information to be used, the mobile terminal may provide the application with the modified contact information to obtain the usage right of the application and also protect the privacy of the user.
Alternatively, the permissions an application has may not change when the instruction that holds all of the permissions for the application is turned on. For example, if the social application has the authority to access the contact information in the mobile terminal, the social application may still access the contact information in the mobile terminal when the instruction for keeping all the authorities of the social application is turned on.
Optionally, when the instruction for closing all the permissions of the application program is opened, all the permissions of the user program are closed. For example, if the social application program has the authority to access the contact information and the location information of the user in the mobile terminal, the social application program cannot access the authority to access the contact information and the location information of the user in the mobile terminal when the instruction to close all the authorities of the social application program is turned on.
Optionally, the prompt information corresponding to the operation information is output according to the first operation information and/or the second operation information, and the following three conditions are provided:
case 1: the first operational information is greater than or equal to a first threshold.
Optionally, the first operation information is historical access frequency of the application program to the data of the mobile terminal, and when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold, the mobile terminal determines or generates and displays the prompt information. For example, when the first threshold is 10 times per day, if the access frequency of the application program to the user data within 1 day is 20 times, the mobile terminal determines or generates and displays the prompt message; and if the access times of the application program to the user data within 1 day are 3 times, the mobile terminal is uncertain or generates prompt information.
Optionally, in this case, the hint information includes an access instruction to deny the application and an access instruction to allow the application to use. Therefore, when the access frequency of the application program to the user data is greater than or equal to the first threshold, the mobile terminal can provide two choices for the user, the flexibility of determining the access authority of the application program to the user data is improved, and the influence degree of the application program on the safety of the user data can be accurately reflected by the access frequency, so that the accuracy of determining the application program threatening the safety of the user data can be improved.
Next, the presentation information in this case will be described with reference to fig. 6.
Fig. 6 is a schematic diagram of a prompt message according to an embodiment of the present application. Please refer to fig. 6, which includes a mobile terminal. The state of the mobile terminal is a screen locking state. The mobile terminal determines or generates the reminder information when the navigation application accesses the user location information 40 times within the last three days. The prompt message includes a prompt message that "the navigation application has accessed the user location information 40 times in the background for the past three days, whether to confirm continued permission", and an icon that is permitted and an icon that is rejected when used. Optionally, when the icon allowed during use is activated, the mobile terminal runs an instruction for allowing the navigation application to access the user location information during use, and when the icon activation is rejected, the mobile terminal runs an instruction for rejecting the navigation application to access the user location information.
Case 2: the second operational information is less than or equal to a second threshold.
Optionally, the second operation information is the starting frequency of the application program in a preset time period, and if the starting frequency of the application program in the preset time period is less than or equal to a second threshold, the mobile terminal determines or generates and displays the prompt information. For example, when the preset time period is 30 days and the second threshold is 1 time, if the number of times of starting the application program in 30 days is 4 times, the mobile terminal does not generate the prompt message; and if the starting times of the application program in 30 days are 0 times, the mobile terminal generates and displays the prompt information.
Optionally, in this case, the hint information includes an instruction to reserve all rights of the application, and an instruction to close all rights of the application. If the starting times of the application program in the preset time period are less than or equal to the second threshold, the fact that the application program is not in abnormal use software is indicated, the permission of the application program has the possibility of influencing the safety of the user data, at the moment, the prompt information comprises an instruction for closing all the permissions of the application program, the fact that the abnormal software accesses the user data in the background of the mobile terminal can be effectively prevented, the safety of the user data is improved, and the accuracy of the application program which threatens the safety of the user data is improved by combining the fact that the starting times of the application program in the preset time period are less.
Next, the presentation information in this case will be described with reference to fig. 7.
Fig. 7 is a schematic diagram of another prompt message provided in the embodiment of the present application. Please refer to fig. 7, which includes a mobile terminal. The state of the mobile terminal is a screen locking state. When the starting frequency of the navigation application program in the past 30 days is 0, the mobile terminal outputs prompt information. The prompt message includes a prompt message of whether all the permissions of the navigation application program are recovered after the navigation application program has not been started for 30 days, and an icon for reserving the permissions and an icon for all rejections. And when all the rejected icons are activated, the mobile terminal operates an instruction for closing all the permissions of the navigation application program.
Case 3: the first operational information is greater than or equal to a first threshold value, and the second operational information is less than or equal to a second threshold value.
The first operation information is historical access frequency of the application program to the data of the mobile terminal, the second operation information is starting frequency of the application program in a preset time period, and when the historical access frequency of the application program to the data of the mobile terminal is larger than or equal to a first threshold value and the starting frequency of the application program in the preset time period is smaller than or equal to a second threshold value, the mobile terminal outputs prompt information. For example, when the first threshold is 10 times per day, the preset time period is 30 days, and the second threshold is 1 time, if the access frequency of the application program to the user data within 1 day is 5 times, and the startup frequency of the application program within 30 days is 4 times, the mobile terminal does not generate the prompt message; if the access times of the application program to the user data within 1 day are 14 times, and the starting times of the application program within 30 days are 0 times, the mobile terminal outputs the prompt message.
Optionally, when the historical access frequency of the application to the data of the mobile terminal is greater than or equal to a first threshold, and the number of times of starting the application in a preset period is less than or equal to a second threshold, the prompt information includes an access instruction for rejecting the application and an access instruction allowed when the application is used.
Optionally, in this case, the instruction included in the hint information may be determined according to the following feasible implementation: acquiring a first priority that the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold value and a second priority that the starting frequency of the application program in a preset time period is less than or equal to a second threshold value, and determining an instruction included in the prompt message according to the first priority and the second priority. For example, if the first priority is greater than the second priority, the prompt message includes an access instruction for denying the application program, and an access instruction for allowing the application program to use; if the first priority is less than the second priority, the prompt message includes an instruction to reserve all permissions of the application and an instruction to close all permissions of the application.
In practical application, when the historical access frequency of the application program to the user data is greater than or equal to a first threshold value and the starting frequency of the application program in a preset period is less than or equal to a second threshold value, the influence of the application program on the security of the user data can be reflected more accurately by the historical access frequency of the application program to the user data, so that the prompt information can be determined to comprise an access instruction for rejecting the application program and an access instruction allowed when the application program is used, and the accuracy of the application program for determining that the security of the user data is threatened is improved.
And responding to the operation of the prompt message, and managing and controlling the operation authority of the application program.
Next, a procedure of the operation authority of the management application will be described with reference to fig. 8.
Fig. 8 is a schematic process diagram for managing access rights according to an embodiment of the present application. Please refer to fig. 8, which includes a mobile terminal. The prompt information output by the mobile terminal includes a prompt content of "the navigation application has accessed the user's allelic information 40 times in the background for the past three days, whether to confirm continued permission" and an icon permitted and a rejection icon when used.
Referring to fig. 8, when the user clicks the rejection icon, the mobile terminal closes the authority of the navigation application to access the user location information, and displays a notification message that the authority of the navigation application to access the user location information is closed on the screen.
The embodiment of the application provides a processing method of an application program, which includes obtaining operation information of a mobile terminal, wherein the operation information includes historical access frequency of the application program in the mobile terminal to data of the mobile terminal and/or starting frequency of the application program in a preset time period, and when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold value and/or the starting frequency of the application program in the preset time period is less than or equal to a second threshold value, the mobile terminal outputs prompt information, and responds to operation of the prompt information to control operation permission of the mobile terminal. In the method, the prompt message can provide at least one authority for the user to select, so that the flexibility of determining the access authority of the application program to the user data is improved, and the influence degree of the application program on the safety of the user data can be accurately reflected by the historical access frequency and the starting times of the user program in a preset time period, so that the accuracy of determining the application program threatening the safety of the user data can be improved.
Based on the embodiment shown in fig. 4, when the historical access frequency of the application program to the user data is greater than or equal to the first threshold, prompt information may be output according to the type of the application program accessing the user data, and the processing method of the application program is described in detail below with reference to fig. 9.
Fig. 9 is a flowchart illustrating another processing method of an application according to an embodiment of the present application. Please refer to fig. 9, which includes:
and S21, acquiring the historical access frequency of the application program to the data of the mobile terminal.
It should be noted that the execution process of S21 may refer to the execution process of S11, and is not described again in this embodiment of the application.
And S22, when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold value, acquiring the access type of the application program.
The access types include private type data access and non-private type data access. Optionally, the private data access is used to instruct the application program to access the private data, and the non-private data access is used to instruct the application program to access the non-private data. For example, the privacy data includes information that has a large influence on the security of the user data, such as contact information, voice recording, short messages, and location information of the user, and the non-privacy data includes information that has a small influence on the security of the user data, such as local files in the memory and log information of the mobile terminal.
Alternatively, the type of data accessed by the application program may be arbitrarily set. For example, the contact information may be preset to be privacy-type data or non-privacy-type data, which is not limited in this embodiment of the application.
And S23, outputting prompt information according to the access type.
Optionally, when the access type is non-privacy data access, the mobile terminal does not output the prompt information. For example, when the local file in the memory is non-privacy data, and the first threshold is 10 times per day, if the navigation application accesses the local file in the memory 20 times within 1 day, the mobile terminal does not output the prompt message.
Optionally, when the access type is privacy data access, the mobile terminal outputs prompt information. For example, when the contact information is privacy-type data and the first threshold is 10 times per day, if the navigation application accesses the contact information 20 times within 1 day, the mobile terminal determines or generates and displays the prompt information.
Optionally, when the type of the user data is privacy data, the prompt information is at least one of the following instructions: the method comprises the steps of refusing an access instruction of the application program, allowing the access instruction when the application program is used, allowing the access instruction when the application program accesses the current time, and providing a virtual login instruction for the application program.
Next, the presentation information when the access type is the private data access will be described with reference to fig. 10.
Fig. 10 is a schematic diagram of another prompt message provided in the embodiment of the present application. Please refer to fig. 10, which includes: a mobile terminal. The state of the mobile terminal is a screen locking state, and the type of the contact information is privacy data. When the navigation application accesses the contact information for 40 times in the last 3 days, the mobile terminal outputs prompt information. The prompt message includes a prompt of "the navigation application has accessed the contact information 40 times in the background in the past three days, and whether to confirm continued permission", and icons permitted in use, an icon providing virtual user data, an icon permitted this time, and a rejection icon. When the allowed icon is activated during use, the mobile terminal runs an instruction for allowing the application program to access the contact information during the current access, when the icon for providing the virtual user data is activated, the mobile terminal runs an instruction for providing the virtual contact information for the application program, when the allowed icon is activated, the mobile terminal runs an instruction for allowing the navigation application program to access the contact information at the current time, and when the icon is not activated, the mobile terminal runs an instruction for refusing the navigation application program to access the contact information.
And S24, responding to the operation of the prompt message, and managing and controlling the operation authority of the mobile terminal.
It should be noted that the execution process of S24 may refer to the execution process of S12, and is not described again in this embodiment of the application.
The embodiment of the application provides a processing method of an application program, which includes the steps of obtaining historical access frequency of the application program to data of a mobile terminal, obtaining an access type of the application program when the historical access frequency of the application program to the data of the mobile terminal is larger than or equal to a first threshold value, determining or generating and displaying prompt information by the mobile terminal when the access type is privacy data access, responding to operation on the prompt information, and managing and controlling operation permission of the application program. In the method, when the historical access frequency of the application program to the user data is greater than or equal to the first threshold, whether the prompt information is determined or generated can be determined according to the type of the application program to access the user data, if the prompt information is privacy data, the reason that the frequent access of the application program to the privacy data influences the safety of the user data is shown, and the mobile terminal determines or generates and displays the prompt information, so that the accuracy of the application program which is determined to threaten the safety of the user data can be improved.
Based on any of the above embodiments, the following describes a procedure of the processing method of the application program with reference to fig. 11.
Fig. 11 is a process schematic diagram of a processing method of an application program according to an embodiment of the present application. Please refer to fig. 11, which includes a mobile terminal. The mobile terminal obtains the historical access frequency of the navigation application program to the contact information and the starting frequency of the navigation application program in a preset time period. Optionally, the navigation application accesses the contact information 40 times in the last 3 days, the historical access frequency of the navigation application to the contact information is greater than a first threshold, the navigation application is used 30 times in the last 30 days, and the starting time of the navigation application in the preset time period is greater than a second threshold. The mobile terminal acquires the type of the contact information.
Referring to fig. 11, when the type of the contact information is privacy-type data, the mobile terminal determines or generates a prompt message including a prompt of "the navigation application has accessed the contact information 40 times in the background for the past three days and whether to confirm continued permission" and an icon permitted at the time of use, an icon providing virtual user data, an icon permitted this time, and a reject icon.
Referring to fig. 11, when the user clicks an icon providing virtual user data, the mobile terminal provides virtual contact information to the navigation application and displays a notification that virtual contact information has been provided to the navigation application. Therefore, the user can normally use the navigation application program, the navigation application program cannot influence the safety of the contact person information of the user (the navigation application program accesses the virtual contact person information), the safety of the user information is improved, meanwhile, the influence degree of the application program on the safety of the user data can be accurately reflected by the historical access frequency and the starting times of the user program in a preset time period, and the accuracy of the application program which threatens the safety of the user data is improved.
Fig. 12 is a schematic structural diagram of a processing device of an application according to an embodiment of the present application. The processing means 10 of the application may be provided in a mobile terminal. Referring to fig. 12, the processing device 10 of the application program includes a first obtaining module 11 and a management module 12, and optionally:
the first obtaining module 11 is configured to obtain operation information of a mobile terminal, where the mobile terminal includes first operation information and/or second operation information of an application;
the management module 12 is configured to manage and control the operation permission of the mobile terminal according to the first operation information and/or the second operation information.
Optionally, the management module 12 is specifically configured to:
outputting prompt information corresponding to the operation information according to the first operation information and/or the second operation information;
and responding to the operation of the prompt message, and managing and controlling the operation authority of the application program.
Optionally, the management module 12 is specifically configured to:
determining or generating prompt information when at least one of the following conditions is met, and displaying the prompt information:
the first running information is historical access frequency of the application program to the data of the mobile terminal, and the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold value; alternatively, the first and second electrodes may be,
the second running information is the starting times of the application program in a preset time period, and the starting times of the application program in the preset time period are smaller than or equal to a second threshold value.
Optionally, the prompt message includes at least one of the following:
denying an access instruction of the application;
allowing access to instructions while the application is in use;
allowing the instruction when the application program accesses the current time;
providing a virtual login instruction to the application program;
instructions to reserve all permissions of the application;
an instruction to close all permissions of the application.
Optionally, when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold, the prompt information includes: the access instruction of the application program is refused and/or the access instruction is allowed when the application program is used.
Optionally, when the number of times of starting the application program in a preset time period is less than or equal to the second threshold, the prompt message includes: the instruction for reserving all the authorities of the application program and the instruction for closing all the authorities of the application program.
Optionally, when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold and the number of times of starting the application program in a preset time period is less than or equal to the second threshold, the prompt information includes: the instruction for denying the access of the application program and the instruction for allowing the access when the application program is used.
The processing device of the application program provided in the embodiment of the present application may execute the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects thereof are similar and will not be described herein again.
Fig. 13 is a schematic structural diagram of another processing device for an application according to an embodiment of the present application. Fig. 13 is a view showing the processing apparatus of the application program shown in fig. 12. The processing device 10 of the application program further comprises a second obtaining module 13, wherein the second obtaining module 13 is configured to:
obtaining an access type of the application program, wherein optionally, the access type includes private data access and non-private data access;
when the access type is privacy data access, outputting at least one instruction as follows: the method comprises the steps of refusing an access instruction of the application program, allowing the access instruction when the application program is used, allowing the instruction when the application program accesses the current time, and providing a virtual login instruction for the application program.
The processing device of the application program provided in the embodiment of the present application may execute the technical solutions shown in the above method embodiments, and the implementation principles and beneficial effects thereof are similar and will not be described herein again.
The application also provides a mobile terminal, which comprises a memory and a processor, wherein the memory stores a processing program of an application program, and the processing program of the application program is executed by the processor to realize the processing method of the application program in any embodiment.
The present application also provides a computer-readable storage medium, on which a processing program of an application program is stored, and when the processing program of the application program is executed by a processor, the processing method of the application program in any of the above embodiments is implemented.
In the embodiments of the mobile terminal and the computer-readable storage medium provided in the present application, all technical features of any one of the embodiments of the processing method of the application program may be included, and the expanding and explaining contents of the specification are basically the same as those of the embodiments of the method, and are not described herein again.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method in the above various possible embodiments.
Embodiments of the present application further provide a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method in the above various possible embodiments.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device in the embodiment of the application can be merged, divided and deleted according to actual needs.
In the present application, the same or similar term concepts, technical solutions and/or application scenario descriptions will be generally described only in detail at the first occurrence, and when the description is repeated later, the detailed description will not be repeated in general for brevity, and when understanding the technical solutions and the like of the present application, reference may be made to the related detailed description before the description for the same or similar term concepts, technical solutions and/or application scenario descriptions and the like which are not described in detail later.
In the present application, each embodiment is described with emphasis, and reference may be made to the description of other embodiments for parts that are not described or illustrated in any embodiment.
The technical features of the technical solution of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the scope of the present application should be considered as being described in the present application.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, memory Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A processing method of an application program is characterized by comprising the following steps:
s11, obtaining operation information of the mobile terminal, wherein the mobile terminal comprises first operation information and/or second operation information of an application program;
s12, managing and controlling the operation authority of the mobile terminal according to the first operation information and/or the second operation information.
2. The method according to claim 1, wherein the S12 includes:
outputting prompt information corresponding to the operation information according to the first operation information and/or the second operation information;
and responding to the operation of the prompt message, and managing and controlling the operation authority of the application program.
3. The method according to claim 2, wherein outputting a prompt message corresponding to the operation information according to the first operation information and/or the second operation information comprises:
determining or generating prompt information when at least one of the following conditions is met, and displaying the prompt information:
the first running information is historical access frequency of the application program to the data of the mobile terminal, and the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold value; alternatively, the first and second electrodes may be,
the second running information is the starting times of the application program in a preset time period, and the starting times of the application program in the preset time period are smaller than or equal to a second threshold value.
4. The method of any of claims 1-3, wherein the prompt message comprises at least one of:
denying an access instruction of the application;
allowing access to instructions while the application is in use;
allowing the instruction when the application program accesses the current time;
providing a virtual login instruction to the application;
instructions to reserve all permissions of the application;
an instruction to close all permissions of the application.
5. The method according to claim 4, wherein when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold, the prompt message comprises: the access instruction of the application program is refused and/or the access instruction is allowed when the application program is used.
6. The method according to claim 4, wherein when the number of times the application is started within a preset time period is less than or equal to the second threshold, the prompt message comprises: the instruction for reserving all the authorities of the application program and the instruction for closing all the authorities of the application program.
7. The method according to claim 4, wherein when the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to the first threshold value, and the starting number of the application program in a preset time period is less than or equal to the second threshold value, the prompt message comprises: the access instruction of the application program is refused and/or the access instruction is allowed when the application program is used.
8. The method according to claim 4, wherein after the historical access frequency of the application program to the data of the mobile terminal is greater than or equal to a first threshold, the method further comprises:
acquiring the access type of the application program;
when the access type is privacy data access, outputting at least one instruction as follows: the method comprises the steps of refusing an access instruction of the application program, allowing the access instruction when the application program is used, allowing the instruction when the application program accesses the current time, and providing a virtual login instruction for the application program.
9. A mobile terminal, characterized in that the mobile terminal comprises: memory, processor, wherein the memory has stored thereon a processing program of an application program, which when executed by the processor implements a processing method of an application program according to any one of claims 1 to 8.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when executed by a processor, implements a processing method of an application program according to any one of claims 1 to 8.
CN202110904403.9A 2021-08-06 2021-08-06 Application program processing method, mobile terminal and storage medium Pending CN113626804A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110904403.9A CN113626804A (en) 2021-08-06 2021-08-06 Application program processing method, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110904403.9A CN113626804A (en) 2021-08-06 2021-08-06 Application program processing method, mobile terminal and storage medium

Publications (1)

Publication Number Publication Date
CN113626804A true CN113626804A (en) 2021-11-09

Family

ID=78383465

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110904403.9A Pending CN113626804A (en) 2021-08-06 2021-08-06 Application program processing method, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113626804A (en)

Similar Documents

Publication Publication Date Title
CN109151169B (en) Camera authority management method, mobile terminal and computer readable storage medium
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN110187925B (en) Desktop pre-starting control method, device and computer readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN112347503A (en) Management method, management device and computer storage medium
CN107194217B (en) User data access control method, apparatus and computer-readable storage medium
CN113094670A (en) Privacy protection method, terminal and storage medium
CN107168747B (en) Method and device for distinguishing mobile terminal configuration and computer readable storage medium
CN113515254A (en) Interface display method, terminal and storage medium
CN112163194A (en) Authorization method of application permission, mobile terminal and computer storage medium
CN113220109A (en) Processing method, mobile terminal and readable storage medium
CN109409081B (en) Permission setting method, mobile terminal and computer storage medium
CN111949957A (en) Privacy protection method, device and storage medium
CN108108054B (en) Method, apparatus and computer-readable storage medium for predicting user sliding operation
CN115617293A (en) Data processing method, source end screen projection equipment and storage medium
CN114217685A (en) Application management method, intelligent terminal and storage medium
CN113626804A (en) Application program processing method, mobile terminal and storage medium
CN112347505A (en) Data protection method and device and computer storage medium
CN107563210B (en) Information processing method, terminal and computer readable storage medium
CN112597448A (en) Authority granting method, mobile terminal and computer readable storage medium
CN112347471A (en) Terminal control method, terminal, and computer-readable storage medium
CN114125851B (en) Information processing method, mobile terminal and readable storage medium
CN109451176B (en) Application icon state switching method, terminal and computer storage medium
CN109451162B (en) Recording control method, mobile terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication