CN103324867A - Terminal and application program management method - Google Patents
Terminal and application program management method Download PDFInfo
- Publication number
- CN103324867A CN103324867A CN2012100756556A CN201210075655A CN103324867A CN 103324867 A CN103324867 A CN 103324867A CN 2012100756556 A CN2012100756556 A CN 2012100756556A CN 201210075655 A CN201210075655 A CN 201210075655A CN 103324867 A CN103324867 A CN 103324867A
- Authority
- CN
- China
- Prior art keywords
- user
- application program
- terminal
- identity information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a terminal. The terminal comprises an identity acquisition unit, a labeling unit, an identity judge unit and a display processing unit, wherein the identity acquisition unit is used for acquiring the first identity information of first users issuing the orders of starting application programs, and acquiring the second identity information of second users issuing viewing orders when task managers at the terminal are viewed; the labeling unit is used for labeling the application programs started by the first users; the identity judge unit is used for judging whether the first identity information is matched with the second identity information or not; the display processing unit is used for displaying the labeled application programs in the task managers under the condition that the first identity information is matched with the second identity information. Correspondingly, the invention further provides an application program management method. According to the technical scheme of the invention, the application programs displayed in the task managers can be managed according to different users. The terminal protects the privacy of users.
Description
Technical field
The present invention relates to the application management technical field, in particular to the management method of a kind of terminal and a kind of application program.
Background technology
In related art scheme, any user is by the operation task manager, can view the application program that all are moving on the terminal, such as the note of editing or the mail of reading etc., so, all programs of the current startup of user and content that some relates to privacy all have been exposed to the next bit terminal user without reservation.If the user does not want to allow other people know that he is interrupted when using which program or being engaged in the content that relates to privacy midway; this moment is in order to protect privacy, the Close All function that the user can only the initiating task manager or withdraw from one by one each and use and manually preserve each program state.
Therefore, need a kind of administrative skill of new application program, can be according to user's difference, and the application program that demonstrates in the task manager is managed protection user's privacy.
Summary of the invention
The present invention just is being based on the problems referred to above, has proposed a kind of administrative skill of new application program, can be according to user's difference, and the application program that demonstrates in the task manager is managed protection user's privacy.
In view of this, the present invention proposes a kind of terminal, comprise: the identity-acquiring unit, the first user that sends the application program launching order is carried out the collection of the first identity information, and when the task manager of terminal is checked, the second user who sends viewing command is carried out the collection of the second identity information; Indexing unit carries out mark to the application program that described first user starts; The identity judging unit judges whether described the first identity information and described the second identity information are complementary; Display processing unit in the situation that described the second identity information and described the first identity information are complementary, shows the application program that is labeled in described task manager.
In this technical scheme; " first user " can be any user, and this user is merely able to check the application program that initiates self, and can't view the application program that other users start; even thereby this user is not owner or authorized user, its individual privacy still can be protected.
In technique scheme, preferably, the subscriber identity information of described identity-acquiring unit collection comprise following at least one or a combination set of: people's face information, voice messaging, Shape of mouth, finger print information and/or password.
In technique scheme, preferably, described identity judging unit also is used for: judge whether described first user is authorized user; And described display processing unit also is used for: in the situation that described first user is described authorized user, when described first user is checked described task manager, demonstrate the application program that all users open in described task manager.
In this technical scheme; when the active user is authorized user; can in task manager, view the application program that all users open; other users then are merely able to view the application program of oneself opening; thereby in the privacy of having protected authorized user, guaranteed that authorized user can effectively manage terminal.Authorized user can be people owner or appointment, that have the authority of checking, can preserve in advance the identity information of authorized user in terminal, thereby verify.
In technique scheme, preferably, described identity-acquiring unit also is used for: when described terminal is unlocked or is unlocked, the user who sends open command or unlock command is carried out the collection of identity information; And described terminal also comprises: user's designating unit, will send the user of described open command or described unlock command as designated user; The time period designating unit will be from described terminal receives once described open command or described unlock command, until the time period that finishes when receiving one-off command or screen locking order is as the fixed time section; And the order designating unit, the application program launching order that described terminal is received in described fixed time section is judged to be from described designated user.
In this technical scheme, except when each opening application program, all the user is carried out identification, after can also once unlatching or release with terminal, to close next time or screen locking between time in, the application program that all are unlocked is all thought due to this user's operation, thereby has reduced the number of times to user's identification.Simultaneously, first user only needs can protect personal information by simple screen locking action when giving other users with terminal, and is easy to operate, reliable.
In technique scheme, preferably, also comprise: information memory cell, record the information that described first user is inputted, and store as backup information in the described application program that is labeled; The information recovery unit when the described application program that is labeled is started by described first user, is searched corresponding backup information, and is utilized described backup information to recover described application program in described information memory cell.In this technical scheme, by the information of first user input is carried out record, comprise clicks, operation note etc., convenient when first user is opened this application program again, the state when closing before presents, and brings good user's experience.
In technique scheme, preferably, also comprise: the routine processes unit when the described application program that is labeled is started by other users, generates and moves the copy of this application program.In this technical scheme; for some application programs; can open simultaneously a plurality of copies; therefore, in the situation that first user has been opened certain application program, enter on the operation interface of first user when opening this application program in order to prevent other user; restart the copy of this application program; and from viewing effect, then seem normally to have started an application program, thereby protected the individual privacy of first user.Here " other users " is for " first user ", to distinguish.
According to another aspect of the invention, a kind of management method of application program has also been proposed, comprise: step 202, the first user that sends the application program launching order is carried out the collection of the first identity information, and the application program that described first user starts is carried out mark; Step 204, when the task manager of terminal is checked, the second user who sends viewing command is carried out the collection of the second identity information, if described the second identity information and described the first identity information are complementary, then in described task manager, show the application program that is labeled.
In this technical scheme; " first user " can be any user, and this user is merely able to check the application program that initiates self, and can't view the application program that other users start; even thereby this user is not owner or authorized user, its individual privacy still can be protected.
In technique scheme, preferably, the subscriber identity information of collection comprise following at least one or a combination set of: people's face information, voice messaging, Shape of mouth, finger print information and/or password.
In technique scheme, preferably, described step 202 also comprises: the identity information to described first user is judged; And described step 204 also comprises: if described first user is described authorized user, when described first user is checked described task manager, demonstrate the application program that all users open in described task manager.
In this technical scheme; when the active user is authorized user; can in task manager, view the application program that all users open; other users then are merely able to view the application program of oneself opening; thereby in the privacy of having protected authorized user, guaranteed that authorized user can effectively manage terminal.Authorized user can be people owner or appointment, that have the authority of checking, can preserve in advance the identity information of authorized user in terminal, thereby verify.
In technique scheme, preferably, in the described step 202, also comprise: when described terminal is unlocked or is unlocked, the user who sends open command or unlock command is carried out the collection of identity information, and with described user as designated user; Will be from described terminal receive once described open command or described unlock command, until the time period that finishes when receiving one-off command or screen locking order is as the fixed time section; And the application program launching order that described terminal is received in described fixed time section is judged to be from described designated user.
In this technical scheme, except when each opening application program, all the user is carried out identification, after can also once unlatching or release with terminal, to close next time or screen locking between time in, the application program that all are unlocked is all thought due to this user's operation, thereby has reduced the number of times to user's identification.Simultaneously, first user only needs can protect personal information by simple screen locking action when giving other users with terminal, and is easy to operate, reliable.
In technique scheme, preferably, in the described step 204, also comprise: record the information that described first user is inputted in the described application program that is labeled, and store as backup information; And after the described step 204, also comprise: when the described application program that is labeled is started by described first user, search corresponding backup information, and utilize described backup information to recover described application program.In this technical scheme, by the information of first user input is carried out record, comprise clicks, operation note etc., convenient when first user is opened this application program again, the state when closing before presents, and brings good user's experience.
In technique scheme, preferably, after the described step 204, also comprise: when the described application program that is labeled is started by other users, generate and move the copy of this application program.In this technical scheme; for some application programs; can open simultaneously a plurality of copies; therefore, in the situation that first user has been opened certain application program, enter on the operation interface of first user when opening this application program in order to prevent other user; restart the copy of this application program; and from viewing effect, then seem normally to have started an application program, thereby protected the individual privacy of first user.Here " other users " is for " first user ", to distinguish.
By above technical scheme, can be according to user's difference, and the application program that demonstrates in the task manager is managed protection user's privacy.
Description of drawings
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of the management method of application program according to an embodiment of the invention;
Fig. 3 shows the process flow diagram that application programs according to an embodiment of the invention is carried out mark;
Fig. 4 shows the process flow diagram that according to another embodiment of the invention application programs is carried out mark;
Fig. 5 shows the process flow diagram that application programs according to an embodiment of the invention is carried out display management;
Fig. 6 A to Fig. 6 B shows the schematic diagram of task manager according to an embodiment of the invention;
Fig. 7 shows the process flow diagram that application programs according to an embodiment of the invention is carried out display management.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments the present invention is further described in detail.
Set forth in the following description a lot of details so that fully understand the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following public specific embodiment.
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 1, terminal 100 according to an embodiment of the invention, comprise: identity-acquiring unit 102, the first user that sends the application program launching order is carried out the collection of the first identity information, and when the task manager of terminal 100 is checked, the second user who sends viewing command is carried out the collection of the second identity information; Indexing unit 104 carries out mark to the application program that first user starts; Identity judging unit 105 judges whether the first identity information and the second identity information are complementary; Display processing unit 106 in the situation of authorized user, shows the application program that is labeled the user who sends viewing command in task manager.
In this technical scheme; " first user " can be any user, and this user is merely able to check the application program that initiates self, and can't view the application program that other users start; even thereby this user is not owner or authorized user, its individual privacy still can be protected.
In technique scheme, the subscriber identity information that identity-acquiring unit 102 gathers comprise following at least one or a combination set of: people's face information, voice messaging, Shape of mouth, finger print information and/or password.
In technique scheme, identity judging unit 105 also is used for: judge whether first user is authorized user; And display processing unit 106 also is used for: in the situation that first user is authorized user, when first user is checked task manager, demonstrate the application program that all users open in task manager.
In this technical scheme; when the active user is authorized user; can in task manager, view the application program that all users open; other users then are merely able to view the application program of oneself opening; thereby in the privacy of having protected authorized user, guaranteed that authorized user can effectively manage terminal.Authorized user can be people owner or appointment, that have the authority of checking, can preserve in advance the identity information of authorized user in terminal, thereby verify.
In technique scheme, identity-acquiring unit 102 also is used for: when terminal 100 is unlocked or is unlocked, the user who sends open command or unlock command is carried out the collection of identity information; And terminal 100 also comprises: user's designating unit 108, will send the user of open command or unlock command as designated user; Time period designating unit 110 will be from terminal 100 receives open command or unlock command, until the time period that finishes when receiving one-off command or screen locking order is as the fixed time section; And order designating unit 112, with terminal 100 at the appointed time in the section application program launching order that receives be judged to be from designated user.
In this technical scheme, except when each opening application program, all the user is carried out identification, after can also once unlatching or release with terminal 100, to close next time or screen locking between time in, the application program that all are unlocked is all thought due to this user's operation, thereby has reduced the number of times to user's identification.Simultaneously, first user only needs can protect personal information by simple screen locking action when giving other users with terminal 100, and is easy to operate, reliable.
In technique scheme, also comprise: information memory cell 114, record the information that first user is inputted, and store as backup information in the application program that is labeled; Information recovery unit 116 when the application program that is labeled is started by first user, is searched corresponding backup information in information memory cell 114, and utilizes backup information to recover application program.In this technical scheme, by the information of first user input is carried out record, comprise clicks, operation note etc., convenient when first user is opened this application program again, the state when closing before presents, and brings good user's experience.
In technique scheme, also comprise: routine processes unit 118 when the application program that is labeled is started by other users, generates and moves the copy of this application program.In this technical scheme; for some application programs; can open simultaneously a plurality of copies; therefore, in the situation that first user has been opened certain application program, enter on the operation interface of first user when opening this application program in order to prevent other user; restart the copy of this application program; and from viewing effect, then seem normally to have started an application program, thereby protected the individual privacy of first user.Here " other users " is for " first user ", to distinguish.
Fig. 2 shows the process flow diagram of the management method of application program according to an embodiment of the invention.
As shown in Figure 2, the management method of application program according to an embodiment of the invention, comprise: step 202, the first user that sends the application program launching order is carried out the collection of the first identity information, and the application program that described first user starts is carried out mark; Step 204, when the task manager of terminal is checked, the second user who sends viewing command is carried out the collection of the second identity information, if described the second identity information and described the first identity information are complementary, then in task manager, show the application program that is labeled.
In this technical scheme; " first user " can be any user, and this user is merely able to check the application program that initiates self, and can't view the application program that other users start; even thereby this user is not owner or authorized user, its individual privacy still can be protected.
In technique scheme, the subscriber identity information of collection comprise following at least one or a combination set of: people's face information, voice messaging, Shape of mouth, finger print information and/or password.
In technique scheme, step 202 also comprises: the identity information to first user is judged; And step 204 also comprises: if first user is authorized user, when first user is checked task manager, demonstrate the application program that all users open in task manager.
In this technical scheme; when the active user is authorized user; can in task manager, view the application program that all users open; other users then are merely able to view the application program of oneself opening; thereby in the privacy of having protected authorized user, guaranteed that authorized user can effectively manage terminal.Authorized user can be people owner or appointment, that have the authority of checking, can preserve in advance the identity information of authorized user in terminal, thereby verify.
In technique scheme, in the step 202, also comprise: when terminal is unlocked or be unlocked, the user who sends open command or unlock command is carried out the collection of identity information, and with the user as designated user; Will be from terminal receive open command or unlock command, until the time period that finishes when receiving one-off command or screen locking order is as the fixed time section; And with terminal at the appointed time in the section application program launching order that receives be judged to be from described designated user.
In this technical scheme, except when each opening application program, all the user is carried out identification, after can also once unlatching or release with terminal, to close next time or screen locking between time in, the application program that all are unlocked is all thought due to this user's operation, thereby has reduced the number of times to user's identification.Simultaneously, first user only needs can protect personal information by simple screen locking action when giving other users with terminal, and is easy to operate, reliable.
In technique scheme, in the step 204, also comprise: record the information that first user is inputted in the application program that is labeled, and store as backup information; And after the step 204, also comprise: when the application program that is labeled is started by first user, search corresponding backup information, and utilize backup information to recover application program.In this technical scheme, by the information of first user input is carried out record, comprise clicks, operation note etc., convenient when first user is opened this application program again, the state when closing before presents, and brings good user's experience.
In technique scheme, after the step 204, also comprise: when the application program that is labeled is started by other users, generate and move the copy of this application program.In this technical scheme; for some application programs; can open simultaneously a plurality of copies; therefore, in the situation that first user has been opened certain application program, enter on the operation interface of first user when opening this application program in order to prevent other user; restart the copy of this application program; and from viewing effect, then seem normally to have started an application program, thereby protected the individual privacy of first user.Here " other users " is for " first user ", to distinguish.
Fig. 3 shows the process flow diagram that application programs according to an embodiment of the invention is carried out mark.
As shown in Figure 3, to carry out the flow process of mark as follows for application programs according to an embodiment of the invention:
In this embodiment, when having application program to be activated, all the user who starts this application program is carried out identification, under this mode, can guarantee the accuracy of judged result, but larger for taking with the consumption of electric weight of the system resource of terminal, therefore, can consider to adopt embodiment shown in Figure 4.
Fig. 4 shows the process flow diagram that according to another embodiment of the invention application programs is carried out mark.
As shown in Figure 4, to carry out the flow process of mark as follows for according to another embodiment of the invention application programs:
Step 402 judges whether to receive open command or unlock command, if then enter step 404, otherwise proceed to judge.Here refer to the user who opens a terminal or carry out the screen locking operation is carried out identification.
Step 404 judges whether this user is authorized user, if then enter step 406, otherwise enter step 408.
Step 406 is carried out mark to the application program that is activated.
In this embodiment, will from terminal be unlocked or solution be locked to be closed next time or screen locking between time in, all operations all think from same user, and this user opens or the user of this terminal of release.Different from embodiment shown in Figure 3 is, in this fact Example, only when terminal unlatching or release, the user has been carried out an identification, and when not needing to start application program at every turn, all the user is carried out identification, therefore, accuracy may reduce, but has greatly saved system resource and terminal power.And, if authorized user is not often terminal need to be given other users to use, so, only need to when changing the user, needs carry out screen locking operation, can realize the protection to wherein privacy content, and easy to operate.
Fig. 5 shows the process flow diagram that application programs according to an embodiment of the invention is carried out display management.
In the situation based on Fig. 3 or embodiment shown in Figure 4, after the application program that authorized user is opened is carried out mark, as shown in Figure 5, be the flow process that application programs according to an embodiment of the invention is carried out display management:
Step 504 judges whether the user of the request of sending is authorized user, if then enter step 506, otherwise enter step 508.
Step 506 demonstrates the application program that is labeled in task manager.
Step 508 demonstrates the application program that is not labeled in task manager.Step 506 and step 508 are not successively to occur, only for different user, if authorized user then can be seen the application program that all have started, and for unauthorized user, then be merely able to see unlabelled application program.
Step 512 judges whether the user of request is authorized user, if enter step 514, otherwise enter step 518.Here for embodiment shown in Figure 3, need to carry out real-time identity validation, and for embodiment shown in Figure 4, then adopt terminal to be unlocked or the user identity when being unlocked, and do not need to re-start identity validation.
Step 514 is shown as previous use state.For authorized user, after opening before this application program, may carry out certain operations, such as just at editing short message, check Email etc., after then if the active user changes, can adopt the mode that the operation before the authorized user is recorded, and when unauthorized user uses, this application program is restarted, avoid exposing the privacy of authorized user.And when authorized user is opened this application program, user's operation of recording before then can utilizing, the state of application programs recovers.
Step 516 is preserved the use state before withdrawing from.Be exactly above-mentioned, carry out record for user's operation, recover after being convenient to.
Step 518 restarts or the start-up routine copy.When unauthorized user wishes to open the application program of authorized user unlatching, if recorded the operation note of authorized user, can restart this application program, if there is not record, the use process that can keep authorized user, and open the copy of this application program, and make unauthorized user seem, seem newly to have started this application program.
Step 520 normally withdraws from this application program.
Fig. 6 A to Fig. 6 B shows the schematic diagram of task manager according to an embodiment of the invention.
As shown in Figure 6A, when require to check task manager be authorized user the time, on task manager interface 602, the application program of moving 604 that demonstrates is current whole application programs of moving, comprise the application program of this authorized user unlatching and the application program that other users open, wherein, the application program of authorized user unlatching has adopted special marking 606 to be differently shown.
Shown in Fig. 6 B; when require to check task manager be unauthorized user the time; on task manager interface 602, do not comprise the application program that authorized user is opened in the application program of moving 604 that demonstrates, thereby protected the individual privacy of authorized user.
Fig. 7 shows the process flow diagram that application programs according to an embodiment of the invention is carried out display management.
As shown in Figure 7, to carry out the flow process of display management as follows for application programs according to an embodiment of the invention:
Step 704 gathers subscriber identity information, is recorded as first user.
Step 706 is carried out mark to the application program that first user starts.System particularly, can generate one corresponding to the sign of first user, and each application program and this sign that has first user to start is bound, so that can identify.When judging whether the user who starts application program is first user, can when application program receives startup command, to collection and the contrast that the user carries out identity information, all can adopt such as face-image, voice, the shape of the mouth as one speaks etc. mode.
Step 710 gathers the user's who sends this viewing command identity information, and is recorded as the second user.
Whether step 712 judges whether first user is identical with the second user's identity information, be same user namely.
Step 714 if first user and the second user are same user, then only demonstrates the application program that first user starts in task manager.
Step 716 if first user and the second user are different user, then only demonstrate the application program that the second user starts, thereby the individual privacy of first user is protected in task manager.
More than be described with reference to the accompanying drawings technical scheme of the present invention; consider in related art scheme; any user is by the operation task manager; can view the application program that all are moving on the terminal, user's individual privacy can not get effective protection, therefore; the invention provides the management method of a kind of terminal and a kind of application program; can be according to user's difference, and the application program that demonstrates in the task manager is managed protection user's privacy.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a terminal is characterized in that, comprising:
The identity-acquiring unit carries out the collection of the first identity information to the first user that sends the application program launching order, and when the task manager of terminal is checked, the second user who sends viewing command is carried out the collection of the second identity information;
Indexing unit carries out mark to the application program that described first user starts;
The identity judging unit judges whether described the first identity information and described the second identity information are complementary;
Display processing unit in the situation that described the second identity information and described the first identity information are complementary, shows the application program that is labeled in described task manager.
2. terminal according to claim 1 is characterized in that, described identity judging unit also is used for:
Judge whether described first user is authorized user; And
Described display processing unit also is used for:
In the situation that described first user is described authorized user, when described first user is checked described task manager, in described task manager, demonstrate the application program that all users open.
3. terminal according to claim 1 and 2 is characterized in that,
Described identity-acquiring unit also is used for: when described terminal is unlocked or is unlocked, the user who sends open command or unlock command is carried out the collection of identity information; And
Described terminal also comprises:
User's designating unit will be sent the user of described open command or described unlock command as designated user;
The time period designating unit will be from described terminal receives once described open command or described unlock command, until the time period that finishes when receiving one-off command or screen locking order is as the fixed time section; And
The order designating unit, the application program launching order that described terminal is received in described fixed time section is judged to be from described designated user.
4. terminal according to claim 1 and 2 is characterized in that, also comprises:
Information memory cell records the information that described first user is inputted in the described application program that is labeled, and stores as backup information;
The information recovery unit when the described application program that is labeled is started by described first user, is searched corresponding backup information, and is utilized described backup information to recover described application program in described information memory cell.
5. terminal according to claim 1 and 2 is characterized in that, also comprises:
The routine processes unit when the described application program that is labeled is started by other users, generates and moves the copy of this application program.
6. the management method of an application program is characterized in that, comprising:
Step 202 is carried out the collection of the first identity information to the first user that sends the application program launching order, and the application program that described first user starts is carried out mark;
Step 204, when the task manager of terminal is checked, the second user who sends viewing command is carried out the collection of the second identity information, if described the second identity information and described the first identity information are complementary, then in described task manager, show the application program that is labeled.
7. the management method of application program according to claim 6 is characterized in that, described step 202 also comprises:
Identity information to described first user is judged; And
Described step 204 also comprises:
If described first user is described authorized user, when described first user is checked described task manager, in described task manager, demonstrate the application program that all users open.
8. according to claim 6 or the management method of 7 described application programs, it is characterized in that, in the described step 202, also comprise:
When described terminal is unlocked or is unlocked, the user who sends open command or unlock command is carried out the collection of identity information, and with described user as designated user;
Will be from described terminal receive once described open command or described unlock command, until the time period that finishes when receiving one-off command or screen locking order is as the fixed time section; And
The application program launching order that described terminal is received in described fixed time section is judged to be from described designated user.
9. according to claim 6 or the management method of 7 described application programs, it is characterized in that, in the described step 204, also comprise:
Record the information that described first user is inputted in the described application program that is labeled, and store as backup information; And
After the described step 204, also comprise:
When the described application program that is labeled is started by described first user, search corresponding backup information, and utilize described backup information to recover described application program.
10. according to claim 6 or the management method of 7 described application programs, it is characterized in that, after the described step 204, also comprise:
When the described application program that is labeled is started by other users, generate and move the copy of this application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210075655.6A CN103324867B (en) | 2012-03-21 | 2012-03-21 | Terminal and the management method of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210075655.6A CN103324867B (en) | 2012-03-21 | 2012-03-21 | Terminal and the management method of application program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103324867A true CN103324867A (en) | 2013-09-25 |
CN103324867B CN103324867B (en) | 2016-08-17 |
Family
ID=49193606
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210075655.6A Active CN103324867B (en) | 2012-03-21 | 2012-03-21 | Terminal and the management method of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103324867B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104199641A (en) * | 2014-08-04 | 2014-12-10 | 联想(北京)有限公司 | Information processing method and first electronic equipment |
CN104408378A (en) * | 2014-12-02 | 2015-03-11 | 百度在线网络技术(北京)有限公司 | Method and device for protecting private data |
CN105260666A (en) * | 2015-09-28 | 2016-01-20 | 小米科技有限责任公司 | Password unlocking method and apparatus |
CN106528141A (en) * | 2016-10-28 | 2017-03-22 | 宇龙计算机通信科技(深圳)有限公司 | Task sweep-out method and system |
CN106572523A (en) * | 2016-10-31 | 2017-04-19 | 宇龙计算机通信科技(深圳)有限公司 | Operation control method and device of application and terminal |
CN106600082A (en) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | Processing method and device of task in service system, and service system construction system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1521161A2 (en) * | 2003-09-25 | 2005-04-06 | Matsushita Electric Industrial Co., Ltd. | An apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use |
CN101119333A (en) * | 2007-09-19 | 2008-02-06 | 北京亿企通信息技术有限公司 | Method to off-line examine history recording in instant communication instrument |
CN101123644A (en) * | 2006-08-11 | 2008-02-13 | 华为技术有限公司 | An authorized management system and authorized management server |
CN101145983A (en) * | 2007-08-07 | 2008-03-19 | 中兴通讯股份有限公司 | A self-diagnosis and self-discovery subsystem and method of network management system |
CN102087620A (en) * | 2009-12-07 | 2011-06-08 | 联想(北京)有限公司 | Method and device for running application programs in heterogeneous cluster and improving operational speed |
-
2012
- 2012-03-21 CN CN201210075655.6A patent/CN103324867B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1521161A2 (en) * | 2003-09-25 | 2005-04-06 | Matsushita Electric Industrial Co., Ltd. | An apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use |
CN101123644A (en) * | 2006-08-11 | 2008-02-13 | 华为技术有限公司 | An authorized management system and authorized management server |
CN101145983A (en) * | 2007-08-07 | 2008-03-19 | 中兴通讯股份有限公司 | A self-diagnosis and self-discovery subsystem and method of network management system |
CN101119333A (en) * | 2007-09-19 | 2008-02-06 | 北京亿企通信息技术有限公司 | Method to off-line examine history recording in instant communication instrument |
CN102087620A (en) * | 2009-12-07 | 2011-06-08 | 联想(北京)有限公司 | Method and device for running application programs in heterogeneous cluster and improving operational speed |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104199641A (en) * | 2014-08-04 | 2014-12-10 | 联想(北京)有限公司 | Information processing method and first electronic equipment |
CN104408378A (en) * | 2014-12-02 | 2015-03-11 | 百度在线网络技术(北京)有限公司 | Method and device for protecting private data |
CN105260666A (en) * | 2015-09-28 | 2016-01-20 | 小米科技有限责任公司 | Password unlocking method and apparatus |
CN106600082A (en) * | 2015-10-14 | 2017-04-26 | 阿里巴巴集团控股有限公司 | Processing method and device of task in service system, and service system construction system |
CN106528141A (en) * | 2016-10-28 | 2017-03-22 | 宇龙计算机通信科技(深圳)有限公司 | Task sweep-out method and system |
CN106528141B (en) * | 2016-10-28 | 2019-06-11 | 宇龙计算机通信科技(深圳)有限公司 | Task sweep-out method and system |
CN106572523A (en) * | 2016-10-31 | 2017-04-19 | 宇龙计算机通信科技(深圳)有限公司 | Operation control method and device of application and terminal |
CN106572523B (en) * | 2016-10-31 | 2022-04-19 | 宇龙计算机通信科技(深圳)有限公司 | Application program operation control method and device and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN103324867B (en) | 2016-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103324867A (en) | Terminal and application program management method | |
CN103077356B (en) | Protecting and tracking method for primary information of mobile terminal based on user behavior pattern | |
CN106453874B (en) | Mobile phone control method and system | |
CN103827878B (en) | Automate Password Management | |
CN102760042A (en) | Method and system for carrying out unlocking based on picture face identification, and electronic device | |
BRPI0916193B1 (en) | METHOD TO ALLOW A LOCATION OF THE USER'S COMPUTING DEVICE TO BE MONITORED FROM A REMOTE LOCATION, MEDIA READABLE BY COMPUTER AND SYSTEM FOR THE PROTECTION OF PRIVATE DATA WHILE MONITORING AN ELECTRONIC DEVICE | |
US20050204173A1 (en) | Method for automatically filling in user data using fingerprint identification | |
CN102110320A (en) | Coerce alarm method and entrance guard control equipment in entrance guard system | |
CN102842007A (en) | Access control method and system of mobile terminal application program | |
CN103116924B (en) | Electronic lock system based on images and mobile communication network | |
CN104954534B (en) | Control method, device and the corresponding communication terminal of communication terminal | |
CN102722427A (en) | Data information backup method and data information backup system | |
CN204731808U (en) | A kind of dining room meal card system based on recognition of face | |
CN107578506A (en) | The control method and device of internet-of-things terminal | |
Parvez et al. | Framework of digital forensics for the Samsung Star Series phone | |
CN110489984A (en) | Based reminding method, device, computer equipment and the storage medium of backlog | |
WO2014198643A1 (en) | Biometric identification method | |
CN111368620B (en) | Method and device for identifying target attention object and storage medium | |
CN103996035A (en) | Passenger security check identity certification product | |
CN101651742A (en) | Method and system for monitoring mobile phone | |
CN108287988A (en) | Safety management system and method for mobile terminal document | |
CN105516500B (en) | Method and system for selecting equipment mode | |
CN114268461A (en) | User identity authentication method, device, server, terminal and storage medium | |
CN109873747B (en) | Electronic device and unlocking method thereof | |
CN106874718A (en) | privacy processing method, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |