CN105426703A - Application processing method and apparatus - Google Patents
Application processing method and apparatus Download PDFInfo
- Publication number
- CN105426703A CN105426703A CN201510727156.4A CN201510727156A CN105426703A CN 105426703 A CN105426703 A CN 105426703A CN 201510727156 A CN201510727156 A CN 201510727156A CN 105426703 A CN105426703 A CN 105426703A
- Authority
- CN
- China
- Prior art keywords
- application program
- limited
- restrain
- ways
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title abstract 2
- 238000000034 method Methods 0.000 claims abstract description 29
- 230000002452 interceptive effect Effects 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 10
- 238000001514 detection method Methods 0.000 claims description 7
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 7
- 230000000903 blocking effect Effects 0.000 claims description 6
- 230000000694 effects Effects 0.000 description 8
- 230000004044 response Effects 0.000 description 4
- 230000001143 conditioned effect Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1015—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Stored Programmes (AREA)
Abstract
Embodiments of the invention provide an application processing method and apparatus. In one aspect, the method provided by the embodiments of the invention comprises: determining a currently started application of a terminal, then, detecting whether use of the application is restricted; and further, if the use of the application is restricted, acquiring a restriction mode of the application, and performing a use restriction operation corresponding to the restriction mode on the application. Therefore, according to the technical scheme provided by the embodiments of the invention, a plurality of restriction modes can be realized; and use restriction control of the application is performed according to the restriction modes, so that the problem of relatively poor flexibility and reliability of restricting use of the application in the prior art can be solved.
Description
[technical field]
The present invention relates to field of computer technology, particularly relate to a kind of disposal route and device of application program.
[background technology]
Along with the continuous intellectuality of terminal and the constantly universal of development of Mobile Internet technology, occurred a large amount of application programs, user's most of the time every day is all shared by the various application programs in terminal.At present, along with the kind of application program in terminal gets more and more, quantity gets more and more, and user more and more payes attention to the secret protection of application program in terminal.
In prior art; the secret protection mode of the application program generally adopted is: when user opens the application program being limited to use in the terminal; need the correct password of input can continue to use this application program, thus realize the secret protection of application programs.But in the secret protection mode of this application programs, dirigibility and the Reliability comparotive of application programs restriction use are poor.
[summary of the invention]
In view of this, embodiments provide a kind of disposal route and device of application program, multiple ways to restrain can be realized, and carry out the restriction use control of application program according to ways to restrain, thus the dirigibility of application programs restriction use and the problem of Reliability comparotive difference in prior art can be solved.
The one side of the embodiment of the present invention, provides a kind of disposal route of application program, comprising:
Determine the application program of the current startup of terminal;
Detect described application program whether to be limited to use;
If described application program is limited to use, obtain the ways to restrain of described application program;
The described application program execution restriction corresponding with described ways to restrain is used and operates.
Aspect as above and arbitrary possible implementation, a kind of implementation is provided further, before whether the described application program of described detection is limited to use, described method also comprises: bag name needs being limited the application program used adds the privacy the application list preset in described terminal to;
Whether the described application program of described detection is limited to use, and comprising: according to the bag name of described application program, mates in privacy the application list of described terminal; If there is the bag name of described application program in described privacy the application list, determine that described application program is limited to use.
Aspect as above and arbitrary possible implementation, provide a kind of implementation further, described method also comprises:
If there is not the bag name of described application program in described privacy the application list, determine that described application program is not limited to start.
Aspect as above and arbitrary possible implementation, provide a kind of implementation further, and described ways to restrain is camouflage mode, uses and operate, comprising the described application program execution restriction corresponding with described ways to restrain:
In described terminal, start a blank window, described blank window is for blocking the interactive window of the described application program of the current display of described terminal;
Control described terminal and return desktop by the described blank window shown.
Aspect as above and arbitrary possible implementation, provide a kind of implementation further, and described ways to restrain is pin mode, uses and operate, comprising the described application program execution restriction corresponding with described ways to restrain:
Display Password Input frame;
Described Password Input frame is utilized to receive the password of user's input;
If the preset password of the password that described user inputs and described application program is inconsistent, forbid that described user uses described application program.
The one side of the embodiment of the present invention, provides a kind for the treatment of apparatus of application program, comprising:
Determining unit, for determining the application program of the current startup of terminal;
Whether detecting unit, be limited to use for detecting described application program;
Acquiring unit, if be limited to use for described application program, obtains the ways to restrain of described application program;
Processing unit, operates for using the described application program execution restriction corresponding with described ways to restrain.
Aspect as above and arbitrary possible implementation, provide a kind of implementation further, described device also comprises: dispensing unit, for will the bag name being limited the application program used be needed to add the privacy the application list preset in described terminal to;
Described detecting unit, specifically for: according to the bag name of described application program, mate in privacy the application list of described terminal; If there is the bag name of described application program in described privacy the application list, determine that described application program is limited to use.
Aspect as above and arbitrary possible implementation, provide a kind of implementation, described detecting unit further, also for:
If there is not the bag name of described application program in described privacy the application list, determine that described application program is not limited to start.
Aspect as above and arbitrary possible implementation, provide a kind of implementation further, and described ways to restrain is camouflage mode, described processing unit, specifically for:
In described terminal, start a blank window, described blank window is for blocking the interactive window of the described application program of the current display of described terminal;
Control described terminal and return desktop by the described blank window shown.
Aspect as above and arbitrary possible implementation, provide a kind of implementation further, and described ways to restrain is pin mode, described processing unit, specifically for:
Display Password Input frame;
Described Password Input frame is utilized to receive the password of user's input;
If the preset password of the password that described user inputs and described application program is inconsistent, forbid that described user uses described application program.
As can be seen from the above technical solutions, the embodiment of the present invention has following beneficial effect:
The technical scheme that the embodiment of the present invention provides can realize multiple ways to restrain; and the restriction use control of application program is carried out according to ways to restrain; with only have compared with a kind of secret protection mode in prior art; the embodiment of the present invention application programs can perform different restriction use operations flexibly, thus the dirigibility that the restriction that can improve application program uses.In addition, in the technical scheme that the embodiment of the present invention provides, multiple ways to restrain can be utilized to ensure the privacy of application program, compared with prior art, the reliability that the privacy that the embodiment of the present invention improves application program ensures.Therefore, the embodiment of the present invention can solve the dirigibility of application programs restriction use and the problem of Reliability comparotive difference in prior art.
[accompanying drawing explanation]
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the disposal route of the application program that the embodiment of the present invention provides;
Fig. 2 is the functional block diagram of the treating apparatus of the application program that the embodiment of the present invention provides.
[embodiment]
Technical scheme for a better understanding of the present invention, is described in detail the embodiment of the present invention below in conjunction with accompanying drawing.
Should be clear and definite, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
The term used in embodiments of the present invention is only for the object describing specific embodiment, and not intended to be limiting the present invention." one ", " described " and " being somebody's turn to do " of the singulative used in the embodiment of the present invention and appended claims is also intended to comprise most form, unless context clearly represents other implications.
Should be appreciated that term "and/or" used herein is only a kind of incidence relation describing affiliated partner, can there are three kinds of relations in expression, and such as, A and/or B, can represent: individualism A, exists A and B simultaneously, these three kinds of situations of individualism B.In addition, character "/" herein, general expression forward-backward correlation is to the relation liking a kind of "or".
Depend on linguistic context, word as used in this " if " can be construed as into " ... time " or " when ... time " or " in response to determining " or " in response to detection ".Similarly, depend on linguistic context, phrase " if determination " or " if detecting (the conditioned disjunction event of statement) " can be construed as " when determining " or " in response to determining " or " when detecting (the conditioned disjunction event of statement) " or " in response to detection (the conditioned disjunction event of statement) ".
The embodiment of the present invention provides a kind of disposal route of application program, please refer to Fig. 1, the schematic flow sheet of the disposal route of its application program provided for the embodiment of the present invention, and as shown in the figure, the method comprises the following steps:
S101, determines the application program of the current startup of terminal.
Whether S102, detect described application program and be limited to use.
S103, if described application program is limited to use, obtains the ways to restrain of described application program.
S104, uses the described application program execution restriction corresponding with described ways to restrain and operates.
It should be noted that, terminal involved in the embodiment of the present invention can include but not limited to personal computer (PersonalComputer, PC), personal digital assistant (PersonalDigitalAssistant, PDA), radio hand-held equipment, panel computer (TabletComputer), mobile phone, MP3 player, MP4 player etc.
It should be noted that, the executive agent of S101 ~ S104 can be the treating apparatus of application program, this device can be positioned at the application of local terminal, or can also for being arranged in plug-in unit or the SDK (Software Development Kit) (SoftwareDevelopmentKit of the application of local terminal, the functional unit such as SDK), the embodiment of the present invention is not particularly limited this.
Be understandable that, described application can be mounted in the application program (nativeApp) in terminal, or can also be a web page program (webApp) of browser in terminal, and the embodiment of the present invention does not limit this.
Be Android operation system for the operating system of described terminal, determine that the method for the application program of the current startup of terminal can include but not limited to: the application program that can be detected the current startup of described terminal by the mode of the current Activity assembly foremost of terminal described in poll.
Be understandable that, in Android operation system, Activity assembly is an application component, and in order to provide an interactive interface, it is mutual that user completes with application program by this interactive interface.After a new Activity assembly starts, will be presented at screen foremost, be in as seen also can with the state of activation of user interactions.Therefore, in the embodiment of the present invention, by the current Activity assembly foremost of terminal described in poll, the application program of the current startup of terminal can be determined.
Alternatively, in one of the present embodiment possible implementation, before whether the described application program of detection is limited to use, can the bag name being limited the application program used will be needed in advance to add the privacy the application list preset in described terminal to.
In a concrete implementation procedure, in described terminal, a privacy software can be installed in advance, this privacy software can receive user add needs be limited use application program, like this, for the application program needing to be limited to use, will be limited to use if started from desktop, but for the owner user of described terminal, know the application program that can start from privacy software and be limited to use, therefore, can realize needing the restriction being limited the application program used to use, and not affect owner user and use this application program.In addition, the bag name being limited the application program used can be added in privacy the application list of maintenance by described privacy software.
Illustrate, detect described application program whether be limited use method can include but not limited to:
After the application program determining the current startup of terminal, according to the bag name of this application program, mate in the privacy the application list safeguarded in described privacy software.If the bag name of described application program has corresponding matching result in described therefore the application list, the bag name that there is described application program in described privacy the application list is described, then determines that described application program is limited to use.Otherwise, if the bag name of described application program does not have corresponding matching result in described therefore the application list, the bag name that there is not described application program in described privacy the application list is described, then determines that described application program is not limited to start.
Further, if determine that described application program is limited to use, perform S103 and S104, obtain the ways to restrain of described application program, and the restriction corresponding with described ways to restrain is performed to described application program use and operate.Otherwise if determine that described application program is not limited to start, illustrate and do not need to limit described application program launching, then can directly start described application program, user can normally use described application program.
In the embodiment of the present invention, described ways to restrain can include but not limited to camouflage mode and pin mode.
Illustrate, when described application program is limited to use, the method obtaining the ways to restrain of described application program can include but not limited to:
First, whether the ways to restrain judging described application program is described camouflage mode.If so, then determine that the ways to restrain of described application program is camouflage mode.Otherwise, if not, then think that the ways to restrain of described application program is pin mode.
Whether, in a concrete implementation procedure, can be confined application deployment ways to restrain in advance in described privacy software, like this, can be described camouflage mode according to the ways to restrain checking described application program in described privacy software.
Illustrate, if described ways to restrain is camouflage mode, the restriction corresponding with described ways to restrain is performed to described application program and uses the method operated to include but not limited to:
In described terminal, start a blank window, described blank window is for blocking the interactive window of the described application program of the current display of described terminal; Then, control described terminal and return desktop by the described blank window shown.
Such as, be Android operation system for the operating system of described terminal, can start a new Activity assembly, this Activity assembly provides a blank window, and this blank window will shelter from the interactive window showing described application program like this.Then, control described Activity assembly and return desktop.Like this, described terminal returns desktop by showing described blank window, the interactive window that described blank window is sheltered from cannot show, thus realizes the described restriction performed described application program to use operation, the effect of the described application program launching failure that disguises oneself as.
It should be noted that, in the embodiment of the present invention, can support that the ways to restrain of camouflage mode uses to the restriction realizing application programs, such user will think it is that application program occurs abnormal and starts unsuccessfully, can not think because this application program is limited to use so just cannot start this application program.This ways to restrain is compared with pin mode, and this is the application program being limited to use to avoid allowing user learn, thus avoids user and utilize illegal means to start this application program, thus improves the safety and reliability of the secret protection of application program.And, avoid owing to allowing user learn that this is by the application program that uses and the embarrassment brought, thus solve the poor problem of Consumer's Experience.
Illustrate, if ways to restrain is pin mode, the restriction corresponding with described ways to restrain is performed to described application program and uses the method operated to include but not limited to:
Display Password Input frame; Then, described Password Input frame is utilized to receive the password of user's input.If the preset password of the password that described user inputs and described application program is inconsistent, forbid that described user uses described application program.
In a concrete implementation procedure, when the password of user's input and the preset password of described application program are inconsistent, the information of code error can be shown, and forbids that described user uses described application program.Or, also can show the information starting application program failure, and forbid that described user uses described application program.
The embodiment of the present invention provides the device embodiment realizing each step and method in said method embodiment further.
Please refer to Fig. 2, the functional block diagram of the treating apparatus of its application program provided for the embodiment of the present invention.As shown in the figure, this device comprises:
Determining unit 21, for determining the application program of the current startup of terminal;
Whether detecting unit 22, be limited to use for detecting described application program;
Acquiring unit 23, if be limited to use for described application program, obtains the ways to restrain of described application program;
Processing unit 24, operates for using the described application program execution restriction corresponding with described ways to restrain.
Optionally, described device also comprises: dispensing unit 25, for will the bag name being limited the application program used be needed to add the privacy the application list preset in described terminal to;
Described detecting unit 22, specifically for: according to the bag name of described application program, mate in privacy the application list of described terminal; If there is the bag name of described application program in described privacy the application list, determine that described application program is limited to use.
Optionally, described detecting unit 22, also for: if there is not the bag name of described application program in described privacy the application list, determine described application program be not limited start.
In a concrete implementation procedure, described ways to restrain is camouflage mode, described processing unit 24, specifically for: in described terminal, start a blank window, described blank window is for blocking the interactive window of the described application program of the current display of described terminal; Control described terminal and return desktop by the described blank window shown.
In a concrete implementation procedure, described ways to restrain is pin mode, described processing unit 24, specifically for:
Display Password Input frame;
Described Password Input frame is utilized to receive the password of user's input;
If the preset password of the password that described user inputs and described application program is inconsistent, forbid that described user uses described application program.
Because each unit in the present embodiment can perform the method shown in Fig. 1, the part that the present embodiment is not described in detail, can with reference to the related description to Fig. 1.
The technical scheme of the embodiment of the present invention has following beneficial effect:
In the embodiment of the present invention, by determining the application program of the current startup of terminal; Thus, detect described application program and whether be limited to use; And then, if described application program is limited to use, obtain the ways to restrain of described application program, and, the described application program execution restriction corresponding with described ways to restrain is used and operates.
The technical scheme that the embodiment of the present invention provides can realize multiple ways to restrain; and the restriction use control of application program is carried out according to ways to restrain; with only have compared with a kind of secret protection mode in prior art; the embodiment of the present invention application programs can perform different restriction use operations flexibly, thus the dirigibility that the restriction that can improve application program uses.In addition, in the technical scheme that the embodiment of the present invention provides, multiple ways to restrain can be utilized to ensure the privacy of application program, compared with prior art, the reliability that the privacy that the embodiment of the present invention improves application program ensures.Therefore, the embodiment of the present invention can solve the dirigibility of application programs restriction use and the problem of Reliability comparotive difference in prior art.
In the embodiment of the present invention; the restriction that the ways to restrain of camouflage can be utilized to realize application program uses and controls, and improves the disguise of the secret protection of application program, thus improves the security of the secret protection of application program; and avoid user awkward, bring good experience to user.
Those skilled in the art can be well understood to, and for convenience and simplicity of description, the system of foregoing description, the specific works process of device and unit, with reference to the corresponding process in preceding method embodiment, can not repeat them here.
In several embodiment provided by the present invention, should be understood that, disclosed system, apparatus and method, can realize by another way.Such as, device embodiment described above is only schematic, such as, the division of described unit, is only a kind of logic function and divides, and actual can have other dividing mode when realizing, such as, multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical, machinery or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form that hardware also can be adopted to add SFU software functional unit realizes.
The above-mentioned integrated unit realized with the form of SFU software functional unit, can be stored in a computer read/write memory medium.Above-mentioned SFU software functional unit is stored in a storage medium, comprising some instructions in order to make a computer installation (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the part steps of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (Read-OnlyMemory, ROM), random access memory (RandomAccessMemory, RAM), magnetic disc or CD etc. various can be program code stored medium.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within the scope of protection of the invention.
Claims (10)
1. a disposal route for application program, is characterized in that, described method comprises:
Determine the application program of the current startup of terminal;
Detect described application program whether to be limited to use;
If described application program is limited to use, obtain the ways to restrain of described application program;
The described application program execution restriction corresponding with described ways to restrain is used and operates.
2. method according to claim 1, is characterized in that,
Before whether the described application program of described detection is limited to use, described method also comprises: bag name needs being limited the application program used adds the privacy the application list preset in described terminal to;
Whether the described application program of described detection is limited to use, and comprising: according to the bag name of described application program, mates in privacy the application list of described terminal; If there is the bag name of described application program in described privacy the application list, determine that described application program is limited to use.
3. method according to claim 2, is characterized in that, described method also comprises:
If there is not the bag name of described application program in described privacy the application list, determine that described application program is not limited to start.
4. method according to claim 1, is characterized in that, described ways to restrain is camouflage mode, uses and operates, comprising the described application program execution restriction corresponding with described ways to restrain:
In described terminal, start a blank window, described blank window is for blocking the interactive window of the described application program of the current display of described terminal;
Control described terminal and return desktop by the described blank window shown.
5. method according to claim 1, is characterized in that, described ways to restrain is pin mode, uses and operates, comprising the described application program execution restriction corresponding with described ways to restrain:
Display Password Input frame;
Described Password Input frame is utilized to receive the password of user's input;
If the preset password of the password that described user inputs and described application program is inconsistent, forbid that described user uses described application program.
6. a treating apparatus for application program, is characterized in that, described device comprises:
Determining unit, for determining the application program of the current startup of terminal;
Whether detecting unit, be limited to use for detecting described application program;
Acquiring unit, if be limited to use for described application program, obtains the ways to restrain of described application program;
Processing unit, operates for using the described application program execution restriction corresponding with described ways to restrain.
7. device according to claim 6, is characterized in that,
Described device also comprises: dispensing unit, for will the bag name being limited the application program used be needed to add the privacy the application list preset in described terminal to;
Described detecting unit, specifically for: according to the bag name of described application program, mate in privacy the application list of described terminal; If there is the bag name of described application program in described privacy the application list, determine that described application program is limited to use.
8. device according to claim 7, is characterized in that, described detecting unit, also for:
If there is not the bag name of described application program in described privacy the application list, determine that described application program is not limited to start.
9. device according to claim 6, is characterized in that, described ways to restrain is camouflage mode, described processing unit, specifically for:
In described terminal, start a blank window, described blank window is for blocking the interactive window of the described application program of the current display of described terminal;
Control described terminal and return desktop by the described blank window shown.
10. device according to claim 6, is characterized in that, described ways to restrain is pin mode, described processing unit, specifically for:
Display Password Input frame;
Described Password Input frame is utilized to receive the password of user's input;
If the preset password of the password that described user inputs and described application program is inconsistent, forbid that described user uses described application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510727156.4A CN105426703A (en) | 2015-10-30 | 2015-10-30 | Application processing method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510727156.4A CN105426703A (en) | 2015-10-30 | 2015-10-30 | Application processing method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105426703A true CN105426703A (en) | 2016-03-23 |
Family
ID=55504911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510727156.4A Pending CN105426703A (en) | 2015-10-30 | 2015-10-30 | Application processing method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105426703A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049610A1 (en) * | 2016-09-14 | 2018-03-22 | 北京小米移动软件有限公司 | Permission control method and device |
CN109511013A (en) * | 2018-11-09 | 2019-03-22 | 四川长虹电器股份有限公司 | The method of android system starting application |
CN109800566A (en) * | 2017-11-16 | 2019-05-24 | 中移(杭州)信息技术有限公司 | A kind of management-control method of application program, device and equipment |
CN114859874A (en) * | 2022-07-06 | 2022-08-05 | 深圳市星卡软件技术开发有限公司 | Closed system based on automobile diagnosis and use method thereof |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103336924A (en) * | 2013-07-03 | 2013-10-02 | 上海斐讯数据通信技术有限公司 | Starting lock for mobile terminal application program |
CN103761473A (en) * | 2013-12-12 | 2014-04-30 | 北京宝利明威软件技术有限公司 | Application management system and method for mobile terminal |
US20150033361A1 (en) * | 2013-07-24 | 2015-01-29 | Korea Advanced Institute Of Science And Technology | Method for Invoking Application in Screen Lock Environment |
CN104820540A (en) * | 2015-05-20 | 2015-08-05 | 北京奇虎科技有限公司 | Mobile terminal and software management method thereof |
-
2015
- 2015-10-30 CN CN201510727156.4A patent/CN105426703A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103336924A (en) * | 2013-07-03 | 2013-10-02 | 上海斐讯数据通信技术有限公司 | Starting lock for mobile terminal application program |
US20150033361A1 (en) * | 2013-07-24 | 2015-01-29 | Korea Advanced Institute Of Science And Technology | Method for Invoking Application in Screen Lock Environment |
CN103761473A (en) * | 2013-12-12 | 2014-04-30 | 北京宝利明威软件技术有限公司 | Application management system and method for mobile terminal |
CN104820540A (en) * | 2015-05-20 | 2015-08-05 | 北京奇虎科技有限公司 | Mobile terminal and software management method thereof |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018049610A1 (en) * | 2016-09-14 | 2018-03-22 | 北京小米移动软件有限公司 | Permission control method and device |
CN109800566A (en) * | 2017-11-16 | 2019-05-24 | 中移(杭州)信息技术有限公司 | A kind of management-control method of application program, device and equipment |
CN109800566B (en) * | 2017-11-16 | 2021-03-05 | 中移(杭州)信息技术有限公司 | Application program control method, device and equipment |
CN109511013A (en) * | 2018-11-09 | 2019-03-22 | 四川长虹电器股份有限公司 | The method of android system starting application |
CN114859874A (en) * | 2022-07-06 | 2022-08-05 | 深圳市星卡软件技术开发有限公司 | Closed system based on automobile diagnosis and use method thereof |
CN114859874B (en) * | 2022-07-06 | 2022-11-01 | 深圳市星卡软件技术开发有限公司 | Closed system based on automobile diagnosis and use method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170185461A1 (en) | Fast switching method, device and terminal of dual system | |
CN106445309B (en) | Application download entry display method and device | |
CN107145782B (en) | Abnormal application program identification method, mobile terminal and server | |
EP2428890A1 (en) | Mobile terminal and method of operating the same, and identify module card | |
CN105426703A (en) | Application processing method and apparatus | |
CN101604223A (en) | A kind of unlock method of touch-screen, system and touch panel device | |
CN109947449B (en) | System upgrading method and device, storage medium and electronic equipment | |
CN103309561A (en) | Method and device for processing information | |
CN105574403A (en) | Application control method and terminal | |
CN110598384B (en) | Information protection method, information protection device and mobile terminal | |
CN105303100A (en) | Verification method and device of application program startup | |
CN108509291B (en) | Application program is operating abnormally restorative procedure and system and mobile terminal | |
CN104580378A (en) | Installation package processing method and device | |
CN111427803A (en) | Automated random test method, apparatus, computer device and medium | |
CN104769601A (en) | Method for recognition of user identity and electronic equipment | |
CN102736954A (en) | Addressing system degradation by application disabling | |
CN105376719A (en) | Information pushing method and device | |
CN108737638A (en) | Application control method, apparatus, mobile terminal and computer-readable medium | |
CN104881224A (en) | Method and device for adding cards | |
CN104750575A (en) | Restoring method and device for mobile terminal operating system | |
CN104915228A (en) | Application program language setting method and device | |
CN104732165A (en) | Management method of applications and terminal | |
CN105354704A (en) | Resource processing method, apparatus and system | |
KR101595936B1 (en) | Optimization method, optimization server and computer readable recording medium for providing service with vaccine and optimization functions | |
CN112286414A (en) | Information display method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160323 |