CN106022101B - application management method and terminal - Google Patents

application management method and terminal Download PDF

Info

Publication number
CN106022101B
CN106022101B CN201610327920.3A CN201610327920A CN106022101B CN 106022101 B CN106022101 B CN 106022101B CN 201610327920 A CN201610327920 A CN 201610327920A CN 106022101 B CN106022101 B CN 106022101B
Authority
CN
China
Prior art keywords
target application
terminal
application
notification
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610327920.3A
Other languages
Chinese (zh)
Other versions
CN106022101A (en
Inventor
林志泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610327920.3A priority Critical patent/CN106022101B/en
Publication of CN106022101A publication Critical patent/CN106022101A/en
Application granted granted Critical
Publication of CN106022101B publication Critical patent/CN106022101B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/26Power supply means, e.g. regulation thereof
    • G06F1/32Means for saving power
    • G06F1/3203Power management, i.e. event-based initiation of a power-saving mode
    • G06F1/3234Power saving characterised by the action undertaken
    • G06F1/329Power saving characterised by the action undertaken by task scheduling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

the embodiment of the invention provides an application management method and a terminal, wherein the method comprises the following steps: a terminal acquires a target application with a system notification read permission, and the system triggers the target application to start when a new notification appears; the terminal acquires the application package name of the target application, judges whether the target application meets a preset condition according to the package name of the target application, and if the target application meets the preset condition, the terminal can close the notification reading permission of the target application, so that the terminal system does not trigger the target application to start any more when a new notification appears. The embodiment of the invention can effectively limit the starting of the application and the monitoring action of the system and improve the safety of the system.

Description

Application management method and terminal
Technical Field
The invention relates to the technical field of electronics, in particular to an application management method and a terminal.
background
with the rapid development of communication technology and mobile internet technology, terminals such as smart phones and tablet computers are very popular, and users can conveniently perform activities such as friend making, entertainment and office by installing various applications on the terminals. However, these applications are likely to frequently run in the background in a stolen manner, and monitor the operation behavior of the user, and even read the privacy information of the user and the stolen running flow, for example, the application obtains the notification reading permission of the system, so that the system directly triggers the application to start when there is a new notification, which not only greatly increases the power consumption of the terminal, but also reduces the security of the terminal system, and seriously affects the user experience of the terminal.
Disclosure of Invention
the embodiment of the invention provides an application management method and a terminal, which can effectively limit the starting of an application and the monitoring action of a system and improve the safety of the system.
A first aspect of an embodiment of the present invention provides an application management method, including:
The terminal acquires a target application with a notification reading permission of the terminal system;
The terminal judges whether the target application meets a preset condition or not according to the packet name of the target application;
if yes, the terminal closes the notification reading permission of the target application, so that the terminal system does not trigger the target application to start any more when a new notification appears.
Optionally, the determining, by the terminal, whether the target application meets a preset condition according to the packet name of the target application includes:
The terminal judges whether the packet name of the target application exists in a preset blacklist or not, and determines that the target application meets a preset condition when the packet name of the target application exists in the preset blacklist.
Optionally, the determining, by the terminal, whether the target application meets a preset condition according to the packet name of the target application includes:
the terminal judges whether the packet name of the target application exists in a preset white list or not, and determines that the target application meets a preset condition when the packet name of the target application does not exist in the preset white list.
Optionally, the closing, by the terminal, the notification read permission of the target application includes:
And the terminal closes the notification reading permission of the target application by calling a forced closing process forceStopPapackage function in an activity manager service ActivityManagerService.
optionally, the closing, by the terminal, the notification read permission of the target application includes:
The terminal reads a system setting database of the terminal, and the system setting database stores a package name of an application with a notification reading authority of the terminal system;
and the terminal deletes the packet name of the target application from the system setting database so as to close the notification reading permission of the target application.
optionally, the name of the application package included in the preset blacklist is determined by the terminal, or is specified by a user, or is pushed by the cloud server.
Optionally, the application package name included in the preset white list is determined by the terminal, or specified by a user, or pushed by a cloud server.
A second aspect of an embodiment of the present invention provides a terminal, including:
A first acquisition unit, configured to acquire a target application having a notification read permission of the terminal system;
the judging unit is used for judging whether the target application meets a preset condition or not according to the packet name of the target application;
And the closing unit is used for closing the notification reading permission of the target application when the judgment result of the judging unit is yes, so that the terminal system does not trigger the target application to start any more when a new notification appears.
optionally, the specific manner of determining, by the determining unit, whether the target application satisfies the preset condition according to the package name of the target application is as follows:
And judging whether the packet name of the target application exists in a preset blacklist, and determining that the target application meets a preset condition when the packet name of the target application exists in the preset blacklist.
Optionally, the specific manner of determining, by the determining unit, whether the target application satisfies the preset condition according to the package name of the target application is as follows:
Judging whether the packet name of the target application exists in a preset white list or not, and determining that the target application meets a preset condition when the packet name of the target application does not exist in the preset white list.
Optionally, the specific manner of closing the notification read permission of the target application by the closing unit is as follows:
And closing the notification read permission of the target application by calling a forced closing process forceStopPackage function in an activity manager service ActivityManagerService.
Optionally, the closing unit includes:
A second obtaining unit, configured to read a system setting database of the terminal, where the system setting database stores a package name of an application having a notification read permission of the terminal system;
and the deleting unit is used for deleting the packet name of the target application from the system setting database so as to close the notification reading permission of the target application.
Optionally, the method further includes:
the determining unit is used for determining the application package name included in the preset blacklist;
Alternatively, the first and second electrodes may be,
the name of the application package included in the preset blacklist is specified by a user;
alternatively, the first and second electrodes may be,
and the application package name included in the preset blacklist is pushed by the cloud server.
optionally, the method further includes:
The determining unit is used for determining the application package name included in the preset white list;
alternatively, the first and second electrodes may be,
The name of the application package included in the preset white list is specified by a user;
Alternatively, the first and second electrodes may be,
And the application package name included in the preset white list is pushed by the cloud server.
A third aspect of an embodiment of the present invention provides a terminal, including:
The system comprises a processor, a memory and a bus, wherein the processor and the memory are connected through the bus and complete mutual communication;
The memory stores executable program code, and the processor is configured to call the executable program code in the memory to perform the method according to the first aspect.
in the embodiment of the invention, a terminal acquires a target application with a system notification read permission, and the system triggers the target application to start when a new notification appears; the terminal acquires the application package name of the target application, judges whether the target application meets the preset condition or not according to the package name of the target application, and if the target application meets the preset condition, the terminal can close the notification reading permission of the target application, so that the terminal system does not trigger the start of the target application any more when a new notification appears, the start of the application and the monitoring behavior of the system can be effectively limited, and the safety of the system is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a first embodiment of an application management method according to an embodiment of the present invention;
Fig. 2 is a flowchart illustrating a second embodiment of an application management method according to an embodiment of the present invention;
Fig. 3 is a schematic structural diagram of a terminal according to a first embodiment of the present invention;
Fig. 4 is a schematic structural diagram of a terminal according to a second embodiment of the present invention;
Fig. 5 is a schematic structural diagram of a terminal according to a third embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
the terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The terminal in the embodiment of the present invention may include a smart phone, a tablet computer, a palm computer, a notebook computer, a Mobile Internet Device (MID) or a wearable device, and the like, which are merely examples and are not exhaustive, and include but are not limited to the above terminals.
in the Android system, the NOTIFICATION read permission described in the embodiment of the present invention is "Android. Specifically, the application needs to monitor the notification message of the system through a service of the service, and register the service in the notification management service of the system, and the system starts the notification reading authority of each application in a default condition, so that the notification management service of the system can call back the service for monitoring the notification message of the system when a new notification occurs, and if the process of the application is not started at this time, the notification management service of the system can trigger the process of the application to be started, and the application can perform background self-starting through the principle, so as to keep the process of the application resident.
Fig. 1 is a schematic flowchart illustrating an application management method according to a first embodiment of the present invention. The application management method described in this embodiment includes the following steps:
101. and the terminal acquires the target application with the notification reading authority of the terminal system.
specifically, the package name of the application having the notification read authority of the terminal system may be stored in a system setting database of the terminal, and the terminal reads the system setting database to obtain the package name of the target application currently having the notification read authority of the terminal system.
102. The terminal judges whether the target application meets a preset condition according to the packet name of the target application, if so, the step 103 is executed; if not, the process is ended.
the preset condition is used for judging whether an application should be closed to inform the reading permission, if an application meets the preset condition, the application should be closed to inform the reading permission, for example, the application may be in the form of a blacklist, the application belonging to the blacklist should be closed to inform the reading permission owned by the application, the terminal may be provided with a blacklist adding rule, the blacklist adding rule may include that the use frequency is lower than the preset value, the security performance is poor (for example, a plug-in such as advertisement and fishing is attached), the source is not clear, and the like, and the terminal adds the packet name of the application conforming to one or more of the blacklist adding rules to the blacklist by analyzing the installed application.
specifically, the terminal determines whether the packet name of the target application exists in the blacklist, determines that the notification read permission of the target application needs to be closed if the packet name of the target application exists in the blacklist, and executes step S103.
In some possible embodiments, the preset condition may also be in the form of a white list, applications not belonging to the white list should be closed from the owned notification reading authority, the terminal may be provided with a white list adding rule, the white list adding rule may include that the frequency of use is higher than a preset value, the security performance is high (for example, no advertisement, phishing, and the like are attached), the source is a regular application market, and the like, and the terminal adds packet names of applications meeting one or more of the white list adding rules to the white list by parsing the installed applications.
Further, the terminal determines whether the packet name of the target application exists in the white list, and if the packet name of the target application does not exist in the white list, determines that the notification read permission of the target application needs to be closed, and executes step S103.
In some possible embodiments, the packet names of all applications or non-system applications on the terminal may be added to the black list, or the white list may default to be empty or only include the packet names of the system applications, that is, all applications or non-system applications on the terminal should be closed to notify the reading authority.
It should be noted that the black list or the white list may also be set by the user according to experience or a prompt of the terminal, or may also be set by the cloud server and then pushed to the terminal. In addition, the application package name can be added or deleted according to the actual situation for the black list or the white list.
103. And the terminal closes the notification reading permission of the target application, so that the terminal system does not trigger the target application to start any more when a new notification appears.
In the Android system, a forceStopPack function is provided in an activity manager service, and the forceStopPack function is mainly used for forcibly closing a process and is used as a processing function inlet of a one-key cleaning function.
specifically, the forcestoppacket function may be rewritten, and a processing function for closing the notification read permission of the application may be added, and the terminal may close the notification read permission of the target application by calling the rewritten forcestoppacket function and using the processing function for closing the notification read permission of the application. In addition, if the target application is currently in a background running state, the terminal can select to directly close the target application by using a forceStopPackage function, so that the target application is not triggered to be started any more when a new notification appears in a subsequent terminal system, and the starting of the target application and the monitoring behavior of the system are effectively limited.
In the embodiment of the invention, a terminal acquires a target application with a system notification read permission, and the system triggers the target application to start when a new notification appears; the terminal acquires the application package name of the target application, judges whether the target application meets the preset condition according to the package name of the target application, and if the target application meets the preset condition, the terminal can close the notification reading permission of the target application by calling the rewritten forceStopPackage function, so that the terminal system does not trigger the target application to start any more when a new notification is generated, the starting of the application and the monitoring behavior of the system can be effectively limited, the safety of the system is improved, and the flow and electric quantity consumption caused by frequent background running of the application can be reduced.
Please refer to fig. 2, which is a flowchart illustrating an application management method according to a second embodiment of the present invention. The application management method described in this embodiment includes the following steps:
201. And the terminal acquires the target application with the notification reading authority of the terminal system.
Specifically, the process of the terminal for notifying the read permission to close the application may be triggered by a plurality of trigger conditions, including: the method can be triggered by a user, for example, the terminal can perform a process of closing the read permission of the notification of the application when the user uses a function similar to one-touch cleaning; or, the terminal may periodically perform a procedure of notifying the read permission to close the application, for example, 1 time every 2 hours, and so on; or, the terminal continuously performs a process of notifying the read permission to close the application; or, the terminal performs a process of notifying the read permission to close the application when the operation state is not good (for example, the memory occupancy rate is too high and exceeds a preset value) or the battery power is insufficient (for example, less than or equal to 10%). Specifically, one of the trigger conditions may be used, or two or more of the above trigger conditions may be used in combination, or the selection of the trigger condition may be adjusted according to an actual situation, and the embodiment of the present invention is not limited to the trigger condition of the process of the terminal performing the notification of the application to the read permission.
202. The terminal judges whether the packet name of the target application exists in a preset blacklist, if so, steps 203 and 204 are executed; if not, the process is ended.
203. The terminal reads a system setting database of the terminal, and the system setting database stores the package name of the application with the notification reading authority of the terminal system.
204. And the terminal deletes the packet name of the target application from the system setting database so as to close the notification reading permission of the target application, so that the terminal system does not trigger the target application to start when a new notification appears.
The package name of the application with the notification read authority of the terminal system can be stored in a system setting database of the terminal, and the terminal can close the notification read authority of the application by deleting the package name of a certain application from the system setting database.
specifically, the terminal may obtain the packet name of the target application currently having the notification read permission of the terminal system by reading the system setting database, and the terminal may determine whether the packet name of the target application exists in the blacklist described in the first embodiment, and if the packet name of the target application exists in the blacklist, determine that the notification read permission of the target application needs to be closed, delete the packet name of the target application from the system setting database, and implement closing the notification read permission of the target application; or, the terminal may also determine whether the packet name of the target application exists in the white list described in the first embodiment, and if the packet name of the target application does not exist in the white list, determine that the notification reading permission of the target application needs to be closed, delete the packet name of the target application from the system setting database, and implement closing the notification reading permission of the target application, so that the terminal system does not trigger the start of the target application any more when a new notification occurs subsequently, and effectively limit the start of the target application and the monitoring behavior of the system.
in some possible embodiments, after the notification read permission of the target application is closed, when the terminal subsequently opens the target application, the target application may send a request for opening the notification read permission, a user may determine whether to allow the request according to actual requirements, if so, the target application may obtain the notification read permission of the terminal system again, and the terminal may select to move the packet name of the target application out of the blacklist or add the packet name of the target application to the whitelist.
in the embodiment of the invention, a terminal acquires a target application with a system notification read permission, and the system triggers the target application to start when a new notification appears; the terminal obtains the application package name of the target application, judges whether the package name of the target application exists in a preset blacklist, if so, the terminal reads a system setting database, deletes the package name of the target application from the system setting database, and realizes the reading permission of the notification for closing the target application, so that the terminal system does not trigger the start of the target application any more when a new notification appears, the start of the application and the monitoring action of the system can be effectively limited, the safety of the system is improved, and meanwhile, the flow and electric quantity consumption caused by frequent background running of the application can be reduced.
fig. 3 is a schematic structural diagram of a terminal according to a first embodiment of the present invention. The terminal described in this embodiment includes:
A first obtaining unit 301, configured to obtain a target application having a notification read permission of the terminal system.
A determining unit 302, configured to determine whether the target application satisfies a preset condition according to the package name of the target application.
A closing unit 303, configured to close the notification reading permission of the target application when the determination result of the determining unit is yes, so that the terminal system does not trigger the target application to start any more when a new notification occurs.
It should be noted that the functions of each unit of the terminal according to the embodiment of the present invention may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
in the embodiment of the invention, a terminal acquires a target application with a system notification read permission, and the system triggers the target application to start when a new notification appears; the terminal acquires the application package name of the target application, judges whether the target application meets the preset condition according to the package name of the target application, and if the target application meets the preset condition, the terminal can close the notification reading permission of the target application by calling the rewritten forceStopPackage function, so that the terminal system does not trigger the target application to start any more when a new notification is generated, the starting of the application and the monitoring behavior of the system can be effectively limited, the safety of the system is improved, and the flow and electric quantity consumption caused by frequent background running of the application can be reduced.
fig. 4 is a schematic structural diagram of a terminal according to a second embodiment of the present invention. The terminal described in this embodiment includes:
a first obtaining unit 401, configured to obtain a target application with a notification read permission of the terminal system.
A determining unit 402, configured to determine whether the target application satisfies a preset condition according to the package name of the target application.
A closing unit 403, configured to close the notification reading permission of the target application when the determination result of the determining unit is yes, so that the terminal system does not trigger the target application to start any more when a new notification occurs.
the closing unit 403 may specifically include:
a second obtaining unit 4030, configured to read a system setting database of the terminal, where the system setting database stores a package name of an application having a notification read authority of the terminal system.
a deleting unit 4031, configured to delete the package name of the target application from the system setting database, so as to close the notification read permission of the target application.
in some possible embodiments, the terminal further includes:
a determining unit 404, configured to determine an application package name included in the preset blacklist; or the name of the application package included in the preset blacklist is specified by a user; or the application package name included in the preset blacklist is pushed by the cloud server.
Alternatively, the first and second electrodes may be,
The determining unit 404 is configured to determine an application package name included in the preset white list; or the name of the application package included in the preset white list is specified by a user; or the application package name included in the preset white list is pushed by the cloud server.
it should be noted that the functions of each unit of the terminal according to the embodiment of the present invention may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
in the embodiment of the invention, a terminal acquires a target application with a system notification read permission, and the system triggers the target application to start when a new notification appears; the terminal obtains the application package name of the target application, judges whether the package name of the target application exists in a preset blacklist, if so, the terminal reads a system setting database, deletes the package name of the target application from the system setting database, and realizes the reading permission of the notification for closing the target application, so that the terminal system does not trigger the start of the target application any more when a new notification appears, the start of the application and the monitoring action of the system can be effectively limited, the safety of the system is improved, and meanwhile, the flow and electric quantity consumption caused by frequent background running of the application can be reduced.
Fig. 5 is a schematic structural diagram of a terminal according to a third embodiment of the present invention. The terminal described in this embodiment includes: at least one input device 501; at least one output device 502; at least one processor 503, such as a CPU; and a memory 504, the input device 501, the output device 502, the processor 503, and the memory 504 being connected by a bus 505.
The input device 501 may be a touch screen, and is configured to obtain an input touch operation.
The output device 502 may be a display screen for displaying corresponding data information. The display screen can also be integrated on the touch screen, namely the touch screen can integrate touch control and display functions.
the memory 504 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 504 is used for storing a set of program codes, and the input device 501, the output device 502 and the processor 503 are used for calling the program codes stored in the memory 504, and performing the following operations:
The processor 503 is configured to acquire a target application having a notification read permission of a terminal system, and determine whether the target application meets a preset condition according to a package name of the target application.
the processor 503 is further configured to close the notification reading permission of the target application when the target application meets the preset condition, so that the terminal system does not trigger the start of the target application any more when a new notification occurs.
in some possible embodiments, the specific way for the processor 503 to determine whether the target application satisfies the preset condition according to the package name of the target application is as follows:
and judging whether the packet name of the target application exists in a preset blacklist, and determining that the target application meets a preset condition when the packet name of the target application exists in the preset blacklist.
In some possible embodiments, the specific way for the processor 503 to determine whether the target application satisfies the preset condition according to the package name of the target application is as follows:
Judging whether the packet name of the target application exists in a preset white list or not, and determining that the target application meets a preset condition when the packet name of the target application does not exist in the preset white list.
In some possible embodiments, the specific way for the processor 503 to turn off the notification read permission of the target application is as follows:
and closing the notification read permission of the target application by calling a forced closing process forceStopPackage function in an activity manager service ActivityManagerService.
In some possible embodiments, the specific way for the processor 503 to turn off the notification read permission of the target application is as follows:
and reading a system setting database of the terminal, wherein the system setting database stores the package name of the application with the notification reading authority of the terminal system.
Deleting the package name of the target application from the system setting database so as to close the notification reading permission of the target application.
in some possible embodiments, the processor 503 is further configured to determine the application package name included in the preset blacklist, or the application package name included in the preset blacklist is specified by a user or pushed by a cloud server.
In some possible embodiments, the processor 503 is further configured to determine the application package names included in the preset white list, or the application package names included in the preset white list are specified by a user or pushed by a cloud server.
In a specific implementation, the input device 501, the output device 502, and the processor 503 described in this embodiment of the present invention may execute the implementation manners described in the first embodiment and the second embodiment of the application management method provided in this embodiment of the present invention, and may also execute the implementation manners described in the first embodiment and the second embodiment of a terminal provided in this embodiment of the present invention, which is not described again here.
in the embodiment of the invention, a terminal acquires a target application with a system notification read permission, and the system triggers the target application to start when a new notification appears; the terminal acquires the application package name of the target application, judges whether the target application meets the preset condition according to the package name of the target application, and if the target application meets the preset condition, the terminal can close the notification reading permission of the target application by calling the rewritten forceStopPackage function, so that the terminal system does not trigger the target application to start any more when a new notification is generated, the starting of the application and the monitoring behavior of the system can be effectively limited, the safety of the system is improved, and the flow and electric quantity consumption caused by frequent background running of the application can be reduced.
in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like, and may specifically be a processor in the computer device) to execute all or part of the steps of the above-described method according to the embodiments of the present invention. The storage medium may include: a U-disk, a removable hard disk, a magnetic disk, an optical disk, a Read-Only Memory (ROM) or a Random Access Memory (RAM), and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (15)

1. an application management method, comprising:
When the memory occupancy rate of the terminal exceeds a preset value, the terminal acquires a target application with a notification reading permission of the terminal system from a preset system setting database, wherein the system setting database stores a packet name of the application with the notification reading permission of the terminal system, the target application is triggered and started when the terminal system has a new notification, and the target application has the permission of acquiring and monitoring various notifications of the system;
The terminal judges whether the target application meets a preset condition or not according to the packet name of the target application;
if yes, the terminal closes the notification reading permission of the target application, so that the terminal system does not trigger the target application to start any more when a new notification appears.
2. The method according to claim 1, wherein the determining, by the terminal, whether the target application satisfies a preset condition according to the package name of the target application comprises:
The terminal judges whether the packet name of the target application exists in a preset blacklist or not, and determines that the target application meets a preset condition when the packet name of the target application exists in the preset blacklist.
3. The method according to claim 1, wherein the determining, by the terminal, whether the target application satisfies a preset condition according to the package name of the target application comprises:
The terminal judges whether the packet name of the target application exists in a preset white list or not, and determines that the target application meets a preset condition when the packet name of the target application does not exist in the preset white list.
4. The method according to any one of claims 1 to 3, wherein the terminal closing the notification read permission of the target application comprises:
and the terminal closes the notification reading permission of the target application by calling a forced closing process forceStopPapackage function in an activity manager service ActivityManagerService.
5. the method according to any one of claims 1 to 3, wherein the terminal closing the notification read permission of the target application comprises:
the terminal reads a system setting database of the terminal, and the system setting database stores a package name of an application with a notification reading authority of the terminal system;
And the terminal deletes the packet name of the target application from the system setting database so as to close the notification reading permission of the target application.
6. The method of claim 2,
the application package name included in the preset blacklist is determined by the terminal, or is specified by a user, or is pushed by a cloud server.
7. the method of claim 3,
the application package name included in the preset white list is determined by the terminal, or specified by a user, or pushed by a cloud server.
8. A terminal, comprising:
The system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a target application with a notification reading authority of the terminal system from a preset system setting database when the memory occupancy rate exceeds a preset value, the system setting database stores a packet name of the application with the notification reading authority of the terminal system, the target application is triggered and started when the terminal system has a new notification, and the target application has the authority of acquiring and monitoring various notifications of the system;
The judging unit is used for judging whether the target application meets a preset condition or not according to the packet name of the target application;
and the closing unit is used for closing the notification reading permission of the target application when the judgment result of the judging unit is yes, so that the terminal system does not trigger the target application to start any more when a new notification appears.
9. The terminal according to claim 8, wherein the determining unit determines whether the target application satisfies the preset condition according to the packet name of the target application in a specific manner:
and judging whether the packet name of the target application exists in a preset blacklist, and determining that the target application meets a preset condition when the packet name of the target application exists in the preset blacklist.
10. the terminal according to claim 8, wherein the determining unit determines whether the target application satisfies the preset condition according to the packet name of the target application in a specific manner:
Judging whether the packet name of the target application exists in a preset white list or not, and determining that the target application meets a preset condition when the packet name of the target application does not exist in the preset white list.
11. the terminal according to any one of claims 8 to 10, wherein the specific manner for the closing unit to close the notification read permission of the target application is as follows:
And closing the notification read permission of the target application by calling a forced closing process forceStopPackage function in an activity manager service ActivityManagerService.
12. A terminal according to any of claims 8 to 10, wherein the closing unit comprises:
a second obtaining unit, configured to read a system setting database of the terminal, where the system setting database stores a package name of an application having a notification read permission of the terminal system;
and the deleting unit is used for deleting the packet name of the target application from the system setting database so as to close the notification reading permission of the target application.
13. the terminal of claim 9, further comprising:
the determining unit is used for determining the application package name included in the preset blacklist;
Alternatively, the first and second electrodes may be,
the name of the application package included in the preset blacklist is specified by a user;
Alternatively, the first and second electrodes may be,
And the application package name included in the preset blacklist is pushed by the cloud server.
14. The terminal of claim 10, further comprising:
the determining unit is used for determining the application package name included in the preset white list;
alternatively, the first and second electrodes may be,
The name of the application package included in the preset white list is specified by a user;
alternatively, the first and second electrodes may be,
and the application package name included in the preset white list is pushed by the cloud server.
15. a terminal, comprising:
the system comprises a processor, a memory and a bus, wherein the processor and the memory are connected through the bus and complete mutual communication;
The memory stores executable program code, and the processor is used for calling the executable program code in the memory and executing the method according to any one of claims 1-7.
CN201610327920.3A 2016-05-17 2016-05-17 application management method and terminal Active CN106022101B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610327920.3A CN106022101B (en) 2016-05-17 2016-05-17 application management method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610327920.3A CN106022101B (en) 2016-05-17 2016-05-17 application management method and terminal

Publications (2)

Publication Number Publication Date
CN106022101A CN106022101A (en) 2016-10-12
CN106022101B true CN106022101B (en) 2019-12-06

Family

ID=57097467

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610327920.3A Active CN106022101B (en) 2016-05-17 2016-05-17 application management method and terminal

Country Status (1)

Country Link
CN (1) CN106022101B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874713A (en) * 2017-01-09 2017-06-20 广东小天才科技有限公司 A kind of application program runs right management method and device, user equipment
CN106980661B (en) * 2017-03-20 2020-10-09 北京金山安全软件有限公司 Method and device for cleaning data files in mobile terminal and electronic equipment
CN111542061B (en) * 2017-04-25 2023-07-18 北京五洲天宇认证中心 Information synchronization security authentication method
CN107704295B (en) * 2017-10-31 2021-07-23 北京小米移动软件有限公司 Method, device and storage medium for setting self-starting authority
CN107908953A (en) * 2017-11-21 2018-04-13 广东欧珀移动通信有限公司 Notifications service control method, device, terminal device and storage medium
CN110555304A (en) * 2018-05-31 2019-12-10 武汉安天信息技术有限责任公司 malicious packet name detection method, malicious application detection method and corresponding devices
CN109697359A (en) * 2018-12-19 2019-04-30 惠州Tcl移动通信有限公司 A kind of message prompt method, device, storage medium and electronic equipment
CN114091014A (en) * 2021-10-29 2022-02-25 珠海大横琴科技发展有限公司 Data processing method and device
CN115174186B (en) * 2022-06-30 2024-05-17 京东城市(北京)数字科技有限公司 Address book visibility processing method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462980A (en) * 2014-12-30 2015-03-25 北京奇虎科技有限公司 Authority management method, device and system of application programs and mobile terminal
CN104503807A (en) * 2014-12-31 2015-04-08 北京奇虎科技有限公司 Management method and device of starting items
CN105095746A (en) * 2015-07-02 2015-11-25 北京奇虎科技有限公司 Method and device for application program starting authentication
CN105389263A (en) * 2015-12-24 2016-03-09 北京奇虎科技有限公司 Method, system and equipment for monitoring application software permissions
CN105430033A (en) * 2014-09-17 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting position of terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103823669A (en) * 2013-11-26 2014-05-28 上海华力微电子有限公司 Automatic probe station recipe management method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430033A (en) * 2014-09-17 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting position of terminal
CN104462980A (en) * 2014-12-30 2015-03-25 北京奇虎科技有限公司 Authority management method, device and system of application programs and mobile terminal
CN104503807A (en) * 2014-12-31 2015-04-08 北京奇虎科技有限公司 Management method and device of starting items
CN105095746A (en) * 2015-07-02 2015-11-25 北京奇虎科技有限公司 Method and device for application program starting authentication
CN105389263A (en) * 2015-12-24 2016-03-09 北京奇虎科技有限公司 Method, system and equipment for monitoring application software permissions

Also Published As

Publication number Publication date
CN106022101A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
CN106022101B (en) application management method and terminal
CN111030936B (en) Current-limiting control method and device for network access and computer-readable storage medium
CN110324793B (en) Information reminding method and device and electronic terminal
US20150334118A1 (en) Method and apparatus for clearing notification icon, and storage medium
US20150365360A1 (en) Method and apparatus for processing push message in notification center of mobile terminal, and storage medium
US20120110463A1 (en) Application Recommendation
CN107346397B (en) Information processing method and related product
CN106227585B (en) Application program starting method, device and equipment
CN106155789B (en) Application freezing method and mobile terminal
WO2017107830A1 (en) Application installation method, apparatus and electronic device
CN111144953B (en) Resource allocation method, device, equipment and medium
CN108985095B (en) Non-public file access method, system, electronic equipment and storage medium
CN105205388A (en) Authority management method and system for application
EP3486823B1 (en) System notification service control method, apparatus, terminal device, and storage medium
CN108572866B (en) Application program management method, application program management device and mobile terminal
CN105893471B (en) Data processing method and electronic equipment
CN114223177A (en) Access control method, device, server and computer readable medium
US9313256B2 (en) Apparatuses and methods for plug-in management
CN109343944B (en) Data processing method and device for eSIM card, terminal and storage medium
CN106293912B (en) Method and terminal for freezing application program
CN113225767A (en) Monitoring management method, device, equipment and computer readable storage medium
CN108600086B (en) Information processing method, electronic device, and computer-readable storage medium
CN110771113B (en) Brushing amount terminal detection method and device
CN108536512B (en) Interface switching method and device and terminal equipment
CN112989323B (en) Process detection method, device, terminal and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant