CN106295274A - A kind of application control method and device - Google Patents

A kind of application control method and device Download PDF

Info

Publication number
CN106295274A
CN106295274A CN201610604647.4A CN201610604647A CN106295274A CN 106295274 A CN106295274 A CN 106295274A CN 201610604647 A CN201610604647 A CN 201610604647A CN 106295274 A CN106295274 A CN 106295274A
Authority
CN
China
Prior art keywords
destination application
authentication information
application
icons
desktop icons
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610604647.4A
Other languages
Chinese (zh)
Other versions
CN106295274B (en
Inventor
关光炫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610604647.4A priority Critical patent/CN106295274B/en
Priority to PCT/CN2016/097050 priority patent/WO2018018692A1/en
Publication of CN106295274A publication Critical patent/CN106295274A/en
Application granted granted Critical
Publication of CN106295274B publication Critical patent/CN106295274B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The embodiment of the invention discloses a kind of application control method and device, method therein comprises determining that destination application to be controlled;Show the selection interface of the selective desktop icons whether deleting described destination application;When the first selection operation for described selection interface being detected, by invalid for application program launching entrance corresponding for the desktop icons of described destination application, and the desktop icons of described destination application are associated with the application program launching entrance of the hidden icons of described destination application, wherein, described first select operation for indicating the selection operation of the desktop icons not deleting described destination application.The embodiment of the invention also discloses corresponding application program controlling device.The technical scheme that the embodiment of the present invention provides can promote the data safety in the safety of the application program that terminal is installed, and then protection terminal.

Description

A kind of application control method and device
Technical field
The present invention relates to field of terminal, be specifically related to a kind of application control method and device.
Background technology
The appearance of smart mobile phone, the life for people brings many facilities.Smart mobile phone function powerful, cause it this Body also exists huge potential safety hazard.The private informations such as contact person, note, picture library and payment class application in mobile phone are easy to Stolen by others.Therefore, the privacy application in protection mobile device and privacy application data are not stolen and just seem the heaviest Want.
In prior art, currently the mode in mobile device terminal encryption has a lot, but great majority use at lock Screen interface pattern or the mode of password encrypt mobile device, and also sub-fraction is adopted as the mode of applied cryptography encryption and encrypts shifting Dynamic equipment.It is disadvantageously, the two ways safety that in prior art, mobile device terminal is encrypted is the lowest.Such as screen locking is close After code or pattern are learnt by other people, the private data of mobile device will thoroughly be revealed.
Summary of the invention
Embodiments provide a kind of application control method and device, to promoting the application journey that terminal is installed The safety of sequence, the data safety in protection terminal.
Embodiment of the present invention first aspect provides a kind of application control method, including:
Determine destination application to be controlled;
Show the selection interface of the selective desktop icons whether deleting described destination application;
When the first selection operation for described selection interface being detected, by the desktop icons of described destination application Corresponding application program launching entrance is invalid, and by the desktop icons of described destination application and described destination application The application program launching entrance association of hidden icons, wherein, described first selects operation not delete described target for instruction should Operate with the selection of the desktop icons of program.
In conjunction with first aspect, in the implementation that some are possible, described display is selective whether delete described target should After the selection interface of the desktop icons of program, described method also includes:
When the second selection operation for described selection interface being detected, by the desktop icons of described destination application Deleting, wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application to operate.
In conjunction with first aspect, in the implementation that some are possible, the described desktop icons by described destination application After associating with the application program launching entrance of the hidden icons of described destination application, described method also includes:
Obtain the selection operation of the desktop icons for described destination application;
In preset time period, detect whether to receive user authentication information;
If receiving described user authentication information, then detect described user authentication information whether with the authentication information that prestores Join;
If described user authentication information is mated with the authentication information that prestores, then by the desk-top picture with described destination application The application program launching entrance of the hidden icons of the described destination application of mark association, starts described destination application.
In conjunction with first aspect, in the implementation that some are possible, the described desktop icons by described destination application After deletion, described method also includes:
Obtain user authentication information;
Detect whether described authentication information mates with the authentication information that prestores;
If described user authentication information is mated with the authentication information that prestores, then show hiding of at least one hide application program Icon, wherein, the hidden icons of at least one hide application program described includes the hidden icons of described destination application;
Obtain the selection operation of the hidden icons for described destination application, and by described destination application The application program launching entrance of hidden icons, starts described destination application.
In conjunction with first aspect, in the implementation that some are possible, described in detect whether to receive user authentication information it After, described method also includes:
If being not received by user authentication information in described preset time period, then generate hint instructions, wherein, described in carry Show that instruction is for pointing out destination application described in user not successfully started up.
In conjunction with first aspect, in the implementation that some are possible, the described authentication information of described detection whether with the mirror that prestores After power information matches, described method also includes:
If described user authentication information is not mated with the authentication information that prestores, then generating hint instructions, wherein, described prompting refers to Order is used for pointing out destination application described in user not successfully started up.
Embodiment of the present invention second aspect provides a kind of application program controlling device, described application program controlling device bag Include:
Determine unit, for determining destination application to be controlled;
Display unit, for showing the selection interface of the selective desktop icons whether deleting described destination application;
Associative cell, for when detecting the first selection operation for described selection interface, by described intended application The application program launching entrance that the desktop icons of program are corresponding is invalid, and by the desktop icons of described destination application with described The application program launching entrance association of the hidden icons of destination application, wherein, described first selects operation for instruction not Delete the selection operation of the desktop icons of described destination application.In conjunction with second aspect, in the implementation that some are possible, Described device also includes:
Delete unit, show the selective desktop icons whether deleting described destination application at described display unit After selecting interface, for when the second selection operation for described selection interface being detected, by described destination application Desktop icons delete, wherein, described second selects operation for indicating the desktop icons deleting described destination application Select operation.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
First acquiring unit, at described associative cell by the desktop icons of described destination application and described intended application After the application program launching entrance association of the hidden icons of program, for obtaining the desk-top picture for described destination application Target selects operation;
First detector unit, in preset time period, detects whether to receive user authentication information;
Described first detector unit, if being additionally operable to the detection of described detector unit to receive user authentication information, detection is described Whether user authentication information mates with the authentication information that prestores;
First start unit, if detecting described user authentication information and the authentication information that prestores in described first detector unit During coupling, for the hidden icons of described destination application by associating with the desktop icons of described destination application Application program launching entrance, starts described destination application.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
Second acquisition unit, after the desktop icons of described destination application are deleted by described deletion unit, is used for Obtain user authentication information;
Second detector unit, is used for detecting whether described authentication information mates with the authentication information that prestores;
Described display unit, if described second detector unit detects described authentication information and mates with the authentication information that prestores, It is additionally operable to show the hidden icons of at least one hide application program, wherein, hiding of at least one hide application program described Icon includes the hidden icons of described destination application;
Second start unit, for obtaining the selection operation of the hidden icons for described destination application, and passes through The application program launching entrance of the hidden icons of described destination application, starts described destination application.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
First Tip element, after described first detector unit detects whether to receive user authentication information, if for When being not received by user authentication information in described preset time period, it is used for generating hint instructions, wherein, described hint instructions For pointing out destination application described in user not successfully started up.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
In described second detector unit, second Tip element, detects whether described authentication information mates with the authentication information that prestores Afterwards, if not mating with the authentication information that prestores for described authentication information, then hint instructions, wherein, described hint instructions are generated For pointing out destination application described in user not successfully started up.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal Safety.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to These accompanying drawings obtain other accompanying drawing.
Fig. 1 is the schematic flow sheet of a kind of application control method that first embodiment of the invention provides;
Fig. 2 is the schematic flow sheet of a kind of application control method that second embodiment of the invention provides;
Fig. 3 is the schematic flow sheet of a kind of application control method that third embodiment of the invention provides;
Fig. 4 is the structural representation of a kind of application program controlling device that fourth embodiment of the invention provides;
Fig. 5 is the structural representation of a kind of application program controlling device that fifth embodiment of the invention provides.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention, it is clear that described embodiment is this Bright a part of embodiment rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not having Have and make the every other embodiment obtained under creative work premise, broadly fall into the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", " the 3rd ", " Four " it is etc. for distinguishing different object rather than for describing particular order.Additionally, " including " and " having " and they appoint What deformation, it is intended that cover non-exclusive comprising.Such as contain series of steps or the process of unit, method, system, product Product or equipment are not limited to step or the unit listed, but the most also include step or the unit do not listed, or The most also include other steps intrinsic for these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can be wrapped in conjunction with the embodiments It is contained at least one embodiment of the present invention.It is identical that each position in the description occurs that this phrase might not each mean Embodiment, be not and the independent of other embodiments mutual exclusion or alternative embodiment.Those skilled in the art explicitly and Implicitly being understood by, embodiment described herein can combine with other embodiments.
Refer to the flow process signal that Fig. 1, Fig. 1 are a kind of application control methods that first embodiment of the invention provides Figure, the described application control method of the embodiment of the present invention can be applied and can wear in such as smart mobile phone, panel computer, intelligence Wear in the terminals such as equipment, specifically can be realized by the processor of these terminals.As it is shown in figure 1, the application in the embodiment of the present invention Control method comprises the following steps:
S101, terminal determine destination application to be controlled.
Specifically, terminal determines the destination application needing to hide, and adds described destination application to being used for Application or the terminal of hide application program arrange interface, wherein, described hiding destination application can by user according to Service condition selects to determine, can automatically determine according to the purposes of application program or attribute, terminal, such as, work as application program For paying class application, such as Alipay, palm bank etc., then it is described to be controlled that terminal automatically determines this type of application program Destination application.
The selection interface of the selective desktop icons whether deleting described destination application of S102, terminal demonstration.
Specifically, terminal determines the destination application needing to hide, and adds described destination application to being used for After the application of hide application program or terminal arrange interface, terminal demonstration human-computer interaction interface, described human-computer interaction interface is used In choosing whether to delete the desktop icons of described destination application for user.
S103, detect for described selection interface first selection operation time, by the table of described destination application The application program launching entrance that face icon is corresponding is invalid, terminal by the desktop icons of described destination application and described target The application program launching entrance association of the hidden icons of application program, wherein, described first selects operation not delete for instruction The selection operation of the desktop icons of described destination application.
Specifically, if user selects not delete the desktop icons of described destination application, then terminal should by described target The application program launching entrance corresponding with the desktop icons of program is invalid, i.e. the desktop icons of destination application are a kind of pseudo-figure Mark, is only used for reminding terminal described in user to be mounted with this destination application, but this destination application is hidden, only The desktop icons of destination application described in touch-control can not start described destination application.Need to perform follow-up operation, The hidden icons of the described destination application associated with the desktop icons of described destination application can be opened further Application program launching entrance, and then open described destination application.
As the optional embodiment of one, the selective desk-top picture whether deleting described destination application of described display Target selects after interface, and described terminal can also carry out following operation:
When the second selection operation for described selection interface being detected, by the desktop icons of described destination application Deleting, wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application to operate.
Specifically, if user is in the human-computer interaction interface of terminal demonstration, select to delete the table of described destination application Face icon, the desktop icons of the most described destination application are deleted, but during this situation, described destination application is not Have unloaded, but be hidden, need to perform follow-up operation, just can open hiding of described destination application further The application program launching entrance of icon, and then open described destination application.
As the optional embodiment of one, the described desktop icons by described destination application and described intended application After the application program launching entrance association of the hidden icons of program, described terminal can also carry out following operation:
Obtain the selection operation of the desktop icons for described destination application;
In preset time period, detect whether to receive user authentication information;
If receiving described user authentication information, then detect described user authentication information whether with the authentication information that prestores Join;
If described user authentication information is mated with the authentication information that prestores, then by the desk-top picture with described destination application The application program launching entrance of the hidden icons of the described destination application of mark association, starts described destination application.
Specifically, after destination application is hidden, if user selects not delete the desk-top picture of described destination application Mark, then when user needs to start described destination application, needs to select the described intended application of display on terminal desktop The desktop icons of program, then, terminal demonstration inputs the authentication interface of authentication information, (such as 5s in Preset Time for user In), user inputs authentication information, wherein, described authentication information can include but not limited to following at least one: numerical ciphers believe Breath, pattern encrypted message, finger print information, facial information and iris information etc..If terminal is in described Preset Time, do not obtain Get the user authentication information of user's input, i.e. user and input the time time-out of authentication information, then terminal can generate prompting and refer to Order, wherein, described hint instructions is used for pointing out destination application described in user not successfully started up, or terminal camouflage prompting " described destination application is not installed ".After user inputs authentication information in Preset Time, the use of terminal detection user's input Whether family authentication information mates with the authentication information that prestores, if user authentication information is mated with the authentication information that prestores, then proves user For validated user, then terminal then extracts the described destination application that associates with the desktop icons of described destination application The application program launching entrance of hidden icons, and entered by the application program launching of the hidden icons of described destination application Mouthful, start described destination application.But, if user authentication information is not mated with the authentication information that prestores, illustrate that this user is Disabled user, there is the stolen risk of data in described terminal, then terminal then generates hint instructions, and wherein, described hint instructions is used Do not successfully started up in destination application described in prompting user, or terminal camouflage is pointed out, and " described destination application is not pacified Dress ".
As the optional embodiment of one, described by after the desktop icons deletion of described destination application, described Terminal can also carry out following operation:
Obtain user authentication information;
Detect whether described authentication information mates with the authentication information that prestores;
If described user authentication information is mated with the authentication information that prestores, then show hiding of at least one hide application program Icon, wherein, the hidden icons of at least one hide application program described includes the hidden icons of described destination application;
Obtain the selection operation of the hidden icons for described destination application, and by described destination application The application program launching entrance of hidden icons, starts described destination application.
Specifically, after destination application is hidden, if user selects to delete the desktop icons of described destination application, So when user needs to start described destination application, triggering terminal display is needed to input the authentication of authentication information for user Interface, user inputs authentication information, wherein, described authentication information can include but not limited to following at least one: numerical ciphers Information, pattern encrypted message, finger print information, facial information and iris information etc..User is after input authentication information, and terminal is examined Whether the user authentication information surveying user's input mates with the authentication information that prestores, if user authentication information and the authentication information that prestores Join, then prove that user is validated user, then terminal can show to be performed hides at least one hide application program operated Hidden icons, wherein, the hidden icons of at least one hide application program described include user need start intended application The hidden icons of program, terminal obtains user's selection operation for the hidden icons of destination application, and terminal is transferred described The application program launching entrance of the hidden icons of destination application, and answering by the hidden icons of described destination application Start entrance by program, start described destination application.But, if user authentication information is not mated with the authentication information that prestores, Illustrating that this user is disabled user, there is the stolen risk of data in described terminal, then terminal then generates hint instructions, wherein, institute State hint instructions for pointing out destination application described in user not successfully started up, or terminal camouflage prompting " described target Application program is not installed ".
As the optional embodiment of one, described in detect whether to receive user authentication information after, described terminal is also Can perform following operation:
If being not received by user authentication information in described preset time period, then generate hint instructions, wherein, described in carry Show that instruction is for pointing out destination application described in user not successfully started up.
As the optional embodiment of one, whether the described authentication information of described detection mates it with the authentication information that prestores After, described terminal can also carry out following operation:
If described user authentication information is not mated with the authentication information that prestores, then generating hint instructions, wherein, described prompting refers to Order is used for pointing out destination application described in user not successfully started up.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal Safety.
Refer to the flow process signal that Fig. 2, Fig. 2 are a kind of application control methods that second embodiment of the invention provides Figure, the described application control method of the embodiment of the present invention can be applied and can wear in such as smart mobile phone, panel computer, intelligence Wear in the terminals such as equipment, specifically can be realized by the processor of these terminals.As in figure 2 it is shown, the application in the embodiment of the present invention Control method comprises the following steps:
S201, terminal determine destination application to be controlled.
The selection interface of the selective desktop icons whether deleting described destination application of S202, terminal demonstration.
S203, detect for described selection interface first selection operation time, terminal is by described destination application Application program launching entrance corresponding to desktop icons invalid, and by the desktop icons of described destination application and described target The application program launching entrance association of the hidden icons of application program, wherein, described first selects operation not delete for instruction The selection operation of the desktop icons of described destination application.
S204, terminal obtain the selection operation of the desktop icons for described destination application.
S205, in preset time period, terminal detects whether to receive user authentication information.
Wherein, if in preset time period, terminal detection receives user authentication information, then perform step S206, no Then, step S208 is performed.
If the described user authentication information of S206, then terminal detect described user authentication information whether with the authentication information that prestores Coupling.
Wherein, if terminal detects described user authentication information and mates with the authentication information that prestores, then perform step S207, no Then, step S208 is performed.
If the described user authentication information of S207 is mated with the authentication information that prestores, terminal then by with described intended application journey The application program launching entrance of the hidden icons of the described destination application of the desktop icons association of sequence, starting described target should Use program.
S208, terminal then generate hint instructions, and wherein, described hint instructions is used for pointing out destination application described in user Do not successfully started up.
Wherein, the specific implementation of S201-S208 refer to the description of correlation step in first embodiment of the invention.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal Safety.
Refer to the flow process signal that Fig. 3, Fig. 3 are a kind of application control methods that third embodiment of the invention provides Figure, the described application control method of the embodiment of the present invention can be applied and can wear in such as smart mobile phone, panel computer, intelligence Wear in the terminals such as equipment, specifically can be realized by the processor of these terminals.As it is shown on figure 3, the application in the embodiment of the present invention Control method comprises the following steps:
S301, terminal determine destination application to be controlled.
The selection interface of the selective desktop icons whether deleting described destination application of S302, terminal demonstration.
S303, detect for described selection interface second selection operation time, terminal is by described destination application Desktop icons delete, wherein, described second selects operation for indicating the desktop icons deleting described destination application Select operation.
S304, terminal obtain user authentication information.
S305, terminal detect whether described authentication information mates with the authentication information that prestores.
Wherein, if terminal detects described authentication information and mates with the authentication information that prestores, then perform step S306 to S307, no Then, step S308 is performed.
If the described user authentication information of S306 is mated with the authentication information that prestores, at least one hiden application journey of terminal demonstration The hidden icons of sequence, wherein, the hidden icons of at least one hide application program described includes the hidden of described destination application Hide icon;
S307, terminal obtain the selection operation of the hidden icons for described destination application, and by described target The application program launching entrance of the hidden icons of application program, starts described destination application.
If the described user authentication information of S308 is not mated with the authentication information that prestores, terminal then generates hint instructions, wherein, Described hint instructions is used for pointing out destination application described in user not successfully started up.
Wherein, the specific implementation of S301-S308 refer to the description of correlation step in first embodiment of the invention.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal Safety.
Being apparatus of the present invention embodiment below, apparatus of the present invention embodiment is used for performing the inventive method embodiment one to three The method realized, for convenience of description, illustrate only the part relevant to the embodiment of the present invention, and concrete ins and outs do not disclose , refer to the embodiment of the present invention one to embodiment three.
Refer to the structural representation that Fig. 4, Fig. 4 are a kind of application program controlling devices that fourth embodiment of the invention provides Figure, as shown in Figure 4, the application program controlling device in the embodiment of the present invention includes with lower unit:
Determine unit 401, for determining destination application to be controlled;
Display unit 402, for showing selection circle of the selective desktop icons whether deleting described destination application Face;
Associative cell 403, for when the first selection operation for described selection interface being detected, answering described target The application program launching entrance corresponding with the desktop icons of program is invalid, and by the desktop icons of described destination application and institute Stating the application program launching entrance association of the hidden icons of destination application, wherein, described first selects operation to be used for indicating Do not delete the selection operation of the desktop icons of described destination application.As the optional embodiment of one, described application journey Sequence controls device and can further include:
Delete unit 404, show the selective desktop whether deleting described destination application at described display unit 402 After the selection interface of icon, for when the second selection operation for described selection interface being detected, described target being answered Deleting with the desktop icons of program, wherein, described second selects operation for indicating the desktop deleting described destination application The selection operation of icon.
As the optional embodiment of one, described device also includes:
First acquiring unit 405, at described associative cell 403 by the desktop icons of described destination application and described mesh After the application program launching entrance association of the hidden icons of mark application program, for obtaining for described destination application The selection operation of desktop icons;
First detector unit 406, in preset time period, detects whether to receive user authentication information;
Described first detector unit 406, if being additionally operable to the detection of described detector unit to receive user authentication information, detects institute State whether user authentication information mates with the authentication information that prestores;
First start unit 407, if detecting described user authentication information and the mirror that prestores in described first detector unit 406 During power information matches, hiding for the described destination application by associating with the desktop icons of described destination application The application program launching entrance of icon, starts described destination application.
As the optional embodiment of one, described device also includes:
The desktop icons of described destination application are deleted it at described deletion unit 404 by second acquisition unit 408 After, it is used for obtaining user authentication information;
Second detector unit 409, is used for detecting whether described authentication information mates with the authentication information that prestores;
Described display unit 402, if described second detector unit 409 detects described authentication information and the authentication information that prestores Coupling, is additionally operable to show the hidden icons of at least one hide application program, wherein, at least one hide application program described Hidden icons includes the hidden icons of described destination application;
Second start unit 410, for obtaining the selection operation of the hidden icons for described destination application, and leads to Cross the application program launching entrance of the hidden icons of described destination application, start described destination application.
As the optional embodiment of one, described device also includes:
First Tip element 411, after described first detector unit 406 detects whether to receive user authentication information, If during for being not received by user authentication information in described preset time period, be used for generating hint instructions, wherein, described in carry Show that instruction is for pointing out destination application described in user not successfully started up.
As the optional embodiment of one, described device also includes:
In described second detector unit 409, second Tip element 412, detects whether described authentication information is believed with the authentication that prestores After breath coupling, if not mating with the authentication information that prestores for described authentication information, then generate hint instructions, wherein, described in carry Show that instruction is for pointing out destination application described in user not successfully started up.
Concrete, the implementing of above-mentioned unit refers to retouching of correlation step in Fig. 1 to Fig. 3 correspondence embodiment State, be not repeated herein.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal Safety.
Refer to the structural representation that Fig. 5, Fig. 5 are a kind of application program controlling devices that fifth embodiment of the invention provides Figure.As it is shown in figure 5, the application program controlling device in the embodiment of the present invention includes: at least one processor 501, such as CPU, At least one receptor 503, at least one memorizer 504, at least one transmitter 505, at least one communication bus 502.Its In, communication bus 502 is for realizing the connection communication between these assemblies.Wherein, the receptor of device in the embodiment of the present invention 503 and transmitter 505 can be wired transmission port, it is also possible to for wireless device, such as, include antenna assembly, for and other Node device carries out the communication of signaling or data.Memorizer 504 can be high-speed RAM memorizer, it is also possible to be non-volatile depositing Reservoir (non-volatile memory), for example, at least one disk memory.Memorizer 504 optionally can also is that at least One storage device being located remotely from aforementioned processor 501.Memorizer 504 stores batch processing code, and described processor 501 can pass through communication bus 502, call the function that in memorizer 504, the code of storage is correlated with execution.
Described processor 501, for determining destination application to be controlled;Show selective whether to delete described target The selection interface of the desktop icons of application program;When the first selection operation for described selection interface being detected, by described The application program launching entrance that the desktop icons of destination application are corresponding is invalid, and by the desk-top picture of described destination application Mark associates with the application program launching entrance of the hidden icons of described destination application, and wherein, described first selects operation to use The selection operation of the desktop icons of described destination application is not deleted in instruction.
As the optional embodiment of one, described processor 501, it is being used for showing selective whether to delete described target After the selection interface of the desktop icons of application program, it is also possible to for the second selection for described selection interface being detected During operation, being deleted by the desktop icons of described destination application, wherein, described second selects operation to be used for indicating deletion described The selection operation of the desktop icons of destination application.
As the optional embodiment of one, described processor 501, for by the desk-top picture of described destination application After mark associates with the application program launching entrance of the hidden icons of described destination application, it is also possible to for obtaining for institute State the selection operation of the desktop icons of destination application;In preset time period, detect whether to receive user authentication information; If receiving described user authentication information, then detect whether described user authentication information mates with the authentication information that prestores;If it is described User authentication information is mated with the authentication information that prestores, then by the described mesh associated with the desktop icons of described destination application The application program launching entrance of the hidden icons of mark application program, starts described destination application.
As the optional embodiment of one, described processor 501, for by the desk-top picture of described destination application After mark is deleted, it is also possible to be used for obtaining user authentication information;Detect whether described authentication information mates with the authentication information that prestores; If described user authentication information is mated with the authentication information that prestores, show the hidden icons of at least one hide application program, wherein, The hidden icons of at least one hide application program described includes the hidden icons of described destination application;Obtain for described The selection operation of the hidden icons of destination application, and opened by the application program of the hidden icons of described destination application Dynamic entrance, starts described destination application.
As the optional embodiment of one, described processor 501, for detecting whether receive user authentication information Afterwards, it is also possible to if for being not received by user authentication information in described preset time period, then generate hint instructions, its In, described hint instructions is used for pointing out destination application described in user not successfully started up.
As the optional embodiment of one, described processor 501, be used for detecting described authentication information whether with prestore After authentication information coupling, it is also possible to if not mating with the authentication information that prestores for described user authentication information, then generate prompting Instruction, wherein, described hint instructions is used for pointing out destination application described in user not successfully started up.
Concrete, the implementing of above-mentioned unit refers to retouching of correlation step in Fig. 1 to Fig. 3 correspondence embodiment State, be not repeated herein.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal Safety.
The embodiment of the present invention also provides for a kind of computer-readable storage medium, and wherein, this computer-readable storage medium can store journey Sequence, this program includes the part of the monitoring method of any service processes described in said method embodiment or full when performing Portion's step.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should know Knowing, embodiment described in this description belongs to preferred embodiment, involved action and the unit not necessarily present invention Necessary.
The sequence of steps of the method for the embodiment of the present invention can be adjusted according to actual needs, merges or delete.This The unit of the terminal of bright embodiment can carry out integrating according to actual needs, Further Division or delete.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way Realize.Such as, device embodiment described above is schematic, the division of the most described unit, for a kind of logic function Divide, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into Another system, or some features can ignore, or do not perform.Another point, shown or discussed coupling each other or Direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection, can be electricity Property or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part that in other words prior art contributed or this technical scheme completely or partially can be with the form of software product Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer Equipment (can be for personal computer, server or the network equipment etc.) perform the whole of method described in each embodiment of the present invention or Part steps.And aforesaid storage medium includes: USB flash disk, read only memory (ROM, Read-Only Memory), random access memory are deposited Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various can store program code Medium.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completing instructing relevant hardware by program, this program can be stored in a computer-readable recording medium, storage Medium may include that flash disk, read only memory (English: Read-Only Memory, ROM), random access device (English be called for short: RAM), disk or CD etc. literary composition: Random Access Memory, is called for short:.
A kind of application control method provided the embodiment of the present invention above and device are described in detail, this Applying specific case in literary composition to be set forth principle and the embodiment of the present invention, the explanation of above example is only intended to Help to understand method and the core concept thereof of the present invention;Simultaneously for one of ordinary skill in the art, according to the think of of the present invention Thinking, the most all will change, in sum, it is right that this specification content should not be construed as The restriction of the present invention.

Claims (12)

1. an application control method, it is characterised in that including:
Determine destination application to be controlled;
Show the selection interface of the selective desktop icons whether deleting described destination application;
When the first selection operation for described selection interface being detected, the desktop icons of described destination application are corresponding Application program launching entrance invalid, and hiding the desktop icons of described destination application and described destination application The application program launching entrance association of icon, wherein, described first selects operation not delete described intended application journey for instruction The selection operation of the desktop icons of sequence.
2. the method for claim 1, it is characterised in that whether described display is selective deletes described destination application Desktop icons selection interface after, described method also includes:
When the second selection operation for described selection interface being detected, the desktop icons of described destination application are deleted Removing, wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application to operate.
3. the method for claim 1, it is characterised in that described by the desktop icons of described destination application with described After the application program launching entrance association of the hidden icons of destination application, described method also includes:
Obtain the selection operation of the desktop icons for described destination application;
In preset time period, detect whether to receive user authentication information;
If receiving described user authentication information, then detect whether described user authentication information mates with the authentication information that prestores;
If described user authentication information is mated with the authentication information that prestores, then closed by the desktop icons with described destination application The application program launching entrance of the hidden icons of the described destination application of connection, starts described destination application.
4. method as claimed in claim 2, it is characterised in that the described desktop icons by described destination application delete it After, described method also includes:
Obtain user authentication information;
Detect whether described authentication information mates with the authentication information that prestores;
If described authentication information mates with the authentication information that prestores, then show the hidden icons of at least one hide application program, its In, the hidden icons of at least one hide application program described includes the hidden icons of described destination application;
Obtain the selection operation of the hidden icons for described destination application, and hiding by described destination application The application program launching entrance of icon, starts described destination application.
5. method as claimed in claim 3, it is characterised in that described in detect whether to receive user authentication information after, institute Method of stating also includes:
If being not received by user authentication information in described preset time period, then generating hint instructions, wherein, described prompting refers to Order is used for pointing out destination application described in user not successfully started up.
6. method as claimed in claim 4, it is characterised in that the described authentication information of described detection whether with the authentication information that prestores After coupling, described method also includes:
If described authentication information does not mates with the authentication information that prestores, then generating hint instructions, wherein, described hint instructions is used for carrying Show that destination application described in user is not successfully started up.
7. an application program controlling device, it is characterised in that described device includes:
Determine unit, for determining destination application to be controlled;
Display unit, for showing the selection interface of the selective desktop icons whether deleting described destination application;
Associative cell, for when detecting the first selection operation for described selection interface, by described destination application Application program launching entrance corresponding to desktop icons invalid, and by the desktop icons of described destination application and described target The application program launching entrance association of the hidden icons of application program, wherein, described first selects operation not delete for instruction The selection operation of the desktop icons of described destination application.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Delete unit, show the selection of the selective desktop icons whether deleting described destination application at described display unit After interface, for when the second selection operation for described selection interface being detected, by the table of described destination application Face icon is deleted, and wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application Operation.
9. device as claimed in claim 7, it is characterised in that described device also includes:
First acquiring unit, at described associative cell by the desktop icons of described destination application and described destination application Hidden icons the association of application program launching entrance after, for obtaining the desktop icons for described destination application Select operation;
First detector unit, in preset time period, detects whether to receive user authentication information;
Described first detector unit, if being additionally operable to the detection of described detector unit to receive user authentication information, detects described user Whether authentication information mates with the authentication information that prestores;
First start unit, mates with the authentication information that prestores if described user authentication information being detected in described first detector unit Time, for the application of the hidden icons of the described destination application by associating with the desktop icons of described destination application Program starts entrance, starts described destination application.
10. device as claimed in claim 8, it is characterised in that described device also includes:
Second acquisition unit, after the desktop icons of described destination application are deleted by described deletion unit, is used for obtaining User authentication information;
Second detector unit, is used for detecting whether described authentication information mates with the authentication information that prestores;
Described display unit, if described second detector unit detects described authentication information and mates with the authentication information that prestores, also uses In the hidden icons of at least one hide application program of display, wherein, the hidden icons of at least one hide application program described Hidden icons including described destination application;
Second start unit, for obtaining the selection operation of the hidden icons for described destination application, and by described The application program launching entrance of the hidden icons of destination application, starts described destination application.
11. devices as claimed in claim 9, it is characterised in that described device also includes:
First Tip element, after described first detector unit detects whether to receive user authentication information, if in institute When being not received by user authentication information in stating preset time period, being used for generating hint instructions, wherein, described hint instructions is used for Destination application described in prompting user is not successfully started up.
12. devices as claimed in claim 10, it is characterised in that described device also includes:
In described second detector unit, second Tip element, detects whether described authentication information mates it with the authentication information that prestores After, if not mating with the authentication information that prestores for described authentication information, then generate hint instructions, wherein, described hint instructions is used Do not successfully started up in destination application described in prompting user.
CN201610604647.4A 2016-07-27 2016-07-27 Application program control method and device Expired - Fee Related CN106295274B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610604647.4A CN106295274B (en) 2016-07-27 2016-07-27 Application program control method and device
PCT/CN2016/097050 WO2018018692A1 (en) 2016-07-27 2016-08-27 Application control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610604647.4A CN106295274B (en) 2016-07-27 2016-07-27 Application program control method and device

Publications (2)

Publication Number Publication Date
CN106295274A true CN106295274A (en) 2017-01-04
CN106295274B CN106295274B (en) 2020-03-17

Family

ID=57662745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610604647.4A Expired - Fee Related CN106295274B (en) 2016-07-27 2016-07-27 Application program control method and device

Country Status (2)

Country Link
CN (1) CN106295274B (en)
WO (1) WO2018018692A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100223579A1 (en) * 2009-03-02 2010-09-02 Schwartz Gerry M Iphone application disguiser
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103616986A (en) * 2013-11-30 2014-03-05 广东欧珀移动通信有限公司 Method and system for displaying and hiding application icons and mobile terminal
CN105045514A (en) * 2015-08-27 2015-11-11 广东欧珀移动通信有限公司 Application process management method and terminal
CN105677214A (en) * 2015-12-30 2016-06-15 小米科技有限责任公司 Application management method and apparatus
CN105740670A (en) * 2016-01-28 2016-07-06 百度在线网络技术(北京)有限公司 Application encryption method and device, and application startup method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN103984885B (en) * 2014-05-30 2017-05-17 广东欧珀移动通信有限公司 Application program hiding method applied to touch screen terminal and touch screen terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100223579A1 (en) * 2009-03-02 2010-09-02 Schwartz Gerry M Iphone application disguiser
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN103616986A (en) * 2013-11-30 2014-03-05 广东欧珀移动通信有限公司 Method and system for displaying and hiding application icons and mobile terminal
CN105045514A (en) * 2015-08-27 2015-11-11 广东欧珀移动通信有限公司 Application process management method and terminal
CN105677214A (en) * 2015-12-30 2016-06-15 小米科技有限责任公司 Application management method and apparatus
CN105740670A (en) * 2016-01-28 2016-07-06 百度在线网络技术(北京)有限公司 Application encryption method and device, and application startup method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system

Also Published As

Publication number Publication date
WO2018018692A1 (en) 2018-02-01
CN106295274B (en) 2020-03-17

Similar Documents

Publication Publication Date Title
JP2021525428A (en) User interface for transfer accounts
CN104049806B (en) A kind of touch control terminal and its control method and system
CN105760737A (en) Control method for applications and terminal
CN103902862A (en) Mobile device management method and device and mobile device
CN104866752B (en) A kind of application guard method and user terminal
CN107038357A (en) User authority control method and mobile terminal
CN104679387A (en) Privacy information protection method and terminal
CN106815509B (en) A kind of multimedia file guard method, device and electronic equipment
CN108235767B (en) Payment application isolation method and device and terminal
CN103164264A (en) Application program manager and application program management method and access method
CN106959754A (en) Control the method and mobile terminal of mobile terminal
CN105809000A (en) Information processing method and electronic device
CN109085976A (en) Interface hidden method and device
WO2017008415A1 (en) Apparatus and method for launching mobile applications from a lock screen
CN107422976A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN107256353A (en) Possesses the display methods of privacy protection function
CN107729765A (en) Management method, device, storage medium and the electronic equipment of multi-medium data
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN106529235A (en) Unlocking method and terminal
CN104346550A (en) Information processing method and electronic equipment
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN104392158A (en) Mobile terminal unlocking method and mobile terminal
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
CN106295274A (en) A kind of application control method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200317

Termination date: 20210727