CN107370873A - Using management-control method, mobile terminal and storage medium - Google Patents

Using management-control method, mobile terminal and storage medium Download PDF

Info

Publication number
CN107370873A
CN107370873A CN201710467394.5A CN201710467394A CN107370873A CN 107370873 A CN107370873 A CN 107370873A CN 201710467394 A CN201710467394 A CN 201710467394A CN 107370873 A CN107370873 A CN 107370873A
Authority
CN
China
Prior art keywords
destination application
front stage
stage operation
pushed
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710467394.5A
Other languages
Chinese (zh)
Inventor
葛亚洁
唐敏
朱少杰
周佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Everest Mobile Communication Co Ltd
Original Assignee
Beijing Everest Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Everest Mobile Communication Co Ltd filed Critical Beijing Everest Mobile Communication Co Ltd
Priority to CN201710467394.5A priority Critical patent/CN107370873A/en
Publication of CN107370873A publication Critical patent/CN107370873A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses one kind to apply management-control method, mobile terminal and storage medium.Wherein, this includes using management-control method:When receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation;If destination application be present in front stage operation, destination application is pushed into running background or target end application program.When the present invention receives screen locking instruction or unlock instruction, running background will be pushed into the destination application of front stage operation or terminate to run.Therefore, though it is non-I when unlocking, the privacy information of destination application will not be revealed, so as to improve the security performance of terminal data.In addition, before terminal performs screen locking operation, operation is exited without user's performance objective application program, so as to improve user experience.

Description

Using management-control method, mobile terminal and storage medium
Technical field
The present invention relates to field of terminal technology, more particularly to one kind to apply management-control method, mobile terminal and storage medium.
Background technology
Mobile terminal has become everybody indispensability at present, as communication tool and the means of payment carried with etc..Therefore, Mobile terminal is stored with the substantial amounts of private information of user.
But during the use of mobile terminal, in order to cater to the use habit of user, user does not exit intended application Screen locking operation is carried out to mobile terminal in the case of program, after unlocking again, may proceed to perform the intended application journey on foreground Sequence.If the destination application is related to privacy information and my non-execution unblock operation, cause leakage of private information, so that Reduce terminal data security.In addition, in order to avoid destination application leakage of private information, it is necessary to which user is locking every time Performed before screen and exit operation, so that reducing user experience.
The content of the invention
It is an object of the invention to provide one kind to apply management-control method, to solve existing mobile terminal data security performance Difference, and the problem of user experience difference.In addition, implement the mobile end for applying management-control method present invention also offers a kind of End.
In order to solve the above problems, the invention provides one kind to apply management-control method, and it includes:
When receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, destination application is pushed into running background or target end should Use program.
Further improved as of the invention:When receiving screen locking instruction or unlock instruction, detect whether intended application be present Program the front stage operation the step of, including:
When receiving screen locking instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, destination application is pushed into running background or target end should The step of with program, including:
If destination application be present in front stage operation, screen locking and destination application is pushed into running background or knot Beam destination application.
Further improved as of the invention:If destination application be present in front stage operation, destination application is pushed away The step of to running background or target end application program, including:
If destination application be present in front stage operation, when receiving unlock instruction, judge that unlocking checking information is No to be matched with default unlocking information, unlock instruction includes unblock checking information;
If unblock checking information matches with default unlocking information, unlock and destination application is pushed into running background Or terminate application program.
Further improved as of the invention, default unlocking information includes the first identity information and the second identity information, judges After the step of whether unblock checking information matches with default unlocking information, in addition to:
If unblock checking information matches with the first identity information, unlock and destination application is pushed into running background Or terminate application program;
If unblock checking information matches with the second identity information, unlock and continue in front stage operation destination application.
Further improved as of the invention, the first identity information includes numerical ciphers or gesture password, the second identity information Including Fingerprint Identity information.
Further improved as of the invention:When receiving screen locking instruction or unlock instruction, detect whether intended application be present Program the front stage operation the step of, including:
When receiving unlock instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, destination application is pushed into running background or target end should The step of with program, including:
If destination application be present simultaneously is pushed into running background or knot in front stage operation, unblock by destination application Beam application program.
Further improved as of the invention, destination application is pushed into the step of running background or target end application program Suddenly, including:
It is to belong to continuation usage scenario to still fall within interruptibility use to judge the currently used scene of destination application Scene;
If the currently used scene of destination application belongs to continuation usage scenario, destination application is pushed into backstage Operation;
If the currently used scene of destination application belongs to interruptibility usage scenario, target end application program.
In order to solve the above problems, present invention also offers a kind of mobile terminal, and it includes:
Detection module, during for receiving screen locking instruction or unlock instruction, detect whether to have destination application preceding Platform is run;
Management and control module, if for destination application being present in front stage operation, destination application being pushed into backstage and is transported Row or target end application program.
Further improved as of the invention:Detection module, including:
First detection unit, when instructing for receiving screen locking, detect whether to have destination application in front stage operation;
Management and control module, including:
First control unit, if for destination application be present in front stage operation, screen locking and by destination application It is pushed into running background or target end application program.
Further improved as of the invention:Management and control module, including:
First authentication unit, if for destination application be present in front stage operation, when receiving unlock instruction, sentence Whether disconnected unblock checking information matches with default unlocking information, and unlock instruction includes unblock checking information;
Second control unit, if being matched for unlocking checking information with default unlocking information, unblock and by intended application Program is pushed into running background or terminates application program.
Further improved as of the invention, default unlocking information includes the first identity information and the second identity information, management and control Module also includes:
3rd control unit, if being matched for unlocking checking information with the first identity information, destination application is pushed away To running background or terminate application program;
4th control unit, if being matched for unlocking checking information with the second identity information, continue in front stage operation mesh Mark application program.
Further improved as of the invention, the first identity information includes numerical ciphers or gesture password, the second identity information Including Fingerprint Identity information.
Further improved as of the invention:Detection module, including:
3rd detection unit, during for receiving unlock instruction, detect whether to have destination application in front stage operation;
Management and control module, including:
5th control unit, if for destination application be present in front stage operation, unlock and by destination application It is pushed into running background or terminates application program.
Further improved as of the invention:Management and control module, including:
Judging unit, for judging that the currently used scene of destination application is to belong to continuation usage scenario to still fall within Interruptibility usage scenario;
7th control unit, if belonging to continuation usage scenario for the currently used scene of destination application, by mesh Mark application program is pushed into running background;
8th control unit, if belonging to interruptibility usage scenario for the currently used scene of destination application, tie Beam destination application.
In order to solve the above problems, present invention also offers a kind of storage medium, is stored thereon with routine data, program number During according to being executed by processor, the step of realizing above-mentioned application management-control method.
Compared with prior art, when the present invention receives screen locking instruction or unlock instruction, will be answered in the target of front stage operation Running background is pushed into program or terminates operation.Therefore, though it is non-I unlock when, will not also reveal the hidden of destination application Personal letter ceases, so as to improve the security performance of terminal data.In addition, before terminal performs screen locking operation, without user's performance objective Application program exits operation, so as to improve user experience.
Brief description of the drawings
Fig. 1 is the schematic flow sheet that the present invention applies management-control method one embodiment;
Fig. 2 is the schematic flow sheet that the present invention applies second embodiment of management-control method;
Fig. 3 is the schematic flow sheet that the present invention applies the 3rd embodiment of management-control method;
Fig. 4 is the schematic flow sheet that the present invention applies the 4th embodiment of management-control method;
Fig. 5 is the schematic flow sheet that the present invention applies the 5th embodiment of management-control method;
Fig. 6 is the schematic flow sheet that the present invention applies the 6th embodiment of management-control method;
Fig. 7 is the schematic flow sheet that the present invention applies the 7th embodiment of management-control method;
Fig. 8 is the high-level schematic functional block diagram of mobile terminal one embodiment of the present invention;
Fig. 9 is the high-level schematic functional block diagram of second embodiment of mobile terminal of the present invention;
Figure 10 is the high-level schematic functional block diagram of 3rd embodiment of mobile terminal of the present invention;
Figure 11 is the high-level schematic functional block diagram of 4th embodiment of mobile terminal of the present invention;
Figure 12 is the high-level schematic functional block diagram of 5th embodiment of mobile terminal of the present invention;
Figure 13 is the high-level schematic functional block diagram of 6th embodiment of mobile terminal of the present invention;
Figure 14 is the high-level schematic functional block diagram of 7th embodiment of mobile terminal of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used to limit the present invention.
Fig. 1 illustrates one embodiment that the present invention applies management-control method.In the present embodiment, this applies management-control method bag Include following steps:
Step S1, when receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation. If destination application be present in front stage operation, execution step S2.
Step S2, destination application is pushed into running background or target end application program.
When the present embodiment receives screen locking instruction or unlock instruction, backstage will be pushed into the destination application of front stage operation Operation terminates operation.Therefore, though it is non-I when unlocking, the privacy information of destination application will not be also revealed, so as to carry The security performance of terminal data is risen.In addition, before terminal performs screen locking operation, without exiting for user's performance objective application program Operation, so as to improve user experience.
Further, on the basis of above-described embodiment, in other embodiment, in order to cater to the base of the use habit of user On plinth, the leakage of privacy information is avoided.The step S1 of the present embodiment includes:When receiving screen locking instruction or unlock instruction, detection With the presence or absence of in front stage operation and being related to the destination application of privacy information.
It should be noted that the present embodiment is when receiving screen locking instruction, detects whether to be present in front stage operation and relate to And the destination application of privacy information.Screen locking instruction in the present embodiment can be the screen locking that user presses power button input Instruction or detection instruct in preset time without the dormancy (screen locking) sent after operation by mobile terminal system, such as Without 1 minute dormancy instruction sent afterwards of operation.
Specifically, first, the first application program in front stage operation is detected.Secondly, whether first application program is judged Belong to default privacy application.Finally, if the first application program belongs to default privacy application, as destination application.
It should be noted that the default privacy application in the present embodiment can be given tacit consent to terminal or user makes by oneself Justice, and can be revised in real time according to the demand of user.Specifically, the default privacy application in the present embodiment can wrap Include communication applications (for example:Wechat, QQ), financial class application is (for example:Bank class APP) etc..
Step S2, including:If being present in front stage operation and being related to the destination application of privacy information, privacy will be related to The destination application of information is pushed into running background or terminates the destination application for being related to privacy information.
Further, if the destination application belongs to financial class application (for example:Bank's class application), detecting screen locking When instruction or unlock instruction, user's login account information is exited, user needs in the financial class application program of front stage operation again User account is inputted again to be logged in.In this way, it can prevent other people are continuing with the user account after unlocking should to this Operated with program, avoid causing economic loss or cause private information to expose.
The present embodiment is only handled the default privacy application for being related to privacy information.Therefore, avoid to not being related to privacy The processing of the application program of information, on the one hand reduce the treating capacity of application program, so as to improve effective utilization of processor Rate, on the other hand, the application program for not being related to privacy information continue, in front stage operation, to be easy to user to continue to operate, so as to enter one Step improves user experience.
For the technical scheme of this case described in more detail, when it is screen locking instruction to receive, referring to Fig. 2, step S1, bag Include:
Step S101, when receiving screen locking instruction, detect whether to have destination application in front stage operation.If mesh be present Application program is marked in front stage operation, execution step S201.
It is understood that the screen locking that the screen locking instruction in the present embodiment can be user's pressing power button input refers to Order or detection instruct in preset time without the dormancy (screen locking) sent after operation by mobile terminal system, such as nothing The dormancy instruction that operation is sent after 1 minute.
Step S2, including:
Destination application is simultaneously pushed into running background or target end application program by step S201, screen locking.
The present embodiment receives screen locking instruction, and destination application is pushed into running background immediately or terminates the intended application Program, destination application is avoided after screen locking, continued in front stage operation, so as to reduce the electricity losing quantity of terminal, together When avoid the private information in destination application from exposing.
For the technical scheme of this case described in more detail, when it is screen locking instruction to receive, referring to Fig. 3, step S1, bag Include:
Step S111, when receiving screen locking instruction, detect whether to have destination application in front stage operation.If mesh be present Application program is marked in front stage operation, then performs step S211.
Step S2, including:
Step S211, when receiving unlock instruction, judge to unlock whether checking information matches with default unlocking information, solve Lock instruction includes unlocking checking information.If unblock checking information matches with default unlocking information, step S212 is performed.
Step S212, unlock and destination application is pushed into running background or terminates application program.
For the present embodiment in screen locking, there is destination application in front stage operation in detection, and be tested in unblock, it is necessary to unlock After card passes through, management and control processing just is carried out to destination application.On the one hand, to during unlocking, destination application continues for screen locking In front stage operation, to meet user's request, so as to improve user experience.On the other hand, unblock checking is avoided not lead to Out-of-date, the management and control initiated to the processor of terminal to destination application handles request, so that reducing effective utilization of processor Rate.
Further, if be that user operates by unlocking checking information directly to confirm, can continue on foreground Operational objective application program, to meet the needs of user.Therefore, on the basis of above-described embodiment, in other embodiment, referring to Fig. 4, default unlocking information includes the first identity information and the second identity information, then after step S211, if unblock checking information Matched with the first identity information, then perform step S221.If unblock checking information matches with the second identity information, step is performed S222。
Step S221, unblock, and destination application is pushed into running background or terminates application program.
Step S222, unblock, and continue in front stage operation destination application.
On the basis of above-described embodiment, in other embodiment, it is close that the first identity information in the present embodiment includes numeral Code or gesture password, the second identity information include Fingerprint Identity information.It should be noted that the second identity letter in the present embodiment Breath can also be iris information, user images information etc..In other embodiments, the first identity information can be that numeral is close One or more in code, gesture password, Fingerprint Identity information, iris information, user images information etc., the second identity information can Be in numerical ciphers, gesture password, Fingerprint Identity information, iris information, user images information etc. with the first identity information not Same one or more.
In the present invention, when user is unlocked by numerical ciphers or gesture password, then illustrate that now mobile terminal can It can need to lend other people uses, destination application is pushed into backstage when detecting that numerical ciphers or gesture password are unlocked Operation terminates application, in the case of avoiding other people maloperation unblocks, the privacy information of destination application is revealed, so as to enter One step improves terminal data security performance.In addition, when user is unlocked by Fingerprint Identity information, then illustrate this time shift Dynamic terminal is to use in person, and when detecting that Fingerprint Identity information is unlocked, destination application continues in front stage operation, with Meet user's request, so as to further improve user experience.
For the technical scheme of this case described in more detail, when it is unlock instruction to receive, referring to Fig. 5, step S1, bag Include:
Step S121, when receiving unlock instruction, detect whether to have destination application in front stage operation.If mesh be present Application program is marked in front stage operation, execution step S231.
The unlock instruction of the present embodiment the unlock instruction of power button input can be pressed with user or user presses Fingerprint obtains the unlock instruction of region input.
Step S2, including:
Step S231, unlock and destination application is pushed into running background or terminates application program.
When the present embodiment receives unlock instruction, running background or end will be pushed into the destination application of front stage operation Operation.Therefore, even if right and wrong unlock, the privacy information of destination application will not be also revealed, so as to improve terminal The security performance of data.
For the technical scheme of this case described in more detail, when it is unlock instruction to receive, referring to Fig. 6, step S1, bag Include:
Step S131, when receiving unlock instruction, judge to unlock whether checking information matches with default unlocking information, unlock Instruction includes unlocking checking information.If unblock checking information matches with default unlocking information, step S132 is performed.
Step S132, detect whether to have destination application in front stage operation.If destination application be present on foreground Operation, perform step S241.
Step S2, including:
Step S241, unlock and destination application is pushed into running background or terminates application program.
When the present embodiment unblock is verified, just detect whether destination application be present.Therefore, unblock checking is avoided Not by when, initiate detection to destination application to processor and ask, so that reducing the effective rate of utilization of processor.This Outside, unblock checking not by when, destination application continues in front stage operation, to meet user's request, so as to further be lifted User experience.
By being applied to using management-control method during the use of mobile terminal, it is necessary to according to usage scenario not for the present invention The different management and control strategy with selection.Therefore, on the basis of above-described embodiment, in other embodiment, referring to Fig. 7, step S2, bag Include:
Step S251, judge the currently used scene of destination application be belong to continuation usage scenario still fall within can in Disconnected property usage scenario.If the currently used scene of destination application belongs to continuation usage scenario, step S252 is performed.If mesh The mark currently used scene of application program belongs to interruptibility usage scenario, then performs step S253.
Specifically, judge whether destination application is currently used preset function.If destination application is current just Using preset function, then the currently used scene of destination application belongs to continuation usage scenario.If destination application is worked as Preceding unused preset function, then the currently used scene of destination application belong to interruptibility usage scenario.
Preset function in the present embodiment includes:Positioning function, step function, navigation feature, upload function, download work( Energy, AF playing function play video capability etc..
Step S252, destination application is pushed into running background.
Step S253, target end application program.
The present embodiment is different according to the usage scenario of destination application, carries out different processing operations, so that needing to hold The continuous destination application used is in running background, to meet the needs of user, so as to improve user experience.In addition, Destination application without persistently using is closed, to reduce internal memory consume and electricity consume etc..
Fig. 8 illustrates one embodiment of mobile terminal of the present invention.In the present embodiment, the mobile terminal includes detection mould Block 10 and management and control module 11.
Wherein, detection module 10, during for receiving screen locking instruction or unlock instruction, detect whether intended application journey be present Sequence is in front stage operation;Management and control module 11, if for destination application be present in front stage operation, destination application is pushed into Running background or target end application program.
On the basis of above-described embodiment, in other embodiment, referring to Fig. 9, detection module 10 includes the first detection unit 1001.Management and control module 11 includes the first control unit 1101.
Wherein, the first detection unit 1001, when being instructed for receiving screen locking, detect whether that destination application be present exists Front stage operation;First control unit 1101, if for exist destination application front stage operation, screen locking and by target should Running background or target end application program are pushed into program.
On the basis of above-described embodiment, in other embodiment, referring to Figure 10, detection module 10 includes the second detection unit 1011.Management and control module 11 includes the first authentication unit 1111 and the second control unit 1112.
Wherein, the second detection unit 1011, when being instructed for receiving screen locking, detect whether that destination application be present exists Front stage operation;First authentication unit 1111, if for destination application be present in front stage operation, receiving unlock instruction When, judge to unlock whether checking information matches with default unlocking information, unlock instruction includes unblock checking information;Second management and control list Member 1112, if being matched for unlocking checking information with default unlocking information, unlock and destination application is pushed into backstage and transport Row terminates application program.
On the basis of above-described embodiment, in other embodiment, referring to Figure 11, preset unlocking information and believe including the first identity Breath and the second identity information, management and control module 11 also include the 3rd control unit 1121 and the 4th control unit 1122.
Wherein, the 3rd control unit 1121, should by target if being matched for unlocking checking information with the first identity information Running background is pushed into program or terminates application program;4th control unit 1122, if for unlocking checking information and the second body Part information matches, then continue in front stage operation destination application.
On the basis of above-described embodiment, in other embodiment, the first identity information includes numerical ciphers or gesture password, Second identity information includes Fingerprint Identity information.
On the basis of above-described embodiment, in other embodiment, referring to Figure 12, detection module 10 includes the 3rd detection unit 1021.Management and control module 11 includes the 5th control unit 1131.
Wherein, the 3rd detection unit 1021, during for receiving unlock instruction, detect whether that destination application be present exists Front stage operation;5th control unit 1131, if simultaneously should by target in front stage operation, unblock for destination application be present Running background is pushed into program or terminates application program.
On the basis of above-described embodiment, in other embodiment, referring to Figure 13, detection module 10 includes the second authentication unit 1031 and the 4th detection unit 1032.Management and control module 11 includes the 6th control unit 1141.
Wherein, the second authentication unit 1031, during for receiving unlock instruction, judge to unlock checking information whether with it is default Unlocking information matches, and unlock instruction includes unblock checking information;4th detection unit 1032, if for unblock checking information and in advance If unlocking information matches, detect whether to have destination application in front stage operation;6th control unit 1141, if in the presence of Destination application then unblock and is pushed into running background or terminates application program in front stage operation by destination application.
On the basis of above-described embodiment, in other embodiment, referring to Figure 13, management and control module 11 includes judging unit 1151st, the 7th control unit 1152 and the 8th control unit 1153.
Wherein, judging unit 1151, for judging that the currently used scene of destination application is to belong to continuation to use field Scape still falls within interruptibility usage scenario;7th control unit 1152, if for the currently used scene category of destination application In continuation usage scenario, then destination application is pushed into running background;8th control unit 1153, if for intended application The currently used scene of program belongs to interruptibility usage scenario, then target end application program.
The other details of technical scheme are realized on each module in above-mentioned seven embodiment mobile terminals, reference can be made to above-mentioned reality Apply in example using the description in management-control method, here is omitted.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
The embodiment of the present application additionally provides a kind of storage medium, and for storage program data, it, which is included, is used to perform this Shen Please the above-mentioned electric routine data using designed by management-control method embodiment.By performing the program number stored in the storage medium According to, it is possible to achieve what the application provided applies management-control method.
Storage medium in the present embodiment can be read-only storage, can store static information and the static storage of instruction is set Standby, random access memory or can storage information and instruction dynamic memory or electric erazable programmable it is read-only Memory, read-only optical disc or other optical disc storages, laser disc storage, magnetic disk storage medium or other magnetic storage apparatus.
The embodiment of invention is described in detail above, but it is only used as example, and the present invention is not intended to limit With specific embodiments described above.For a person skilled in the art, any equivalent modifications carried out to the invention Or substitute also all among scope of the invention, therefore, the equalization made in the case where not departing from the spirit and principles in the present invention scope Conversion and modification, improvement etc., all should be contained within the scope of the invention.

Claims (15)

1. one kind applies management-control method, it is characterised in that it includes:
When receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, the destination application is pushed into running background or terminates the mesh Mark application program.
2. according to claim 1 apply management-control method, it is characterised in that:
It is described when receiving screen locking instruction or unlock instruction, detect whether to exist destination application the front stage operation the step of, Including:
When receiving screen locking instruction, detect whether to have destination application in front stage operation;
If described have destination application in front stage operation, the destination application is pushed into running background or terminates institute The step of stating destination application, including:
If destination application be present in front stage operation, screen locking and the destination application is pushed into running background or knot Shu Suoshu destination applications.
3. according to claim 1 apply management-control method, it is characterised in that if described have destination application on foreground Operation, then the step of being pushed into running background by the destination application or terminate the destination application, including:
If destination application be present in front stage operation, when receiving unlock instruction, judge to unlock checking information whether with Default unlocking information matching, the unlock instruction include unblock checking information;
If the unblock checking information matches with the default unlocking information, unlock and be pushed into the destination application Running background terminates the application program.
4. according to claim 3 apply management-control method, it is characterised in that the default unlocking information includes the first identity Information and the second identity information, it is described to judge after unlocking the step of whether checking information matches with default unlocking information, also wrap Include:
If the unblock checking information matches with first identity information, unlock and be pushed into the destination application Running background terminates the application program;
If the unblock checking information matches with second identity information, unlock and continue in target described in front stage operation Application program.
5. according to claim 4 apply management-control method, it is characterised in that first identity information includes numerical ciphers Or gesture password, second identity information include Fingerprint Identity information.
6. according to claim 1 apply management-control method, it is characterised in that:
It is described when receiving screen locking instruction or unlock instruction, detect whether to exist destination application the front stage operation the step of, Including:
When receiving unlock instruction, detect whether to have destination application in front stage operation;
If described have destination application in front stage operation, the destination application is pushed into running background or terminates institute The step of stating destination application, including:
If destination application be present simultaneously is pushed into running background or knot in front stage operation, unblock by the destination application Shu Suoshu application programs.
7. according to claim 1 apply management-control method, it is characterised in that it is described the destination application is pushed into after The step of platform runs or terminates the destination application, including:
It is to belong to continuation usage scenario to still fall within interruptibility use to judge the currently used scene of the destination application Scene;
If the currently used scene of destination application belongs to the continuation usage scenario, by the destination application It is pushed into running background;
If the currently used scene of destination application belongs to interruptibility usage scenario, terminate the intended application journey Sequence.
8. a kind of mobile terminal, it is characterised in that it includes:
Detection module, during for receiving screen locking instruction or unlock instruction, detect whether that destination application be present transports on foreground OK;
Management and control module, if for destination application being present in front stage operation, the destination application being pushed into backstage and is transported Row terminates the destination application.
9. mobile terminal according to claim 8, it is characterised in that:
The detection module, including:
First detection unit, when instructing for receiving screen locking, detect whether to have destination application in front stage operation;
The management and control module, including:
First control unit, if for destination application be present in front stage operation, screen locking and by the destination application It is pushed into running background or terminates the destination application.
10. mobile terminal according to claim 8, it is characterised in that:
The management and control module, including:
First authentication unit, if for destination application be present in front stage operation, when receiving unlock instruction, judge to solve Whether lock checking information matches with default unlocking information, and the unlock instruction includes unblock checking information;
Second control unit, if being matched for the unblock checking information with the default unlocking information, unlock and by described in Destination application is pushed into running background or terminates the application program.
11. mobile terminal according to claim 10, it is characterised in that the default unlocking information is believed including the first identity Breath and the second identity information, the management and control module also include:
3rd control unit, if being matched for the unblock checking information with first identity information, unlock and by described in Destination application is pushed into running background or terminates the application program;
4th control unit, if being matched for the unblock checking information with second identity information, unlock and continue Destination application described in front stage operation.
12. mobile terminal according to claim 11, it is characterised in that first identity information include numerical ciphers or Gesture password, second identity information include Fingerprint Identity information.
13. mobile terminal according to claim 8, it is characterised in that:
The detection module, including:
3rd detection unit, during for receiving unlock instruction, detect whether to have destination application in front stage operation;
The management and control module, including:
5th control unit, if for destination application be present in front stage operation, unlock and by the destination application It is pushed into running background or terminates the application program.
14. mobile terminal according to claim 8, it is characterised in that:
The management and control module, including:
Judging unit, for judging that the currently used scene of the destination application is to belong to continuation usage scenario to still fall within Interruptibility usage scenario;
7th control unit, if belonging to the continuation usage scenario for the currently used scene of the destination application, The destination application is pushed into running background;
8th control unit, if belonging to interruptibility usage scenario for the currently used scene of the destination application, tie Shu Suoshu destination applications.
15. a kind of storage medium, is stored thereon with routine data, it is characterised in that when described program data are executed by processor, The step of realizing any one of the claim 1-7 application management-control method.
CN201710467394.5A 2017-06-19 2017-06-19 Using management-control method, mobile terminal and storage medium Pending CN107370873A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710467394.5A CN107370873A (en) 2017-06-19 2017-06-19 Using management-control method, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710467394.5A CN107370873A (en) 2017-06-19 2017-06-19 Using management-control method, mobile terminal and storage medium

Publications (1)

Publication Number Publication Date
CN107370873A true CN107370873A (en) 2017-11-21

Family

ID=60305584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710467394.5A Pending CN107370873A (en) 2017-06-19 2017-06-19 Using management-control method, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN107370873A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664818A (en) * 2018-05-14 2018-10-16 维沃移动通信有限公司 A kind of unlock control method and device
CN111932718A (en) * 2019-04-25 2020-11-13 珠海格力电器股份有限公司 Control method, device, system, terminal and storage medium of intelligent door lock
CN113515254A (en) * 2021-07-29 2021-10-19 上海传英信息技术有限公司 Interface display method, terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318185A (en) * 2014-09-26 2015-01-28 厦门美图移动科技有限公司 Application control method, application control equipment and mobile terminal
CN104978109A (en) * 2015-07-15 2015-10-14 魅族科技(中国)有限公司 Application program interface display method and terminal
US9477394B2 (en) * 2010-10-01 2016-10-25 Z124 Desktop reveal
CN106294209A (en) * 2015-06-12 2017-01-04 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106687969A (en) * 2015-10-08 2017-05-17 华为技术有限公司 Method and terminal device for protecting privacy information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9477394B2 (en) * 2010-10-01 2016-10-25 Z124 Desktop reveal
CN104318185A (en) * 2014-09-26 2015-01-28 厦门美图移动科技有限公司 Application control method, application control equipment and mobile terminal
CN106294209A (en) * 2015-06-12 2017-01-04 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN104978109A (en) * 2015-07-15 2015-10-14 魅族科技(中国)有限公司 Application program interface display method and terminal
CN106687969A (en) * 2015-10-08 2017-05-17 华为技术有限公司 Method and terminal device for protecting privacy information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664818A (en) * 2018-05-14 2018-10-16 维沃移动通信有限公司 A kind of unlock control method and device
CN111932718A (en) * 2019-04-25 2020-11-13 珠海格力电器股份有限公司 Control method, device, system, terminal and storage medium of intelligent door lock
CN113515254A (en) * 2021-07-29 2021-10-19 上海传英信息技术有限公司 Interface display method, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN102404727B (en) The method of controlling security and device of mobile terminal
CN103377332B (en) The method of access application and device
WO2020216131A1 (en) Digital key-based identity authentication method, terminal apparatus, and medium
CN104376274B (en) The guard method of mobile terminal payment interface and device
JP2019521455A (en) Method and device for managing service operation risk
CN110310205A (en) A kind of block chain data monitoring method, device, equipment and medium
CN109416800B (en) Authentication method of mobile terminal and mobile terminal
CN107370873A (en) Using management-control method, mobile terminal and storage medium
CN106453205A (en) Identity verification method and identity verification device
EP3007066A1 (en) Method for using shared device in apparatus capable of operating two operating systems
CN205139990U (en) No IC -card authentication hot water consumption management system based on two -dimensional code
CN110458572B (en) User risk determining method and target risk recognition model establishing method
CN104967593A (en) Identity verification method, apparatus and system
CN106454800A (en) Identity verification method, device and system
CN104363589A (en) Identity authentication method, device and terminal
WO2013168151A2 (en) Method and system for authentication of communication and operation
CN106778178A (en) The call method and device of fingerprint business card
US20150113602A1 (en) Method and system for authentication of communication and operation
CN105871840B (en) A kind of certificate management method and system
CN107580138A (en) Instant messaging processing method, mobile terminal and storage medium based on dual system
CN106534047A (en) Information transmitting method and apparatus based on Trust application
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
CN109446818A (en) A kind of novel computer starting method
CN106685931A (en) Smart card application management method and system, a terminal and smart card
CN106683250A (en) Entrance guard device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171121