CN107370873A - Using management-control method, mobile terminal and storage medium - Google Patents
Using management-control method, mobile terminal and storage medium Download PDFInfo
- Publication number
- CN107370873A CN107370873A CN201710467394.5A CN201710467394A CN107370873A CN 107370873 A CN107370873 A CN 107370873A CN 201710467394 A CN201710467394 A CN 201710467394A CN 107370873 A CN107370873 A CN 107370873A
- Authority
- CN
- China
- Prior art keywords
- destination application
- front stage
- stage operation
- pushed
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses one kind to apply management-control method, mobile terminal and storage medium.Wherein, this includes using management-control method:When receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation;If destination application be present in front stage operation, destination application is pushed into running background or target end application program.When the present invention receives screen locking instruction or unlock instruction, running background will be pushed into the destination application of front stage operation or terminate to run.Therefore, though it is non-I when unlocking, the privacy information of destination application will not be revealed, so as to improve the security performance of terminal data.In addition, before terminal performs screen locking operation, operation is exited without user's performance objective application program, so as to improve user experience.
Description
Technical field
The present invention relates to field of terminal technology, more particularly to one kind to apply management-control method, mobile terminal and storage medium.
Background technology
Mobile terminal has become everybody indispensability at present, as communication tool and the means of payment carried with etc..Therefore,
Mobile terminal is stored with the substantial amounts of private information of user.
But during the use of mobile terminal, in order to cater to the use habit of user, user does not exit intended application
Screen locking operation is carried out to mobile terminal in the case of program, after unlocking again, may proceed to perform the intended application journey on foreground
Sequence.If the destination application is related to privacy information and my non-execution unblock operation, cause leakage of private information, so that
Reduce terminal data security.In addition, in order to avoid destination application leakage of private information, it is necessary to which user is locking every time
Performed before screen and exit operation, so that reducing user experience.
The content of the invention
It is an object of the invention to provide one kind to apply management-control method, to solve existing mobile terminal data security performance
Difference, and the problem of user experience difference.In addition, implement the mobile end for applying management-control method present invention also offers a kind of
End.
In order to solve the above problems, the invention provides one kind to apply management-control method, and it includes:
When receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, destination application is pushed into running background or target end should
Use program.
Further improved as of the invention:When receiving screen locking instruction or unlock instruction, detect whether intended application be present
Program the front stage operation the step of, including:
When receiving screen locking instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, destination application is pushed into running background or target end should
The step of with program, including:
If destination application be present in front stage operation, screen locking and destination application is pushed into running background or knot
Beam destination application.
Further improved as of the invention:If destination application be present in front stage operation, destination application is pushed away
The step of to running background or target end application program, including:
If destination application be present in front stage operation, when receiving unlock instruction, judge that unlocking checking information is
No to be matched with default unlocking information, unlock instruction includes unblock checking information;
If unblock checking information matches with default unlocking information, unlock and destination application is pushed into running background
Or terminate application program.
Further improved as of the invention, default unlocking information includes the first identity information and the second identity information, judges
After the step of whether unblock checking information matches with default unlocking information, in addition to:
If unblock checking information matches with the first identity information, unlock and destination application is pushed into running background
Or terminate application program;
If unblock checking information matches with the second identity information, unlock and continue in front stage operation destination application.
Further improved as of the invention, the first identity information includes numerical ciphers or gesture password, the second identity information
Including Fingerprint Identity information.
Further improved as of the invention:When receiving screen locking instruction or unlock instruction, detect whether intended application be present
Program the front stage operation the step of, including:
When receiving unlock instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, destination application is pushed into running background or target end should
The step of with program, including:
If destination application be present simultaneously is pushed into running background or knot in front stage operation, unblock by destination application
Beam application program.
Further improved as of the invention, destination application is pushed into the step of running background or target end application program
Suddenly, including:
It is to belong to continuation usage scenario to still fall within interruptibility use to judge the currently used scene of destination application
Scene;
If the currently used scene of destination application belongs to continuation usage scenario, destination application is pushed into backstage
Operation;
If the currently used scene of destination application belongs to interruptibility usage scenario, target end application program.
In order to solve the above problems, present invention also offers a kind of mobile terminal, and it includes:
Detection module, during for receiving screen locking instruction or unlock instruction, detect whether to have destination application preceding
Platform is run;
Management and control module, if for destination application being present in front stage operation, destination application being pushed into backstage and is transported
Row or target end application program.
Further improved as of the invention:Detection module, including:
First detection unit, when instructing for receiving screen locking, detect whether to have destination application in front stage operation;
Management and control module, including:
First control unit, if for destination application be present in front stage operation, screen locking and by destination application
It is pushed into running background or target end application program.
Further improved as of the invention:Management and control module, including:
First authentication unit, if for destination application be present in front stage operation, when receiving unlock instruction, sentence
Whether disconnected unblock checking information matches with default unlocking information, and unlock instruction includes unblock checking information;
Second control unit, if being matched for unlocking checking information with default unlocking information, unblock and by intended application
Program is pushed into running background or terminates application program.
Further improved as of the invention, default unlocking information includes the first identity information and the second identity information, management and control
Module also includes:
3rd control unit, if being matched for unlocking checking information with the first identity information, destination application is pushed away
To running background or terminate application program;
4th control unit, if being matched for unlocking checking information with the second identity information, continue in front stage operation mesh
Mark application program.
Further improved as of the invention, the first identity information includes numerical ciphers or gesture password, the second identity information
Including Fingerprint Identity information.
Further improved as of the invention:Detection module, including:
3rd detection unit, during for receiving unlock instruction, detect whether to have destination application in front stage operation;
Management and control module, including:
5th control unit, if for destination application be present in front stage operation, unlock and by destination application
It is pushed into running background or terminates application program.
Further improved as of the invention:Management and control module, including:
Judging unit, for judging that the currently used scene of destination application is to belong to continuation usage scenario to still fall within
Interruptibility usage scenario;
7th control unit, if belonging to continuation usage scenario for the currently used scene of destination application, by mesh
Mark application program is pushed into running background;
8th control unit, if belonging to interruptibility usage scenario for the currently used scene of destination application, tie
Beam destination application.
In order to solve the above problems, present invention also offers a kind of storage medium, is stored thereon with routine data, program number
During according to being executed by processor, the step of realizing above-mentioned application management-control method.
Compared with prior art, when the present invention receives screen locking instruction or unlock instruction, will be answered in the target of front stage operation
Running background is pushed into program or terminates operation.Therefore, though it is non-I unlock when, will not also reveal the hidden of destination application
Personal letter ceases, so as to improve the security performance of terminal data.In addition, before terminal performs screen locking operation, without user's performance objective
Application program exits operation, so as to improve user experience.
Brief description of the drawings
Fig. 1 is the schematic flow sheet that the present invention applies management-control method one embodiment;
Fig. 2 is the schematic flow sheet that the present invention applies second embodiment of management-control method;
Fig. 3 is the schematic flow sheet that the present invention applies the 3rd embodiment of management-control method;
Fig. 4 is the schematic flow sheet that the present invention applies the 4th embodiment of management-control method;
Fig. 5 is the schematic flow sheet that the present invention applies the 5th embodiment of management-control method;
Fig. 6 is the schematic flow sheet that the present invention applies the 6th embodiment of management-control method;
Fig. 7 is the schematic flow sheet that the present invention applies the 7th embodiment of management-control method;
Fig. 8 is the high-level schematic functional block diagram of mobile terminal one embodiment of the present invention;
Fig. 9 is the high-level schematic functional block diagram of second embodiment of mobile terminal of the present invention;
Figure 10 is the high-level schematic functional block diagram of 3rd embodiment of mobile terminal of the present invention;
Figure 11 is the high-level schematic functional block diagram of 4th embodiment of mobile terminal of the present invention;
Figure 12 is the high-level schematic functional block diagram of 5th embodiment of mobile terminal of the present invention;
Figure 13 is the high-level schematic functional block diagram of 6th embodiment of mobile terminal of the present invention;
Figure 14 is the high-level schematic functional block diagram of 7th embodiment of mobile terminal of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used to limit the present invention.
Fig. 1 illustrates one embodiment that the present invention applies management-control method.In the present embodiment, this applies management-control method bag
Include following steps:
Step S1, when receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation.
If destination application be present in front stage operation, execution step S2.
Step S2, destination application is pushed into running background or target end application program.
When the present embodiment receives screen locking instruction or unlock instruction, backstage will be pushed into the destination application of front stage operation
Operation terminates operation.Therefore, though it is non-I when unlocking, the privacy information of destination application will not be also revealed, so as to carry
The security performance of terminal data is risen.In addition, before terminal performs screen locking operation, without exiting for user's performance objective application program
Operation, so as to improve user experience.
Further, on the basis of above-described embodiment, in other embodiment, in order to cater to the base of the use habit of user
On plinth, the leakage of privacy information is avoided.The step S1 of the present embodiment includes:When receiving screen locking instruction or unlock instruction, detection
With the presence or absence of in front stage operation and being related to the destination application of privacy information.
It should be noted that the present embodiment is when receiving screen locking instruction, detects whether to be present in front stage operation and relate to
And the destination application of privacy information.Screen locking instruction in the present embodiment can be the screen locking that user presses power button input
Instruction or detection instruct in preset time without the dormancy (screen locking) sent after operation by mobile terminal system, such as
Without 1 minute dormancy instruction sent afterwards of operation.
Specifically, first, the first application program in front stage operation is detected.Secondly, whether first application program is judged
Belong to default privacy application.Finally, if the first application program belongs to default privacy application, as destination application.
It should be noted that the default privacy application in the present embodiment can be given tacit consent to terminal or user makes by oneself
Justice, and can be revised in real time according to the demand of user.Specifically, the default privacy application in the present embodiment can wrap
Include communication applications (for example:Wechat, QQ), financial class application is (for example:Bank class APP) etc..
Step S2, including:If being present in front stage operation and being related to the destination application of privacy information, privacy will be related to
The destination application of information is pushed into running background or terminates the destination application for being related to privacy information.
Further, if the destination application belongs to financial class application (for example:Bank's class application), detecting screen locking
When instruction or unlock instruction, user's login account information is exited, user needs in the financial class application program of front stage operation again
User account is inputted again to be logged in.In this way, it can prevent other people are continuing with the user account after unlocking should to this
Operated with program, avoid causing economic loss or cause private information to expose.
The present embodiment is only handled the default privacy application for being related to privacy information.Therefore, avoid to not being related to privacy
The processing of the application program of information, on the one hand reduce the treating capacity of application program, so as to improve effective utilization of processor
Rate, on the other hand, the application program for not being related to privacy information continue, in front stage operation, to be easy to user to continue to operate, so as to enter one
Step improves user experience.
For the technical scheme of this case described in more detail, when it is screen locking instruction to receive, referring to Fig. 2, step S1, bag
Include:
Step S101, when receiving screen locking instruction, detect whether to have destination application in front stage operation.If mesh be present
Application program is marked in front stage operation, execution step S201.
It is understood that the screen locking that the screen locking instruction in the present embodiment can be user's pressing power button input refers to
Order or detection instruct in preset time without the dormancy (screen locking) sent after operation by mobile terminal system, such as nothing
The dormancy instruction that operation is sent after 1 minute.
Step S2, including:
Destination application is simultaneously pushed into running background or target end application program by step S201, screen locking.
The present embodiment receives screen locking instruction, and destination application is pushed into running background immediately or terminates the intended application
Program, destination application is avoided after screen locking, continued in front stage operation, so as to reduce the electricity losing quantity of terminal, together
When avoid the private information in destination application from exposing.
For the technical scheme of this case described in more detail, when it is screen locking instruction to receive, referring to Fig. 3, step S1, bag
Include:
Step S111, when receiving screen locking instruction, detect whether to have destination application in front stage operation.If mesh be present
Application program is marked in front stage operation, then performs step S211.
Step S2, including:
Step S211, when receiving unlock instruction, judge to unlock whether checking information matches with default unlocking information, solve
Lock instruction includes unlocking checking information.If unblock checking information matches with default unlocking information, step S212 is performed.
Step S212, unlock and destination application is pushed into running background or terminates application program.
For the present embodiment in screen locking, there is destination application in front stage operation in detection, and be tested in unblock, it is necessary to unlock
After card passes through, management and control processing just is carried out to destination application.On the one hand, to during unlocking, destination application continues for screen locking
In front stage operation, to meet user's request, so as to improve user experience.On the other hand, unblock checking is avoided not lead to
Out-of-date, the management and control initiated to the processor of terminal to destination application handles request, so that reducing effective utilization of processor
Rate.
Further, if be that user operates by unlocking checking information directly to confirm, can continue on foreground
Operational objective application program, to meet the needs of user.Therefore, on the basis of above-described embodiment, in other embodiment, referring to
Fig. 4, default unlocking information includes the first identity information and the second identity information, then after step S211, if unblock checking information
Matched with the first identity information, then perform step S221.If unblock checking information matches with the second identity information, step is performed
S222。
Step S221, unblock, and destination application is pushed into running background or terminates application program.
Step S222, unblock, and continue in front stage operation destination application.
On the basis of above-described embodiment, in other embodiment, it is close that the first identity information in the present embodiment includes numeral
Code or gesture password, the second identity information include Fingerprint Identity information.It should be noted that the second identity letter in the present embodiment
Breath can also be iris information, user images information etc..In other embodiments, the first identity information can be that numeral is close
One or more in code, gesture password, Fingerprint Identity information, iris information, user images information etc., the second identity information can
Be in numerical ciphers, gesture password, Fingerprint Identity information, iris information, user images information etc. with the first identity information not
Same one or more.
In the present invention, when user is unlocked by numerical ciphers or gesture password, then illustrate that now mobile terminal can
It can need to lend other people uses, destination application is pushed into backstage when detecting that numerical ciphers or gesture password are unlocked
Operation terminates application, in the case of avoiding other people maloperation unblocks, the privacy information of destination application is revealed, so as to enter
One step improves terminal data security performance.In addition, when user is unlocked by Fingerprint Identity information, then illustrate this time shift
Dynamic terminal is to use in person, and when detecting that Fingerprint Identity information is unlocked, destination application continues in front stage operation, with
Meet user's request, so as to further improve user experience.
For the technical scheme of this case described in more detail, when it is unlock instruction to receive, referring to Fig. 5, step S1, bag
Include:
Step S121, when receiving unlock instruction, detect whether to have destination application in front stage operation.If mesh be present
Application program is marked in front stage operation, execution step S231.
The unlock instruction of the present embodiment the unlock instruction of power button input can be pressed with user or user presses
Fingerprint obtains the unlock instruction of region input.
Step S2, including:
Step S231, unlock and destination application is pushed into running background or terminates application program.
When the present embodiment receives unlock instruction, running background or end will be pushed into the destination application of front stage operation
Operation.Therefore, even if right and wrong unlock, the privacy information of destination application will not be also revealed, so as to improve terminal
The security performance of data.
For the technical scheme of this case described in more detail, when it is unlock instruction to receive, referring to Fig. 6, step S1, bag
Include:
Step S131, when receiving unlock instruction, judge to unlock whether checking information matches with default unlocking information, unlock
Instruction includes unlocking checking information.If unblock checking information matches with default unlocking information, step S132 is performed.
Step S132, detect whether to have destination application in front stage operation.If destination application be present on foreground
Operation, perform step S241.
Step S2, including:
Step S241, unlock and destination application is pushed into running background or terminates application program.
When the present embodiment unblock is verified, just detect whether destination application be present.Therefore, unblock checking is avoided
Not by when, initiate detection to destination application to processor and ask, so that reducing the effective rate of utilization of processor.This
Outside, unblock checking not by when, destination application continues in front stage operation, to meet user's request, so as to further be lifted
User experience.
By being applied to using management-control method during the use of mobile terminal, it is necessary to according to usage scenario not for the present invention
The different management and control strategy with selection.Therefore, on the basis of above-described embodiment, in other embodiment, referring to Fig. 7, step S2, bag
Include:
Step S251, judge the currently used scene of destination application be belong to continuation usage scenario still fall within can in
Disconnected property usage scenario.If the currently used scene of destination application belongs to continuation usage scenario, step S252 is performed.If mesh
The mark currently used scene of application program belongs to interruptibility usage scenario, then performs step S253.
Specifically, judge whether destination application is currently used preset function.If destination application is current just
Using preset function, then the currently used scene of destination application belongs to continuation usage scenario.If destination application is worked as
Preceding unused preset function, then the currently used scene of destination application belong to interruptibility usage scenario.
Preset function in the present embodiment includes:Positioning function, step function, navigation feature, upload function, download work(
Energy, AF playing function play video capability etc..
Step S252, destination application is pushed into running background.
Step S253, target end application program.
The present embodiment is different according to the usage scenario of destination application, carries out different processing operations, so that needing to hold
The continuous destination application used is in running background, to meet the needs of user, so as to improve user experience.In addition,
Destination application without persistently using is closed, to reduce internal memory consume and electricity consume etc..
Fig. 8 illustrates one embodiment of mobile terminal of the present invention.In the present embodiment, the mobile terminal includes detection mould
Block 10 and management and control module 11.
Wherein, detection module 10, during for receiving screen locking instruction or unlock instruction, detect whether intended application journey be present
Sequence is in front stage operation;Management and control module 11, if for destination application be present in front stage operation, destination application is pushed into
Running background or target end application program.
On the basis of above-described embodiment, in other embodiment, referring to Fig. 9, detection module 10 includes the first detection unit
1001.Management and control module 11 includes the first control unit 1101.
Wherein, the first detection unit 1001, when being instructed for receiving screen locking, detect whether that destination application be present exists
Front stage operation;First control unit 1101, if for exist destination application front stage operation, screen locking and by target should
Running background or target end application program are pushed into program.
On the basis of above-described embodiment, in other embodiment, referring to Figure 10, detection module 10 includes the second detection unit
1011.Management and control module 11 includes the first authentication unit 1111 and the second control unit 1112.
Wherein, the second detection unit 1011, when being instructed for receiving screen locking, detect whether that destination application be present exists
Front stage operation;First authentication unit 1111, if for destination application be present in front stage operation, receiving unlock instruction
When, judge to unlock whether checking information matches with default unlocking information, unlock instruction includes unblock checking information;Second management and control list
Member 1112, if being matched for unlocking checking information with default unlocking information, unlock and destination application is pushed into backstage and transport
Row terminates application program.
On the basis of above-described embodiment, in other embodiment, referring to Figure 11, preset unlocking information and believe including the first identity
Breath and the second identity information, management and control module 11 also include the 3rd control unit 1121 and the 4th control unit 1122.
Wherein, the 3rd control unit 1121, should by target if being matched for unlocking checking information with the first identity information
Running background is pushed into program or terminates application program;4th control unit 1122, if for unlocking checking information and the second body
Part information matches, then continue in front stage operation destination application.
On the basis of above-described embodiment, in other embodiment, the first identity information includes numerical ciphers or gesture password,
Second identity information includes Fingerprint Identity information.
On the basis of above-described embodiment, in other embodiment, referring to Figure 12, detection module 10 includes the 3rd detection unit
1021.Management and control module 11 includes the 5th control unit 1131.
Wherein, the 3rd detection unit 1021, during for receiving unlock instruction, detect whether that destination application be present exists
Front stage operation;5th control unit 1131, if simultaneously should by target in front stage operation, unblock for destination application be present
Running background is pushed into program or terminates application program.
On the basis of above-described embodiment, in other embodiment, referring to Figure 13, detection module 10 includes the second authentication unit
1031 and the 4th detection unit 1032.Management and control module 11 includes the 6th control unit 1141.
Wherein, the second authentication unit 1031, during for receiving unlock instruction, judge to unlock checking information whether with it is default
Unlocking information matches, and unlock instruction includes unblock checking information;4th detection unit 1032, if for unblock checking information and in advance
If unlocking information matches, detect whether to have destination application in front stage operation;6th control unit 1141, if in the presence of
Destination application then unblock and is pushed into running background or terminates application program in front stage operation by destination application.
On the basis of above-described embodiment, in other embodiment, referring to Figure 13, management and control module 11 includes judging unit
1151st, the 7th control unit 1152 and the 8th control unit 1153.
Wherein, judging unit 1151, for judging that the currently used scene of destination application is to belong to continuation to use field
Scape still falls within interruptibility usage scenario;7th control unit 1152, if for the currently used scene category of destination application
In continuation usage scenario, then destination application is pushed into running background;8th control unit 1153, if for intended application
The currently used scene of program belongs to interruptibility usage scenario, then target end application program.
The other details of technical scheme are realized on each module in above-mentioned seven embodiment mobile terminals, reference can be made to above-mentioned reality
Apply in example using the description in management-control method, here is omitted.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined
See the part explanation of embodiment of the method.
The embodiment of the present application additionally provides a kind of storage medium, and for storage program data, it, which is included, is used to perform this Shen
Please the above-mentioned electric routine data using designed by management-control method embodiment.By performing the program number stored in the storage medium
According to, it is possible to achieve what the application provided applies management-control method.
Storage medium in the present embodiment can be read-only storage, can store static information and the static storage of instruction is set
Standby, random access memory or can storage information and instruction dynamic memory or electric erazable programmable it is read-only
Memory, read-only optical disc or other optical disc storages, laser disc storage, magnetic disk storage medium or other magnetic storage apparatus.
The embodiment of invention is described in detail above, but it is only used as example, and the present invention is not intended to limit
With specific embodiments described above.For a person skilled in the art, any equivalent modifications carried out to the invention
Or substitute also all among scope of the invention, therefore, the equalization made in the case where not departing from the spirit and principles in the present invention scope
Conversion and modification, improvement etc., all should be contained within the scope of the invention.
Claims (15)
1. one kind applies management-control method, it is characterised in that it includes:
When receiving screen locking instruction or unlock instruction, detect whether to have destination application in front stage operation;
If destination application be present in front stage operation, the destination application is pushed into running background or terminates the mesh
Mark application program.
2. according to claim 1 apply management-control method, it is characterised in that:
It is described when receiving screen locking instruction or unlock instruction, detect whether to exist destination application the front stage operation the step of,
Including:
When receiving screen locking instruction, detect whether to have destination application in front stage operation;
If described have destination application in front stage operation, the destination application is pushed into running background or terminates institute
The step of stating destination application, including:
If destination application be present in front stage operation, screen locking and the destination application is pushed into running background or knot
Shu Suoshu destination applications.
3. according to claim 1 apply management-control method, it is characterised in that if described have destination application on foreground
Operation, then the step of being pushed into running background by the destination application or terminate the destination application, including:
If destination application be present in front stage operation, when receiving unlock instruction, judge to unlock checking information whether with
Default unlocking information matching, the unlock instruction include unblock checking information;
If the unblock checking information matches with the default unlocking information, unlock and be pushed into the destination application
Running background terminates the application program.
4. according to claim 3 apply management-control method, it is characterised in that the default unlocking information includes the first identity
Information and the second identity information, it is described to judge after unlocking the step of whether checking information matches with default unlocking information, also wrap
Include:
If the unblock checking information matches with first identity information, unlock and be pushed into the destination application
Running background terminates the application program;
If the unblock checking information matches with second identity information, unlock and continue in target described in front stage operation
Application program.
5. according to claim 4 apply management-control method, it is characterised in that first identity information includes numerical ciphers
Or gesture password, second identity information include Fingerprint Identity information.
6. according to claim 1 apply management-control method, it is characterised in that:
It is described when receiving screen locking instruction or unlock instruction, detect whether to exist destination application the front stage operation the step of,
Including:
When receiving unlock instruction, detect whether to have destination application in front stage operation;
If described have destination application in front stage operation, the destination application is pushed into running background or terminates institute
The step of stating destination application, including:
If destination application be present simultaneously is pushed into running background or knot in front stage operation, unblock by the destination application
Shu Suoshu application programs.
7. according to claim 1 apply management-control method, it is characterised in that it is described the destination application is pushed into after
The step of platform runs or terminates the destination application, including:
It is to belong to continuation usage scenario to still fall within interruptibility use to judge the currently used scene of the destination application
Scene;
If the currently used scene of destination application belongs to the continuation usage scenario, by the destination application
It is pushed into running background;
If the currently used scene of destination application belongs to interruptibility usage scenario, terminate the intended application journey
Sequence.
8. a kind of mobile terminal, it is characterised in that it includes:
Detection module, during for receiving screen locking instruction or unlock instruction, detect whether that destination application be present transports on foreground
OK;
Management and control module, if for destination application being present in front stage operation, the destination application being pushed into backstage and is transported
Row terminates the destination application.
9. mobile terminal according to claim 8, it is characterised in that:
The detection module, including:
First detection unit, when instructing for receiving screen locking, detect whether to have destination application in front stage operation;
The management and control module, including:
First control unit, if for destination application be present in front stage operation, screen locking and by the destination application
It is pushed into running background or terminates the destination application.
10. mobile terminal according to claim 8, it is characterised in that:
The management and control module, including:
First authentication unit, if for destination application be present in front stage operation, when receiving unlock instruction, judge to solve
Whether lock checking information matches with default unlocking information, and the unlock instruction includes unblock checking information;
Second control unit, if being matched for the unblock checking information with the default unlocking information, unlock and by described in
Destination application is pushed into running background or terminates the application program.
11. mobile terminal according to claim 10, it is characterised in that the default unlocking information is believed including the first identity
Breath and the second identity information, the management and control module also include:
3rd control unit, if being matched for the unblock checking information with first identity information, unlock and by described in
Destination application is pushed into running background or terminates the application program;
4th control unit, if being matched for the unblock checking information with second identity information, unlock and continue
Destination application described in front stage operation.
12. mobile terminal according to claim 11, it is characterised in that first identity information include numerical ciphers or
Gesture password, second identity information include Fingerprint Identity information.
13. mobile terminal according to claim 8, it is characterised in that:
The detection module, including:
3rd detection unit, during for receiving unlock instruction, detect whether to have destination application in front stage operation;
The management and control module, including:
5th control unit, if for destination application be present in front stage operation, unlock and by the destination application
It is pushed into running background or terminates the application program.
14. mobile terminal according to claim 8, it is characterised in that:
The management and control module, including:
Judging unit, for judging that the currently used scene of the destination application is to belong to continuation usage scenario to still fall within
Interruptibility usage scenario;
7th control unit, if belonging to the continuation usage scenario for the currently used scene of the destination application,
The destination application is pushed into running background;
8th control unit, if belonging to interruptibility usage scenario for the currently used scene of the destination application, tie
Shu Suoshu destination applications.
15. a kind of storage medium, is stored thereon with routine data, it is characterised in that when described program data are executed by processor,
The step of realizing any one of the claim 1-7 application management-control method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710467394.5A CN107370873A (en) | 2017-06-19 | 2017-06-19 | Using management-control method, mobile terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710467394.5A CN107370873A (en) | 2017-06-19 | 2017-06-19 | Using management-control method, mobile terminal and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107370873A true CN107370873A (en) | 2017-11-21 |
Family
ID=60305584
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710467394.5A Pending CN107370873A (en) | 2017-06-19 | 2017-06-19 | Using management-control method, mobile terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107370873A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108664818A (en) * | 2018-05-14 | 2018-10-16 | 维沃移动通信有限公司 | A kind of unlock control method and device |
CN111932718A (en) * | 2019-04-25 | 2020-11-13 | 珠海格力电器股份有限公司 | Control method, device, system, terminal and storage medium of intelligent door lock |
CN113515254A (en) * | 2021-07-29 | 2021-10-19 | 上海传英信息技术有限公司 | Interface display method, terminal and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318185A (en) * | 2014-09-26 | 2015-01-28 | 厦门美图移动科技有限公司 | Application control method, application control equipment and mobile terminal |
CN104978109A (en) * | 2015-07-15 | 2015-10-14 | 魅族科技(中国)有限公司 | Application program interface display method and terminal |
US9477394B2 (en) * | 2010-10-01 | 2016-10-25 | Z124 | Desktop reveal |
CN106294209A (en) * | 2015-06-12 | 2017-01-04 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN106687969A (en) * | 2015-10-08 | 2017-05-17 | 华为技术有限公司 | Method and terminal device for protecting privacy information |
-
2017
- 2017-06-19 CN CN201710467394.5A patent/CN107370873A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9477394B2 (en) * | 2010-10-01 | 2016-10-25 | Z124 | Desktop reveal |
CN104318185A (en) * | 2014-09-26 | 2015-01-28 | 厦门美图移动科技有限公司 | Application control method, application control equipment and mobile terminal |
CN106294209A (en) * | 2015-06-12 | 2017-01-04 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN104978109A (en) * | 2015-07-15 | 2015-10-14 | 魅族科技(中国)有限公司 | Application program interface display method and terminal |
CN106687969A (en) * | 2015-10-08 | 2017-05-17 | 华为技术有限公司 | Method and terminal device for protecting privacy information |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108664818A (en) * | 2018-05-14 | 2018-10-16 | 维沃移动通信有限公司 | A kind of unlock control method and device |
CN111932718A (en) * | 2019-04-25 | 2020-11-13 | 珠海格力电器股份有限公司 | Control method, device, system, terminal and storage medium of intelligent door lock |
CN113515254A (en) * | 2021-07-29 | 2021-10-19 | 上海传英信息技术有限公司 | Interface display method, terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102404727B (en) | The method of controlling security and device of mobile terminal | |
CN103377332B (en) | The method of access application and device | |
WO2020216131A1 (en) | Digital key-based identity authentication method, terminal apparatus, and medium | |
CN104376274B (en) | The guard method of mobile terminal payment interface and device | |
JP2019521455A (en) | Method and device for managing service operation risk | |
CN110310205A (en) | A kind of block chain data monitoring method, device, equipment and medium | |
CN109416800B (en) | Authentication method of mobile terminal and mobile terminal | |
CN107370873A (en) | Using management-control method, mobile terminal and storage medium | |
CN106453205A (en) | Identity verification method and identity verification device | |
EP3007066A1 (en) | Method for using shared device in apparatus capable of operating two operating systems | |
CN205139990U (en) | No IC -card authentication hot water consumption management system based on two -dimensional code | |
CN110458572B (en) | User risk determining method and target risk recognition model establishing method | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN106454800A (en) | Identity verification method, device and system | |
CN104363589A (en) | Identity authentication method, device and terminal | |
WO2013168151A2 (en) | Method and system for authentication of communication and operation | |
CN106778178A (en) | The call method and device of fingerprint business card | |
US20150113602A1 (en) | Method and system for authentication of communication and operation | |
CN105871840B (en) | A kind of certificate management method and system | |
CN107580138A (en) | Instant messaging processing method, mobile terminal and storage medium based on dual system | |
CN106534047A (en) | Information transmitting method and apparatus based on Trust application | |
CN112637195B (en) | Method and device for controlling electronic equipment and electronic equipment | |
CN109446818A (en) | A kind of novel computer starting method | |
CN106685931A (en) | Smart card application management method and system, a terminal and smart card | |
CN106683250A (en) | Entrance guard device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171121 |