CN107729745A - Data processing method, terminal, computer installation and computer-readable recording medium - Google Patents
Data processing method, terminal, computer installation and computer-readable recording medium Download PDFInfo
- Publication number
- CN107729745A CN107729745A CN201711011628.1A CN201711011628A CN107729745A CN 107729745 A CN107729745 A CN 107729745A CN 201711011628 A CN201711011628 A CN 201711011628A CN 107729745 A CN107729745 A CN 107729745A
- Authority
- CN
- China
- Prior art keywords
- application program
- targeted security
- security application
- target element
- clicking operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3234—Power saving characterised by the action undertaken
- G06F1/329—Power saving characterised by the action undertaken by task scheduling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
Abstract
The embodiment of the present application discloses a kind of data processing method, terminal, computer installation and computer-readable recording medium, for saving the power consumption of Android system and improving the performance of Android system.This method includes:The first clicking operation is received, first clicking operation is the operation performed by the initial interface of triggering intended application;Judge whether target element is registered in targeted security application program according to first clicking operation, the target element is that first clicking operation clicks on component in the initial interface;If so, then the target element is started by the targeted security application program.
Description
Technical field
The application is related to software field, more particularly to data processing method, terminal, computer installation and computer-readable deposits
Storage media.
Background technology
In Android system, when a Android application is installed, often not just increase the thing that user can see, such as should
With the icon of program, or many background services (Service) of increase, broadcast service (BroadCastReciever), ACTION
And to store and obtaining the content that data provide the resident Android system backstage such as unified interface (ContentProvider),
The a large amount of system resources of Android system are taken, and the authority that can also utilize application program oneself to get, user profile is stolen, is repaiied
Change system setting, increase power consumption.
Cell phone manufacturer carries out interception limit to all installed using the System Privileges, background process, wake operation that get
System.Deficiency existing for this method is to bring the setting options of complexity, and intelligently can not be configured these choosings for user
.
Third party security firm sets security application, decides whether that Android application program is put into safety answers by user
Performed with program, once into security application, the Android application will be limited and protected.This method is present
Deficiency be third party's security application poor performance, and can not be compatible with most of Android application programs.
The content of the invention
The embodiment of the present application provides a kind of data processing method, terminal, computer installation and computer-readable storage medium
Matter, for reducing Android system power consumption and lifting the performance of Android system.
The embodiment of the present application first aspect provides a kind of data processing method, specifically includes:
The first clicking operation is received, first clicking operation is the behaviour performed by the initial interface of triggering intended application
Make;
Judge whether target element is registered in targeted security application program according to first clicking operation, the target
Component is the component in first clicking operation click initial interface;
If so, then the target element is started by the targeted security application program.
Alternatively, before the first clicking operation of the reception, methods described also includes:
Android installation kit corresponding to the intended application is parsed by the targeted security application program, by institute
The component for stating Android installation kit corresponding to intended application is registered in the targeted security application program;
When the component of Android Android bag corresponding to the intended application registers completion in the targeted security application program
Afterwards, all interface elements of the intended application are extracted;
The initial interface is determined from all interface elements of the intended application, and the initial interface is shown.
Alternatively, when the target element is unregistered in the targeted security application program, methods described also includes:
The target element is registered in the targeted security application program, with the targeted security application journey
Corresponding first assembly in sequence establishes incidence relation;
By the target element that incidence relation is established with the first assembly by starting in the targeted security application program.
Alternatively, it is described that the target element that incidence relation is established with the first assembly is passed through into the targeted security application
Starting in program includes:
The first assembly is run to find code class name corresponding to the target element;
Determined to start code according to code class name corresponding to the target element, and by the code that starts by the mesh
Component is marked to start.
Alternatively, it is described the target element is started by the targeted security application program after, the side
Method also includes:
Receive the second clicking operation of the user;
According to the second clicking operation of the user by the intended application and the targeted security closing application program,
Closed with all component for registering the intended application in the targeted security application program.
Alternatively, it is described to judge target element whether in the targeted security application program according to first clicking operation
Middle registration includes:
According to first clicking operation judge the target element with corresponding group in the targeted security application program
Whether part establishes incidence relation;
If, it is determined that the target element is registered in the targeted security application program.
The embodiment of the present application second aspect provides a kind of terminal, specifically includes:
Receiving unit, for receiving the first clicking operation, first clicking operation is the initial boundary of triggering intended application
Operation performed by face;
Judging unit, for judging target element whether in targeted security application program according to first clicking operation
Registration, the target element are the component in first clicking operation click initial interface;
First processing units, described in when the target element is registered in the targeted security application program, inciting somebody to action
Target element is started by the targeted security application program.
Alternatively, the terminal also includes:
Resolution unit, for being entered by the targeted security application program to Android installation kit corresponding to the intended application
Row parsing, the component of Android installation kit corresponding to the intended application is noted in the targeted security application program
Volume;
Extraction unit, registered for the component when the target Android Android bag in the targeted security application program
Cheng Hou, extract all interface elements of the intended application;
Display unit, the initial interface is determined from all interface elements of the intended application, and will be described initial
Interface display.
Alternatively, the terminal also includes:
Registering unit, for when the target element is unregistered in the targeted security application program, by the mesh
Mark component registered in the targeted security application program, with corresponding first in the targeted security application program
Component establishes incidence relation;
Second processing unit, for running the first assembly to find code class name corresponding to the target element;
The second processing unit is additionally operable to the code class name according to corresponding to the target element and determines to start code, and leads to
The startup code is crossed to start the target element.
Alternatively, the receiving unit, it is additionally operable to receive the second clicking operation of the user;
The first processing units, it is additionally operable to the intended application and institute according to the second clicking operation of the user
Targeted security closing application program is stated, all component that the intended application is registered in the targeted security application program
Close.
Alternatively, the judging unit is specifically used for:
According to first clicking operation judge the target element with corresponding group in the targeted security application program
Whether part establishes incidence relation;
If, it is determined that the target element is registered in the targeted security application program.
The embodiment of the present application third aspect provides a kind of terminal, including:
One or more processors unit, processing unit, bus system and one or more programs, the processor
Unit is connected with the processing unit by the bus system;
Wherein one or more of programs are stored in the processing unit, and one or more of programs include referring to
Order, the instruction make the terminal perform such as the above-mentioned each side methods described of the embodiment of the present application when being performed by the terminal
Step.
The embodiment of the present application fourth aspect provides a kind of computer installation, and the computer installation includes processor, institute
State when processor is used to perform the computer program stored in memory and realize such as the step of above-mentioned each side methods described.
The aspect of the embodiment of the present application the 5th provides a kind of computer-readable recording medium, is stored thereon with computer journey
Sequence, it is characterised in that:Realized when the computer program is executed by processor such as the step of above-mentioned each side methods described.
In summary, in the terminal, Android installation kit is mounted in targeted security application program corresponding to intended application,
When the target element in operational objective application, it can be determined that whether the target element is registered in targeted security application program,
If the target element is registered in targeted security application program, the target element is opened by targeted security application program
Move and run.Because all softwares of intended application need just run after registration in targeted security application program, this
Sample can improve the security of Android application program, and because the component of all applications in intended application is in safety applications
Run in program, so after security application closing, all component in the security application is turned off, without
The running background of Android system again, save the power consumption of Android system and improve the performance of Android system.
Brief description of the drawings
The embodiment schematic diagram for the data processing method that Fig. 1 is provided by the embodiment of the present application;
One embodiment schematic diagram for the terminal that Fig. 2 is provided by the embodiment of the present application;
Another embodiment schematic diagram for the terminal that Fig. 3 is provided by the embodiment of the present application;
The hardware architecture diagram for the data processing equipment that Fig. 4 is provided by the embodiment of the present application.
Embodiment
The embodiment of the present application provides a kind of data processing method, terminal, computer installation and computer-readable storage medium
Matter, for reducing Android system power consumption and lifting the performance of Android system.
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.
Term " first ", " second ", " the 3rd " in the description and claims of this application and above-mentioned accompanying drawing, "
The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage
The data that solution so uses can exchange in the appropriate case, so that the embodiments described herein can be with except illustrating herein
Or the order beyond the content of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that
Cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or equipment need not limit
In those steps or unit for clearly listing, but may include not list clearly or for these processes, method, production
The intrinsic other steps of product or equipment or unit.
Referring to Fig. 1, Fig. 1 is one embodiment of data processing method in the embodiment of the present application, including:
101st, Android installation kit corresponding to intended application is parsed by targeted security application program, should by target
Registered with the component of corresponding Android installation kit in targeted security application program.
In the present embodiment, when user needs operational objective to apply, target can be answered by targeted security application program
Parsed with corresponding Android installation kit, by the component of Android installation kit corresponding to intended application in targeted security application journey
Registered in sequence.That is, the incidence relation of the component in intended application and the component in targeted security application program is established.
It should be noted that not limiting the mode for obtaining Android installation kit herein, such as can be answering by terminal
Downloaded with shop, or by the Internet download, can also obtained in other way.The targeted security application program can be with
It is installed in terminal, triggering targeted security application program can also adds in Android installation kit corresponding to operational objective application in advance
In terminal, do not limit specifically.
102nd, after the completion of the component of Android Android bag corresponding to intended application is registered in targeted security application program, carry
Take all interface elements of intended application.
In the present embodiment, when the component of Android installation kit corresponding to intended application has been registered in targeted security application program
Cheng Hou, extract all interface elements of intended application.Established in targeted security application program corresponding with intended application
After the incidence relation of the component of Android installation kit, by including institute's bounded of intended application in the configuration file of intended application
Face, the corresponding interface element (such as initial interface element corresponding to initial interface) in each interface, can now extract mesh
Mark all interface elements of application.
103rd, initial interface is determined from all interface elements of intended application, and initial interface is shown.
, can be from all interfaces of intended application after all interface elements of intended application are extracted in the present embodiment
Initial interface element is found out in element, and is shown initial interface by initial interface element.
It should be noted that including specific code in element, initial interface is shown i.e. by loading initial interface
Corresponding code is shown initial interface.
104th, the first clicking operation is received.
In the present embodiment, terminal can receive the first clicking operation of user, and first clicking operation should for triggering target
Operation performed by initial interface, such as the address list in wechat application initial interface is clicked on, wechat is to operate in target
Android application in security application.
105th, judge whether target element is registered in targeted security application program according to the first clicking operation, if so, then
Step 106 is performed, if it is not, then performing step 107.
In the present embodiment, terminal can be after the first clicking operation of user be received, and triggering, which performs, judges target element
Whether registered in targeted security application program, i.e., target element and targeted security application program are judged according to the first clicking operation
In corresponding component whether establish incidence relation, that is to say, that judge whether established in targeted security application program and target group
The relevant component of part, if so, step 106 is then performed, if it is not, step 107 is then performed, wherein, target element first
Clicking operation clicks on the component in initial interface.For example, when the first clicking operation of user is in click wechat application interface
During address list, whether triggering terminal judges address list component in wechat application interface in security application corresponding to wechat
Registration.
It should be noted that the security application more than one in terminal, can be with an Android application program corresponding one
Individual security application, can also the corresponding security application of multiple Android application programs, can also an Android application
Program corresponds to multiple security applications, as long as can guarantee that Android application program is run in security application, specifically
Do not limit.
106th, target element is started by the targeted security application program.
In the present embodiment, when terminal determines that target element is registered in targeted security application program, you can to incite somebody to action
Target element is run by targeted security application program.
107th, target element is registered in targeted security application program, with pair in targeted security application program
The first assembly answered establishes incidence relation.
, can be by target when terminal determines that target element is not registered in targeted security application program in the present embodiment
Component is registered in targeted security application program, will in targeted security application program newly-built first assembly, and establish
Incidence relation between one component and target element.
108th, by the target element that incidence relation is established with first assembly by starting in targeted security application program.
In the present embodiment, the first assembly in targeted security application program is established to associate with target element when terminal contacted
Afterwards, first assembly is run to find code class name corresponding to target element, and code class name is true according to corresponding to target element
Surely start code, and started target element by starting code, i.e., terminal can be by starting in targeted security application program
First assembly, target element is started.
It should be noted that after user performs the operation of destination application corresponding to completion intended application, terminal can
To receive the second clicking operation of user, and according to the second clicking operation of user by intended application and targeted security application journey
Sequence is closed, and intended application is registered to all component closing in targeted security application program.
In summary, in the terminal, Android installation kit is mounted in targeted security application program corresponding to intended application,
When the target element in operational objective application, it can be determined that whether the target element is registered in targeted security application program,
If the target element is registered in targeted security application program, the target element is opened by targeted security application program
Move and run.Because all softwares of intended application need just run after registration in targeted security application program, this
Sample can improve the security of Android application program, and because the component of all applications in intended application is in safety applications
Run in program, so after security application closing, all component in the security application is turned off, without
The running background of Android system again, save the power consumption of Android system and improve the performance of Android system.
The embodiment of the present application is described from the angle of data processing method above, below from the angle of terminal to this Shen
Please embodiment be described.
Referring to Fig. 2, Fig. 2 is terminal one embodiment schematic diagram that the embodiment of the present application provides:
Receiving unit 201, for receiving the first clicking operation, the first clicking operation is the initial interface of triggering intended application
Performed operation;
Judging unit 202, for judging target element whether in targeted security application program according to the first clicking operation
Registration, target element are the component in first clicking operation click initial interface;
First processing units 203, for when target element is registered in targeted security application program, target element to be led to
Target security application is crossed to be started.
In order to make it easy to understand, the terminal in the embodiment of the present application is described in detail with reference to Fig. 3.
Referring to Fig. 3, Fig. 3 is another embodiment schematic diagram for the terminal that the application provides, including:
Resolution unit 301, for being solved by targeted security application program to Android installation kit corresponding to intended application
Analysis, the component of Android installation kit corresponding to intended application is registered in targeted security application program;
Extraction unit 302, after the completion of being registered when the component of target Android Android bag in targeted security application program,
Extract all interface elements of intended application;
Display unit 303, initial interface is determined from all interface elements of intended application, and initial interface is shown;
Receiving unit 304, for receiving the first clicking operation, the first clicking operation is the initial interface of triggering intended application
Performed operation;
Judging unit 305, for judging target element whether in targeted security application program according to the first clicking operation
Registration, target element are the component in first clicking operation click initial interface;
First processing units 306, for when target element is registered in targeted security application program, target element to be led to
Target security application is crossed to be started;
Registering unit 307, for when target element is unregistered in targeted security application program, by target element in mesh
Registered in mark security application, closed with establishing association with the corresponding first assembly in the targeted security application program
System;
Second processing unit 308, the target element that incidence relation is established with first assembly is passed through into targeted security application journey
Sequence starts;
Wherein, second processing unit 308 is specifically used for operation first assembly to find code class name corresponding to target element,
And the code class name according to corresponding to target element determines to start code, and the target element is started by starting code.
Wherein, receiving unit 304, it is additionally operable to receive the second clicking operation of user;
First processing units 306, being additionally operable to should by intended application and targeted security according to the second clicking operation of user
With stop, all component that intended application is registered in targeted security application program is closed.
Judging unit 305 is specifically used for:
Judge whether target element component corresponding with targeted security application program establishes pass according to the first clicking operation
Connection relation;
If, it is determined that target element is registered in targeted security application program.
In summary, in the terminal, Android installation kit is mounted in targeted security application program corresponding to intended application,
When the target element in operational objective application, it can be determined that whether the target element is registered in targeted security application program,
If the target element is registered in targeted security application program, the target element is opened by targeted security application program
Move and run.Because all softwares of intended application need just run after registration in targeted security application program, this
Sample can improve the security of Android application program, and because the component of all applications in intended application is in safety applications
Run in program, so after security application closing, all component in the security application is turned off, without
The running background of Android system again, save the power consumption of Android system and improve the performance of Android system.
Referring to Fig. 4, Fig. 4 is the structural representation for the terminal that the embodiment of the present application provides.The terminal 400 of the embodiment is wrapped
Include:Processor, memory and the computer program that can be run in the memory and on the processor is stored in, such as
Receive program.The step in the embodiment of above-mentioned each data processing method is realized described in the computing device during computer program
Such as the step 101 shown in Fig. 1 suddenly,.Or above-mentioned terminal embodiment is realized described in the computing device during computer program
The function of middle each unit, such as receiving unit.
Exemplary, the computer program can be divided into one or more units, one or more of lists
Member is stored in the memory, and by the computing device, to complete the application.One or more of units can be with
It is the series of computation machine programmed instruction section that can complete specific function, the instruction segment is used to describe the computer program in institute
State the implementation procedure in terminal.For example, the computer program can be divided into resolution unit, extraction unit, display unit,
Receiving unit, judging unit, first processing units, registering unit and second processing unit, each unit concrete function are as follows:
Resolution unit, for being parsed by targeted security application program to Android installation kit corresponding to intended application,
So that the component of Android installation kit corresponding to intended application to be registered in targeted security application program;
Extraction unit, after the completion of being registered when the component of target Android Android bag in targeted security application program, carry
Take all interface elements of intended application;
Display unit, initial interface is determined from all interface elements of intended application, and initial interface is shown;
Receiving unit, for receiving the first clicking operation, the first clicking operation is triggers the initial interface institute of intended application
The operation of execution;
Judging unit, for judging whether target element is noted in targeted security application program according to the first clicking operation
Volume, target element are the component in first clicking operation click initial interface;
First processing units, for when target element is registered in targeted security application program, target element to be passed through
Targeted security application program is started;
Registering unit, for when target element is unregistered in targeted security application program, by target element in target
Registered in security application, closed with establishing association with the corresponding first assembly in the targeted security application program
System;
Second processing unit, the target element that incidence relation is established with first assembly is opened by targeted security application program
It is dynamic;
Wherein, receiving unit, it is additionally operable to receive the second clicking operation of user;
First processing units, it is additionally operable to intended application and targeted security application journey according to the second clicking operation of user
Sequence is closed, and all component that intended application is registered in targeted security application program is closed;
Second processing unit is specific:
For running first assembly to find code class name corresponding to target element, and the code according to corresponding to target element
Class name determines to start code, and is started the target element by starting code;
Judging unit is specifically used for:
Judge whether target element component corresponding with targeted security application program establishes pass according to the first clicking operation
Connection relation;
If, it is determined that target element is registered in targeted security application program.
The terminal can be the computing devices such as desktop PC, notebook, palm PC and cloud server.It is described
Terminal may include, but be not limited only to, processor, memory.It will be understood by those skilled in the art that the schematic diagram is only eventually
The restriction of the example at end, not structure paired terminal, it can include than illustrating more or less parts, or some portions of combination
Part, or different parts, such as the terminal can also include input-output equipment, network access equipment, bus etc..
Alleged processor can be CPU (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng the processor is the control centre of the terminal, utilizes various interfaces and the various pieces of the whole terminal of connection.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing
The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization
The various functions of terminal.The memory can mainly include storing program area and storage data field, wherein, storing program area can deposit
Application program (such as sound-playing function, image player function etc.) needed for storage operating system, at least one function etc.;Storage
Data field can store uses created data (such as voice data, phone directory etc.) etc. according to mobile phone.In addition, memory can
So that including high-speed random access memory, nonvolatile memory, such as hard disk, internal memory, plug-in type hard disk, intelligence can also be included
Energy storage card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash
Card), at least one disk memory, flush memory device or other volatile solid-state parts.
If the integrated unit of the terminal realized in the form of SFU software functional unit and as independent production marketing or
In use, it can be stored in a computer read/write memory medium.Based on such understanding, the application realizes above-mentioned implementation
All or part of flow in example method, by computer program the hardware of correlation can also be instructed to complete, described meter
Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being executed by processor
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer-readable medium
It can include:Any entity or device, recording medium, USB flash disk, mobile hard disk, the magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It is it should be noted that described
The content that computer-readable medium includes can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice
Subtract, such as in some jurisdictions, electric carrier signal and electricity are not included according to legislation and patent practice, computer-readable medium
Believe signal.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or
The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communicate to connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, the technical scheme of the application is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the application
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
Described above, above example is only to illustrate the technical scheme of the application, rather than its limitations;Although with reference to before
Embodiment is stated the application is described in detail, it will be understood by those within the art that:It still can be to preceding
State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these
Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and scope of each embodiment technical scheme of the application.
Claims (10)
- A kind of 1. data processing method, applied to hand-held mobile terminal, it is characterised in that including:The first clicking operation is received, first clicking operation is the operation performed by the initial interface of triggering intended application;Judge whether target element is registered in targeted security application program according to first clicking operation, the target element The component in the initial interface is clicked on for first clicking operation;If so, then the target element is started by the targeted security application program.
- 2. according to the method for claim 1, it is characterised in that before the first clicking operation of the reception, methods described is also Including:Android installation kit corresponding to the intended application is parsed by the targeted security application program, by the mesh The component of Android installation kit is registered in the targeted security application program corresponding to mark application;After the completion of the component of Android Android bag corresponding to the intended application is registered in the targeted security application program, carry Take all interface elements of the intended application;The initial interface is determined from all interface elements of the intended application, and the initial interface is shown.
- 3. method according to claim 1 or 2, it is characterised in that when the target element is in the targeted security application When unregistered in program, methods described also includes:The target element is registered in the targeted security application program, with the targeted security application program Corresponding first assembly establish incidence relation;By the target element that incidence relation is established with the first assembly by starting in the targeted security application program.
- 4. according to the method for claim 3, it is characterised in that the mesh that incidence relation will be established with the first assembly Mark component is included by starting in the targeted security application program:The first assembly is run to find code class name corresponding to the target element;Determined to start code according to code class name corresponding to the target element, and by the code that starts by the target group Part starts.
- 5. method according to claim 1 or 2, it is characterised in that described to pacify the target element by the target After full application program is started, methods described also includes:Receive the second clicking operation of the user;, will according to the second clicking operation of the user by the intended application and the targeted security closing application program The all component that the intended application is registered in the targeted security application program is closed.
- 6. method according to claim 1 or 2, it is characterised in that described that target is judged according to first clicking operation Whether component is registered in the targeted security application program includes:Judge that the target element is with corresponding component in the targeted security application program according to first clicking operation It is no to establish incidence relation;If, it is determined that the target element is registered in the targeted security application program.
- A kind of 7. terminal, it is characterised in that including:Receiving unit, for receiving the first clicking operation, first clicking operation is triggers the initial interface institute of intended application The operation of execution;Judging unit, for judging whether target element is noted in targeted security application program according to first clicking operation Volume, the target element are the component in first clicking operation click initial interface;First processing units, for when the target element is registered in the targeted security application program, by the target Component is started by the targeted security application program.
- 8. terminal according to claim 7, it is characterised in that the terminal also includes:Resolution unit, for being solved by the targeted security application program to Android installation kit corresponding to the intended application Analysis, the component of Android installation kit corresponding to the intended application is registered in the targeted security application program;Extraction unit, completion is registered in the targeted security application program for the component when the target Android Android bag Afterwards, all interface elements of the intended application are extracted;Display unit, determines the initial interface from all interface elements of the intended application, and by the initial interface Display.
- 9. a kind of computer installation, it is characterised in that the computer installation includes processor, and the processor is deposited for execution The step of any one methods described in such as claim 1-6 is realized during the computer program stored in reservoir.
- 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that:The computer program The step of any one methods described in such as claim 1-6 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711011628.1A CN107729745A (en) | 2017-10-24 | 2017-10-24 | Data processing method, terminal, computer installation and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711011628.1A CN107729745A (en) | 2017-10-24 | 2017-10-24 | Data processing method, terminal, computer installation and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107729745A true CN107729745A (en) | 2018-02-23 |
Family
ID=61213638
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711011628.1A Pending CN107729745A (en) | 2017-10-24 | 2017-10-24 | Data processing method, terminal, computer installation and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107729745A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111814196A (en) * | 2020-09-04 | 2020-10-23 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
US11341284B2 (en) | 2020-09-04 | 2022-05-24 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based data management methods, apparatuses, and devices |
US11354448B2 (en) | 2020-09-04 | 2022-06-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Demand trusted device-based data acquisition methods, apparatuses, and devices |
US11354447B2 (en) | 2020-08-28 | 2022-06-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data authorization information acquisition methods, apparatuses, and devices |
US11362815B2 (en) | 2020-08-28 | 2022-06-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted data transmission methods, apparatuses, and devices |
US11386191B2 (en) | 2020-09-15 | 2022-07-12 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based identity management methods, apparatuses, and devices |
US11494511B2 (en) | 2020-09-15 | 2022-11-08 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
US11604894B2 (en) | 2020-07-24 | 2023-03-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, devices, and media |
US11614929B2 (en) | 2020-08-28 | 2023-03-28 | Alipay (Hangzhou) Information Technology Co., Ltd. | Identity registration methods, apparatuses, and devices |
US11652879B2 (en) | 2020-08-28 | 2023-05-16 | Alipay (Hangzhou) Information Technology Co., Ltd. | Matching methods, apparatuses, and devices based on trusted asset data |
US11726968B2 (en) | 2020-09-15 | 2023-08-15 | Alipay (Hangzhou) Information Technology Co., Ltd. | Methods, apparatuses, and devices for transferring data assets based on blockchain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7146611B1 (en) * | 2003-02-24 | 2006-12-05 | Hewlett-Packard Development Company, L.P. | Method and system for managing memory for software modules |
CN104268019A (en) * | 2014-09-23 | 2015-01-07 | 广州金山网络科技有限公司 | Software operating method and device and terminal |
CN106055396A (en) * | 2016-05-27 | 2016-10-26 | 深圳市金立通信设备有限公司 | Application management method and terminal |
-
2017
- 2017-10-24 CN CN201711011628.1A patent/CN107729745A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7146611B1 (en) * | 2003-02-24 | 2006-12-05 | Hewlett-Packard Development Company, L.P. | Method and system for managing memory for software modules |
CN104268019A (en) * | 2014-09-23 | 2015-01-07 | 广州金山网络科技有限公司 | Software operating method and device and terminal |
CN106055396A (en) * | 2016-05-27 | 2016-10-26 | 深圳市金立通信设备有限公司 | Application management method and terminal |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11604894B2 (en) | 2020-07-24 | 2023-03-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, devices, and media |
US11354447B2 (en) | 2020-08-28 | 2022-06-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data authorization information acquisition methods, apparatuses, and devices |
US11362815B2 (en) | 2020-08-28 | 2022-06-14 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted data transmission methods, apparatuses, and devices |
US11614929B2 (en) | 2020-08-28 | 2023-03-28 | Alipay (Hangzhou) Information Technology Co., Ltd. | Identity registration methods, apparatuses, and devices |
US11652879B2 (en) | 2020-08-28 | 2023-05-16 | Alipay (Hangzhou) Information Technology Co., Ltd. | Matching methods, apparatuses, and devices based on trusted asset data |
CN111814196A (en) * | 2020-09-04 | 2020-10-23 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment |
US11341284B2 (en) | 2020-09-04 | 2022-05-24 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based data management methods, apparatuses, and devices |
US11354448B2 (en) | 2020-09-04 | 2022-06-07 | Alipay (Hangzhou) Information Technology Co., Ltd. | Demand trusted device-based data acquisition methods, apparatuses, and devices |
US11455417B2 (en) | 2020-09-04 | 2022-09-27 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
US11386191B2 (en) | 2020-09-15 | 2022-07-12 | Alipay (Hangzhou) Information Technology Co., Ltd. | Trusted hardware-based identity management methods, apparatuses, and devices |
US11494511B2 (en) | 2020-09-15 | 2022-11-08 | Alipay (Hangzhou) Information Technology Co., Ltd. | Data processing methods, apparatuses, and devices |
US11726968B2 (en) | 2020-09-15 | 2023-08-15 | Alipay (Hangzhou) Information Technology Co., Ltd. | Methods, apparatuses, and devices for transferring data assets based on blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107729745A (en) | Data processing method, terminal, computer installation and computer-readable recording medium | |
CN108365961B (en) | The response method and server that interface call method and terminal device, interface call | |
US9633098B2 (en) | System and method for maintaining device state coherency | |
CN109327439B (en) | Risk identification method and device for service request data, storage medium and equipment | |
CN104598286B (en) | The Oftware updating method and device of mobile terminal | |
CN107484190B (en) | Method for connecting network, mobile terminal and computer readable storage medium | |
CN107292342A (en) | Data processing method and related product | |
CN106790727B (en) | Information push method and device | |
CN105426761B (en) | A kind of recognition methods of illegal application and mobile terminal | |
CN107894920A (en) | Resource allocation method and Related product | |
CN107729836A (en) | Face identification method and Related product | |
CN107357833A (en) | Data processing method and related product | |
CN106851779A (en) | A kind of method and mobile terminal for recognizing access point and focus | |
CN106096450A (en) | A kind of application program freezing method and mobile terminal | |
CN109347898A (en) | Sending method, display methods and the server and mobile terminal of scene information | |
CN104254074A (en) | Method and device for intercepting spam short messages | |
US10282719B1 (en) | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit | |
CN107908940A (en) | The method and terminal device of a kind of fingerprint recognition | |
CN108984339B (en) | Data recovery method and related product | |
CN104426960B (en) | A kind of trial method and device of payment applications | |
CN106559315A (en) | Buddy communication method and device | |
CN107957905A (en) | Method, apparatus, storage medium and the intelligent terminal of self-starting are applied in limitation | |
CN107819768A (en) | Service end actively disconnects method, terminal device and the storage medium of illegal long connection | |
CN105320885A (en) | Method and device for detecting malicious website | |
CN106027532A (en) | Voiceprint-based subscriber identity authentication method, terminal and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180223 |
|
RJ01 | Rejection of invention patent application after publication |