CN108174036B - Method and system for managing and controlling application program - Google Patents

Method and system for managing and controlling application program Download PDF

Info

Publication number
CN108174036B
CN108174036B CN201711463112.0A CN201711463112A CN108174036B CN 108174036 B CN108174036 B CN 108174036B CN 201711463112 A CN201711463112 A CN 201711463112A CN 108174036 B CN108174036 B CN 108174036B
Authority
CN
China
Prior art keywords
terminal
risk
application
forbidden
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711463112.0A
Other languages
Chinese (zh)
Other versions
CN108174036A (en
Inventor
麻华英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Genius Technology Co Ltd
Original Assignee
Guangdong Genius Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Genius Technology Co Ltd filed Critical Guangdong Genius Technology Co Ltd
Priority to CN201711463112.0A priority Critical patent/CN108174036B/en
Publication of CN108174036A publication Critical patent/CN108174036A/en
Application granted granted Critical
Publication of CN108174036B publication Critical patent/CN108174036B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)

Abstract

A method and system for managing applications, comprising: the server sends the application identifier of the installed application of the second terminal and the risk index of each application to the first terminal, wherein the risk index is an index which is counted in advance by the server and used for indicating the learning influence degree of the application on the user, the larger the risk index is, the larger the learning influence degree of the application on the user is, and the first terminal controls the second terminal to set the target application in the applications installed by the second terminal to be forbidden according to the application identifier and the risk index of each application, so that the second terminal sets the use state of the target application to be forbidden. By implementing the embodiment of the invention, parents can timely know the risk information of the applications installed on the learning tablet of the student, and the use permission of the children on the application program on the learning tablet can be controlled, so that the children are prevented from being addicted to the learning tablet for a long time for entertainment, and the learning efficiency is improved.

Description

Method and system for managing and controlling application program
Technical Field
The invention relates to the technical field of internet, in particular to a method and a system for managing and controlling an application program.
Background
Currently, more and more parents buy learning tablets for their own children to enable the children to learn using the learning tablets, but due to lack of effective supervision, the children can enjoy downloading an entertaining application program through the learning tablets instead of learning using the learning tablets, while being hidden from the parents. At the moment, parents cannot control the using permission of the children on the recreational application program on the learning tablet, so that the children are addicted to the learning tablet for a long time to play, and the learning efficiency is reduced.
Disclosure of Invention
The embodiment of the invention discloses a method and a system for managing and controlling an application program, which can manage and control the use permission of a child on the learning tablet to prevent the child from being addicted to the learning tablet for a long time for entertainment, thereby improving the learning efficiency.
The first aspect of the embodiments of the present invention discloses a method for managing and controlling an application program, including:
the method comprises the steps that a server sends risk application information to a first terminal, wherein the risk application information at least comprises an application identifier of each application installed by a second terminal and a risk index of each application installed by the second terminal, the risk index of each application installed by the second terminal is an index which is counted by the server in advance and used for representing the learning influence degree of the application on a user, and the second terminal is a terminal bound with the first terminal in advance;
the first terminal sends a control instruction to the second terminal according to the risk application information; the control instruction is used for instructing the second terminal to set and disable a target application in the installed applications of the second terminal;
and the second terminal sets the use state of the target application to a forbidden state according to the control instruction.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the method further includes:
the server defining risk categories of all risk applications, the risk applications being applications that have an adverse effect on the learning of the user of the second terminal;
the server sets a risk label of a risk application installed on the second terminal according to the risk category; the risk label is a risk category of a risk application installed on the second terminal;
the method further comprises the following steps:
the server detects whether the second terminal installs a new risk application, and if so, the server executes the risk application information sent to the first terminal; the risk application information further comprises a risk label of each risk application in the second terminal installed applications, the second terminal installed applications comprise the new risk applications, and the risk application information is sent to the first terminal according to the sequence of the risk indexes of each application installed by the second terminal from high to low.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, before the first terminal sends the control instruction to the second terminal according to the risk application information, the method further includes:
the first terminal starts control software; the control software at least comprises a risk management and control module, and the risk management and control module is used for enabling a user of the first terminal to set target applications in the second terminal installed applications to be forbidden and a forbidden mode aiming at the target applications;
the first terminal detects that a user of the first terminal sets the target application to be forbidden through the risk management and control module and a forbidden mode aiming at the target application, wherein the forbidden mode comprises a complete forbidden mode or a forbidden mode in different time periods;
the control instruction is specifically used for instructing the second terminal to set and disable the target application according to a disabling mode for the target application.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the method further includes:
the server counts first forbidden amounts of all user terminals adopting the complete forbidden mode and second forbidden amounts of all user terminals adopting the forbidden mode in different time periods aiming at a certain risk application installed on the second terminal;
the server selects forbidden amount with a larger value from the first forbidden amount and the second forbidden amount, and determines a forbidden mode corresponding to the forbidden amount with the larger value;
the server sets the determined forbidden mode corresponding to the forbidden amount with the larger numerical value as a recommended control mode for the certain risk application, and sends the recommended control mode to the first terminal;
when the recommended control mode is the time-interval-based disabling mode, the server counts all time intervals selected to be disabled by all user terminals adopting the time-interval-based disabling mode for the certain risk application, selects a time interval with the maximum number of times of disabling from all the time intervals as a recommended disabling time interval, and sends the recommended disabling time interval to the first terminal;
after the first terminal starts control software and before the first terminal detects that the user of the first terminal sets the target application to be disabled and the disabling mode for the target application through the risk management and control module, the method further includes:
when the recommended management and control mode is the complete forbidden mode, the first terminal outputs the complete forbidden mode and triggers the execution of the detection of the target application which is set to be forbidden by the user of the first terminal through the risk management and control module and the forbidden mode aiming at the target application;
when the recommended management and control mode is the forbidden mode in different time periods, the first terminal outputs the forbidden mode in different time periods and the forbidden time period recommended by the first terminal, and triggers the execution of the detection that the user of the first terminal sets the forbidden target application and the forbidden mode aiming at the target application through the risk management and control module.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the method further includes:
the server calculates a risk index of the installed application of the second terminal according to a preset calculation formula, wherein the preset calculation formula is expressed as:
F=[(A1÷C1)+(A2÷C1)]÷2;
wherein a1 represents a third forbidden amount for all user terminals in the fully forbidden manner for an application installed on the second terminal, a2 represents a fourth forbidden amount for all user terminals in the time-period forbidden manner for the application, C1 represents a download amount for the application, and F represents a risk index for the application.
The second aspect of the embodiment of the invention discloses a system for managing and controlling application programs, which comprises a server, a first terminal and a second terminal, wherein the second terminal is a terminal bound with the first terminal in advance;
wherein the server comprises:
a first sending unit, configured to send risk application information to the first terminal, where the risk application information at least includes an application identifier of each application installed in the second terminal and a risk index of each application installed in the second terminal, and the risk index of each application installed in the second terminal is an index that is counted by the server in advance and used for indicating a learning influence degree of the application on a user;
wherein the first terminal includes:
a first receiving unit, configured to receive the risk application information sent by the first sending unit;
a second sending unit, configured to send a control instruction to the second terminal according to the risk application information received by the first receiving unit; the control instruction is used for instructing the second terminal to set and disable a target application in the installed applications of the second terminal;
wherein the second terminal includes:
the second receiving unit is used for receiving the control instruction sent by the second sending unit;
and the first setting unit is used for setting the use state of the target application to a forbidden state according to the control instruction received by the second receiving unit.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the server further includes:
a defining unit, configured to define risk categories of all risk applications, where the risk applications are applications that adversely affect learning of a user of the second terminal;
a second setting unit, configured to set a risk tag of a risk application installed on the second terminal according to the risk category defined by the defining unit; the risk label is a risk category of a risk application installed on the second terminal;
the first detection unit is used for detecting whether the second terminal installs a new risk application or not;
the first sending unit is specifically configured to send risk application information to the first terminal when the first detecting unit detects that the second terminal installs a new risk application; the risk application information further comprises a risk label of each risk application in the second terminal installed applications, the second terminal installed applications comprise the new risk applications, and the risk application information is sent to the first terminal according to the sequence of the risk indexes of each application installed by the second terminal from high to low.
As an optional implementation manner, in a second aspect of the embodiment of the present invention, the first terminal further includes:
the starting unit is used for starting the control software; the control software at least comprises a risk management and control module, and the risk management and control module is used for enabling a user of the first terminal to set target applications in the second terminal installed applications to be forbidden and a forbidden mode aiming at the target applications;
a second detecting unit, configured to detect that the risk management and control module included in the control software started by the starting unit by a user of the first terminal sets the target application to be disabled and a disabling mode for the target application, and trigger the second sending unit to execute the sending of the control instruction to the second terminal according to the risk application information received by the first receiving unit, where the disabling mode includes a complete disabling mode or a time-interval disabling mode;
the control instruction is specifically used for instructing the second terminal to set and disable the target application according to a disabling mode for the target application.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the server further includes:
a counting unit, configured to count first forbidden amounts of all user terminals that adopt the complete forbidden manner and second forbidden amounts of all user terminals that adopt the time-interval forbidden manner for a certain risk application installed on the second terminal;
a selecting unit, configured to select a forbidden amount with a larger value from the first forbidden amount and the second forbidden amount counted by the counting unit, and determine a forbidden manner corresponding to the forbidden amount with the larger value;
the second setting unit is further configured to set the forbidden mode corresponding to the forbidden amount with the larger value determined by the selecting unit as a recommended management and control mode for the certain risk application;
a third sending unit, configured to send the recommended management and control manner set by the second setting unit to the first terminal;
the first receiving unit is further configured to receive the recommended management and control manner sent by the third sending unit;
the statistical unit is further configured to, when the recommended management and control manner is the time-period-based disabling manner, count all time periods in which all user terminals in the time-period-based disabling manner are selectively disabled for the certain risk application;
the selecting unit is further configured to select a time period with the largest number of forbidden times from all the time periods counted by the counting unit as a suggested forbidden time period;
the third sending unit is further configured to send the suggested disabled time period selected by the selecting unit to the first terminal;
the first receiving unit is further configured to receive the suggested disable time period sent by the third sending unit;
the first terminal further comprises:
the output unit is used for outputting the complete forbidden mode and triggering the second detection unit to execute the detection of the target application which is set to be forbidden by the user of the first terminal through the risk management and control module and the forbidden mode aiming at the target application when the recommended management and control mode is the complete forbidden mode after the starting unit starts the control software; when the recommended management and control mode is the forbidden mode in different time periods, the forbidden mode in different time periods and the forbidden time period are output, and the second detection unit is triggered to execute the detection of the target application which is set to be forbidden by the user of the first terminal through the risk management and control module and the forbidden mode aiming at the target application.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the server further includes:
the server further comprises:
a calculating unit, configured to calculate a risk index of an installed application of the second terminal according to a preset calculation formula, where the preset calculation formula is expressed as:
F=[(A1÷C1)+(A2÷C1)]÷2;
wherein a1 represents a third forbidden amount for all user terminals in the fully forbidden manner for an application installed on the second terminal, a2 represents a fourth forbidden amount for all user terminals in the time-period forbidden manner for the application, C1 represents a download amount for the application, and F represents a risk index for the application.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, a server sends an application identifier of an installed application of a second terminal and a risk index of each application to a first terminal, wherein the risk index is an index which is counted by the server in advance and used for indicating the learning influence degree of the application on a user, the larger the risk index is, the larger the learning influence degree of the application on the user is, and the first terminal controls the second terminal to set a target application in the applications installed on the second terminal to be forbidden according to the application identifier and the risk index of each application, so that the second terminal sets the use state of the target application to be forbidden.
For example, the first terminal is a parent's smart phone, and the second terminal is a student's learning tablet. The server sends the application identifiers of the installed applications and the risk index of each application to the smartphone of the parent, the parent can select forbidden target applications according to the application identifiers and the risk index of each application, and controls the learning tablet to set the forbidden target applications, so that the second terminal sets the use state of the target applications to be forbidden. The process enables parents to know the risk information of the applications installed on the learning tablet of the student, and can control the use authority of the children on the application program on the learning tablet, so that the children are prevented from being addicted to the learning tablet for a long time to entertain, and the learning efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart illustrating a method for managing an application according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating another method for managing applications according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating another method for managing applications according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of a system for managing applications according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of another system for managing applications according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of another system for managing an application according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It is to be noted that the terms "comprises" and "comprising" and any variations thereof in the embodiments and drawings of the present invention are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The embodiment of the invention discloses a method and a system for managing and controlling an application program, which can manage and control the use permission of a child on the learning tablet to prevent the child from being addicted to the learning tablet for a long time for entertainment, thereby improving the learning efficiency. The following are detailed below.
Example one
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for managing an application according to an embodiment of the present invention. As shown in fig. 1, the method for managing an application may include the following steps:
101. the server sends risk application information to the first terminal.
In the embodiment of the present invention, the risk application information at least includes an application identifier of each application installed in the second terminal and a risk index of each application installed in the second terminal, the risk index of each application installed in the second terminal is an index that is counted in advance by the server and is used for indicating a learning influence degree of the application on the user, and the second terminal is a terminal that is bound to the first terminal in advance. Wherein a higher risk index indicates a greater degree of learning impact of the application on the user. Optionally, when the first terminal is a terminal device used by a parent and the second terminal is a tablet used by a student, the first terminal (the terminal device used by the parent) may be bound by scanning the two-dimensional code on the second terminal (the tablet).
As an alternative implementation, the manner in which the server calculates the risk index of each application installed by the second terminal may include:
the server calculates the risk index of the installed application of the second terminal according to a preset calculation formula, wherein the preset calculation formula is expressed as follows:
F=[(A1÷C1)+(A2÷C1)]÷2;
where a1 represents a third forbidden amount for all user terminals in a fully forbidden manner for an application installed on the second terminal, a2 represents a fourth forbidden amount for all user terminals in a time-period forbidden manner for the application, C1 represents a download amount for the application, and F represents a risk index for the application.
By implementing the implementation mode, the server can calculate the risk index of the application installed on the second terminal according to the preset calculation formula, so that the accuracy of calculating the risk index is improved, and the application installed on the second terminal is better controlled according to the risk index.
As an optional implementation, the sending, by the server, the risk application information to the first terminal may include:
the server identifies a terminal identification of the first terminal;
the server inquires a terminal identification of a second terminal corresponding to the terminal identification in an internal database according to the terminal identification of the first terminal, wherein the second terminal is a terminal bound with the first terminal in advance;
the server assembles risk application information from the application identification of each application installed by the second terminal and the risk index of each application installed by the second terminal;
the server sends risk application information to the first terminal.
By implementing the implementation mode, the server stores the bound terminal equipment information in the internal database, and can inquire the terminal identification of the second terminal bound with the first terminal in the database and acquire the risk application information of the second terminal according to the terminal identification. The process can accurately acquire the binding information between the devices, so that the first terminal accurately acquires the risk application information of the second terminal bound with the first terminal, and better management and control are realized.
102. And the first terminal sends a control instruction to the second terminal according to the risk application information.
In the embodiment of the present invention, the control instruction may be used to instruct the second terminal to set and disable a target application in the applications installed on the second terminal. Optionally, the first terminal may send the control instruction to the server, and the server sends the control instruction to the second terminal. Alternatively, the first terminal may send the control instruction directly to the second terminal.
As an optional implementation manner, the sending, by the first terminal, the control instruction to the second terminal according to the risk application information may include:
the first terminal judges whether the risk index in the risk application information is higher than the application of a preset risk index;
if the risk index is higher than the preset risk index, the first terminal sets the application with the risk index higher than the preset risk index as a target application, and automatically sends a control instruction to the second terminal so that the second terminal sets and disables the target application in the installed application of the second terminal.
Through implementing the implementation mode, the first terminal can judge the applications with high risk installed on the second terminal according to the risk application information, the applications with high risk are the applications with risk indexes higher than the preset risk indexes, namely the applications with serious harm to the learning of the user, the first terminal can automatically send control instructions to the second terminal to forbid the second terminal user from using the applications with high risk, the management and control are more timely due to high automation degree, and the labor are saved.
As another optional implementation, the sending, by the first terminal, the control instruction to the second terminal according to the risk application information may include:
the method comprises the steps that a first terminal starts control software, wherein the control software at least comprises a display module and a control module;
the first terminal controls the display module to display the risk application information for reference of a user of the first terminal, optionally, the display mode can be freely selected by the user of the first terminal, and the display mode comprises sequential display according to the risk indexes from high to low, sequential display according to the risk indexes from low to high and the like;
the first terminal detects the target application which is selected to be forbidden by the first terminal user through the control module, and sends a control instruction to the second terminal so that the target application is forbidden by the second terminal.
As another optional implementation, the sending, by the first terminal, the control instruction to the second terminal according to the risk application information may include:
the first terminal matches application identifications of all applications contained in the risk application information with application identifications of risk applications stored in advance;
if the application identifier of a certain application contained in the risk application information is successfully matched with the application identifier of the pre-stored risk application, the first terminal outputs prompt information, the prompt information is used for prompting the second terminal to install the risk application, and a user of the first terminal is inquired whether a default management and control mode needs to be adopted or not;
the method comprises the steps that a first terminal outputs a drawing interface and detects a gesture instruction drawn on the drawing interface by a first terminal user;
the first terminal judges whether the gesture instruction is an instruction for managing the installed risk application of the second terminal by using a default management and control mode, if so, the installed risk application of the second terminal is set as a target application, and the control instruction is sent to the second terminal.
By implementing the above embodiment, the first terminal is provided with a default management and control mode, the default management and control mode may be a general management and control mode obtained after the server performs big data crawling, the general management and control mode is sent to the first terminal, when the first terminal user draws a specified gesture instruction, the first terminal can send a default control instruction to the second terminal, and the default control instruction includes the default management and control mode, so that the second terminal manages and controls the application program according to the default management and control mode. The default selection enables a user (such as a parent) of the first terminal to set authority for each application program installed on the second terminal (learning tablet) without worrying about, and a universal management and control mode can be selected by one key for management and control, so that the method is more convenient and meets various requirements of the user of the first terminal. Meanwhile, if the first terminal user needs to perform targeted control on the application program on the second terminal, control software can be started to achieve targeted control, and the control flexibility is improved.
103. And the second terminal sets the use state of the target application to a forbidden state according to the control instruction.
In the embodiment of the present invention, the control instruction may include an application identifier of the target application, and the second terminal may be capable of analyzing the application identifier and automatically setting the use state of the target application corresponding to the application identifier to the disabled state. And the user of the second terminal cannot change the use state of the target application, and the use state can only be set to be forbidden by sending a control instruction to the second terminal.
It can be seen that, in implementing the method for managing and controlling an application program described in fig. 1, a server sends, to a first terminal, an application identifier of an installed application installed on a second terminal and a risk index of each application, where the risk index is an index that is counted in advance by the server and is used for indicating a learning influence degree of the application on a user, and the larger the risk index is, the larger the learning influence degree of the application on the user is, the first terminal controls the second terminal to set a target application in the applications installed on the second terminal to be disabled according to the application identifier and the risk index of each application, so that the second terminal sets a use state of the target application to be disabled. The process can control the use authority of a second terminal user (such as a child) to the application program on the second terminal (such as a learning tablet) so as to prevent the child from being addicted to the learning tablet for a long time for entertainment, thereby improving the learning efficiency.
Example two
Referring to fig. 2, fig. 2 is a flowchart illustrating another method for managing an application according to an embodiment of the present invention. As shown in fig. 2, the method for managing an application may include the following steps:
201. the server defines the risk categories for all risk applications.
In an embodiment of the present invention, the risk application may be an application that adversely affects the learning of the user of the second terminal. The risk category may include an advertisement application undesirable content risk, a network disk application undesirable content risk, a social application undesirable content risk, a game application addiction risk, a video application addiction risk, a novel application addiction risk, and the like, and the embodiment of the present invention is not limited. The risk category can enable the first terminal user to know specific risks existing in the risk application, so that better management and control can be achieved.
202. And the server sets a risk label of the risk application installed on the second terminal according to the risk category.
In the embodiment of the present invention, the risk label may be a risk category of a risk application installed on the second terminal. Wherein, the risk label can make the user know the specific risk content existing in the application.
As an optional implementation, the setting, by the server, the risk label of the risk application installed on the second terminal according to the risk category may include:
the server reads application information of all applications installed on the second terminal;
screening risk applications with risks in all the applications by the server, wherein the screening mode can be that application identifiers of all the applications are matched with all risk application identifiers in a local database of the server, and if the application identifier of a certain application installed on the second terminal is successfully matched with a certain risk application identifier in the database, setting the certain application as the risk application with risks;
and the server inquires a risk category corresponding to the application identifier in a database according to the application identifier of the risk application, and sets the risk category as a risk label of the risk application.
By implementing the implementation mode, the risk label set by the server is realized by taking the corresponding relation between the application identifier of the risk application and the risk category stored in the database of the server as a reference, and when the corresponding relation needs to be modified, only professional workers need to modify the corresponding relation in the database, so that the risk application is not required to be modified one by one, the workload of updating the risk label is reduced, and the updating efficiency is improved.
203. The server detects whether the second terminal installs a new risk application, if so, the step 204 to the step 208 are executed, and if not, the process is ended.
In the embodiment of the invention, when the second terminal installs a new risk application, the server can synchronously update the risk application information received by the first terminal, so as to ensure that the risk application information received by the first terminal includes all risk application information installed by the second terminal, thereby improving the timeliness of management and control, realizing the synchronous update function, enabling the first terminal to obtain all risk application information installed on the second terminal in time, and facilitating better management and control. And when the server detects that the second terminal installs a new risk application, executing the step 204 to the step 208, and when the server detects that the second terminal does not install the new risk application, ending the process.
204. The server sends risk application information to the first terminal.
In this embodiment of the present invention, the risk application information may include an application identifier of each application installed on the second terminal, a risk index of each application installed on the second terminal, and a risk tag of each risk application in the applications installed on the second terminal, where the applications installed on the second terminal include new risk applications, the risk index of each application installed on the second terminal is an index that is counted by the server in advance and is used to indicate a learning influence degree of the application on a user, and the second terminal is a terminal that is bound with the first terminal in advance. The risk application information can be sent to the first terminal according to the risk index of each application installed in the second terminal from high to low. According to the process, the risk application information is sent to the first terminal according to the sequence of the risk indexes from high to low, so that the first terminal can better master the ranking condition of the risk index of each application, the high-risk applications are selected to be managed and controlled more pertinently, and the reliability of management and control is improved
Optionally, when the first terminal is a terminal device used by a parent and the second terminal is a tablet used by a student, the first terminal (the terminal device used by the parent) may be bound by scanning the two-dimensional code on the second terminal (the tablet).
205. The first terminal starts control software.
In the embodiment of the present invention, the control software at least includes a risk management and control module, and the risk management and control module may be configured to enable a user of the first terminal to set a target application that is disabled in an installed application of the second terminal and a disabling mode for the target application. The control software may further include a risk display module, and the information displayed by the risk display module may include an application icon, an application name, risk prompt information, a risk index, a recommendation management and control method, and the like, which is not limited in the embodiment of the present invention.
206. The first terminal detects that a user of the first terminal sets a forbidden target application through the risk management and control module and a forbidden mode aiming at the target application.
In the embodiment of the present invention, the disabling mode may include a complete disabling mode or a time-interval disabling mode. The first terminal can select forbidden target applications and forbidden modes aiming at the target applications through the control software, different management and control modes can be selectively selected for different applications, and the flexibility of management and control is improved through multiple management and control modes, so that different requirements of different users can be met in a combined manner, and the user experience is improved.
207. And the first terminal sends a control instruction to the second terminal according to the risk application information.
In the embodiment of the present invention, the control instruction is specifically used to instruct the second terminal to set the target application to be disabled according to the disabling mode for the target application.
208. And the second terminal sets the use state of the target application to a forbidden state according to the control instruction.
It should be noted that, the steps 205 to 208 may also occur before or simultaneously with the steps 201 to 204, and the embodiment of the present invention is not limited thereto.
It can be seen that, by implementing another method for managing applications as described in fig. 2, the usage right of the application on the second terminal (e.g. learning tablet) by the second terminal user (e.g. child) can be managed, so as to prevent the child from long-term enthusiasm for the learning tablet to entertain, thereby improving learning efficiency.
In addition, in another method for managing and controlling applications as described in fig. 2, the server can define risk categories for all risk applications, and attach risk labels to the risk applications installed on the second terminal according to the risk categories; and when the second terminal installs a new risk application, the risk application information containing the risk label is sent to the first terminal according to the sequence of the risk indexes from high to low. According to the process, risk categories can be further divided for risk applications, so that a user can obtain more accurate risk application information, when a second terminal installs a new risk application, risk information containing the new risk application can be sent to the first terminal, a synchronous updating function is achieved, the first terminal can timely obtain all risk application information installed on the second terminal, better management and control are facilitated, the risk application information is sent to the first terminal according to the sequence of risk indexes from high to low, the first terminal can better master the risk index ranking condition of each application, the high-risk applications are selected more pertinently for management and control, and the management and control reliability is improved.
In addition, by implementing another method for managing and controlling an application program described in fig. 2, the first terminal can select the forbidden target application and the forbidden mode for the target application through the control software, and can selectively select different management and control modes for different applications, and the multiple management and control modes improve the flexibility of management and control, so that different requirements of different users can be actually met, and user experience is improved.
EXAMPLE III
Referring to fig. 3, fig. 3 is a flowchart illustrating another method for managing an application according to an embodiment of the present invention. As shown in fig. 3, the method for managing an application may include the following steps:
301. the server counts first forbidden amounts of all the user terminals adopting the complete forbidden mode and second forbidden amounts of all the user terminals adopting the forbidden mode in different time periods aiming at a certain risk application installed on the second terminal.
In the embodiment of the invention, the server can count the forbidden amount of the user terminals adopting different forbidden modes for a certain risk application installed on the second terminal, and the forbidden modes selected by a plurality of user terminals can be selected as the recommended control mode for the certain risk application and recommended to the first terminal, so that the first terminal can perform more proper control according to the recommended control mode, and the control is more convenient.
302. The server selects the forbidden amount with a larger value from the first forbidden amount and the second forbidden amount, and determines the forbidden mode corresponding to the forbidden amount with the larger value.
303. The server sets the forbidden mode corresponding to the forbidden amount with the determined larger numerical value as a recommended control mode for certain risk application, and sends the recommended control mode to the first terminal. When the recommended management and control mode is the disabled mode in different time periods, the steps 304 to 309 and the steps 311 to 314 are executed, and when the recommended management and control mode is the completely disabled mode, the steps 305 to 310 and the steps 312 to 314 are executed.
304. The server counts all the time periods selected to be forbidden by all the user terminals adopting a time period forbidden mode aiming at a certain risk application, selects the time period with the most forbidden times from all the time periods as a suggested forbidden time period, and sends the suggested forbidden time period to the first terminal.
It should be noted that, for the descriptions of step 305 to step 309 in the embodiment of the present invention, please refer to the descriptions of step 201 to step 205 in the second embodiment, which is not repeated herein.
It should be noted that steps 301 to 303 may also occur after or simultaneously with steps 305 to 308, and the embodiment of the present invention is not limited thereto.
It should be noted that steps 305 to 308 may also occur after or simultaneously with steps 309 to 313, and the embodiment of the present invention is not limited.
310. The first terminal outputs a fully disabled mode.
311. The first terminal outputs a time period disabling pattern and a suggested disabling time period.
312. The first terminal detects that a user of the first terminal sets a forbidden target application through the risk management and control module and a forbidden mode aiming at the target application.
In the embodiment of the present invention, the disabling mode may include a complete disabling mode or a time-interval disabling mode.
313. And the first terminal sends a control instruction to the second terminal according to the risk application information.
In the embodiment of the present invention, the control instruction is specifically used to instruct the second terminal to set the target application to be disabled according to the disabling mode for the target application.
314. And the second terminal sets the use state of the target application to a forbidden state according to the control instruction.
For example, when the first terminal is a mobile phone used by a parent and the second terminal is a learning tablet used by a child, one of the risk applications installed on the learning tablet used by the child is a certain tour, the server can count the number of parents who completely prohibit the child from using the certain tour (a first forbidden amount) and the number of parents who prohibit the child from using the certain tour for a time period (a second forbidden amount), the server selects the forbidden mode selected by the most parents, that is, selects the forbidden mode corresponding to the forbidden amount with the larger value of the first forbidden amount and the second forbidden amount, and pushes the forbidden mode to the mobile phone used by the parent as a recommended control mode for the certain tour, if the recommended control mode is that the child is prohibited from using the certain tour for the time period, the time period during which the parents who prohibit the child from using the certain tour for the time period select to select the forbidden mode is further counted, and determining a time period forbidden by the parents at most, for example, a time period forbidden by the parents at most from seven nights to eight nights, and pushing the time period to a mobile phone used by the parents by using the server as a forbidden time period. The parents can control the applications installed on the learning tablet of the child by referring to the suggested control mode and the suggested forbidden time period, and send control instructions to the learning tablet, so that the learning tablet can set and forbid certain risk applications according to the specified mode and the control mode set by the parents. Therefore, the recommended management and control mode can be pushed to the parents according to the result counted by the server before the parents set the management and control mode so as to be referred by the parents, the parents can set the most appropriate management and control mode, and the management and control effect is improved.
It can be seen that, by implementing another method for managing applications as described in fig. 3, the usage right of the application on the second terminal (e.g. learning tablet) by the second terminal user (e.g. child) can be managed, so as to prevent the child from long-term enthusiasm for the learning tablet to entertain, thereby improving learning efficiency.
In addition, by implementing another method for managing and controlling the application program described in fig. 3, the user can obtain more accurate risk application information, and the first terminal can obtain all risk application information installed on the second terminal in time, which is convenient for better management and control.
In addition, by implementing another method for managing and controlling an application program described in fig. 3, the first terminal can select the forbidden target application and the forbidden mode for the target application through the control software, and can selectively select different management and control modes for different applications, and the multiple management and control modes improve the flexibility of management and control, so that different requirements of different users can be actually met, and user experience is improved.
In addition, by implementing another method for managing and controlling an application program described in fig. 3, the server can count the forbidden amounts of the user terminals that adopt different forbidden manners for a certain risk application installed on the second terminal, and select the forbidden manner selected by most user terminals as the recommended management and control manner for the certain risk application to recommend to the first terminal, so that the first terminal can perform more appropriate management and control according to the recommended management and control manner, and the management and control are more convenient.
In addition, by implementing another method for managing and controlling an application program described in fig. 3, the server can calculate the risk index of the application installed in the second terminal according to the preset calculation formula, so that the accuracy of calculating the risk index is improved, and the application installed in the second terminal is better managed and controlled according to the risk index.
Example four
Referring to fig. 4, fig. 4 is a schematic structural diagram of a system for managing application programs according to an embodiment of the present invention. As shown in fig. 4, the system may include a server 40, a first terminal 50, and a second terminal 60, where the second terminal 60 is a terminal bound with the first terminal 50 in advance, and in the system:
the server 40 includes:
a first sending unit 401, configured to send risk application information to the first terminal 50.
In this embodiment of the present invention, the risk application information at least includes an application identifier of each application installed by the second terminal 60 and a risk index of each application installed by the second terminal 60, where the risk index of each application installed by the second terminal 60 is an index that is counted by the server in advance and is used to indicate a learning influence degree of the application on the user.
As an optional implementation manner, the sending, by the first sending unit 401, the risk application information to the first terminal may include:
the first sending unit 401 identifies the terminal identity of the first terminal 50;
the first sending unit 401 queries, according to the terminal identifier of the first terminal 50, the terminal identifier of the second terminal 60 corresponding to the terminal identifier in an internal database, where the second terminal 60 is a terminal bound with the first terminal 50 in advance;
the first sending unit 401 assembles the application identifier of each application installed by the second terminal 60 and the risk index of each application installed by the second terminal 60 into risk application information;
the first transmission unit 401 transmits the risk application information to the first terminal 50.
By implementing such an embodiment, the first sending unit 401 stores the bound terminal device information in an internal database, and can query the database for the terminal identifier of the second terminal 60 bound by the first terminal 50, and obtain the risk application information of the second terminal 60 according to the terminal identifier. The process can accurately acquire the binding information between the devices, so that the first terminal 50 accurately acquires the risk application information of the second terminal 60 bound with the first terminal, and better management and control are realized.
The first terminal 50 includes:
a first receiving unit 501, configured to receive the risk application information sent by the first sending unit 401.
A second sending unit 502, configured to send a control instruction to the second terminal 60 according to the risk application information received by the first receiving unit 501.
In the embodiment of the present invention, the control instruction is used to instruct the second terminal 60 to set and disable a target application in the applications installed in the second terminal 60.
As an optional implementation, the sending, by the second sending unit 502, the control instruction to the second terminal 60 according to the risk application information may include:
the second sending unit 502 determines whether the risk application information has an application with a risk index higher than a preset risk index;
if so, the second sending unit 502 sets the application with the risk index higher than the preset risk index as the target application, and automatically sends a control instruction to the second terminal 60, so that the second terminal 60 sets to disable the target application in the applications installed in the second terminal 60.
By implementing the implementation manner, the second sending unit 502 can judge the applications installed on the second terminal 60 and having high risk according to the risk application information, the applications having high risk are applications having risk indexes higher than the preset risk index, that is, applications having serious harm to the learning of the user, the second sending unit 502 can automatically send a control instruction to the second terminal 60 to prohibit the user of the second terminal 60 from using the applications having high risk, the high automation degree enables management and control to be more timely, and the labor and the effort are saved.
As another alternative implementation, the sending, by the second sending unit 502, the control instruction to the second terminal 60 according to the risk application information may include:
the second sending unit 502 starts control software, and the control software at least comprises a display module and a control module;
the second sending unit 502 controls the display module to display the risk application information for reference by the user of the first terminal, optionally, the display mode may be freely selected by the user of the first terminal 50, and the display mode includes sequential display according to a sequence from high to low of the risk index, sequential display according to a sequence from low to high of the risk index, and the like, which is not limited in the embodiment of the present invention;
the second sending unit 502 may detect that the user of the first terminal 50 selects the disabled target application through the control module, and send the control instruction to the second terminal 60 to enable the second terminal 60 to disable the target application.
As another alternative implementation, the sending, by the second sending unit 502, the control instruction to the second terminal 60 according to the risk application information may include:
the second sending unit 502 matches the application identifiers of all applications included in the risk application information with the application identifiers of the risk applications stored in advance;
if the application identifier of a certain application included in the risk application information is successfully matched with the application identifier of a pre-stored risk application, the second sending unit 502 outputs a prompt message, where the prompt message is used to prompt the second terminal to install the risk application, and ask the user of the first terminal 50 whether to adopt a default management and control mode;
the second sending unit 502 outputs a drawing interface and detects a gesture instruction drawn on the drawing interface by the user of the first terminal 50;
the second sending unit 502 determines whether the gesture instruction is an instruction for managing the installed risk application of the second terminal 60 by using a default management and control manner, and if so, sets the installed risk application of the second terminal 60 as a target application and sends a control instruction to the second terminal 60.
By implementing the above embodiment, the second sending unit 502 is provided with a default management and control manner, which may be a general management and control manner obtained after the server performs the big data crawling, and sends the general management and control manner to the second sending unit 502, when the user of the first terminal 50 draws a specified gesture instruction, the second sending unit 502 can send a default control instruction to the second terminal 60, where the default control instruction includes the default management and control manner, so that the second terminal 60 manages and controls the application program according to the default management and control manner. This default selection makes the user (e.g., a parent) of the user of the first terminal 50 not have to worry about setting the authority for each application installed on the second terminal 60 (e.g., a learning tablet), and can select a universal management and control method by one key for management and control, which is more convenient and meets various requirements of the user of the first terminal 50. Meanwhile, if the user of the first terminal 50 needs to perform targeted control on the application program on the second terminal 60, control software can be started to achieve targeted control, so that the flexibility of control is improved.
The second terminal 60 includes:
a second receiving unit 601, configured to receive the control instruction sent by the second sending unit 502.
A first setting unit 602, configured to set the use state of the target application to a disabled state according to the control instruction received by the second receiving unit 601.
Therefore, the system for managing and controlling the application program described in fig. 4 can manage and control the usage right of the application program on the second terminal (e.g. learning tablet) by the second terminal user (e.g. child), so as to prevent the child from indulging the learning tablet for entertainment for a long time, thereby improving the learning efficiency.
EXAMPLE five
Referring to fig. 5, fig. 5 is a schematic structural diagram of another system for managing and controlling an application according to an embodiment of the present disclosure. The system shown in fig. 5 is optimized from the system shown in fig. 4. In the system shown in fig. 5, the server 40 further includes:
a defining unit 402 for defining risk categories for all risk applications.
In the embodiment of the present invention, the risk application is an application that adversely affects the learning of the user of the second terminal 60.
A second setting unit 403, configured to set a risk label of the risk application installed on the second terminal 60 according to the risk category defined by the defining unit 402.
In the embodiment of the present invention, the risk label is a risk category of the risk application installed on the second terminal 60.
As an alternative embodiment, the setting of the risk label of the risk application installed on the second terminal 60 by the second setting unit 403 according to the risk category may include:
the second setting unit 403 reads application information of all applications installed on the second terminal 60;
the second setting unit 403 screens risk applications with risks in all the applications, where the screening may be performed by matching application identifiers of all the applications with all risk application identifiers in a local database of the server 40, and if there is a successful matching between a certain application installed on the second terminal 60 and a certain risk application identifier in the database, setting the certain application as a risk application with risks;
the second setting unit 403 queries a risk category corresponding to the application identifier in the database according to the application identifier of the risk application, and sets the risk category as a risk label of the risk application.
By implementing this embodiment, the setting of the risk label by the second setting unit 403 is implemented by taking the corresponding relationship between the application identifier of the risk application and the risk category stored in the database of the server 40 as a reference, and when such a corresponding relationship needs to be modified, only professional staff need to modify the corresponding relationship in the database, and the risk application does not need to be modified one by one, so that the workload of updating the risk label is reduced, and the updating efficiency is improved.
A first detecting unit 404, configured to detect whether the second terminal 60 installs a new risk application.
The first sending unit 401 is specifically configured to send risk application information to the first terminal 50 when the first detecting unit 404 detects that a new risk application is installed in the second terminal 60.
In this embodiment of the present invention, the risk application information further includes a risk label of each risk application in the applications installed on the second terminal 60, which is set by the second setting unit 403, and the applications installed on the second terminal 60 include new risk applications, where the risk application information is sent to the first terminal 50 in an order from a high risk index to a low risk index of each application installed on the second terminal 60.
Further optionally, the first terminal 50 further includes:
a starting unit 503, configured to start the control software.
In the embodiment of the present invention, the control software at least includes a risk management and control module, and the risk management and control module is configured to enable a user of the first terminal 50 to set a target application of the applications installed in the second terminal 60 to be disabled and a disabling mode for the target application.
The second detecting unit 504 is configured to detect that the risk management and control module included in the control software that is started by the starting unit 503 by the user of the first terminal 50 sets a target application that is disabled and a disabling mode for the target application, and trigger the second sending unit 502 to send a control instruction to the second terminal 60 according to the risk application information received by the first receiving unit 501, where the disabling mode includes a complete disabling mode or a time-interval disabling mode.
In this embodiment of the present invention, the control instruction is specifically used to instruct the second terminal 60 to set the target application to be disabled according to the disabling mode for the target application.
It can be seen that, the system for managing and controlling applications as described in fig. 5 can manage and control the usage right of the application on the second terminal (e.g. learning tablet) by the second terminal user (e.g. child), so as to prevent the child from being enthusiastic for the learning tablet for a long time to entertain, thereby improving the learning efficiency.
In addition, the system for managing and controlling the application program described in fig. 5 is implemented, so that a user can obtain more accurate risk application information, the first terminal can obtain all risk application information installed on the second terminal in time, better management and control are facilitated, the first terminal can select high-risk applications to manage and control more pertinently, and the reliability of management and control is improved.
In addition, the system for managing and controlling the application program described in fig. 5 can selectively select different management and control modes for different applications, and the flexibility of management and control is improved by the multiple management and control modes, so that different requirements of different users can be met in a combined manner, and user experience is improved.
EXAMPLE six
Referring to fig. 6, fig. 6 is a schematic structural diagram of another system for managing and controlling an application according to an embodiment of the present disclosure. The system shown in fig. 6 is optimized from the system shown in fig. 5. In the system shown in fig. 6, the server 40 further includes:
a counting unit 405, configured to count first forbidden amounts of all user terminals in the complete forbidden manner and second forbidden amounts of all user terminals in the time-interval forbidden manner for a certain risk application installed on the second terminal 60.
A selecting unit 406, configured to select the forbidden amount with a larger value from the first forbidden amount and the second forbidden amount counted by the counting unit 405, and determine a forbidden manner corresponding to the forbidden amount with the larger value.
The second setting unit 403 is further configured to set the disabling manner corresponding to the disabled amount with the larger value determined by the selecting unit 406 as a recommended management and control manner for a certain risk application.
A third sending unit 407, configured to send the recommendation management and control method set by the second setting unit 403 to the first terminal 50.
The first receiving unit 501 is further configured to receive the recommendation management and control method sent by the third sending unit 407.
The statistical unit 405 is further configured to, when the recommended management and control manner is the time-period disabled manner, count all time periods that all user terminals in the time-period disabled manner are selectively disabled for a certain risk application.
The selecting unit 406 is further configured to select, as the recommended disabling time period, a time period with the largest number of times of disabling from all the time periods counted by the counting unit 405.
The third sending unit 407 is further configured to send the proposed disabled time period selected by the selecting unit 406 to the first terminal 50.
The first receiving unit 501 is further configured to receive the suggested disable time period sent by the third sending unit 407.
The first terminal 50 further includes:
an output unit 505, configured to output the complete disabling mode when the recommended management and control mode is the complete disabling mode after the control software is started by the starting unit 503, and trigger the second detection unit 504 to detect a target application that is set to be disabled by the user of the first terminal 50 through the risk management and control module and the disabling mode for the target application; when the recommended management and control mode is the time-interval disabled mode, the time-interval disabled mode and the recommended disabled time interval are output, and the detection performed by the second detection unit 504 to set the disabled target application and the disabled mode for the target application by the user of the first terminal 50 through the risk management and control module is triggered.
Specifically, after the activation unit 503 activates the control software, the activation unit 503 transmits an activation instruction to the output unit 505 to activate the output unit 505.
Further optionally, the server 40 further includes:
the calculating unit 408 is configured to calculate a risk index of the application installed in the second terminal according to a preset calculation formula, and send the risk index of the application installed in the second terminal to the first sending unit 401.
In the embodiment of the invention, the preset calculation formula is expressed as follows:
F=[(A1÷C1)+(A2÷C1)]÷2;
wherein a1 is the third forbidden amount of all user terminals that are counted by the counting unit 405 and that adopt the complete forbidden manner for the application installed on the second terminal, a2 is the fourth forbidden amount of all user terminals that are counted by the counting unit 405 and that adopt the forbidden manner for the application in different time periods, C1 is the download amount of the application counted by the counting unit 405, and F represents the risk index of the application.
It can be seen that, the system for managing and controlling applications as described in fig. 6 can manage and control the usage right of the application on the second terminal (e.g. learning tablet) by the second terminal user (e.g. child), so as to prevent the child from being enthusiastic for the learning tablet for a long time to entertain, thereby improving the learning efficiency.
In addition, the system for managing and controlling the application program described in fig. 6 is implemented, so that a user can obtain more accurate risk application information, the first terminal can obtain all risk application information installed on the second terminal in time, better management and control are facilitated, the first terminal can select high-risk applications to manage and control more pertinently, and the reliability of management and control is improved.
In addition, the system for managing and controlling the application program described in fig. 6 can selectively select different management and control modes for different applications, and the flexibility of management and control is improved by using multiple management and control modes, so that different requirements of different users can be met in a combined manner, and user experience is improved.
In addition, the system for managing and controlling the application program described in fig. 6 is implemented, so that the first terminal can perform more appropriate management and control according to the suggested management and control manner, and the management and control are more convenient.
In addition, the system for managing and controlling the application program described in fig. 6 is implemented, so that the accuracy of calculating the risk index is improved, and the installed application of the second terminal is better managed and controlled according to the risk index.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by instructions associated with a program, which may be stored in a computer-readable storage medium, where the storage medium includes Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), compact disc-Read-Only Memory (CD-ROM), or other Memory, magnetic disk, magnetic tape, or magnetic tape, Or any other medium which can be used to carry or store data and which can be read by a computer.
The method and system for managing and controlling application programs disclosed in the embodiments of the present invention are described in detail above, and the principle and the implementation of the present invention are explained in detail herein by using specific examples, and the description of the embodiments above is only used to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (8)

1. A method of hosting an application, comprising:
the method comprises the steps that a server sends risk application information to a first terminal, wherein the risk application information at least comprises an application identifier of each application installed by a second terminal and a risk index of each application installed by the second terminal, the risk index of each application installed by the second terminal is an index which is counted by the server in advance and used for representing the learning influence degree of the application on a user, and the second terminal is a terminal bound with the first terminal in advance;
the first terminal sends a control instruction to the second terminal according to the risk application information; the control instruction is used for instructing the second terminal to set and disable a target application in the installed applications of the second terminal;
the second terminal sets the use state of the target application to a forbidden state according to the control instruction;
the first terminal sends a control instruction to the second terminal according to the risk application information, and the control instruction comprises the following steps:
the first terminal matches the application identifications of all applications contained in the risk application information with the application identifications of the risk applications stored in advance;
if the application identifier of a certain application contained in the risk application information is successfully matched with the application identifier of a pre-stored risk application, the first terminal outputs prompt information, the prompt information is used for prompting the second terminal to install the risk application, and a first terminal user is inquired whether a default management and control mode needs to be adopted or not;
the first terminal outputs a drawing interface and detects a gesture instruction drawn on the drawing interface by a first terminal user;
the first terminal judges whether the gesture instruction is an instruction for managing the installed risk application of the second terminal by using a default management and control mode, if so, the installed risk application of the second terminal is set as the target application, and the control instruction is sent to the second terminal; if not, the first terminal starts control software, the control software at least comprises a risk management and control module, the risk management and control module is used for enabling a user of the first terminal to set a target application in the installed applications of the second terminal to be forbidden and a forbidden mode for the target application, the first terminal detects the target application set to be forbidden by the user of the first terminal through the risk management and control module and the forbidden mode for the target application, the forbidden mode comprises a complete forbidden mode or a forbidden mode with different time periods, and the control instruction is specifically used for instructing the second terminal to set the target application to be forbidden according to the forbidden mode for the target application;
the control software further comprises a risk display module, the risk display module displays risk application information for a user of the first terminal to refer to, and the risk application information displayed by the risk display module comprises an application icon, an application name, risk prompt information, a risk index and a recommendation management and control mode.
2. The method of claim 1, further comprising:
the server defining risk categories of all risk applications, the risk applications being applications that have an adverse effect on the learning of the user of the second terminal;
the server sets a risk label of a risk application installed on the second terminal according to the risk category; the risk label is a risk category of a risk application installed on the second terminal;
the method further comprises the following steps:
the server detects whether the second terminal installs a new risk application, and if so, the server executes the risk application information sent to the first terminal; the risk application information further comprises a risk label of each risk application in the second terminal installed applications, the second terminal installed applications comprise the new risk applications, and the risk application information is sent to the first terminal according to the sequence of the risk indexes of each application installed by the second terminal from high to low.
3. The method of claim 1, further comprising:
the server counts first forbidden amounts of all user terminals adopting the complete forbidden mode and second forbidden amounts of all user terminals adopting the forbidden mode in different time periods aiming at a certain risk application installed on the second terminal;
the server selects forbidden amount with a larger value from the first forbidden amount and the second forbidden amount, and determines a forbidden mode corresponding to the forbidden amount with the larger value;
the server sets the determined forbidden mode corresponding to the forbidden amount with the larger numerical value as a recommended control mode for the certain risk application, and sends the recommended control mode to the first terminal;
when the recommended control mode is the time-interval-based disabling mode, the server counts all time intervals selected to be disabled by all user terminals adopting the time-interval-based disabling mode for the certain risk application, selects a time interval with the maximum number of times of disabling from all the time intervals as a recommended disabling time interval, and sends the recommended disabling time interval to the first terminal;
after the first terminal starts control software and before the first terminal detects that the user of the first terminal sets the target application to be disabled and the disabling mode for the target application through the risk management and control module, the method further includes:
when the recommended management and control mode is the complete forbidden mode, the first terminal outputs the complete forbidden mode and triggers the execution of the detection of the target application which is set to be forbidden by the user of the first terminal through the risk management and control module and the forbidden mode aiming at the target application;
when the recommended management and control mode is the forbidden mode in different time periods, the first terminal outputs the forbidden mode in different time periods and the forbidden time period recommended by the first terminal, and triggers the execution of the detection that the user of the first terminal sets the forbidden target application and the forbidden mode aiming at the target application through the risk management and control module.
4. The method of claim 3, further comprising:
the server calculates a risk index of the installed application of the second terminal according to a preset calculation formula, wherein the preset calculation formula is expressed as:
F=[(A1÷C1)+(A2÷C1)]÷2;
wherein a1 represents a third forbidden amount for all user terminals in the fully forbidden manner for an application installed on the second terminal, a2 represents a fourth forbidden amount for all user terminals in the time-period forbidden manner for the application, C1 represents a download amount for the application, and F represents a risk index for the application.
5. A system for managing and controlling application programs is characterized by comprising a server, a first terminal and a second terminal, wherein the second terminal is a terminal bound with the first terminal in advance;
wherein the server comprises:
a first sending unit, configured to send risk application information to the first terminal, where the risk application information at least includes an application identifier of each application installed in the second terminal and a risk index of each application installed in the second terminal, and the risk index of each application installed in the second terminal is an index that is counted by the server in advance and used for indicating a learning influence degree of the application on a user;
wherein the first terminal includes:
a first receiving unit, configured to receive the risk application information sent by the first sending unit;
a second sending unit, configured to send a control instruction to the second terminal according to the risk application information received by the first receiving unit; the control instruction is used for instructing the second terminal to set and disable a target application in the installed applications of the second terminal;
wherein the second terminal includes:
the second receiving unit is used for receiving the control instruction sent by the second sending unit;
a first setting unit, configured to set a use state of the target application to a disabled state according to the control instruction received by the second receiving unit;
wherein the first terminal further comprises: the starting unit and the second detection unit;
the second sending unit is further configured to match application identifiers of all applications included in the risk application information with application identifiers of risk applications stored in advance;
if the application identifier of a certain application contained in the risk application information is successfully matched with the application identifier of the pre-stored risk application, outputting prompt information, wherein the prompt information is used for prompting the second terminal to install the risk application and inquiring whether a user of the first terminal needs to adopt a default control mode or not;
outputting a drawing interface, and detecting a gesture instruction drawn on the drawing interface by a user of the first terminal;
judging whether the gesture instruction is an instruction for managing the installed risk application of the second terminal by using a default management and control mode, if so, setting the installed risk application of the second terminal as a target application, and sending a control instruction to the second terminal;
the starting unit is used for starting control software under the condition that the gesture instruction is not an instruction for managing the installed risk application of the second terminal by using a default management and control mode; the control software at least comprises a risk management and control module, and the risk management and control module is used for enabling a user of the first terminal to set target applications in the second terminal installed applications to be forbidden and a forbidden mode aiming at the target applications;
the second detecting unit is configured to detect that the risk management and control module included in the control software started by the starting unit by the user of the first terminal sets the target application to be disabled and the disabling mode for the target application, and trigger the second sending unit to execute the control instruction sent to the second terminal according to the risk application information received by the first receiving unit, where the disabling mode includes a complete disabling mode or a time-interval disabling mode; the control instruction is specifically used for instructing the second terminal to set and disable the target application according to a disabling mode for the target application;
the control software further comprises a risk display module, the risk display module displays risk application information for a user of the first terminal to refer to, and the risk application information displayed by the risk display module comprises an application icon, an application name, risk prompt information, a risk index and a recommendation management and control mode.
6. The system for managing applications of claim 5, wherein the server further comprises:
a defining unit, configured to define risk categories of all risk applications, where the risk applications are applications that adversely affect learning of a user of the second terminal;
a second setting unit, configured to set a risk tag of a risk application installed on the second terminal according to the risk category defined by the defining unit; the risk label is a risk category of a risk application installed on the second terminal;
the first detection unit is used for detecting whether the second terminal installs a new risk application or not;
the first sending unit is specifically configured to send risk application information to the first terminal when the first detecting unit detects that the second terminal installs a new risk application; the risk application information further comprises a risk label of each risk application in the second terminal installed applications, the second terminal installed applications comprise the new risk applications, and the risk application information is sent to the first terminal according to the sequence of the risk indexes of each application installed by the second terminal from high to low.
7. The system for managing applications of claim 5, wherein the server further comprises:
a counting unit, configured to count first forbidden amounts of all user terminals that adopt the complete forbidden manner and second forbidden amounts of all user terminals that adopt the time-interval forbidden manner for a certain risk application installed on the second terminal;
a selecting unit, configured to select a forbidden amount with a larger value from the first forbidden amount and the second forbidden amount counted by the counting unit, and determine a forbidden manner corresponding to the forbidden amount with the larger value;
the second setting unit is further configured to set the forbidden mode corresponding to the forbidden amount with the larger value determined by the selecting unit as a recommended management and control mode for the certain risk application;
a third sending unit, configured to send the recommended management and control manner set by the second setting unit to the first terminal;
the first receiving unit is further configured to receive the recommended management and control manner sent by the third sending unit;
the statistical unit is further configured to, when the recommended management and control manner is the time-period-based disabling manner, count all time periods in which all user terminals in the time-period-based disabling manner are selectively disabled for the certain risk application;
the selecting unit is further configured to select a time period with the largest number of forbidden times from all the time periods counted by the counting unit as a suggested forbidden time period;
the third sending unit is further configured to send the suggested disabled time period selected by the selecting unit to the first terminal;
the first receiving unit is further configured to receive the suggested disable time period sent by the third sending unit;
the first terminal further comprises:
the output unit is used for outputting the complete forbidden mode and triggering the second detection unit to execute the detection of the target application which is set to be forbidden by the user of the first terminal through the risk management and control module and the forbidden mode aiming at the target application when the recommended management and control mode is the complete forbidden mode after the starting unit starts the control software; when the recommended management and control mode is the forbidden mode in different time periods, the forbidden mode in different time periods and the forbidden time period are output, and the second detection unit is triggered to execute the detection of the target application which is set to be forbidden by the user of the first terminal through the risk management and control module and the forbidden mode aiming at the target application.
8. The system for managing applications of claim 7, wherein the server further comprises:
a calculating unit, configured to calculate a risk index of an installed application of the second terminal according to a preset calculation formula, where the preset calculation formula is expressed as:
F=[(A1÷C1)+(A2÷C1)]÷2;
wherein a1 represents a third forbidden amount for all user terminals in the fully forbidden manner for an application installed on the second terminal, a2 represents a fourth forbidden amount for all user terminals in the time-period forbidden manner for the application, C1 represents a download amount for the application, and F represents a risk index for the application.
CN201711463112.0A 2017-12-28 2017-12-28 Method and system for managing and controlling application program Active CN108174036B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711463112.0A CN108174036B (en) 2017-12-28 2017-12-28 Method and system for managing and controlling application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711463112.0A CN108174036B (en) 2017-12-28 2017-12-28 Method and system for managing and controlling application program

Publications (2)

Publication Number Publication Date
CN108174036A CN108174036A (en) 2018-06-15
CN108174036B true CN108174036B (en) 2020-10-16

Family

ID=62519642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711463112.0A Active CN108174036B (en) 2017-12-28 2017-12-28 Method and system for managing and controlling application program

Country Status (1)

Country Link
CN (1) CN108174036B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101280A (en) * 2018-07-09 2018-12-28 广东小天才科技有限公司 A kind of control method for electronic equipment and terminal device
US10855836B2 (en) * 2018-09-24 2020-12-01 AVAST Software s.r.o. Default filter setting system and method for device control application
CN110009127A (en) * 2019-01-24 2019-07-12 平安科技(深圳)有限公司 Indulge game Risk Identification Method, device, computer equipment and storage medium
CN112134856B (en) * 2020-09-02 2023-08-15 中移(杭州)信息技术有限公司 Application program disabling method, system, server and storage medium
CN113536283A (en) * 2021-06-18 2021-10-22 深圳市沃特沃德信息有限公司 Application control method and system
CN113938510A (en) * 2021-09-29 2022-01-14 青岛海信移动通信技术股份有限公司 Terminal equipment and terminal control method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130140406A (en) * 2012-06-14 2013-12-24 서강대학교기술지주 주식회사 Push type e-learning system and its service method based on contextual information
EP2733909A1 (en) * 2012-08-29 2014-05-21 Huawei Device Co., Ltd. Terminal control method and device, and terminal

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521548B (en) * 2011-11-24 2014-11-05 中兴通讯股份有限公司 Method for managing using rights of function and mobile terminal
CN103841192B (en) * 2014-03-05 2018-01-16 天闻数媒科技(北京)有限公司 A kind of method and system of remote control mobile terminal application software
US9679340B2 (en) * 2014-11-21 2017-06-13 Hong Kong Applied Science and Technology Reserach Institute Company Limited Multi-location learning-activity state management for distance education
US9924026B2 (en) * 2015-06-24 2018-03-20 Airwatch Llc Managing classroom attendance and student device usage
CN106874774A (en) * 2015-12-14 2017-06-20 北京奇虎科技有限公司 The use control method and mobile terminal of a kind of mobile terminal
CN105844149A (en) * 2016-03-21 2016-08-10 乐视网信息技术(北京)股份有限公司 Terminal use control method and apparatus
CN106060252B (en) * 2016-05-26 2018-04-13 广东欧珀移动通信有限公司 A kind of management-control method of application program, device and mobile terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130140406A (en) * 2012-06-14 2013-12-24 서강대학교기술지주 주식회사 Push type e-learning system and its service method based on contextual information
EP2733909A1 (en) * 2012-08-29 2014-05-21 Huawei Device Co., Ltd. Terminal control method and device, and terminal

Also Published As

Publication number Publication date
CN108174036A (en) 2018-06-15

Similar Documents

Publication Publication Date Title
CN108174036B (en) Method and system for managing and controlling application program
EP3629564A1 (en) Screen locking method and mobile terminal
CN103605531A (en) Household appliance control method and device and mobile terminal
CN107944267B (en) Application program control method and system based on terminal equipment
CN105808303B (en) Browser and method for reminding page game event by using same
CN108009014B (en) Application use management method and mobile terminal
US10888780B2 (en) Information processing system and information processing method
CN104239775A (en) Method and device for establishing wireless connection of mobile phone end and PC (Personal Computer) end by short message
JP2014236785A (en) Information processor, information processing system, information processing program and information processing method
CN109287511B (en) Method and device for training pet control equipment and wearable equipment for pet
CN110430925B (en) Server device and storage medium
EP3493140A1 (en) Program, terminal device, and information processing system
JP2014106814A (en) Information distribution system, server, information distribution method and program
CN103646169A (en) Reminding method and reminding device for games
US9943764B2 (en) Non-transitory computer-readable storage medium, information processing apparatus, information processing system, and information processing method
WO2017092415A1 (en) Clothing prompting method and device
US10448101B2 (en) Communication system, communication method, communication terminal, information-processing system, information-processing method, and storage medium
JP2004180765A (en) Data delivery system
CN109344335B (en) Content recommendation method and electronic equipment
CN111107147B (en) Message pushing method and device
KR102493435B1 (en) Method and device for providing cognitive intervention program
JP2011186922A (en) Quiz system for encouraging attendant user to move across wide area in hall
CN107944261B (en) Application program control method and user equipment
CN114116105A (en) Control method and device of dynamic desktop, storage medium and electronic device
CN109819300A (en) A kind of message content methods of exhibiting, sending method, device, terminal and system

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant