CN108319432A - A kind of application operation method and terminal - Google Patents
A kind of application operation method and terminal Download PDFInfo
- Publication number
- CN108319432A CN108319432A CN201810064497.1A CN201810064497A CN108319432A CN 108319432 A CN108319432 A CN 108319432A CN 201810064497 A CN201810064497 A CN 201810064497A CN 108319432 A CN108319432 A CN 108319432A
- Authority
- CN
- China
- Prior art keywords
- data
- target
- domain
- application
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0635—Configuration or reconfiguration of storage systems by changing the path, e.g. traffic rerouting, path reconfiguration
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of application operation method of present invention offer and terminal, this method are applied to terminal, including:According to default application to the access request of the target data in the domain of target storage, the target data is copied, obtains copy data;The copy data are stored to destination path, wherein the destination path is different from the path indicated by the target storage domain;The default application is controlled to access to the copy data by the destination path.Due to default application can not be directly in access target storage region target data, and can only be under access target path copy data, this makes default application be in isolation with the data in the domain of target storage, so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to effectively prevent malicious application from encrypting the data in target storage domain in the process of running, the safety of user data is improved.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of application operation methods and terminal.
Background technology
With the development of communication technologies, mobile terminal is gradually gained popularity, and more and more movable developments of the mankind rely on
In the use of mobile terminal, also therefore, more and more users' data are for example, photo, document files, location information, address list
Or short message etc. is present in mobile terminal.
Along with the mass users data of mobile terminal, all kinds of malicious applications seriously threaten user's at explosive growth
Data safety.Currently, a kind of harm situation of common Malware is that Malware is by directly encrypting target storage domain
Such as (public storage area is any to have applied for that the application of storage region access limit can be carried out visiting for public storage area
Ask) user data, make user can not use these data, and then achieve the purpose that user carry out money extort.
The infringement of malicious application in order to prevent, at present user mainly taken precautions against using antivirus software, i.e., application install
During, antivirus software can scan the installation kit of application, and installation kit disease is carried out by local or high in the clouds Virus Sample feature
Malicious feature recognition.But since this mode can only work mostly when application is installed, and dynamic is keen in many applications now
The mode that code issues, therefore it can not effectively be prevented to encrypt the user in target storage domain in malicious application operational process
Data cause the safety of user data relatively low.
Invention content
A kind of application operation method of offer of the embodiment of the present invention and terminal, can not be transported with solving the prior art in malicious application
It effectively prevents it to encrypt the user data in target storage domain during row, causes the safety of user data is lower to ask
Topic.
In order to solve the above technical problems, the invention is realized in this way:A kind of application operation method is applied to terminal, packet
It includes:
According to default application to the access request of the target data in the domain of target storage, the target data is copied
Shellfish obtains copy data;
The copy data are stored to destination path, wherein the destination path and the target storage domain institute
The path of instruction is different;
The default application is controlled to access to the copy data by the destination path.
In a first aspect, an embodiment of the present invention provides a kind of application operation method, it is applied to terminal, including:
According to default application to the access request of the target data in the domain of target storage, the target data is copied
Shellfish obtains copy data;
The copy data are stored to destination path, wherein the destination path and the target storage domain institute
The path of instruction is different;
The default application is controlled to access to the copy data by the destination path.
Second aspect, the embodiment of the present invention also provide a kind of terminal, including:
Module is copied, for the access request according to default application to the target data in the domain of target storage, to described
Target data is copied, and copy data are obtained;
Memory module, for storing the copy data to destination path, wherein the destination path and the mesh
The path marked indicated by storage region is different;
Access modules access to the copy data by the destination path for controlling the default application.
The third aspect, the embodiment of the present invention also provide a kind of terminal, including processor, memory and are stored in the storage
On device and the computer program that can run on the processor, realized when the computer program is executed by the processor
The step of stating application operation method.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage
It is stored with computer program on medium, the step of above application operation method is realized when the computer program is executed by processor
Suddenly.
In embodiments of the present invention, by being asked to the access of the target data in the domain of target storage according to default application
It asks, the target data is copied, obtain copy data;The copy data are stored to destination path, wherein institute
It is different from the path indicated by the target storage domain to state destination path;It controls the default application and passes through the destination path
It accesses to the copy data.In this way, due to default application can not be directly in access target storage region target data,
And can only be under access target path copy data, this makes default application be in barrier-like with the data in the domain of target storage
State so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to have
Effect ground prevents malicious application from encrypting the data in target storage domain in the process of running, improves the safety of user data.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention
Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention,
For those of ordinary skill in the art, without having to pay creative labor, it can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the flow chart for the application operation method that one embodiment of the invention provides;
Fig. 2 is the overall technology frame construction drawing of the application operation method provided for realizing one embodiment of the invention;
Fig. 3 is the isolation frame in the overall technology frame of the application operation method provided for realizing one embodiment of the invention
One of the structure chart of rack-layer and Android application framework layer;
Fig. 4 is the isolation frame in the overall technology frame of the application operation method provided for realizing one embodiment of the invention
The two of the structure chart of rack-layer and Android application framework layer;
Fig. 5 is that same application is separately operable entirety in the application operation method provided for realizing one embodiment of the invention
When insulating frame layer and Android application framework layer in technological frame, the comparison diagram of the accessible paths of the process of the application;
Fig. 6 is the flow chart for the application operation method that another embodiment of the present invention provides;
Fig. 7 is one of the structure chart of terminal that one embodiment of the invention provides;
Fig. 8 is the two of the structure chart for the terminal that one embodiment of the invention provides;
Fig. 9 is the structure chart of the copy module for the terminal that one embodiment of the invention provides;
Figure 10 is the structure chart for the terminal that another embodiment of the present invention provides.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
It is the flow chart for the application operation method that one embodiment of the invention provides referring to Fig. 1, Fig. 1, as shown in Figure 1, a kind of
Application operation method is applied to terminal, includes the following steps:
Step 101, the default access request using to the target data in the domain of target storage of basis, to the number of targets
According to being copied, copy data are obtained;
Step 102 stores the copy data to destination path, wherein the destination path is deposited with the target
Path indicated by storage area domain is different;
Step 103, the control default application access to the copy data by the destination path.
Wherein, above-mentioned terminal can be mobile phone, tablet computer (Tablet Personal Computer), laptop computer
(Laptop Computer), personal digital assistant (personal digital assistant, abbreviation PDA), mobile Internet access dress
Set (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
Above-mentioned default application can be one of installation application in above-mentioned terminal, can also be to pacify in above-mentioned terminal
The two of which of dress or more than two applications.Above-mentioned target storage domain can refer to internal storage region, may also mean that outer
Portion memory block can also refer to the common storage area for storing the data such as image, document, audio, video, in this regard, of the invention
It is not construed as limiting.Above-mentioned target data can be the total data in above-mentioned target storage domain, can also be above-mentioned target storage
Partial data in region, such as can be a certain or a few specific image or some or certain several specific texts
Shelves.Above-mentioned copy alternatively referred to as replicates;Above-mentioned access can refer to reading data and/or write-in data.
Above-mentioned destination path can (be reset to the access modification in the target storage domain for the default application
To) access path, specifically can be understood as when default application needs access target storage region, above-mentioned default application will be by
The storage region of access target path meaning is guided, rather than accesses target storage domain truly.
It should be noted that the overall technology frame for realizing the application operation method in the embodiment of the present invention can be with
It is, using the technological frame for increasing " insulating frame layer " between primary system framework layer and application, to make the application being isolated
In " insulating frame layer " operation (executing specific operation rule).It is operated using primary operating system as Android (Android)
Can be that above application operation method is realized using technological frame as shown in Figures 2 to 4 for for system:
First, used overall technology frame refers to Fig. 2.As shown in Fig. 2, in Android application framework layer and applying it
Between increase and have " insulating frame layer ", wherein using A be the application for being isolated operation, operate in increased " insulating frame layer "
In;" insulating frame layer " was both may operate in using B, " the Android application framework layer " that can also operate in standard (executes peace
The operation rule of tall and erect standard);It is the application for not being isolated operation using C, operates in " the Android application framework of standard completely
In layer ".
Secondly, the structure and relationship between the two of " insulating frame layer " and " Android application framework layer " refer to Fig. 3
And Fig. 4.As shown in figure 3, there are a set of system services S in " the Android application framework layer " of standard, wrapped in set of system services S
Contain campaign management services (ActivityManagerService), packet installation management service (PackageManager), resource
Manage (AssetManager, ResourcesManager) and other systems service, it is intended to operate in " Android application framework
Installation, the operational management of application (such as using B and applying C) in layer " provide support and organization and administration;Equally, increased
There is also a set of system services E, this set of system services E can be set of system services S in " isolation frame in " insulating frame layer "
One mapping agent of rack-layer " i.e. includes the agency of each system service in set of system services S, packet in set of system services E
It includes:Campaign management services agency, packet installation service broker, resource management agent and other systems service broker, these services
Agency is it is intended that the application (such as using A) operated in " insulating frame layer " provides support and permission, the section of file resource
Management and control.Therefore, as shown in figure 4, when applying A operations, set of system services E will provide the Android application interface of standard for application A,
Set of system services S in " Android application framework layer " of the interface capability from standard on basis;Also, it when application A operations, answers
With A to the application B, all unknown using C and the application of system short message etc. run in " Android application framework layer ", can not cross over
Set of system services E is supplied to its sandbox ability, and the mistake by set of system services E is required for using all data acquired in A
Chimney filter control.That is, using any one data or action from non-" insulating frame layer " of A applications, it all will be by " isolation
Ccf layer " acts on behalf of it and files an application to " Android application framework layer ", the data that " Android application framework layer " could need application A
" insulating frame layer " is copied to so that application A is accessed.
In order to which the operation principle to Fig. 3 and technological frame shown in Fig. 4 is further explained, Fig. 5, Fig. 5 exhibitions are referred to
The same application (Fig. 5 is by taking demo the is applied as an example) operation in " Android application framework layer " and " insulating frame layer " respectively is shown
When, the difference of the accessible paths of demo processes, wherein block diagram above indicates that demo is operated in " Android application framework layer "
When, the accessible paths of demo processes;When following block diagram indicates that demo is operated in " insulating frame layer ", demo processes can
Access path.As shown in figure 5, when demo operations in " the Android application framework layer " of standard, demo is mounted on "/data/
Under the paths app/ ", the private data of demo processes is stored under the path "/data/data/ ", and/sdcard/ represents external public
The access path of storage region, thus at this point, demo processes can access under the path "/data/app/demo.apk ", "/
Data under the paths data/data/demo " and under the path "/sdcard/ ";And when demo operations in " insulating frame layer "
When, the accessible paths of demo processes (are redirected) by modification mostly, wherein in addition to comprising application code and resource "/
Outside data under the paths data/app/demo.apk " still can access, the private data of demo processes (is weighed by modification
Orientation) it arrives under the path "/data/security_data/ ", and the public storage area that demo is accessed (is reset by modification
To) arrive under the path "/sdcard/security_path ", thus at this point, the process using B can access "/data/app/
Under the paths demo.apk ", under the path "/data/security_data/demo " and road "/sdcard/security_path "
Data under diameter.In addition it should be pointed out that be, on the one hand, the aforementioned each specific access path referred to is only to illustrate
Bright needs, and do not have uniqueness;On the other hand, can be choosing according to user using whether operating in " insulating frame layer "
Instruction is selected to be set.
Application operation method in the embodiment of the present invention, since default application can not be directly in access target storage region
Target data, and can only be under access target path copy data, this makes default application and the data in the domain of target storage
In isolation so that default application can not in the process of running be encrypted the user data in the domain of target storage,
So as to effectively prevent malicious application from encrypting the data in target storage domain in the process of running, the peace of user data is improved
Quan Xing.
It is the flow chart for the application operation method that another embodiment of the present invention provides referring to Fig. 6, Fig. 6, as shown in fig. 6, one
Kind application operation method, is applied to terminal, includes the following steps:
Step 601, according to it is input by user for selection target application selection instruction, by the intended application to target
The access path of storage region is revised as destination path, obtains default application;
Step 602, according to the default application to the access request of the target data in the target storage domain, to institute
It states target data to be copied, obtains copy data;
Step 603 stores the copy data to the destination path, wherein the destination path and the mesh
The path marked indicated by storage region is different;
Step 604, the control default application access to the copy data by the destination path.
Wherein, about above-mentioned terminal, above-mentioned default application, above-mentioned target storage domain, above-mentioned target data, above-mentioned copy
The explanation of shellfish, above-mentioned access and above-mentioned destination path etc. is referred to the explanation of corresponding portion in the corresponding embodiments of Fig. 1, therefore
Details are not described herein again.
Application operation method in the embodiment of the present invention, since default application can not be directly in access target storage region
Target data, and can only be under access target path copy data, this makes default application and the data in the domain of target storage
In isolation so that default application can not in the process of running be encrypted the user data in the domain of target storage,
So as to effectively prevent malicious application from encrypting the data in target storage domain in the process of running, the peace of user data is improved
Quan Xing;In addition, user can independently select to set certain applications in terminal to default application as needed, not only further
The selection independence for improving user, keeps the experience of user more preferable, and when user find it is suspicious in application, also can by by its
It is set as default application, prevents malicious application from further increasing user data to the danger of the data of target storage in time
Safety.
Optionally, in the above-described embodiments, visit of the default application of the basis to the target data in the domain of target storage
The step of asking request, the target data copied, including:
If access request of the default application to the target data in the domain of target storage is received, to the target data
It is copied.
Optionally, in the above-described embodiments, visit of the default application of the basis to the target data in the domain of target storage
The step of asking request, the target data copied, including:
If receiving default application to the access request of the target data in the domain of target storage, pass through the terminal
Display screen shows user's approval request corresponding with the access request;
If receiving the response message that user inputs user's approval request, institute is judged according to the response message
State whether access request passes through;
If judging, the access request passes through, and is copied to the target data.
Wherein, above-mentioned user's approval request can whether allow default application access target storage for counsel user
Word message or speech message of target data in domain etc.;Above-mentioned response message can agree to (or permission), can also be
It disagrees (or not allowing).It is above-mentioned to judge whether the access request passes through according to the response message, can be when response disappears
When breath is agrees to or allow, judge that access request passes through, can also be to judge to visit when response message is to disagree or do not allow
Ask that request does not pass through.
In this way, due to only agreeing in user or in the case of allow access, it just can be to the target in the domain of target storage
Data are copied and are stored to default access path, and then the copy data of target data can be just accessed in default application,
To further improve the safety of user data, meanwhile, user can be held to the initiative of data so that user
Experience it is more preferable.
It is the structure chart for the terminal that one embodiment of the invention provides referring to Fig. 7, Fig. 7, as shown in fig. 7, terminal 700 includes:
Module 701 is copied, for the access request according to default application to the target data in the domain of target storage, to institute
It states target data to be copied, obtains copy data;
Memory module 702, for storing the copy data to destination path, wherein the destination path and institute
The path stated indicated by the domain of target storage is different;
Access modules 703 visit the copy data by the destination path for controlling the default application
It asks.
Optionally, as shown in figure 8, the terminal 700 further includes:
Access path modified module 704 is used for according to the selection instruction input by user for selection target application, by institute
It states intended application and the destination path is revised as to the access path in the target storage domain, to obtain the default application.
Optionally, if the copy module 701 is for receiving default application to the target data in the domain of target storage
Access request, then the target data is copied.
Optionally, as shown in figure 9, the copy module 701 includes:
Unit 7011 is examined, if being asked to the access of the target data in the domain of target storage for receiving default application
It asks, then user's approval request corresponding with the access request is shown by the display screen of the terminal;
Judging unit 7012, if the response message inputted to user's approval request for receiving user, basis
The response message judges whether the access request passes through;
If copy cell 7013 copies the target data for judging that the access request passes through.
Terminal 700 can realize each process that terminal is realized in aforementioned approaches method embodiment, to avoid repeating, here not
It repeats again.
The terminal 700 of the embodiment of the present invention, due to default application can not be directly in access target storage region number of targets
According to, and can only be under access target path copy data, this make default application and the data in the domain of target storage be in every
From state so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to
It is enough effectively malicious application to be prevented to encrypt the data in target storage domain in the process of running, improve the safety of user data.
Figure 10 be another embodiment of the present invention provide terminal structure chart, as shown in Figure 10, the terminal 1000 include but
It is not limited to:Radio frequency unit 1001, audio output unit 1003, input unit 1004, sensor 1005, is shown network module 1002
Show unit 1006, user input unit 1007, interface unit 1008, memory 1009, processor 1010 and power supply 1011 etc.
Component.It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Figure 10, terminal can be with
Including than illustrating more or fewer components, either combining certain components or different components arrangement.In the embodiment of the present invention
In, terminal include but not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and
Pedometer etc..
Wherein, processor 1010 are used for:
According to default application to the access request of the target data in the domain of target storage, the target data is copied
Shellfish obtains copy data;
The copy data are stored to destination path, wherein the destination path and the target storage domain institute
The path of instruction is different;
The default application is controlled to access to the copy data by the destination path.
Optionally, processor 1010 is additionally operable to:
According to the selection instruction input by user for selection target application, the intended application stores the target
The access path in region is revised as the destination path, to obtain the default application.
Optionally, visit of the default application of the basis that processor 1010 executes to the target data in the domain of target storage
The step of asking request, the target data copied, including:
If access request of the default application to the target data in the domain of target storage is received, to the target data
It is copied.
Optionally, visit of the default application of the basis that processor 1010 executes to the target data in the domain of target storage
The step of asking request, the target data copied, including:
If receiving default application to the access request of the target data in the domain of target storage, pass through the terminal
Display screen shows user's approval request corresponding with the access request;
If receiving the response message that user inputs user's approval request, institute is judged according to the response message
State whether access request passes through;
If judging, the access request passes through, and is copied to the target data.
Terminal 1000 can realize each process that terminal is realized in foregoing embodiments, to avoid repeating, here no longer
It repeats.
The terminal 1000 of the embodiment of the present invention, due to default application can not be directly in access target storage region number of targets
According to, and can only be under access target path copy data, this make default application and the data in the domain of target storage be in every
From state so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to
It is enough effectively malicious application to be prevented to encrypt the data in target storage domain in the process of running, improve the safety of user data.
It should be understood that the embodiment of the present invention in, radio frequency unit 1001 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 1010 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 1001 includes but not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1001 can also by radio communication system and network and other
Equipment communicates.
Terminal has provided wireless broadband internet to the user by network module 1002 and has accessed, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 1003 can receive radio frequency unit 1001 or network module 1002 or in memory
The audio data stored in 1009 is converted into audio signal and exports to be sound.Moreover, audio output unit 1003 can be with
The relevant audio output of specific function executed with terminal 1000 is provided (for example, call signal receives sound, message sink sound
Etc.).Audio output unit 1003 includes loud speaker, buzzer and receiver etc..
Input unit 1004 is for receiving audio or video signal.Input unit 1004 may include graphics processor
(Graphics Processing Unit, GPU) 10041 and microphone 10042, graphics processor 10041 in video to capturing
In pattern or image capture mode by image capture apparatus (such as camera) obtain static images or video image data into
Row processing.Treated, and picture frame may be displayed on display unit 1006.Through treated the picture frame of graphics processor 10041
It can be stored in memory 1009 (or other storage mediums) or be carried out via radio frequency unit 1001 or network module 1002
It sends.Microphone 10042 can receive sound, and can be audio data by such acoustic processing.Audio that treated
Data can be converted to the lattice that mobile communication base station can be sent to via radio frequency unit 1001 in the case of telephone calling model
Formula exports.
Terminal 1000 further includes at least one sensor 1005, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
The light and shade of line adjusts the brightness of display panel 10061, and proximity sensor can close display when terminal 1000 is moved in one's ear
Panel 10061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three
Axis) acceleration size, size and the direction of gravity are can detect that when static, can be used to identify terminal posture (such as horizontal/vertical screen
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 1005
Can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature
Meter, infrared sensor etc. are spent, details are not described herein.
Display unit 1006 is for showing information input by user or being supplied to the information of user.Display unit 1006 can
Including display panel 10061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes may be used
Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 10061.
User input unit 1007 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 1007 include touch panel 10071 and its
His input equipment 10072.Touch panel 10071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 10071 or in touch panel
Operation near 10071).Touch panel 10071 may include both touch detecting apparatus and touch controller.Wherein, it touches
The touch orientation of detection device detection user is touched, and detects the signal that touch operation is brought, transmits a signal to touch controller;
Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1010,
It receives the order that processor 1010 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface
The multiple types such as sound wave realize touch panel 10071.In addition to touch panel 10071, user input unit 1007 can also include
Other input equipments 10072.Specifically, other input equipments 10072 can include but is not limited to physical keyboard, function key (ratio
Such as volume control button, switch key), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 10071 can be covered on display panel 10061, when touch panel 10071 detects
After touch operation on or near it, processor 1010 is sent to determine the type of touch event, is followed by subsequent processing device 1010
Corresponding visual output is provided on display panel 10061 according to the type of touch event.Although in Fig. 10, touch panel
10071 be to realize the function that outputs and inputs of terminal as two independent components with display panel 10061, but certain
In embodiment, can touch panel 10071 and display panel 10061 be integrated and be realized the function that outputs and inputs of terminal, tool
Body does not limit herein.
Interface unit 1008 is the interface that external device (ED) is connect with terminal 1000.For example, external device (ED) may include wired
Or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 1008 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal 1000 or it can be used in terminal 1000 and external fill
Transmission data between setting.
Memory 1009 can be used for storing software program and various data.Memory 1009 can include mainly storage program
Area and storage data field, wherein storing program area can storage program area, needed at least one function application program (such as
Sound-playing function, image player function etc.) etc.;Storage data field can be stored uses created data (ratio according to mobile phone
Such as audio data, phone directory) etc..In addition, memory 1009 may include high-speed random access memory, can also include non-
Volatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 1010 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection,
By running or execute the software program and/or module that are stored in memory 1009, and calls and be stored in memory 1009
Interior data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 1010 may include
One or more processing units;Preferably, processor 1010 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 1010.
Terminal 1000 can also include the power supply 1011 (such as battery) powered to all parts, it is preferred that power supply 1011
Can be logically contiguous by power-supply management system and processor 1010, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal 1000 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 1010, and memory 1009 is stored in
On reservoir 1009 and the computer program that can be run on the processor 1010, the computer program are executed by processor 1010
Each process of Shi Shixian above application operation method embodiments, and identical technique effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes each process of above application operation method embodiment, and energy when the computer program is executed by processor
Reach identical technique effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within the protection of the present invention.
Claims (10)
1. a kind of application operation method is applied to terminal, which is characterized in that including:
According to default application to the access request of the target data in the domain of target storage, the target data is copied,
Obtain copy data;
The copy data are stored to destination path, wherein indicated by the destination path and the target storage domain
Path it is different;
The default application is controlled to access to the copy data by the destination path.
2. according to the method described in claim 1, it is characterized in that, the default application of the basis is to the mesh in the domain of target storage
The access request for marking data, the step of copy to the target data, including:
If receiving default application to the access request of the target data in the domain of target storage, the target data is carried out
Copy.
3. according to the method described in claim 1, it is characterized in that, the default application of the basis is to the mesh in the domain of target storage
The access request for marking data, the step of copy to the target data, including:
If receiving default application to the access request of the target data in the domain of target storage, pass through the display of the terminal
Screen shows user's approval request corresponding with the access request;
If receiving the response message that user inputs user's approval request, the visit is judged according to the response message
Ask whether request passes through;
If judging, the access request passes through, and is copied to the target data.
4. method according to any one of claims 1 to 3, which is characterized in that deposited to target in the default application of the basis
The access request of target data in storage area domain further includes before the step of being copied to the target data:
According to the selection instruction input by user for selection target application, by the intended application to the target storage domain
Access path be revised as the destination path, to obtain the default application.
5. a kind of terminal, which is characterized in that including:
Module is copied, for the access request according to default application to the target data in the domain of target storage, to the target
Data are copied, and copy data are obtained;
Memory module, for storing the copy data to destination path, wherein the destination path is deposited with the target
Path indicated by storage area domain is different;
Access modules access to the copy data by the destination path for controlling the default application.
6. terminal according to claim 5, which is characterized in that if the copy module is for receiving default application to mesh
The access request for marking the target data in storage region, then copy the target data.
7. terminal according to claim 5, which is characterized in that the copy module includes:
Unit is examined, if for receiving default application to the access request of the target data in the domain of target storage, is passed through
The display screen of the terminal shows user's approval request corresponding with the access request;
Judging unit, if the response message inputted to user's approval request for receiving user, according to the response
Message judges whether the access request passes through;
If copy cell copies the target data for judging that the access request passes through.
8. according to claim 5 to 7 any one of them terminal, which is characterized in that the terminal further includes:
Access path modified module is used for according to the selection instruction input by user for selection target application, by the target
It is revised as the destination path using the access path to the target storage domain, to obtain the default application.
9. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be in the processing
The computer program run on device is realized when the computer program is executed by the processor as any in Claims 1-4
Described in application operation method the step of.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program, the computer program realize application operation method according to any one of claims 1 to 4 when being executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810064497.1A CN108319432A (en) | 2018-01-23 | 2018-01-23 | A kind of application operation method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810064497.1A CN108319432A (en) | 2018-01-23 | 2018-01-23 | A kind of application operation method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108319432A true CN108319432A (en) | 2018-07-24 |
Family
ID=62887433
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810064497.1A Pending CN108319432A (en) | 2018-01-23 | 2018-01-23 | A kind of application operation method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108319432A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020057202A1 (en) * | 2018-09-20 | 2020-03-26 | Oppo广东移动通信有限公司 | Game running method and related product |
CN111314417A (en) * | 2020-01-14 | 2020-06-19 | 网易(杭州)网络有限公司 | Application data processing method and device, storage medium and processor |
CN112218173A (en) * | 2020-10-13 | 2021-01-12 | 广州欢网科技有限责任公司 | Smart television user information protection method, device, equipment and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1804810A (en) * | 2005-01-14 | 2006-07-19 | 国际商业机器公司 | Method and system of redirection for storage access requests |
CN102124436A (en) * | 2008-07-08 | 2011-07-13 | 桑迪士克以色列有限公司 | Dynamic file system restriction for portable storage devices |
CN102289633A (en) * | 2011-09-02 | 2011-12-21 | 广东欧珀移动通信有限公司 | Method for managing dynamic permission of application program under Android platform |
CN105468974A (en) * | 2015-11-19 | 2016-04-06 | 广东欧珀移动通信有限公司 | File access method and device, and mobile terminal |
CN105488387A (en) * | 2014-09-28 | 2016-04-13 | 北京云巢动脉科技有限公司 | Method and system for redirecting files through security sand table |
CN106203127A (en) * | 2015-04-30 | 2016-12-07 | 中国电信股份有限公司 | A kind of method realizing the reading of M1 application data general-purposeization and Mobile phone card |
CN106909342A (en) * | 2017-03-01 | 2017-06-30 | 中天安泰(北京)信息技术有限公司 | A kind of data processing method and data processing equipment |
CN107194217A (en) * | 2017-05-24 | 2017-09-22 | 努比亚技术有限公司 | User data access control method, equipment and computer-readable recording medium |
CN107247560A (en) * | 2017-05-23 | 2017-10-13 | 努比亚技术有限公司 | Date storage method and mobile terminal |
CN107341032A (en) * | 2017-06-23 | 2017-11-10 | 努比亚技术有限公司 | A kind of data load method, mobile terminal and computer-readable recording medium |
-
2018
- 2018-01-23 CN CN201810064497.1A patent/CN108319432A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1804810A (en) * | 2005-01-14 | 2006-07-19 | 国际商业机器公司 | Method and system of redirection for storage access requests |
CN102124436A (en) * | 2008-07-08 | 2011-07-13 | 桑迪士克以色列有限公司 | Dynamic file system restriction for portable storage devices |
CN102289633A (en) * | 2011-09-02 | 2011-12-21 | 广东欧珀移动通信有限公司 | Method for managing dynamic permission of application program under Android platform |
CN105488387A (en) * | 2014-09-28 | 2016-04-13 | 北京云巢动脉科技有限公司 | Method and system for redirecting files through security sand table |
CN106203127A (en) * | 2015-04-30 | 2016-12-07 | 中国电信股份有限公司 | A kind of method realizing the reading of M1 application data general-purposeization and Mobile phone card |
CN105468974A (en) * | 2015-11-19 | 2016-04-06 | 广东欧珀移动通信有限公司 | File access method and device, and mobile terminal |
CN106909342A (en) * | 2017-03-01 | 2017-06-30 | 中天安泰(北京)信息技术有限公司 | A kind of data processing method and data processing equipment |
CN107247560A (en) * | 2017-05-23 | 2017-10-13 | 努比亚技术有限公司 | Date storage method and mobile terminal |
CN107194217A (en) * | 2017-05-24 | 2017-09-22 | 努比亚技术有限公司 | User data access control method, equipment and computer-readable recording medium |
CN107341032A (en) * | 2017-06-23 | 2017-11-10 | 努比亚技术有限公司 | A kind of data load method, mobile terminal and computer-readable recording medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020057202A1 (en) * | 2018-09-20 | 2020-03-26 | Oppo广东移动通信有限公司 | Game running method and related product |
CN111314417A (en) * | 2020-01-14 | 2020-06-19 | 网易(杭州)网络有限公司 | Application data processing method and device, storage medium and processor |
CN111314417B (en) * | 2020-01-14 | 2023-04-28 | 网易(杭州)网络有限公司 | Method and device for processing application data, storage medium and processor |
CN112218173A (en) * | 2020-10-13 | 2021-01-12 | 广州欢网科技有限责任公司 | Smart television user information protection method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108491133A (en) | A kind of application control method and terminal | |
CN108595946B (en) | Privacy protection method and terminal | |
CN109542282A (en) | A kind of interface display method and terminal device | |
CN109194818A (en) | A kind of information processing method and terminal | |
CN107203147A (en) | Internet of Things network control system and method based on cloud platform | |
WO2018214748A1 (en) | Method and apparatus for displaying application interface, terminal and storage medium | |
CN110457935A (en) | A kind of authority configuring method and terminal device | |
CN109446834A (en) | A kind of right management method and mobile terminal of application program | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN109687974A (en) | APK verification method, device, mobile terminal and readable storage medium storing program for executing | |
CN108681427A (en) | A kind of method and terminal device of access privilege control | |
CN109753350A (en) | A kind of method for managing resource and terminal device | |
CN108833690A (en) | authority control method, terminal and computer readable storage medium | |
CN110309004A (en) | The processing method and terminal of data | |
CN108171034A (en) | A kind of method and terminal for protecting privacy | |
CN110147186A (en) | A kind of control method and terminal device of application | |
CN110035183A (en) | Information sharing method and terminal | |
CN108319432A (en) | A kind of application operation method and terminal | |
CN109271779A (en) | A kind of installation packet inspection method, terminal device and server | |
CN109117054A (en) | A kind of display control method and terminal | |
CN108984231A (en) | A kind of login method and mobile terminal of application program account | |
CN109246693A (en) | A kind of control method and terminal of application program | |
CN111209031B (en) | Data acquisition method, device, terminal equipment and storage medium | |
CN109815679A (en) | Right management method and mobile terminal | |
CN108153460A (en) | A kind of icon hiding method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180724 |
|
RJ01 | Rejection of invention patent application after publication |