CN108319432A - A kind of application operation method and terminal - Google Patents

A kind of application operation method and terminal Download PDF

Info

Publication number
CN108319432A
CN108319432A CN201810064497.1A CN201810064497A CN108319432A CN 108319432 A CN108319432 A CN 108319432A CN 201810064497 A CN201810064497 A CN 201810064497A CN 108319432 A CN108319432 A CN 108319432A
Authority
CN
China
Prior art keywords
data
target
domain
application
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810064497.1A
Other languages
Chinese (zh)
Inventor
胡展鸿
莫燕清
刘朝辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810064497.1A priority Critical patent/CN108319432A/en
Publication of CN108319432A publication Critical patent/CN108319432A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0635Configuration or reconfiguration of storage systems by changing the path, e.g. traffic rerouting, path reconfiguration

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of application operation method of present invention offer and terminal, this method are applied to terminal, including:According to default application to the access request of the target data in the domain of target storage, the target data is copied, obtains copy data;The copy data are stored to destination path, wherein the destination path is different from the path indicated by the target storage domain;The default application is controlled to access to the copy data by the destination path.Due to default application can not be directly in access target storage region target data, and can only be under access target path copy data, this makes default application be in isolation with the data in the domain of target storage, so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to effectively prevent malicious application from encrypting the data in target storage domain in the process of running, the safety of user data is improved.

Description

A kind of application operation method and terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of application operation methods and terminal.
Background technology
With the development of communication technologies, mobile terminal is gradually gained popularity, and more and more movable developments of the mankind rely on In the use of mobile terminal, also therefore, more and more users' data are for example, photo, document files, location information, address list Or short message etc. is present in mobile terminal.
Along with the mass users data of mobile terminal, all kinds of malicious applications seriously threaten user's at explosive growth Data safety.Currently, a kind of harm situation of common Malware is that Malware is by directly encrypting target storage domain Such as (public storage area is any to have applied for that the application of storage region access limit can be carried out visiting for public storage area Ask) user data, make user can not use these data, and then achieve the purpose that user carry out money extort.
The infringement of malicious application in order to prevent, at present user mainly taken precautions against using antivirus software, i.e., application install During, antivirus software can scan the installation kit of application, and installation kit disease is carried out by local or high in the clouds Virus Sample feature Malicious feature recognition.But since this mode can only work mostly when application is installed, and dynamic is keen in many applications now The mode that code issues, therefore it can not effectively be prevented to encrypt the user in target storage domain in malicious application operational process Data cause the safety of user data relatively low.
Invention content
A kind of application operation method of offer of the embodiment of the present invention and terminal, can not be transported with solving the prior art in malicious application It effectively prevents it to encrypt the user data in target storage domain during row, causes the safety of user data is lower to ask Topic.
In order to solve the above technical problems, the invention is realized in this way:A kind of application operation method is applied to terminal, packet It includes:
According to default application to the access request of the target data in the domain of target storage, the target data is copied Shellfish obtains copy data;
The copy data are stored to destination path, wherein the destination path and the target storage domain institute The path of instruction is different;
The default application is controlled to access to the copy data by the destination path.
In a first aspect, an embodiment of the present invention provides a kind of application operation method, it is applied to terminal, including:
According to default application to the access request of the target data in the domain of target storage, the target data is copied Shellfish obtains copy data;
The copy data are stored to destination path, wherein the destination path and the target storage domain institute The path of instruction is different;
The default application is controlled to access to the copy data by the destination path.
Second aspect, the embodiment of the present invention also provide a kind of terminal, including:
Module is copied, for the access request according to default application to the target data in the domain of target storage, to described Target data is copied, and copy data are obtained;
Memory module, for storing the copy data to destination path, wherein the destination path and the mesh The path marked indicated by storage region is different;
Access modules access to the copy data by the destination path for controlling the default application.
The third aspect, the embodiment of the present invention also provide a kind of terminal, including processor, memory and are stored in the storage On device and the computer program that can run on the processor, realized when the computer program is executed by the processor The step of stating application operation method.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage It is stored with computer program on medium, the step of above application operation method is realized when the computer program is executed by processor Suddenly.
In embodiments of the present invention, by being asked to the access of the target data in the domain of target storage according to default application It asks, the target data is copied, obtain copy data;The copy data are stored to destination path, wherein institute It is different from the path indicated by the target storage domain to state destination path;It controls the default application and passes through the destination path It accesses to the copy data.In this way, due to default application can not be directly in access target storage region target data, And can only be under access target path copy data, this makes default application be in barrier-like with the data in the domain of target storage State so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to have Effect ground prevents malicious application from encrypting the data in target storage domain in the process of running, improves the safety of user data.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without having to pay creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is the flow chart for the application operation method that one embodiment of the invention provides;
Fig. 2 is the overall technology frame construction drawing of the application operation method provided for realizing one embodiment of the invention;
Fig. 3 is the isolation frame in the overall technology frame of the application operation method provided for realizing one embodiment of the invention One of the structure chart of rack-layer and Android application framework layer;
Fig. 4 is the isolation frame in the overall technology frame of the application operation method provided for realizing one embodiment of the invention The two of the structure chart of rack-layer and Android application framework layer;
Fig. 5 is that same application is separately operable entirety in the application operation method provided for realizing one embodiment of the invention When insulating frame layer and Android application framework layer in technological frame, the comparison diagram of the accessible paths of the process of the application;
Fig. 6 is the flow chart for the application operation method that another embodiment of the present invention provides;
Fig. 7 is one of the structure chart of terminal that one embodiment of the invention provides;
Fig. 8 is the two of the structure chart for the terminal that one embodiment of the invention provides;
Fig. 9 is the structure chart of the copy module for the terminal that one embodiment of the invention provides;
Figure 10 is the structure chart for the terminal that another embodiment of the present invention provides.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
It is the flow chart for the application operation method that one embodiment of the invention provides referring to Fig. 1, Fig. 1, as shown in Figure 1, a kind of Application operation method is applied to terminal, includes the following steps:
Step 101, the default access request using to the target data in the domain of target storage of basis, to the number of targets According to being copied, copy data are obtained;
Step 102 stores the copy data to destination path, wherein the destination path is deposited with the target Path indicated by storage area domain is different;
Step 103, the control default application access to the copy data by the destination path.
Wherein, above-mentioned terminal can be mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital assistant, abbreviation PDA), mobile Internet access dress Set (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
Above-mentioned default application can be one of installation application in above-mentioned terminal, can also be to pacify in above-mentioned terminal The two of which of dress or more than two applications.Above-mentioned target storage domain can refer to internal storage region, may also mean that outer Portion memory block can also refer to the common storage area for storing the data such as image, document, audio, video, in this regard, of the invention It is not construed as limiting.Above-mentioned target data can be the total data in above-mentioned target storage domain, can also be above-mentioned target storage Partial data in region, such as can be a certain or a few specific image or some or certain several specific texts Shelves.Above-mentioned copy alternatively referred to as replicates;Above-mentioned access can refer to reading data and/or write-in data.
Above-mentioned destination path can (be reset to the access modification in the target storage domain for the default application To) access path, specifically can be understood as when default application needs access target storage region, above-mentioned default application will be by The storage region of access target path meaning is guided, rather than accesses target storage domain truly.
It should be noted that the overall technology frame for realizing the application operation method in the embodiment of the present invention can be with It is, using the technological frame for increasing " insulating frame layer " between primary system framework layer and application, to make the application being isolated In " insulating frame layer " operation (executing specific operation rule).It is operated using primary operating system as Android (Android) Can be that above application operation method is realized using technological frame as shown in Figures 2 to 4 for for system:
First, used overall technology frame refers to Fig. 2.As shown in Fig. 2, in Android application framework layer and applying it Between increase and have " insulating frame layer ", wherein using A be the application for being isolated operation, operate in increased " insulating frame layer " In;" insulating frame layer " was both may operate in using B, " the Android application framework layer " that can also operate in standard (executes peace The operation rule of tall and erect standard);It is the application for not being isolated operation using C, operates in " the Android application framework of standard completely In layer ".
Secondly, the structure and relationship between the two of " insulating frame layer " and " Android application framework layer " refer to Fig. 3 And Fig. 4.As shown in figure 3, there are a set of system services S in " the Android application framework layer " of standard, wrapped in set of system services S Contain campaign management services (ActivityManagerService), packet installation management service (PackageManager), resource Manage (AssetManager, ResourcesManager) and other systems service, it is intended to operate in " Android application framework Installation, the operational management of application (such as using B and applying C) in layer " provide support and organization and administration;Equally, increased There is also a set of system services E, this set of system services E can be set of system services S in " isolation frame in " insulating frame layer " One mapping agent of rack-layer " i.e. includes the agency of each system service in set of system services S, packet in set of system services E It includes:Campaign management services agency, packet installation service broker, resource management agent and other systems service broker, these services Agency is it is intended that the application (such as using A) operated in " insulating frame layer " provides support and permission, the section of file resource Management and control.Therefore, as shown in figure 4, when applying A operations, set of system services E will provide the Android application interface of standard for application A, Set of system services S in " Android application framework layer " of the interface capability from standard on basis;Also, it when application A operations, answers With A to the application B, all unknown using C and the application of system short message etc. run in " Android application framework layer ", can not cross over Set of system services E is supplied to its sandbox ability, and the mistake by set of system services E is required for using all data acquired in A Chimney filter control.That is, using any one data or action from non-" insulating frame layer " of A applications, it all will be by " isolation Ccf layer " acts on behalf of it and files an application to " Android application framework layer ", the data that " Android application framework layer " could need application A " insulating frame layer " is copied to so that application A is accessed.
In order to which the operation principle to Fig. 3 and technological frame shown in Fig. 4 is further explained, Fig. 5, Fig. 5 exhibitions are referred to The same application (Fig. 5 is by taking demo the is applied as an example) operation in " Android application framework layer " and " insulating frame layer " respectively is shown When, the difference of the accessible paths of demo processes, wherein block diagram above indicates that demo is operated in " Android application framework layer " When, the accessible paths of demo processes;When following block diagram indicates that demo is operated in " insulating frame layer ", demo processes can Access path.As shown in figure 5, when demo operations in " the Android application framework layer " of standard, demo is mounted on "/data/ Under the paths app/ ", the private data of demo processes is stored under the path "/data/data/ ", and/sdcard/ represents external public The access path of storage region, thus at this point, demo processes can access under the path "/data/app/demo.apk ", "/ Data under the paths data/data/demo " and under the path "/sdcard/ ";And when demo operations in " insulating frame layer " When, the accessible paths of demo processes (are redirected) by modification mostly, wherein in addition to comprising application code and resource "/ Outside data under the paths data/app/demo.apk " still can access, the private data of demo processes (is weighed by modification Orientation) it arrives under the path "/data/security_data/ ", and the public storage area that demo is accessed (is reset by modification To) arrive under the path "/sdcard/security_path ", thus at this point, the process using B can access "/data/app/ Under the paths demo.apk ", under the path "/data/security_data/demo " and road "/sdcard/security_path " Data under diameter.In addition it should be pointed out that be, on the one hand, the aforementioned each specific access path referred to is only to illustrate Bright needs, and do not have uniqueness;On the other hand, can be choosing according to user using whether operating in " insulating frame layer " Instruction is selected to be set.
Application operation method in the embodiment of the present invention, since default application can not be directly in access target storage region Target data, and can only be under access target path copy data, this makes default application and the data in the domain of target storage In isolation so that default application can not in the process of running be encrypted the user data in the domain of target storage, So as to effectively prevent malicious application from encrypting the data in target storage domain in the process of running, the peace of user data is improved Quan Xing.
It is the flow chart for the application operation method that another embodiment of the present invention provides referring to Fig. 6, Fig. 6, as shown in fig. 6, one Kind application operation method, is applied to terminal, includes the following steps:
Step 601, according to it is input by user for selection target application selection instruction, by the intended application to target The access path of storage region is revised as destination path, obtains default application;
Step 602, according to the default application to the access request of the target data in the target storage domain, to institute It states target data to be copied, obtains copy data;
Step 603 stores the copy data to the destination path, wherein the destination path and the mesh The path marked indicated by storage region is different;
Step 604, the control default application access to the copy data by the destination path.
Wherein, about above-mentioned terminal, above-mentioned default application, above-mentioned target storage domain, above-mentioned target data, above-mentioned copy The explanation of shellfish, above-mentioned access and above-mentioned destination path etc. is referred to the explanation of corresponding portion in the corresponding embodiments of Fig. 1, therefore Details are not described herein again.
Application operation method in the embodiment of the present invention, since default application can not be directly in access target storage region Target data, and can only be under access target path copy data, this makes default application and the data in the domain of target storage In isolation so that default application can not in the process of running be encrypted the user data in the domain of target storage, So as to effectively prevent malicious application from encrypting the data in target storage domain in the process of running, the peace of user data is improved Quan Xing;In addition, user can independently select to set certain applications in terminal to default application as needed, not only further The selection independence for improving user, keeps the experience of user more preferable, and when user find it is suspicious in application, also can by by its It is set as default application, prevents malicious application from further increasing user data to the danger of the data of target storage in time Safety.
Optionally, in the above-described embodiments, visit of the default application of the basis to the target data in the domain of target storage The step of asking request, the target data copied, including:
If access request of the default application to the target data in the domain of target storage is received, to the target data It is copied.
Optionally, in the above-described embodiments, visit of the default application of the basis to the target data in the domain of target storage The step of asking request, the target data copied, including:
If receiving default application to the access request of the target data in the domain of target storage, pass through the terminal Display screen shows user's approval request corresponding with the access request;
If receiving the response message that user inputs user's approval request, institute is judged according to the response message State whether access request passes through;
If judging, the access request passes through, and is copied to the target data.
Wherein, above-mentioned user's approval request can whether allow default application access target storage for counsel user Word message or speech message of target data in domain etc.;Above-mentioned response message can agree to (or permission), can also be It disagrees (or not allowing).It is above-mentioned to judge whether the access request passes through according to the response message, can be when response disappears When breath is agrees to or allow, judge that access request passes through, can also be to judge to visit when response message is to disagree or do not allow Ask that request does not pass through.
In this way, due to only agreeing in user or in the case of allow access, it just can be to the target in the domain of target storage Data are copied and are stored to default access path, and then the copy data of target data can be just accessed in default application, To further improve the safety of user data, meanwhile, user can be held to the initiative of data so that user Experience it is more preferable.
It is the structure chart for the terminal that one embodiment of the invention provides referring to Fig. 7, Fig. 7, as shown in fig. 7, terminal 700 includes:
Module 701 is copied, for the access request according to default application to the target data in the domain of target storage, to institute It states target data to be copied, obtains copy data;
Memory module 702, for storing the copy data to destination path, wherein the destination path and institute The path stated indicated by the domain of target storage is different;
Access modules 703 visit the copy data by the destination path for controlling the default application It asks.
Optionally, as shown in figure 8, the terminal 700 further includes:
Access path modified module 704 is used for according to the selection instruction input by user for selection target application, by institute It states intended application and the destination path is revised as to the access path in the target storage domain, to obtain the default application.
Optionally, if the copy module 701 is for receiving default application to the target data in the domain of target storage Access request, then the target data is copied.
Optionally, as shown in figure 9, the copy module 701 includes:
Unit 7011 is examined, if being asked to the access of the target data in the domain of target storage for receiving default application It asks, then user's approval request corresponding with the access request is shown by the display screen of the terminal;
Judging unit 7012, if the response message inputted to user's approval request for receiving user, basis The response message judges whether the access request passes through;
If copy cell 7013 copies the target data for judging that the access request passes through.
Terminal 700 can realize each process that terminal is realized in aforementioned approaches method embodiment, to avoid repeating, here not It repeats again.
The terminal 700 of the embodiment of the present invention, due to default application can not be directly in access target storage region number of targets According to, and can only be under access target path copy data, this make default application and the data in the domain of target storage be in every From state so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to It is enough effectively malicious application to be prevented to encrypt the data in target storage domain in the process of running, improve the safety of user data.
Figure 10 be another embodiment of the present invention provide terminal structure chart, as shown in Figure 10, the terminal 1000 include but It is not limited to:Radio frequency unit 1001, audio output unit 1003, input unit 1004, sensor 1005, is shown network module 1002 Show unit 1006, user input unit 1007, interface unit 1008, memory 1009, processor 1010 and power supply 1011 etc. Component.It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Figure 10, terminal can be with Including than illustrating more or fewer components, either combining certain components or different components arrangement.In the embodiment of the present invention In, terminal include but not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and Pedometer etc..
Wherein, processor 1010 are used for:
According to default application to the access request of the target data in the domain of target storage, the target data is copied Shellfish obtains copy data;
The copy data are stored to destination path, wherein the destination path and the target storage domain institute The path of instruction is different;
The default application is controlled to access to the copy data by the destination path.
Optionally, processor 1010 is additionally operable to:
According to the selection instruction input by user for selection target application, the intended application stores the target The access path in region is revised as the destination path, to obtain the default application.
Optionally, visit of the default application of the basis that processor 1010 executes to the target data in the domain of target storage The step of asking request, the target data copied, including:
If access request of the default application to the target data in the domain of target storage is received, to the target data It is copied.
Optionally, visit of the default application of the basis that processor 1010 executes to the target data in the domain of target storage The step of asking request, the target data copied, including:
If receiving default application to the access request of the target data in the domain of target storage, pass through the terminal Display screen shows user's approval request corresponding with the access request;
If receiving the response message that user inputs user's approval request, institute is judged according to the response message State whether access request passes through;
If judging, the access request passes through, and is copied to the target data.
Terminal 1000 can realize each process that terminal is realized in foregoing embodiments, to avoid repeating, here no longer It repeats.
The terminal 1000 of the embodiment of the present invention, due to default application can not be directly in access target storage region number of targets According to, and can only be under access target path copy data, this make default application and the data in the domain of target storage be in every From state so that default application can not in the process of running be encrypted the user data in the domain of target storage, so as to It is enough effectively malicious application to be prevented to encrypt the data in target storage domain in the process of running, improve the safety of user data.
It should be understood that the embodiment of the present invention in, radio frequency unit 1001 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 1010 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 1001 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1001 can also by radio communication system and network and other Equipment communicates.
Terminal has provided wireless broadband internet to the user by network module 1002 and has accessed, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 1003 can receive radio frequency unit 1001 or network module 1002 or in memory The audio data stored in 1009 is converted into audio signal and exports to be sound.Moreover, audio output unit 1003 can be with The relevant audio output of specific function executed with terminal 1000 is provided (for example, call signal receives sound, message sink sound Etc.).Audio output unit 1003 includes loud speaker, buzzer and receiver etc..
Input unit 1004 is for receiving audio or video signal.Input unit 1004 may include graphics processor (Graphics Processing Unit, GPU) 10041 and microphone 10042, graphics processor 10041 in video to capturing In pattern or image capture mode by image capture apparatus (such as camera) obtain static images or video image data into Row processing.Treated, and picture frame may be displayed on display unit 1006.Through treated the picture frame of graphics processor 10041 It can be stored in memory 1009 (or other storage mediums) or be carried out via radio frequency unit 1001 or network module 1002 It sends.Microphone 10042 can receive sound, and can be audio data by such acoustic processing.Audio that treated Data can be converted to the lattice that mobile communication base station can be sent to via radio frequency unit 1001 in the case of telephone calling model Formula exports.
Terminal 1000 further includes at least one sensor 1005, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light The light and shade of line adjusts the brightness of display panel 10061, and proximity sensor can close display when terminal 1000 is moved in one's ear Panel 10061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three Axis) acceleration size, size and the direction of gravity are can detect that when static, can be used to identify terminal posture (such as horizontal/vertical screen Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 1005 Can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, temperature Meter, infrared sensor etc. are spent, details are not described herein.
Display unit 1006 is for showing information input by user or being supplied to the information of user.Display unit 1006 can Including display panel 10061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes may be used Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 10061.
User input unit 1007 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 1007 include touch panel 10071 and its His input equipment 10072.Touch panel 10071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 10071 or in touch panel Operation near 10071).Touch panel 10071 may include both touch detecting apparatus and touch controller.Wherein, it touches The touch orientation of detection device detection user is touched, and detects the signal that touch operation is brought, transmits a signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1010, It receives the order that processor 1010 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface The multiple types such as sound wave realize touch panel 10071.In addition to touch panel 10071, user input unit 1007 can also include Other input equipments 10072.Specifically, other input equipments 10072 can include but is not limited to physical keyboard, function key (ratio Such as volume control button, switch key), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 10071 can be covered on display panel 10061, when touch panel 10071 detects After touch operation on or near it, processor 1010 is sent to determine the type of touch event, is followed by subsequent processing device 1010 Corresponding visual output is provided on display panel 10061 according to the type of touch event.Although in Fig. 10, touch panel 10071 be to realize the function that outputs and inputs of terminal as two independent components with display panel 10061, but certain In embodiment, can touch panel 10071 and display panel 10061 be integrated and be realized the function that outputs and inputs of terminal, tool Body does not limit herein.
Interface unit 1008 is the interface that external device (ED) is connect with terminal 1000.For example, external device (ED) may include wired Or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 1008 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal 1000 or it can be used in terminal 1000 and external fill Transmission data between setting.
Memory 1009 can be used for storing software program and various data.Memory 1009 can include mainly storage program Area and storage data field, wherein storing program area can storage program area, needed at least one function application program (such as Sound-playing function, image player function etc.) etc.;Storage data field can be stored uses created data (ratio according to mobile phone Such as audio data, phone directory) etc..In addition, memory 1009 may include high-speed random access memory, can also include non- Volatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 1010 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, By running or execute the software program and/or module that are stored in memory 1009, and calls and be stored in memory 1009 Interior data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 1010 may include One or more processing units;Preferably, processor 1010 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 1010.
Terminal 1000 can also include the power supply 1011 (such as battery) powered to all parts, it is preferred that power supply 1011 Can be logically contiguous by power-supply management system and processor 1010, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal 1000 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 1010, and memory 1009 is stored in On reservoir 1009 and the computer program that can be run on the processor 1010, the computer program are executed by processor 1010 Each process of Shi Shixian above application operation method embodiments, and identical technique effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes each process of above application operation method embodiment, and energy when the computer program is executed by processor Reach identical technique effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within the protection of the present invention.

Claims (10)

1. a kind of application operation method is applied to terminal, which is characterized in that including:
According to default application to the access request of the target data in the domain of target storage, the target data is copied, Obtain copy data;
The copy data are stored to destination path, wherein indicated by the destination path and the target storage domain Path it is different;
The default application is controlled to access to the copy data by the destination path.
2. according to the method described in claim 1, it is characterized in that, the default application of the basis is to the mesh in the domain of target storage The access request for marking data, the step of copy to the target data, including:
If receiving default application to the access request of the target data in the domain of target storage, the target data is carried out Copy.
3. according to the method described in claim 1, it is characterized in that, the default application of the basis is to the mesh in the domain of target storage The access request for marking data, the step of copy to the target data, including:
If receiving default application to the access request of the target data in the domain of target storage, pass through the display of the terminal Screen shows user's approval request corresponding with the access request;
If receiving the response message that user inputs user's approval request, the visit is judged according to the response message Ask whether request passes through;
If judging, the access request passes through, and is copied to the target data.
4. method according to any one of claims 1 to 3, which is characterized in that deposited to target in the default application of the basis The access request of target data in storage area domain further includes before the step of being copied to the target data:
According to the selection instruction input by user for selection target application, by the intended application to the target storage domain Access path be revised as the destination path, to obtain the default application.
5. a kind of terminal, which is characterized in that including:
Module is copied, for the access request according to default application to the target data in the domain of target storage, to the target Data are copied, and copy data are obtained;
Memory module, for storing the copy data to destination path, wherein the destination path is deposited with the target Path indicated by storage area domain is different;
Access modules access to the copy data by the destination path for controlling the default application.
6. terminal according to claim 5, which is characterized in that if the copy module is for receiving default application to mesh The access request for marking the target data in storage region, then copy the target data.
7. terminal according to claim 5, which is characterized in that the copy module includes:
Unit is examined, if for receiving default application to the access request of the target data in the domain of target storage, is passed through The display screen of the terminal shows user's approval request corresponding with the access request;
Judging unit, if the response message inputted to user's approval request for receiving user, according to the response Message judges whether the access request passes through;
If copy cell copies the target data for judging that the access request passes through.
8. according to claim 5 to 7 any one of them terminal, which is characterized in that the terminal further includes:
Access path modified module is used for according to the selection instruction input by user for selection target application, by the target It is revised as the destination path using the access path to the target storage domain, to obtain the default application.
9. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be in the processing The computer program run on device is realized when the computer program is executed by the processor as any in Claims 1-4 Described in application operation method the step of.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize application operation method according to any one of claims 1 to 4 when being executed by processor The step of.
CN201810064497.1A 2018-01-23 2018-01-23 A kind of application operation method and terminal Pending CN108319432A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810064497.1A CN108319432A (en) 2018-01-23 2018-01-23 A kind of application operation method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810064497.1A CN108319432A (en) 2018-01-23 2018-01-23 A kind of application operation method and terminal

Publications (1)

Publication Number Publication Date
CN108319432A true CN108319432A (en) 2018-07-24

Family

ID=62887433

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810064497.1A Pending CN108319432A (en) 2018-01-23 2018-01-23 A kind of application operation method and terminal

Country Status (1)

Country Link
CN (1) CN108319432A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020057202A1 (en) * 2018-09-20 2020-03-26 Oppo广东移动通信有限公司 Game running method and related product
CN111314417A (en) * 2020-01-14 2020-06-19 网易(杭州)网络有限公司 Application data processing method and device, storage medium and processor
CN112218173A (en) * 2020-10-13 2021-01-12 广州欢网科技有限责任公司 Smart television user information protection method, device, equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1804810A (en) * 2005-01-14 2006-07-19 国际商业机器公司 Method and system of redirection for storage access requests
CN102124436A (en) * 2008-07-08 2011-07-13 桑迪士克以色列有限公司 Dynamic file system restriction for portable storage devices
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform
CN105468974A (en) * 2015-11-19 2016-04-06 广东欧珀移动通信有限公司 File access method and device, and mobile terminal
CN105488387A (en) * 2014-09-28 2016-04-13 北京云巢动脉科技有限公司 Method and system for redirecting files through security sand table
CN106203127A (en) * 2015-04-30 2016-12-07 中国电信股份有限公司 A kind of method realizing the reading of M1 application data general-purposeization and Mobile phone card
CN106909342A (en) * 2017-03-01 2017-06-30 中天安泰(北京)信息技术有限公司 A kind of data processing method and data processing equipment
CN107194217A (en) * 2017-05-24 2017-09-22 努比亚技术有限公司 User data access control method, equipment and computer-readable recording medium
CN107247560A (en) * 2017-05-23 2017-10-13 努比亚技术有限公司 Date storage method and mobile terminal
CN107341032A (en) * 2017-06-23 2017-11-10 努比亚技术有限公司 A kind of data load method, mobile terminal and computer-readable recording medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1804810A (en) * 2005-01-14 2006-07-19 国际商业机器公司 Method and system of redirection for storage access requests
CN102124436A (en) * 2008-07-08 2011-07-13 桑迪士克以色列有限公司 Dynamic file system restriction for portable storage devices
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform
CN105488387A (en) * 2014-09-28 2016-04-13 北京云巢动脉科技有限公司 Method and system for redirecting files through security sand table
CN106203127A (en) * 2015-04-30 2016-12-07 中国电信股份有限公司 A kind of method realizing the reading of M1 application data general-purposeization and Mobile phone card
CN105468974A (en) * 2015-11-19 2016-04-06 广东欧珀移动通信有限公司 File access method and device, and mobile terminal
CN106909342A (en) * 2017-03-01 2017-06-30 中天安泰(北京)信息技术有限公司 A kind of data processing method and data processing equipment
CN107247560A (en) * 2017-05-23 2017-10-13 努比亚技术有限公司 Date storage method and mobile terminal
CN107194217A (en) * 2017-05-24 2017-09-22 努比亚技术有限公司 User data access control method, equipment and computer-readable recording medium
CN107341032A (en) * 2017-06-23 2017-11-10 努比亚技术有限公司 A kind of data load method, mobile terminal and computer-readable recording medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020057202A1 (en) * 2018-09-20 2020-03-26 Oppo广东移动通信有限公司 Game running method and related product
CN111314417A (en) * 2020-01-14 2020-06-19 网易(杭州)网络有限公司 Application data processing method and device, storage medium and processor
CN111314417B (en) * 2020-01-14 2023-04-28 网易(杭州)网络有限公司 Method and device for processing application data, storage medium and processor
CN112218173A (en) * 2020-10-13 2021-01-12 广州欢网科技有限责任公司 Smart television user information protection method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108491133A (en) A kind of application control method and terminal
CN108595946B (en) Privacy protection method and terminal
CN109542282A (en) A kind of interface display method and terminal device
CN109194818A (en) A kind of information processing method and terminal
CN107203147A (en) Internet of Things network control system and method based on cloud platform
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN110457935A (en) A kind of authority configuring method and terminal device
CN109446834A (en) A kind of right management method and mobile terminal of application program
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN109687974A (en) APK verification method, device, mobile terminal and readable storage medium storing program for executing
CN108681427A (en) A kind of method and terminal device of access privilege control
CN109753350A (en) A kind of method for managing resource and terminal device
CN108833690A (en) authority control method, terminal and computer readable storage medium
CN110309004A (en) The processing method and terminal of data
CN108171034A (en) A kind of method and terminal for protecting privacy
CN110147186A (en) A kind of control method and terminal device of application
CN110035183A (en) Information sharing method and terminal
CN108319432A (en) A kind of application operation method and terminal
CN109271779A (en) A kind of installation packet inspection method, terminal device and server
CN109117054A (en) A kind of display control method and terminal
CN108984231A (en) A kind of login method and mobile terminal of application program account
CN109246693A (en) A kind of control method and terminal of application program
CN111209031B (en) Data acquisition method, device, terminal equipment and storage medium
CN109815679A (en) Right management method and mobile terminal
CN108153460A (en) A kind of icon hiding method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180724

RJ01 Rejection of invention patent application after publication