CN108536482B - Application shielding method, device, server and storage medium - Google Patents

Application shielding method, device, server and storage medium Download PDF

Info

Publication number
CN108536482B
CN108536482B CN201810180338.8A CN201810180338A CN108536482B CN 108536482 B CN108536482 B CN 108536482B CN 201810180338 A CN201810180338 A CN 201810180338A CN 108536482 B CN108536482 B CN 108536482B
Authority
CN
China
Prior art keywords
attribute information
target application
application
mobile terminal
mobile terminals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810180338.8A
Other languages
Chinese (zh)
Other versions
CN108536482A (en
Inventor
陆庆宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810180338.8A priority Critical patent/CN108536482B/en
Publication of CN108536482A publication Critical patent/CN108536482A/en
Application granted granted Critical
Publication of CN108536482B publication Critical patent/CN108536482B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44536Selecting among different versions

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses an application shielding method, an application shielding device, a server and a storage medium, and relates to the field of data processing. The method comprises the following steps: when the fact that the target application is abnormal in the mobile terminals of the multiple models is detected, the attribute information corresponding to the mobile terminal of each model in the multiple models is obtained respectively, whether the attribute information of the mobile terminals of the multiple models has the same target attribute information or not is judged, and if the attribute information of the mobile terminals of the multiple models has the same target attribute information, the target application is shielded for all the mobile terminals containing the target attribute information. The application shielding method, the application shielding device, the server and the storage medium provided by the embodiment of the application shielding method and the server have the advantages that the common characteristics of a plurality of machine types are extracted, the application shielding is performed in a targeted mode, the shielding workload is reduced, the problem application is prevented from flowing into the hands of users, and the user experience is improved.

Description

Application shielding method, device, server and storage medium
Technical Field
The present application relates to the field of data processing, and more particularly, to an application blocking method, apparatus, server, and storage medium.
Background
With the development of mobile terminal technology, the rapid increase of the application scale of the mobile terminal, and the influence of factors such as frequent updating of a mobile terminal system, many mobile terminal applications are incompatible with the mobile terminal, so that when a user downloads in a shop, the user often encounters the problems of no response, stop running, unavailable functions and the like caused by the application incompatible mobile terminal, and the user experience is poor.
Disclosure of Invention
In view of the above problems, the application shielding method, device, server and storage medium are provided in the present application, and by extracting common features of multiple machine types, application shielding is performed in a targeted manner, so that shielding workload is reduced, problem applications are prevented from flowing into a user, and user experience is improved.
In a first aspect, an embodiment of the present application provides an application shielding method, where the method includes: when the situation that the target application is abnormal in the mobile terminals of the multiple models is detected, respectively acquiring attribute information corresponding to the mobile terminal of each model in the multiple models; judging whether the attribute information of the mobile terminals of the plurality of models has the same target attribute information; and if the attribute information of the mobile terminals of the plurality of models has the same target attribute information, shielding the target application for all the mobile terminals containing the target attribute information.
In a second aspect, an embodiment of the present application provides an applied shielding apparatus, including: the attribute information acquisition module is used for respectively acquiring attribute information corresponding to the mobile terminal of each model in the plurality of models when the target application is detected to be abnormal in the mobile terminals of the plurality of models; the attribute information judging module is used for judging whether the attribute information of the mobile terminals of the plurality of models has the same target attribute information; and the target application shielding module is used for shielding the target application aiming at all the mobile terminals containing the target attribute information if the attribute information of the mobile terminals of the plurality of models has the same target attribute information.
In a third aspect, embodiments of the present application provide a server, including a memory and a processor, the memory being coupled to the processor, the memory storing instructions, the processor performing the above method when the instructions are executed by the processor.
In a fourth aspect, the present application provides a computer readable storage medium having program code executable by a processor, the program code causing the processor to execute the above method.
According to the application shielding method, the device, the server and the storage medium, when it is detected that the target application is abnormal in the mobile terminals of the multiple models, the attribute information corresponding to the mobile terminal of each model in the multiple models is respectively obtained, whether the attribute information of the mobile terminals of the multiple models has the same target attribute information is judged, if the attribute information of the mobile terminals of the multiple models has the same target attribute information, the target application is shielded for all the mobile terminals including the target attribute information, and therefore by extracting the common characteristics of the multiple models, the application shielding is performed in a targeted manner, the shielding workload is reduced, problem applications are prevented from flowing into the hands of users, and the user experience is improved.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating an interaction between a mobile terminal and a server according to an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an application shielding method according to a first embodiment of the present application;
FIG. 3 is a flow chart illustrating an application masking method according to a second embodiment of the present application;
fig. 4 is a flowchart illustrating step S230 of the application shielding method according to the second embodiment of the present application;
fig. 5 is a block diagram illustrating a structure of an applied shielding apparatus according to a third embodiment of the present application;
fig. 6 shows a block diagram of a server for executing the application blocking method according to the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In an interactive network formed by a mobile terminal and a server, a user can download a corresponding application program from the server through a client of the mobile terminal. In order to improve the enthusiasm of the user for the application program, the effectiveness and the rapidity of downloading and installing, the incompatible application program of the mobile terminal can be shielded. The inventor finds that when a user downloads an application in a software store, the problems of no response, running stop, incapability of using functions and the like caused by the fact that the application is incompatible with a mobile terminal are often encountered, when the current software store processes the exceptions, shielding processing is performed according to one mobile terminal model with the problems, and the mobile terminal models with the problems are not processed, so that the application shielding efficiency is low, other mobile terminal models with the problems can be downloaded to the application, and the user experience is reduced.
For example, an application has an abnormality on a certain mobile phone platform, but only receives the abnormal feedback of the terminal a and the terminal B, and only shields the two mobile terminals, namely the terminal a and the terminal B, but on the mobile phone platform, there are mobile terminals such as the terminal C and the terminal D, which may cause incomplete shielding.
In view of the above problems, the inventor proposes an application shielding method, an application shielding device, a server and a storage medium provided in the embodiments of the present application, and performs application shielding in a targeted manner by refining common features of multiple models, thereby reducing shielding workload and reducing problem application flow into a user, and improving user experience. Embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Fig. 1 shows a schematic diagram of an interaction between a mobile terminal and a server in an embodiment of the present application. As shown in fig. 1, the mobile terminal 100 and the server 200 are located in a network 300, and the network 300 may be a wireless network or a wired network. Through the wireless network or the wired network, the mobile terminal 100 performs data interaction with the server 200. In the present application, the mobile terminal 100 may be a mobile phone, a tablet computer, a computer, or the like.
A client may be operated in the mobile terminal 100 and a server 200 may be operated as a server. For example, in the present application, the mobile terminal 100 runs a client corresponding to a software store, and the server 200 runs a server corresponding to the software store, and based on the network environment, the client corresponding to the software store can perform data interaction with the server 200 through the network 300, thereby realizing data interaction with the server corresponding to the software store running on the server 200. For example, a client corresponding to a software store in the mobile terminal 100 sends an application installation request to the server 200 through the network 300, and in response, the server 200 returns a link or information to the client in the mobile terminal, which is required to be fed back to the client in the mobile terminal 100 after processing the request, through the network 300 so that the client can display the link or information. The application blocking method, device, server and storage medium provided by the embodiments of the present application will be described below by specific embodiments.
First embodiment
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating an application shielding method according to a first embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 2, the method may specifically include the following steps:
step S110: when the situation that the target application is abnormal in the mobile terminals of the multiple models is detected, the attribute information corresponding to the mobile terminal of each model in the multiple models is respectively acquired.
In this embodiment, the occurrence of the abnormality of the target application on the mobile terminal may be when the mobile terminal runs the target application, or when the mobile terminal downloads or installs the target application, which is not limited in this embodiment, specifically, when the mobile terminal has problems of no response, stop running, or function being unable to be used when running the target application or downloading and installing the target application, it is considered that the abnormality of the target application occurs on the mobile terminal, and the target application is incompatible with the mobile terminal.
As a mode, the model of the mobile terminal with the abnormality for the target application is recorded, and when it is detected that the recorded models of the mobile terminal are multiple, the abnormality of the target application on the mobile terminals of the multiple models is represented, at this time, attribute information corresponding to the mobile terminal of each model in the multiple models is respectively obtained, taking the mobile terminals of the two models of the first mobile terminal and the second mobile terminal as an example, and when the abnormality occurs in the first mobile terminal and the second mobile terminal, the attribute information corresponding to the first mobile terminal and the attribute information corresponding to the second mobile terminal are respectively obtained. Specifically, the attribute information may include at least one of a mobile phone platform, an Android version, a resolution, and an OS version, that is, one or a combination of a plurality of the attribute information.
Step S120: and judging whether the attribute information of the mobile terminals of the plurality of models has the same target attribute information.
Further, the attribute information of the mobile terminals of the multiple models is respectively matched and compared to judge whether the attribute information of the mobile terminals of the multiple models has the same target attribute information. Specifically, taking a first mobile terminal and a second mobile terminal as an example, attribute information such as a mobile phone platform, an Android version, a resolution, and an OS version of the first mobile terminal and attribute information such as a mobile phone platform, an Android version, a resolution, and an OS version of the second mobile terminal are compared one by one, so as to determine whether the mobile phone platform of the first mobile terminal and the mobile phone platform of the second mobile terminal are consistent, determine whether resolutions of the first mobile terminal and the second mobile terminal are consistent, and the like.
Step S130: and if the attribute information of the mobile terminals of the plurality of models has the same target attribute information, shielding the target application for all the mobile terminals containing the target attribute information.
As one method, when it is determined that the attribute information of the mobile terminals of the plurality of models in which the abnormality occurs includes the same attribute information, for example, when the attribute information of the mobile terminals of the plurality of models includes the same target attribute information such as the same mobile phone platform, the same Android version, the same resolution, the same OS version, and/or the like, the target application is masked for all the mobile terminals including the target attribute information, and it can be understood that after the target application is masked for the mobile terminal, the application cannot be searched or downloaded in a software store through the mobile terminal, so that the problem applications are prevented from flowing into the hands of users, and the user experience is improved.
As another mode, when it is determined that there is no identical target attribute information in the attribute information of the mobile terminals of the plurality of models in which the abnormality occurs, the mobile terminals representing the plurality of models do not have common characteristics, and the target application is shielded for the mobile terminal of the model in which the abnormality occurs according to the model, so that the mobile terminals corresponding to the plurality of models cannot search for or download the target application.
According to the application shielding method provided by the first embodiment of the application, when it is detected that the target application is abnormal in the mobile terminals of the multiple models, the attribute information corresponding to the mobile terminal of each model in the multiple models is respectively obtained, whether the attribute information of the mobile terminals of the multiple models has the same target attribute information is judged, if the attribute information of the mobile terminals of the multiple models has the same target attribute information, the target application is shielded for all the mobile terminals including the target attribute information, so that the common characteristics of the multiple models are extracted, the application shielding is performed in a targeted manner, the shielding workload is reduced, the problem application flows into the hands of users, and the user experience is improved.
Second embodiment
Referring to fig. 3, fig. 3 is a flowchart illustrating an application shielding method according to a second embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 3, the method may specifically include the following steps:
step S210: and when the target application is detected to be abnormal, analyzing the influence range of the target application.
In this embodiment, when it is detected that a target application has a problem of no response, no operation, or no use, etc. on a mobile terminal of a certain model, an influence range of the target application is analyzed to determine whether there are a plurality of models of mobile terminals for which the target application is abnormal. Specifically, taking two mobile terminals, namely a first mobile terminal and a second mobile terminal as an example, when it is detected that a target application is abnormal for the first time, the model of the first mobile terminal which is abnormal for the target application is recorded and stored, when it is detected that the target application is abnormal again, the model of the second mobile terminal which is abnormal for the target application is recorded and stored, whether the models of the first mobile terminal and the second mobile terminal are consistent or not is further judged, when the models are consistent, the influence range of the target application is represented as a single-model mobile terminal, and when the models are inconsistent, the influence range of the target application is represented as a multi-model mobile terminal.
Step S220: and when the target application is abnormal on the mobile terminal of a single model, shielding the target application aiming at the mobile terminal of the model.
As one mode, if the target application is abnormal on a mobile terminal of a single model, the target application is shielded for the mobile terminal of the model, so that the target application cannot be searched or downloaded through the model.
Step S230: and when the target application is abnormal in the mobile terminals of the plurality of models, respectively acquiring attribute information corresponding to the mobile terminal of each model in the plurality of models.
Referring to fig. 4, fig. 4 is a flowchart illustrating a step S230 of an application shielding method according to a second embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 4, the method may specifically include the following steps:
step S231: and acquiring abnormal information of the target application based on a buried point preset on the target application.
Specifically, as an implementable manner, a background buried point is preset on the target application, and abnormal information of the target application is collected through the background buried point, where the abnormal information carries information such as a model, a mobile phone platform, an Android version, a resolution, an OS version, and the like of the mobile terminal.
Step S232: and analyzing the abnormal information respectively to obtain attribute information corresponding to the mobile terminal of each model in the plurality of models.
It can be understood that, when the mobile terminals of the multiple models of the target application are all abnormal, the abnormal information corresponding to each of the mobile terminals of the multiple models can be received, and the abnormal information of each of the mobile terminals can be analyzed and identified, so that the attribute information corresponding to the mobile terminal of each of the multiple models can be extracted from the abnormal information.
Step S240: and judging whether the attribute information of the mobile terminals of the plurality of models has the same target attribute information.
Step S250: if the attribute information of the mobile terminals of the plurality of models has the same target attribute information, sending the identification information of all the mobile terminals containing the target attribute information and the identification information of the target application to a control terminal so that the control terminal displays all the mobile terminals and all the applications containing the target application corresponding to each mobile terminal.
When the attribute information of the mobile terminals of the multiple models has the same target attribute information, the server sends the identification information of all the mobile terminals containing the target attribute information and the identification information of the target application to the control terminal, so that the control terminal displays all the mobile terminals according to the identification information of the mobile terminals and displays all the applications including the target application corresponding to each mobile terminal according to the identification information of the target application. In this embodiment, the server and the control terminal are connected in a wired or wireless manner to perform data interaction, the control terminal corresponds to a common operator, and the control terminal displays all mobile terminals including the target attribute information and all downloadable applications corresponding to each mobile terminal, so that the common operator can shield the target application according to the mobile terminal information and the application information displayed on the operation interface, thereby improving the shielding efficiency and reducing the maintenance cost.
Step S260: and receiving a shielding instruction which is sent by the control terminal and aims at a target application in all applications corresponding to all the mobile terminals, and responding to the shielding instruction to shield the target application.
Further, after detecting a touch operation triggered by an operator, the control terminal generates a shielding instruction in response to the touch operation, where the shielding instruction is used to instruct to shield a target application corresponding to the mobile terminal including target attribute information, where the touch operation may delete the target application from all applications for the operator, may select the target application from all applications for the operator, and may also select other applications except the target application from all target applications for the operator, and the specific touch operation is not limited in this embodiment. And after receiving a shielding instruction fed back by the control terminal, the server responds to the shielding instruction to shield the target application.
It can be understood that, through the above manner, the mobile terminal containing the target attribute information can not search or download the target application, thereby reducing the problem that the application flows into other mobile terminals with the same attribute due to missing shielding, improving the user experience, and meanwhile, because the control terminal makes the operation interface, the work of shielding the application is transferred to the hands of the operator by professionals, improving the shielding efficiency and reducing the maintenance cost.
Step S270: and when a request for the target application sent by a mobile terminal is received, acquiring a plurality of other applications which are consistent with the type of the target application and are compatible with the mobile terminal.
As one mode, a mapping relationship between a plurality of applications is set in advance in a server, where types of the plurality of applications establishing the mapping relationship are consistent, for example, the plurality of applications establishing the mapping relationship are all video playing applications or the plurality of applications establishing the mapping relationship are all chat applications. And when a request for searching or downloading the target application sent by the mobile terminal is received, acquiring other applications consistent with the type of the target application according to a preset mapping relation.
Further, the server judges the compatibility between the other applications and the mobile terminal sending the request, and acquires a plurality of other applications compatible with the mobile terminal from the plurality of other applications.
Step S280: and sending the other applications to the mobile terminal for display by the mobile terminal.
And the server sends other applications which are compatible with the mobile terminal and are consistent with the target application type to the mobile terminal for display by the mobile terminal, so that the requirement of a user on application downloading and installation is met.
The application shielding method provided in the second embodiment of the present application analyzes an influence range of a target application when detecting that the target application is abnormal, shields the target application for a single model when the target application is abnormal on a mobile terminal of the model, respectively obtains attribute information corresponding to a mobile terminal of each model in a plurality of models when the mobile terminals of the model are abnormal, sends identification information of the mobile terminal including the target attribute information to a control terminal when judging that the attribute information of the mobile terminals of the models has the same attribute information, so that the control terminal displays all the mobile terminals and all applications corresponding to each mobile terminal, and shields the target application when receiving a shielding instruction sent by the control terminal for the target application in all the applications corresponding to all the mobile terminals, when a request for the target application sent by the mobile terminal is received, a plurality of other applications which are consistent with the target application type and compatible with the mobile terminal are obtained, and the other applications are sent to the mobile terminal for the mobile terminal to display, so that the rationality of application shielding can be effectively improved and the maintenance cost can be reduced compared with the first embodiment.
Third embodiment
Referring to fig. 5, fig. 5 is a block diagram illustrating an application shielding apparatus 400 according to a third embodiment of the present application. As will be explained below with respect to the block diagram shown in fig. 5, the application shielding apparatus 400 shown includes: an attribute information obtaining module 410, an attribute information judging module 420 and a target application shielding module 430, wherein:
the attribute information obtaining module 410 is configured to, when it is detected that the target application is abnormal in the mobile terminals of the multiple models, respectively obtain attribute information corresponding to the mobile terminal of each model in the multiple models. Further, the attribute information obtaining module 410 includes: the system comprises an influence range analysis submodule, a single-machine application shielding submodule, a first attribute information acquisition submodule, an abnormal information acquisition submodule and a second attribute information acquisition submodule, wherein:
and the influence range analysis submodule is used for analyzing the influence range of the target application when the target application is detected to be abnormal.
And the single-model application shielding submodule is used for shielding the target application aiming at the mobile terminal of the model when the target application is abnormal on the mobile terminal of the single model.
And the first attribute information acquisition submodule is used for respectively acquiring attribute information corresponding to the mobile terminal of each model in the plurality of models when the target application is abnormal in the mobile terminals of the plurality of models.
And the abnormal information acquisition submodule is used for acquiring the abnormal information of the target application based on the buried point which is preset on the target application.
And the second attribute information acquisition submodule is used for analyzing the abnormal information respectively and acquiring attribute information corresponding to the mobile terminal of each model in the plurality of models.
An attribute information determining module 420, configured to determine whether there is the same target attribute information in the attribute information of the mobile terminals of the multiple models.
And a target application shielding module 430, configured to shield the target application for all mobile terminals including the target attribute information if the attribute information of the mobile terminals of the multiple models includes the same target attribute information. Further, the target application shielding module 430 includes: the device comprises a first information sending submodule, a first shielding instruction receiving module, a second information sending submodule and a second shielding instruction receiving module, wherein:
and the first information sending submodule is used for sending the identification information of all the mobile terminals containing the target attribute information and the identification information of the target application to the control terminal so as to enable the control terminal to display all the mobile terminals and all the applications, which are corresponding to each mobile terminal and contain the target application, on the control terminal.
And the first shielding instruction receiving module is used for receiving shielding instructions which are sent by the control terminal and aim at the target applications corresponding to all the mobile terminals, and responding to the shielding instructions to shield the target applications.
And the second information sending submodule is used for sending the identification information of all the mobile terminals containing the target attribute information and the identification information of the target application to the control terminal so as to enable the control terminal to display all the mobile terminals and the target application.
And the second shielding instruction receiving module is used for receiving shielding instructions aiming at all the mobile terminals and sent by the control terminal, and responding to the shielding instructions to shield all the mobile terminals corresponding to the target application.
Further, the application shielding apparatus 400 further includes: other application acquisition module and other application sending module, wherein:
and the other application acquisition module is used for acquiring a plurality of other applications which are consistent with the type of the target application and are compatible with the mobile terminal when receiving a request which is sent by the mobile terminal and aims at the target application.
And the other application sending module is used for sending the other applications to the mobile terminal so as to be displayed by the mobile terminal.
To sum up, according to the application shielding method, the application shielding device, the server and the storage medium provided in the embodiments of the present application, when it is detected that the target application is abnormal in the mobile terminals of multiple models, the attribute information corresponding to the mobile terminal of each model in the multiple models is respectively obtained, whether the attribute information of the mobile terminals of the multiple models has the same target attribute information is determined, and if the attribute information of the mobile terminals of the multiple models has the same target attribute information, the target application is shielded for all the mobile terminals including the target attribute information, so that by extracting common features of the multiple models, the application shielding is performed in a targeted manner, the shielding workload is reduced, problem applications are prevented from flowing into the hands of users, and the user experience is improved.
It should be noted that, in the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. For any processing manner described in the method embodiment, all the processing manners may be implemented by corresponding processing modules in the apparatus embodiment, and details in the apparatus embodiment are not described again.
Referring to fig. 6, based on the foregoing application shielding method and apparatus, the embodiment of the present application further provides a server 200, where the server 200 may generally include one or more processors 202 (only one is shown in the figure), a memory 204, an RF (Radio Frequency) module 206, and a power module 208. It will be understood by those of ordinary skill in the art that the structure shown in fig. 6 is merely an illustration and is not intended to limit the structure of the server 200. For example, the server 200 may also include more or fewer components than shown in FIG. 6, or have a different correspondence than shown in FIG. 6.
Those skilled in the art will appreciate that all other components are peripheral devices with respect to the processor 202, and the processor 202 is coupled to the peripheral devices through a plurality of peripheral interfaces 210. The peripheral interface 210 may be implemented based on the following criteria: universal Asynchronous Receiver/Transmitter (UART), General Purpose Input/Output (GPIO), Serial Peripheral Interface (SPI), and Inter-Integrated Circuit (I2C), but the present invention is not limited to these standards. In some examples, the peripheral interface 210 may include only a bus; in other examples, the peripheral interface 210 may also include other elements, such as one or more controllers. These controllers may also be separate from the peripheral interface 210 and integrated within the processor 202 or corresponding peripherals.
The memory 204 may be used for storing software programs and modules, and the processor 202 executes various functional applications and data processing by operating the software programs and modules stored in the memory 204. The memory 204 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 204 may further include memory located remotely from the processor 202, which may be connected to the server 200 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The RF module 206 is used for receiving and transmitting electromagnetic waves, and implementing interconversion between the electromagnetic waves and electrical signals, thereby communicating with a communication network or other devices. The RF module 206 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The RF module 206 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. The Wireless network may use various Communication standards, protocols and technologies, including, but not limited to, Global System for Mobile Communication (GSM), Enhanced Data GSM Environment (EDGE), wideband Code division multiple Access (W-CDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Wireless Fidelity (WiFi) (e.g., Institute of Electrical and Electronics Engineers (IEEE) standard IEEE 802.10A, IEEE802.11 b, IEEE 802.2.1 g and/or IEEE802.11 n), Voice over internet protocol (VoIP), world wide mail Access (Microwave for internet Access, Wi-1), and other short message protocols for instant messaging (wimax), as well as any other suitable communication protocols, and may even include those that have not yet been developed.
The power module 208 is used to provide power supply to the processor 202 and other components. Specifically, the power module 208 may include a power management system, one or more power sources (e.g., batteries or ac power), a charging circuit, a power failure detection circuit, an inverter, a power status indicator, and any other components associated with the generation, management, and distribution of power within the server 200.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (mobile terminal) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments. In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (9)

1. An application masking method, characterized in that the method comprises:
when the situation that the target application is abnormal in the mobile terminals of the multiple models is detected, respectively acquiring attribute information corresponding to the mobile terminal of each model in the multiple models;
judging whether the attribute information of the mobile terminals of the plurality of models has the same target attribute information;
and if the attribute information of the mobile terminals of the plurality of models has the same target attribute information, shielding the target application for all the mobile terminals containing the target attribute information.
2. The method according to claim 1, wherein when it is detected that the target application is abnormal in the mobile terminals of the multiple models, the obtaining of the attribute information corresponding to the mobile terminal of each model in the multiple models respectively comprises:
when the target application is detected to be abnormal, analyzing the influence range of the target application;
when the target application is abnormal on a mobile terminal of a single model, shielding the target application aiming at the mobile terminal of the model;
and when the target application is abnormal in the mobile terminals of the plurality of models, respectively acquiring attribute information corresponding to the mobile terminal of each model in the plurality of models.
3. The method according to claim 1, wherein the obtaining attribute information corresponding to the mobile terminal of each model of the plurality of models respectively comprises:
acquiring abnormal information of the target application based on a buried point preset on the target application;
and analyzing the abnormal information respectively to obtain attribute information corresponding to the mobile terminal of each model in the plurality of models.
4. The method according to claim 1, wherein if there is the same target attribute information in the attribute information of the mobile terminals of the plurality of models, after masking the target application for all the mobile terminals including the target attribute information, further comprising:
when a request for the target application sent by a mobile terminal is received, acquiring a plurality of other applications which are consistent with the type of the target application and are compatible with the mobile terminal;
and sending the other applications to the mobile terminal for display by the mobile terminal.
5. The method of claim 1, wherein the masking the target application for all mobile terminals containing the target attribute information comprises:
sending the identification information of all mobile terminals containing the target attribute information and the identification information of the target application to a control terminal so that the control terminal displays all the mobile terminals and all the applications containing the target application corresponding to each mobile terminal;
and receiving a shielding instruction which is sent by the control terminal and aims at the target application corresponding to all the mobile terminals, and responding to the shielding instruction to shield the target application.
6. The method according to any one of claims 1 to 5, wherein the attribute information includes at least one of a mobile platform, an Android version, a resolution, and an OS version.
7. An application shielding device, the device comprising:
the attribute information acquisition module is used for respectively acquiring attribute information corresponding to the mobile terminal of each model in the plurality of models when the target application is detected to be abnormal in the mobile terminals of the plurality of models;
the attribute information judging module is used for judging whether the attribute information of the mobile terminals of the plurality of models has the same target attribute information;
and the target application shielding module is used for shielding the target application aiming at all the mobile terminals containing the target attribute information if the attribute information of the mobile terminals of the plurality of models has the same target attribute information.
8. A server comprising a memory and a processor, the memory coupled to the processor, the memory storing instructions that, when executed by the processor, the processor performs the method of any of claims 1-6.
9. A computer-readable storage medium having program code executable by a processor, the program code causing the processor to perform the method of any of claims 1-6.
CN201810180338.8A 2018-03-05 2018-03-05 Application shielding method, device, server and storage medium Expired - Fee Related CN108536482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810180338.8A CN108536482B (en) 2018-03-05 2018-03-05 Application shielding method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810180338.8A CN108536482B (en) 2018-03-05 2018-03-05 Application shielding method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN108536482A CN108536482A (en) 2018-09-14
CN108536482B true CN108536482B (en) 2021-03-02

Family

ID=63485572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810180338.8A Expired - Fee Related CN108536482B (en) 2018-03-05 2018-03-05 Application shielding method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN108536482B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732326B (en) * 2020-12-25 2024-04-12 维沃移动通信有限公司 Information display method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10545628B2 (en) * 2013-01-31 2020-01-28 Samsung Electronics Co., Ltd. Method of and device for managing applications
US9294284B1 (en) * 2013-09-06 2016-03-22 Symantec Corporation Systems and methods for validating application signatures
CN105117464B (en) * 2015-08-25 2019-02-15 北京金山安全软件有限公司 Application pushing method and device and service equipment
CN106371879B (en) * 2016-09-06 2018-12-07 惠州Tcl移动通信有限公司 A kind of method and system for the application that mobile terminal shielding can not be deleted
CN107666435A (en) * 2017-11-15 2018-02-06 珠海市魅族科技有限公司 A kind of method and device for shielding message

Also Published As

Publication number Publication date
CN108536482A (en) 2018-09-14

Similar Documents

Publication Publication Date Title
CN103425926B (en) The method of application program launching method, configured list, terminal and server
CN108021642B (en) Application program recommendation method and device, mobile terminal and storage medium
CN107291586B (en) Application program analysis method and device
CN105988836B (en) Application recommendation method and device
CN108090142B (en) Card sorting method, device, server and storage medium
CN109791497B (en) Method, device and terminal for executing hot patch
CN105306318A (en) Intelligent scene configuration method and device and server
CN110457154B (en) Abnormal service processing method and device, storage medium and communication terminal
CN108540509B (en) Processing method and device of terminal browser, server and intelligent terminal
CN106294108B (en) Application program testing method and device
CN112566078A (en) Device connection method and apparatus, storage medium, and electronic apparatus
CN108924908B (en) WiFi scanning method and device and electronic device
CN108096838B (en) Gift package receiving method, device, server, mobile terminal and storage medium
CN113094087A (en) Software configuration method, electronic device and storage medium
CN111045893A (en) Method, device and system for executing monitoring task, storage medium and electronic device
CN105468504A (en) Program test method and device
CN108536482B (en) Application shielding method, device, server and storage medium
CN108345696B (en) Card sorting method, device, server and storage medium
CN107643858B (en) Information processing method, terminal and server
CN110659189B (en) Application program generation method and device, cloud server and readable storage medium
CN108256312B (en) Method and device for opening local application program on webpage and mobile terminal
CN106940775B (en) Vulnerability detection method and device for application program
CN107977224B (en) Application program configuration method, device, server and storage medium
CN113190565A (en) Data updating method and device, storage medium and electronic device
CN107302605B (en) Configuration method and device of television proxy server, television and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210302