CN109246693A - A kind of control method and terminal of application program - Google Patents
A kind of control method and terminal of application program Download PDFInfo
- Publication number
- CN109246693A CN109246693A CN201810770471.9A CN201810770471A CN109246693A CN 109246693 A CN109246693 A CN 109246693A CN 201810770471 A CN201810770471 A CN 201810770471A CN 109246693 A CN109246693 A CN 109246693A
- Authority
- CN
- China
- Prior art keywords
- terminal
- destination application
- safe handling
- authentication parameters
- starting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a kind of control method of application program and terminal, it is applied to field of communication technology, can solve the problem of user information during the application program in using terminal existing in the prior art is trapped.This method comprises: obtaining the authentication parameters of the wireless access point of terminal access, authentication parameters are for characterizing the degree that wireless access point is trusted;Authentication parameters are located in the first parameter area;First parameter area corresponds to the first safe handling strategy;In the case where authentication parameters are less than or equal to first threshold, the first safe handling strategy is executed to the destination application in terminal;Wherein, destination application is the application program for requiring authentication parameters to be greater than first threshold.This method is applied in the scene of the control of application program.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to the control methods and terminal of a kind of application program.
Background technique
With the rapid development of mobile Internet, using adopting wireless fidelity technology (full name in English: Wlreless-Fideling,
English abbreviation: WiFi) network (hereinafter referred to as WiFi network) be widely used.
Currently, some free Wi-Fi hotspots (i.e. the access point of WiFi network) of public place, it may be possible to there is peace
The Wi-Fi hotspot of full hidden danger.When the access of the terminal of user is there are when the Wi-Fi hotspot of security risk, in user's using terminal
During application program, user information may be intercepted and captured by the participator of the Wi-Fi hotspot (such as user using payment class
During, the account information and encrypted message of payment class application may be intercepted and captured by the participator of the Wi-Fi hotspot).It is existing
Have in order to avoid user information is trapped in technology, during user uses application program, it will usually show in the terminal
There are security risks with the Wi-Fi hotspot that prompts user terminal to be currently accessed for prompt information, if the Wi-Fi hotspot is continued to use,
To which after user sees the prompt information, user can not use the Wi-Fi hotspot with triggering terminal, or it is whole in triggering
End avoids during using the Wi-Fi hotspot using to the higher application program of security requirement.
But in the above process, if user does not notice prompt information, user may still be will use to safety
Property more demanding application program (payment class application program as escribed above), the process of application program is used so as to cause user
The problem of middle user information is trapped.
Summary of the invention
The embodiment of the present invention provides the control method and terminal of a kind of application program, existing in the prior art to solve
The problem of user information is trapped during application program in using terminal.
In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:
In a first aspect, providing a kind of control method of application program, it is applied to terminal, is connect this method comprises: obtaining terminal
The authentication parameters of the wireless access point entered, authentication parameters are for characterizing the degree that wireless access point is trusted;Authentication parameters are located at
In first parameter area;First parameter area corresponds to the first safe handling strategy;It is less than or equal to first threshold in authentication parameters
In the case where, the first safe handling strategy is executed to the destination application in terminal;Wherein, destination application is that requirement can
Believe that parameter is greater than the application program of first threshold.
Second aspect provides a kind of terminal, which includes: to obtain module and control module;Module is obtained, for obtaining
The authentication parameters of the wireless access point of terminal access, authentication parameters are for characterizing the degree that wireless access point is trusted;Credible ginseng
Numerical digit is in the first parameter area;First parameter area corresponds to the first safe handling strategy;Control module, for obtaining module
In the case that the authentication parameters of acquisition are less than or equal to first threshold, the first safe place is executed to the destination application in terminal
Reason strategy;Wherein, destination application is the application program for requiring authentication parameters to be greater than first threshold.
The third aspect provides a kind of terminal, which includes processor, memory and be stored on the memory and can be
The computer program run on the processor realizes answering as described in relation to the first aspect when the computer program is executed by the processor
The step of with the control method of program.
Fourth aspect provides a kind of computer readable storage medium, stores computer on the computer readable storage medium
Program, when which is executed by processor the step of the control method of the application program of realization as described in relation to the first aspect.
In embodiments of the present invention, the authentication parameters of the wireless access point of terminal access are obtained, authentication parameters are for characterizing
The degree that wireless access point is trusted;Authentication parameters are located in the first parameter area;First parameter area corresponds to the first safe place
Reason strategy;In the case where authentication parameters are less than or equal to first threshold, the first peace is executed to the destination application in terminal
Full processing strategie;Wherein, destination application is the application program for requiring authentication parameters to be greater than first threshold.With this solution,
In the control method of application program provided in an embodiment of the present invention, it is less than in the authentication parameters of the wireless access point of terminal access
Or in the case where being equal to first threshold, the destination application for requiring authentication parameters to be greater than first threshold in terminal can be executed
The first security strategy corresponding with the first parameter area where authentication parameters, so can be smaller in authentication parameters (i.e. wireless
The degree that access point is trusted is lower namely safety is lower) in the case where, the destination application in terminal (is required
Authentication parameters are greater than the application program of first threshold, namely to the higher application program of security requirement) execute corresponding safety
Processing strategie, so as to avoid the problem that the application program in user's using terminal during user information be trapped.
Detailed description of the invention
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is a kind of control method schematic diagram one of application program provided in an embodiment of the present invention;
Fig. 3 is a kind of control method schematic diagram two of application program provided in an embodiment of the present invention;
Fig. 4 is a kind of control method schematic diagram three of application program provided in an embodiment of the present invention;
Fig. 5 is a kind of control method schematic diagram four of application program provided in an embodiment of the present invention;
Fig. 6 is a kind of control method schematic diagram five of application program provided in an embodiment of the present invention;
Fig. 7 is a kind of control method schematic diagram six of application program provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram one of terminal provided in an embodiment of the present invention;
Fig. 9 is a kind of structural schematic diagram two of terminal provided in an embodiment of the present invention;
Figure 10 is a kind of hardware schematic of terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs
As, rather than it is used for the particular order of description object.For example, the first input and the second input and to wait be different defeated for distinguishing
Enter and, rather than for describe input sum particular order.
It should be noted that in the embodiment of the present invention, " illustrative " or " such as " etc. words make example, example for indicating
Card or explanation.Be described as in the embodiment of the present invention " illustrative " or " such as " any embodiment or design scheme do not answer
It is interpreted than other embodiments or design scheme more preferably or more advantage.Specifically, " illustrative " or " example are used
Such as " word is intended to that related notion is presented in specific ways.
Terminal in the embodiment of the present invention can be the terminal with operating system.The operating system can be Android
(Android) operating system can be ios operating system, can also be other possible operating systems, the embodiment of the present invention is not
Make specific limit.
Below by taking Android operation system as an example, the control method institute of application program provided in an embodiment of the present invention is introduced
The software environment of application.
As shown in Figure 1, being a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming
In 1, the framework of Android operation system includes 4 layers, be respectively as follows: application layer, application framework layer, system Runtime Library layer and
Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system
Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation for the frame for abiding by application program
In the case where principle, some application programs are developed based on application framework layer.
System Runtime Library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour
As system it is provided needed for all kinds of resources.Android operation system running environment is used to provide software loop for Android operation system
Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior
Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1
The software program of the control method of application program provided in an embodiment of the present invention is realized in the system architecture of operating system, exploitation, from
And the control method of the application program is run based on Android operation system as shown in Figure 1.That is processor or end
End can realize the control of application program provided in an embodiment of the present invention by running the software program in Android operation system
Method.
The embodiment of the present invention provides the control method and terminal of a kind of application program, obtains the wireless access point of terminal access
Authentication parameters, authentication parameters are for characterizing the degree that wireless access point is trusted;Authentication parameters are located in the first parameter area;
First parameter area corresponds to the first safe handling strategy;In the case where authentication parameters are less than or equal to first threshold, to terminal
In destination application execute the first safe handling strategy;Wherein, destination application is that authentication parameters is required to be greater than first
The application program of threshold value.With this solution, it in the control method of application program provided in an embodiment of the present invention, is accessed in terminal
Wireless access point authentication parameters be less than or equal to first threshold in the case where, can be to requiring authentication parameters to be greater than in terminal
The destination application of first threshold executes the first security strategy corresponding with the first parameter area where authentication parameters, so
It can be in the case where (i.e. the degree that is trusted of wireless access point is lower namely safety be lower) smaller in authentication parameters, to end
Destination application in end (requires authentication parameters to be greater than the application program of first threshold, namely higher to security requirement
Application program) execute corresponding safe handling strategy, so as to avoid the process of the application program in user's using terminal
The problem of middle user information is trapped.
Terminal in the embodiment of the present invention can be mobile terminal, or immobile terminal.Mobile terminal can be
Mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, Ultra-Mobile PC
(ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal digital
Assistant, PDA) etc.;Immobile terminal can be personal computer (personal computer, PC), television set
(television, TV), automatic teller machine or self-service machine etc.;The embodiment of the present invention is not especially limited.
The executing subject of the control method of application program provided in an embodiment of the present invention (including can move for above-mentioned terminal
Dynamic terminal and immobile terminal), or can be realized in the terminal control method of the application program functional module and/
Or functional entity, it can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.It is with terminal below
Example, illustratively illustrates the control method of application program provided in an embodiment of the present invention.
As shown in Fig. 2, the control method of application program provided in an embodiment of the present invention includes following S11 and S12.
S11, terminal obtain the authentication parameters of the wireless access point of terminal access.
Wherein, the authentication parameters are for characterizing the degree that the wireless access point is trusted;The authentication parameters are located at the first ginseng
In number range;First parameter area corresponds to the first safe handling strategy.
In the control method of application program provided in an embodiment of the present invention, can terminal connect above-mentioned wireless access point it
Afterwards, the authentication parameters of the wireless access point are obtained, that is, execute above-mentioned S11.
Optionally, the embodiment of the present invention can obtain authentication parameters by following two ways.
First way: by the method for big data obtain the wireless access point (being denoted as access point 1) of terminal access can
Believe parameter.Specifically, first can (i.e. there may be the wireless access of security risk from the fishing hot spot of third party or operator
Point) database in inquire the labeled number of the wireless access point, the number that then can be labeled according to access point 1, really
Determine the authentication parameters of access point 1.
Optionally, user can mark this in the wireless access point of discovery access there are in the case where security risk
Wireless access point is fishing hot spot, and the information reporting of the wireless access point is reported to operator whenever operator receives
Some wireless access point labeled information when, can recorde in the database of fishing hot spot.To which the present invention is implemented
The method that example provides can inquire the labeled number of access point 1 in the database of fishing hot spot.
Optionally, the labeled number of wireless access point is more, and the authentication parameters of the corresponding wireless access point are smaller.
Illustratively, if the number that the access point 1 is labeled is 0 time, it can determine that the authentication parameters of access point 1 are
100%, i.e., the degree that the access point 1 is trusted is 100%;If the labeled number of the access point 1 is and to be less than greater than 0 time
10 times, then it can determine that the authentication parameters of access point 1 are 50%, i.e., the degree that the access point 1 is trusted is 50%;If the access
The labeled number of point 1 is that can then determine that the authentication parameters of access point 1 are 0% greater than 10 times, i.e. the access point 1 is trusted
Degree be 0% (namely the access point 1 is not trusted).
The second way: by the method for big data obtain the wireless access point (being denoted as access point 1) of terminal access can
Believe parameter.It, can be by block chain technology rapidly when the access point 1 of some user's mark in block chain is fishing hot spot
Notify the other users in the block chain, so when other users are again coupled to the access point 1, the access point 1 is in time
The fishing hot spot that is marked as so as to whether be labeled according to the access point 1 determine the authentication parameters of access point 1.
The authentication parameters that mode determines in second can be by two kinds of possible situations, and it is labeled that one is access points 1, credible
Parameter is not trusted for characterizing access point 1;Another kind is that access point 1 is not labeled, and authentication parameters are for characterizing 1 quilt of access point
Trust.
Illustratively, if the access point 1 is not labeled, it can determine that the authentication parameters of access point 1 are 100%;If should
Access point 1 is labeled, then can determine that the authentication parameters of access point 1 are 0%, i.e., the degree that the access point 1 is trusted is 0%
(namely the access point 1 is not trusted).
It may include having multiple parameters range in the embodiment of the present invention, and may include there are many safe handling strategy.Often
The corresponding safe handling strategy of a parameter area, wherein the first above-mentioned parameter area can be in multiple parameters range
One, which can be one in multiple safe handling strategies.
Illustratively, the corresponding relationship of multiple parameters range and a variety of safe handling strategies can as shown in following table 1,
It is wherein to be illustrated by taking three parameter areas and three kinds of safe handling strategies as an example in table 1.
Table 1
Parameter area | Safe handling strategy |
First parameter area | First safe handling strategy |
Second parameter area | Second safe handling strategy |
Third parameter area | Third safe handling strategy |
In table 1, the first parameter area is corresponding and the first safe handling strategy, the second parameter area correspond to the second safe place
Reason strategy, third parameter area correspondence and third safe handling strategy.
S12, authentication parameters be less than or equal to first threshold in the case where, terminal holds the destination application in terminal
Row the first safe handling strategy.
Wherein, destination application is the application program for requiring authentication parameters to be greater than first threshold.It can be understood as target
Application program is the more demanding application program for the degree being trusted to the wireless access point that terminal accesses, namely requires terminal
The application program of the wireless network of connection safety with higher.
It may include various types of application programs, the nothing that different types of application program connects terminal in usual terminal
The requirement of the safety of gauze network is different.
It optionally, may include paying class application program, social category application program, browser class to answer application program in terminal
Deng.
Illustratively, for paying class application program and browser class application program, class application program is paid to terminal
Peace of the requirement of the safety of the wireless network of connection usually above the wireless network that browser class application program connects terminal
The requirement of full property.
In the embodiment of the present invention, in the case where authentication parameters are less than or equal to first threshold, illustrate the wireless access point
The degree being trusted is lower, and possible safety is lower, in the case where authentication parameters are greater than first threshold, illustrates the wireless access
The degree that point is trusted is higher, and possible safety is higher.
In the embodiment of the present invention, above-mentioned first threshold can be according to the application program in terminal or terminal to wireless access point
Credibility requirement determine, the embodiment of the present invention is without limitation.
Optionally, if above-mentioned authentication parameters are in the second parameter area as shown in table 1, and be less than in authentication parameters or
In the case where equal to first threshold, the second safe handling strategy can be executed to the destination application in terminal;If above-mentioned can
Believe parameter in third parameter area as shown in table 1, and authentication parameters be less than or equal to first threshold in the case where, can
To execute third safe handling strategy to the destination application in terminal.
The embodiment of the present invention provides a kind of control method of application program, obtains the credible of the wireless access point of terminal access
Parameter, authentication parameters are for characterizing the degree that wireless access point is trusted;Authentication parameters are located in the first parameter area;First ginseng
The corresponding first safe handling strategy of number range;In the case where authentication parameters are less than or equal to first threshold, to the mesh in terminal
It marks application program and executes the first safe handling strategy;Wherein, destination application is that authentication parameters is required to be greater than first threshold
Application program.With this solution, in the control method of application program provided in an embodiment of the present invention, in the wireless of terminal access
The authentication parameters of access point be less than or equal to first threshold in the case where, can to required in terminal authentication parameters be greater than the first threshold
The destination application of value executes the first security strategy corresponding with the first parameter area where authentication parameters, so can be
In the case where authentication parameters smaller (i.e. the degree that is trusted of wireless access point is lower namely safety is lower), in terminal
Destination application (requires authentication parameters to be greater than the application program of first threshold, namely to the higher application of security requirement
Program) execute corresponding safe handling strategy, so as to avoid the application program in user's using terminal during user
The problem of information is trapped.
Optionally, the first safe handling strategy in the embodiment of the present invention may include: and cancel showing in the interface of terminal
Show the mark of destination application, the process of target end application program, the starting attribute for modifying destination application, Yi Jixiu
Change at least one in the access attribute of destination application.
Since in the control method of the application program provided in the embodiment of the present invention, the first safe handling strategy be can wrap
Include: the mark, the process of target end application program, modification target for cancelling displaying target application program in the interface of terminal are answered
With at least one in the starting attribute of program, and the access attribute of modification destination application.Therefore it can flexibly adopt
Differently execute the first safe handling strategy.
Optionally, if above-mentioned first safe handling strategy includes the cancellation displaying target application program in the interface of terminal
Mark can cancel displaying target in the interface of terminal and answer then in the case where authentication parameters are less than or equal to first threshold
With the mark of program.
Optionally, in the case where cancelling the mark of displaying target application program in the interface of terminal, terminal can also be shown
Show prompt information (being denoted as prompt information 1), the wireless access point which can prompt user's present terminal to connect exists
Security risk.
Optionally, the mark of above-mentioned destination application can be the icon of destination application.
In the embodiment of the present invention, in the case where authentication parameters are less than or equal to first threshold, taken in the interface of terminal
The mark of the displaying target that disappears application program can be avoided in the wireless access point that terminal accesses there are in the case where security risk
For user by the input of the mark to the destination application, triggering terminal starts the destination application, and then uses the mesh
The problem of mark application program, user information is trapped during causing user to use destination application.
Optionally, if the first safe handling strategy in the embodiment of the present invention includes the process of target end application program,
Then in the case where authentication parameters are less than or equal to first threshold, if destination application in the running background of terminal,
Terminal can be with the process of target end application program.
Optionally, if the first safe handling strategy in the embodiment of the present invention includes the process of target end application program,
Then before the process of starting destination application, if authentication parameters are less than or equal to first threshold, terminal can prohibit
Only start the process of destination application.
In the embodiment of the present invention, in the case where authentication parameters are less than or equal to first threshold, terminal target end application
The process of program can pass through target end application journey in the wireless access point that terminal accesses there are in the case where security risk
The process of sequence avoids the user information for including in the process of the destination application from being trapped, so that user be avoided to use target
The problem of user information is trapped during application program.
Optionally, if above-mentioned first safe handling strategy includes the cancellation displaying target application program in the interface of terminal
Mark then combines Fig. 2, as shown in figure 3, the method also includes following S13 after above-mentioned S12.
If S13, terminal detect that terminal and the wireless access point disconnect, mesh is shown again in the interface of terminal
Mark the mark of application program.
Optionally, above-mentioned to disconnect the connection that can be user's triggering terminal disconnection and the wireless access point, such as can
To be that user disconnects and the connection of the wireless access point in the setting options of terminal;Above-mentioned disconnect can also be terminal certainly
It is dynamic to be disconnected with the wireless access point.
The control method of above-mentioned application program shown in Fig. 3 cancels displaying target application program in the interface of terminal
After mark, if terminal detects that terminal is disconnected with the wireless access point, it can be shown again in the interface of terminal
The mark of destination application.Can in confirmation terminal and not connected there are in the case where the wireless access point of security risk, and
When the application program of displaying target again mark, so can be convenient user using destination application, thus more human nature
Change.
Optionally, if above-mentioned first safe handling strategy includes the starting attribute for modifying destination application, in conjunction with figure
2, as shown in figure 4, above-mentioned S12 could alternatively be following S14.
S14, authentication parameters be less than or equal to first threshold in the case where, the starting category of terminal modifications destination application
Property is No starting.
Wherein, it after the starting attribute of modification destination application is No starting, is inputted for the first of user, eventually
End does not respond, and the first input starts destination application for triggering terminal.
The control method of above-mentioned application program shown in Fig. 4, in the case where authentication parameters are less than or equal to first threshold,
The starting attribute of terminal modifications destination application is No starting, can be deposited to avoid user in the wireless access point that terminal accesses
In the case where security risk, starts the destination application, and then use the destination application, user is caused to use target
The problem of user information is trapped during application program.
Optionally, above-mentioned first safe handling strategy includes: the starting attribute for modifying destination application.In conjunction with Fig. 2, such as
Shown in Fig. 5, above-mentioned S12 could alternatively be following S15.
S15, authentication parameters be less than or equal to first threshold in the case where, the starting category of terminal modifications destination application
Property for prompt user trigger starting.
Optionally, in conjunction with Fig. 5, as shown in fig. 6, the method also includes following S16-S19 after above-mentioned S15.
S16, terminal receive the first input of user, and first input starts destination application for triggering terminal.
S17, terminal show the first prompt information in response to first input.
Wherein, there are security risks for prompting user radio access point for first prompt information, if starting target is answered
Use program.
S18, terminal receive second input of the user to the first prompt information.
S19, terminal start destination application in response to the second input.
The control method of above-mentioned application program shown in fig. 5, in the case where authentication parameters are less than or equal to first threshold,
The starting attribute of terminal modifications destination application is that prompt user triggers starting, can be deposited in the wireless access point that terminal accesses
In the case where security risk, there are safety winds for the wireless access point for prompting user terminal to access by above-mentioned first prompt information
Whether danger, allow user independently to choose whether to start the destination application, so as to allow user to make determines according to actual conditions
Use destination application.
Optionally, if above-mentioned first safe handling strategy includes the access attribute for modifying destination application, in conjunction with figure
2, as shown in fig. 7, above-mentioned S12 could alternatively be following S21.
S21, authentication parameters be less than or equal to first threshold in the case where, the access category of terminal modifications destination application
Property to forbid accessing.
Wherein, after the access attribute of modification destination application is to forbid access, the data of destination application are prohibited
Only it is accessed.
Optionally, the data of destination application may include the data cached and destination application of destination application
Local data etc..
Optionally, forbid the data of access target application program that can refer to and forbid inquiry, write-in and reading target application
The data of program.
The control method of above-mentioned application program shown in Fig. 7, in the case where authentication parameters are less than or equal to first threshold,
The access attribute of terminal modifications destination application is to forbid accessing, and can be deposited to avoid user in the wireless access point that terminal accesses
In the case where security risk, the data of the destination application are accessed, user is caused to use during destination application
The problem of user information is trapped.
As shown in figure 8, the embodiment of the present invention provides a kind of terminal 130, which includes: to obtain module 131 and control
Module 132.
Wherein, module 131 is obtained, the authentication parameters of the wireless access point for obtaining terminal access, authentication parameters are used for
The degree that characterization wireless access point is trusted;Authentication parameters are located in the first parameter area;Corresponding first peace of first parameter area
Full processing strategie;Control module 132, for being less than or equal to the feelings of first threshold in the authentication parameters for obtaining the acquisition of module 131
Under condition, the first safe handling strategy is executed to the destination application in terminal;Wherein, destination application is to require credible ginseng
Number is greater than the application program of first threshold.
The embodiment of the present invention provides a kind of terminal, obtains the authentication parameters of the wireless access point of terminal access, authentication parameters
The degree being trusted for characterizing wireless access point;Authentication parameters are located in the first parameter area;First parameter area corresponding the
One safe handling strategy;In the case where authentication parameters are less than or equal to first threshold, the destination application in terminal is held
Row the first safe handling strategy;Wherein, destination application is the application program for requiring authentication parameters to be greater than first threshold.Pass through
The program, in the control method of application program provided in an embodiment of the present invention, in the credible of the wireless access point that terminal accesses
It, can be to the target application for requiring authentication parameters to be greater than first threshold in terminal in the case that parameter is less than or equal to first threshold
Program executes the first security strategy corresponding with the first parameter area where authentication parameters, so can be smaller in authentication parameters
In the case where (i.e. the degree that is trusted of wireless access point is lower namely safety is lower), to the destination application in terminal
(requiring authentication parameters to be greater than the application program of first threshold, namely to the higher application program of security requirement) executes corresponding
Safe handling strategy, so as to avoid the application program in user's using terminal during asking of being trapped of user information
Topic.
Optionally, the first safe handling strategy include: in the interface of terminal cancel displaying target application program mark,
The process of target end application program, the starting attribute for modifying destination application, and the access of modification destination application
At least one of in attribute.
Optionally, the first safe handling strategy includes: the mark for cancelling displaying target application program in the interface of terminal;
Control module 132 is also used to after executing the first safe handling strategy to the destination application in terminal, if detecting end
End is disconnected with wireless access point, then the mark of displaying target application program again in the interface of terminal.
Optionally, the first safe handling strategy includes: the starting attribute for modifying destination application;Control module 132, tool
The starting attribute that body is used to modify destination application is No starting;Wherein, in the starting attribute of modification destination application
It after No starting, is inputted for the first of user, terminal does not respond, and the first input is answered for triggering terminal starting target
Use program.
Optionally, the first safe handling strategy includes: the starting attribute for modifying destination application;Control module, specifically
Starting is triggered for modifying the starting attribute of destination application for prompt user;
Optionally, as shown in figure 9, terminal 130 further includes receiving module 133, display module 134 and starting module 135;It connects
Module 133 is received, for receiving the first input of user, the first input starts destination application for triggering terminal;Show mould
Block 134 shows the first prompt information, the first prompt information is for mentioning for inputting in response to receiving module 133 received first
Show that there are security risks for user radio access point, if starting destination application;Receiving module 133 is also used to receive user
The second input to the first prompt information that display module 134 is shown, the second input is for determining starting destination application;It opens
Dynamic model block 135 starts destination application for inputting in response to receiving module 133 received second.
Optionally, the first safe handling strategy includes: the access attribute for modifying destination application;Control module 132, tool
The access attribute that body is used to modify destination application is to forbid accessing;Wherein, in the access attribute of modification destination application
After forbidding access, the data of destination application forbid being accessed.
Terminal provided in an embodiment of the present invention can be realized each process shown in above method embodiment, to avoid weight
Multiple, details are not described herein again.
A kind of hardware schematic of Figure 10 terminal of each embodiment to realize the present invention, the terminal 100 include but unlimited
In: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106,
The components such as user input unit 107, interface unit 108, memory 109, processor 110 and power supply 111.Art technology
Personnel are appreciated that the restriction of the not structure paired terminal of terminal structure shown in Figure 10, and terminal may include more than illustrating
Or less component, perhaps combine certain components or different component layouts.In embodiments of the present invention, terminal include but
It is not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 110, the authentication parameters of the wireless access point for obtaining terminal access, authentication parameters are used for table
The degree that sign wireless access point is trusted;Authentication parameters are located in the first parameter area;Corresponding first safety of first parameter area
Processing strategie;In the case where authentication parameters are less than or equal to first threshold, first is executed to the destination application in terminal
Safe handling strategy;Wherein, destination application is the application program for requiring authentication parameters to be greater than first threshold.
The embodiment of the present invention provides a kind of terminal, obtains the authentication parameters of the wireless access point of terminal access, authentication parameters
The degree being trusted for characterizing wireless access point;Authentication parameters are located in the first parameter area;First parameter area corresponding the
One safe handling strategy;In the case where authentication parameters are less than or equal to first threshold, the destination application in terminal is held
Row the first safe handling strategy;Wherein, destination application is the application program for requiring authentication parameters to be greater than first threshold.Pass through
The program, in the control method of application program provided in an embodiment of the present invention, in the credible of the wireless access point that terminal accesses
It, can be to the target application for requiring authentication parameters to be greater than first threshold in terminal in the case that parameter is less than or equal to first threshold
Program executes the first security strategy corresponding with the first parameter area where authentication parameters, so can be smaller in authentication parameters
In the case where (i.e. the degree that is trusted of wireless access point is lower namely safety is lower), to the destination application in terminal
(requiring authentication parameters to be greater than the application program of first threshold, namely to the higher application program of security requirement) executes corresponding
Safe handling strategy, so as to avoid the application program in user's using terminal during asking of being trapped of user information
Topic.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by wireless communication system and network and other set
Standby communication.
Terminal provides wireless broadband internet by network module 102 for user and accesses, and such as user is helped to receive and dispatch electricity
Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 103 can be received by radio frequency unit 101 or network module 102 or in memory 109
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 executes.Sound
Frequency output unit 103 includes loudspeaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike
Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 101 is converted in the case where telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear
1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with
Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer,
Infrared sensor etc., details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generates and set with the user of terminal
It sets and the related key signals of function control inputs.Specifically, user input unit 107 include touch panel 1071 and other
Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or nearby touch operation (such as
User is using any suitable objects or attachment such as finger, stylus on touch panel 1071 or near touch panel 1071
Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.
Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch
Key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it
On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touching
The type for touching event provides corresponding visual output on display panel 1061.Although in Figure 10, touch panel 1071 and aobvious
Show that panel 1061 is the function that outputs and inputs of realizing terminal as two independent components, but in certain embodiments,
The function that outputs and inputs that touch panel 1071 and display panel 1061 can be integrated and be realized terminal, does not limit specifically herein
It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) may include it is wired or
Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port,
For connecting port, the port audio input/output (I/O), video i/o port, ear port of the device with identification module
Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will
One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it
Between transmit data.
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the software program and/or module being stored in memory 109, and call and be stored in memory 109
Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 110 may include one
Or multiple processing units;Optionally, processor 110 can integrate application processor and modem processor, wherein application processing
The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage
Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, and optionally, power supply 111 can be with
It is logically contiguous by power-supply management system and processor 110, thus by power-supply management system realize management charging, electric discharge, with
And the functions such as power managed.In addition, terminal 100 includes some unshowned functional modules, details are not described herein.
The embodiment of the present invention also provides a kind of terminal, which may include processor, memory and is stored in storage
On device and the above method may be implemented when being executed by processor in the computer program that can run on a processor, the computer program
Each process that terminal executes in embodiment, and identical technical effect can be reached, to avoid repeating, which is not described herein again.
A kind of computer readable storage medium of the embodiment of the present invention, which is characterized in that on the computer readable storage medium
Computer program is stored, each mistake that terminal executes in above method embodiment is realized when which is executed by processor
Journey, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, which can
Think read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory,
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (14)
1. a kind of control method of application program is applied to terminal, which is characterized in that the described method includes:
The authentication parameters of the wireless access point of terminal access are obtained, the authentication parameters are believed for characterizing the wireless access point
The degree appointed;
Safe handling strategy is obtained according to the authentication parameters, when the authentication parameters are located in the first parameter area, described the
One parameter area corresponds to the first safe handling strategy;
In the case where the authentication parameters are less than or equal to first threshold, institute is executed to the destination application in the terminal
State the first safe handling strategy;Wherein, the destination application is the application program for requiring authentication parameters to be greater than first threshold.
2. the method according to claim 1, wherein
The first safe handling strategy includes: to cancel the mark for showing the destination application in the interface of the terminal
Know, the starting attribute of the process that terminates the destination application, the modification destination application, and the modification target
At least one of in the access attribute of application program.
3. according to the method described in claim 2, it is characterized in that, the first safe handling strategy includes: in the terminal
Interface in cancel the mark for showing the destination application;Described in the destination application in the terminal executes
After first safe handling strategy, the method also includes:
If detecting, the terminal is disconnected with the wireless access point, in the interface of the terminal again display described in
The mark of destination application.
4. according to the method described in claim 2, it is characterized in that, the first safe handling strategy includes: the modification mesh
Mark the starting attribute of application program;
The destination application in the terminal executes the first safe handling strategy, comprising:
The starting attribute for modifying the destination application is No starting;Wherein, opening for the destination application is being modified
To be inputted after No starting for the first of user, terminal does not respond dynamic attribute, and first input is described for triggering
Terminal starts the destination application.
5. according to the method described in claim 2, it is characterized in that, the first safe handling strategy includes: the modification mesh
Mark the starting attribute of application program;
The destination application in the terminal executes the first safe handling strategy, comprising:
It modifies the starting attribute of the destination application and triggers starting for prompt user;
The method also includes:
The first input of user is received, first input starts the destination application for triggering the terminal;
In response to first input, show that the first prompt information, first prompt information are wireless described in user for prompting
There are security risks for access point, if starts the destination application;
Second input of the user to first prompt information is received, second input starts the target application for determining
Program;
In response to second input, start the destination application.
6. according to the method described in claim 2, it is characterized in that, the first safe handling strategy includes: the modification mesh
Mark the access attribute of application program;
The destination application in the terminal executes the first safe handling strategy, comprising:
The access attribute for modifying the destination application is to forbid accessing;Wherein, in the visit for modifying the destination application
Ask that attribute is after forbidding access, the data of the destination application forbid being accessed.
7. a kind of terminal characterized by comprising obtain module and control module;
The acquisition module, the authentication parameters of the wireless access point for obtaining terminal access, the authentication parameters are for characterizing
The degree that the wireless access point is trusted;Safe handling strategy is obtained according to the authentication parameters, when the authentication parameters position
In in the first parameter area, first parameter area corresponds to the first safe handling strategy;
The control module, in the case that the authentication parameters for obtaining in the acquisition module are less than or equal to first threshold,
The first safe handling strategy is executed to the destination application in the terminal;Wherein, the destination application is to want
Authentication parameters are asked to be greater than the application program of first threshold.
8. terminal according to claim 7, which is characterized in that the first safe handling strategy includes: in the terminal
Interface in cancel the mark for showing the destination application, the process for terminating the destination application, the modification mesh
Mark at least one in the starting attribute of application program, and the access attribute of the modification destination application.
9. terminal according to claim 8, which is characterized in that the first safe handling strategy includes: in the terminal
Interface in cancel the mark for showing the destination application;
The control module, be also used to the destination application in the terminal execute the first safe handling strategy it
Afterwards, if detecting, the terminal is disconnected with the wireless access point, in the interface of the terminal again display described in
The mark of destination application.
10. terminal according to claim 8, which is characterized in that the first safe handling strategy includes: the modification mesh
Mark the starting attribute of application program;
The control module, the starting attribute specifically for modifying the destination application are No starting;Wherein, it is modifying
The starting attribute of the destination application be No starting after, for user first input, terminal does not respond, described
First input starts the destination application for triggering the terminal.
11. terminal according to claim 8, which is characterized in that the first safe handling strategy includes: the modification mesh
Mark the starting attribute of application program;
The control module, the starting attribute specifically for modifying the destination application are that prompt user triggers starting;
The terminal further includes receiving module, display module and starting module;
The receiving module, for receiving the first input of user, first input is for triggering described in the terminal starting
Destination application;
The display module, in response to received first input of the receiving module, showing the first prompt information, described the
There are security risks for prompting wireless access point described in user for one prompt information, if starts the destination application;
The receiving module is also used to receive the second input of the first prompt information that user shows the display module, institute
State the second input for determine the starting destination application;
The starting module, for starting the destination application in response to received second input of the receiving module.
12. terminal according to claim 8, which is characterized in that the first safe handling strategy includes: the modification mesh
Mark the access attribute of application program;
The control module, the access attribute specifically for modifying the destination application are to forbid accessing;Wherein, it is modifying
The access attribute of the destination application is after forbidding access, and the data of the destination application forbid being accessed.
13. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place
The computer program run on reason device is realized when the computer program is executed by the processor as appointed in claim 1 to 6
The step of control method of application program described in one.
14. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence realizes the control such as application program described in any one of claims 1 to 6 when the computer program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810770471.9A CN109246693A (en) | 2018-07-13 | 2018-07-13 | A kind of control method and terminal of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810770471.9A CN109246693A (en) | 2018-07-13 | 2018-07-13 | A kind of control method and terminal of application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246693A true CN109246693A (en) | 2019-01-18 |
Family
ID=65072592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810770471.9A Pending CN109246693A (en) | 2018-07-13 | 2018-07-13 | A kind of control method and terminal of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246693A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110334516A (en) * | 2019-07-05 | 2019-10-15 | 北京可信华泰信息技术有限公司 | The update method and device of credible strategy |
CN110363007A (en) * | 2019-07-05 | 2019-10-22 | 北京可信华泰信息技术有限公司 | The update method and device of credible strategy |
CN111310161A (en) * | 2020-01-20 | 2020-06-19 | Oppo(重庆)智能科技有限公司 | Application management method and device and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
CN105898751A (en) * | 2016-04-14 | 2016-08-24 | 惠州Tcl移动通信有限公司 | Application verification method and application verification system based on AP |
CN106096393A (en) * | 2016-06-07 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of application control method and device |
US9663113B2 (en) * | 2014-10-06 | 2017-05-30 | Preventext Llc | Integrated vehicle monitoring and control |
-
2018
- 2018-07-13 CN CN201810770471.9A patent/CN109246693A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9663113B2 (en) * | 2014-10-06 | 2017-05-30 | Preventext Llc | Integrated vehicle monitoring and control |
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
CN105898751A (en) * | 2016-04-14 | 2016-08-24 | 惠州Tcl移动通信有限公司 | Application verification method and application verification system based on AP |
CN106096393A (en) * | 2016-06-07 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of application control method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110334516A (en) * | 2019-07-05 | 2019-10-15 | 北京可信华泰信息技术有限公司 | The update method and device of credible strategy |
CN110363007A (en) * | 2019-07-05 | 2019-10-22 | 北京可信华泰信息技术有限公司 | The update method and device of credible strategy |
CN110334516B (en) * | 2019-07-05 | 2023-02-24 | 北京可信华泰信息技术有限公司 | Method and device for updating trusted policy |
CN110363007B (en) * | 2019-07-05 | 2023-02-28 | 北京可信华泰信息技术有限公司 | Method and device for updating trusted policy |
CN111310161A (en) * | 2020-01-20 | 2020-06-19 | Oppo(重庆)智能科技有限公司 | Application management method and device and computer readable storage medium |
CN111310161B (en) * | 2020-01-20 | 2022-11-25 | Oppo(重庆)智能科技有限公司 | Application management method and device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109542282A (en) | A kind of interface display method and terminal device | |
CN109194818A (en) | A kind of information processing method and terminal | |
CN110062105A (en) | A kind of interface display method and terminal device | |
CN109068319A (en) | A kind of call method, first terminal and second terminal | |
CN110209323A (en) | A kind of method and terminal device showing unread message | |
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN109189298A (en) | A kind of language switching method and terminal | |
CN110502878A (en) | A kind of application permission setting method and terminal device | |
CN110069180A (en) | A kind of function control method and terminal device | |
CN110309004A (en) | The processing method and terminal of data | |
CN110457935A (en) | A kind of authority configuring method and terminal device | |
CN109743503A (en) | Reminding method and terminal | |
CN109446834A (en) | A kind of right management method and mobile terminal of application program | |
CN109085963A (en) | A kind of interface display method and terminal device | |
CN109246693A (en) | A kind of control method and terminal of application program | |
CN110035183A (en) | Information sharing method and terminal | |
CN109753331A (en) | A kind of information preview method and mobile terminal | |
CN108008892A (en) | The method and terminal that a kind of function enables | |
CN109117054A (en) | A kind of display control method and terminal | |
CN110457921A (en) | Right management method and terminal device | |
CN109815678A (en) | A kind of authority configuring method and mobile terminal | |
CN110457943A (en) | A kind of application permission setting method and mobile terminal | |
CN108848240A (en) | A kind of protecting information safety method and terminal | |
CN109582174A (en) | A kind of touch-control input response method and terminal device | |
CN109086599A (en) | A kind of application program locking method, unlocking method and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |