CN110209437A - It is a kind of that starting method and terminal device are applied based on pseudo- address list information - Google Patents
It is a kind of that starting method and terminal device are applied based on pseudo- address list information Download PDFInfo
- Publication number
- CN110209437A CN110209437A CN201910465587.6A CN201910465587A CN110209437A CN 110209437 A CN110209437 A CN 110209437A CN 201910465587 A CN201910465587 A CN 201910465587A CN 110209437 A CN110209437 A CN 110209437A
- Authority
- CN
- China
- Prior art keywords
- address list
- terminal device
- information
- list information
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000004044 response Effects 0.000 claims abstract description 12
- 238000004891 communication Methods 0.000 claims description 102
- 238000004590 computer program Methods 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 26
- 230000005055 memory storage Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 13
- 230000008569 process Effects 0.000 description 9
- 238000013461 design Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of to apply starting method and terminal device based on pseudo- address list information, this method comprises: terminal device detects the input operation for starting the first application;Terminal device is operated in response to input, exports the first prompt information, the first prompt information is for prompting whether to allow the address list information in the first application access terminal device;If terminal device receives the instruction for not allowing the first application access address list information, the first application is exited;If terminal device receives the instruction for allowing the first application access address list information, the first application of starting, the first application access puppet address list information.In this way, as user using be only allowed access to that address list information could start some in application, these applications had not only can be used normally in user, but also can protect not being leaked for true address list information, protect the privacy of user.
Description
Technical field
The present invention relates to field of communication technology, espespecially a kind of application starting method and terminal based on pseudo- address list information is set
It is standby.
Background technique
Currently, mobile phone is one of most commonly used terminal of user, user can obtain much information by mobile phone and be used for work
Make, learn, entertain etc..And user obtains the approach of information by mobile phone, most of is the application installed by mobile phone
(Application, APP) is obtained, such as Baidu APP, microblogging APP etc..The APP installed on mobile phone can obtain for user
Information provides convenience.
However, some APP need to obtain the part permission of mobile phone when being installed or starting for the first time, to obtain
The part private data of user, then could start and provide certain functions for user, if not obtaining the part permission, these APP
It will be unable to start.For example, some APP when starting for the first time, prompts the user APP to need to obtain the accessing address list information of mobile phone
Permission can not start if the permission of the accessing address list information of mobile phone has not been obtained in the APP.Therefore, user wants to use
These APP, it has to the permission of these APP open visit address list informations, privacy of user is easy to cause to reveal, for example, this
A little APP send promotional information, advertisement etc. or unauthorized theft using some contact persons of the address list of user into address list
The contact method of some contact persons is sent to third party in address list.
Summary of the invention
The embodiment of the present invention provides a kind of application starting method and terminal device based on pseudo- address list information, to protect
The privacy of user.
In a first aspect, the embodiment of the present invention provides a kind of application starting method based on pseudo- address list information, comprising:
Terminal device detects the input operation for starting the first application;
The terminal device is operated in response to the input, exports the first prompt information, and first prompt information is used for
Whether prompt allows the address list information in terminal device described in first application access;
If the terminal device receives the instruction for not allowing address list information described in first application access, exit
First application;
If the terminal device receives the instruction for allowing address list information described in first application access, start institute
State the first application, the first application access puppet address list information.
Optionally, the terminal device receive allow address list information described in first application access instruction it
Afterwards, before starting first application, the method also includes:
The terminal device exports the second prompt information;Second prompt information is for prompting whether allow described first
True address list information in terminal device described in application access;
The terminal device receives the instruction for not allowing true address list information described in first application access.
Optionally, the terminal device receive allow address list information described in first application access instruction it
Afterwards, before starting first application, the method also includes:
The terminal device exports third prompt information;The third prompt information is for prompting whether allow described first
True address list information or pseudo- address list information in terminal device described in application access;
The terminal device receives the instruction for allowing puppet address list information described in first application access.
Optionally, before the first application access puppet address list information, the method also includes:
The terminal device reads at least one communication information from the true address list information and constitutes the pseudo- communication
Record information;At least one communication information is that the terminal device contacts the less communication information of number;Alternatively,
The terminal device generates at least one pseudo- communication information, described at least one pseudo- communication information according to preset rules
Constitute the pseudo- address list information;Each puppet communication information in described at least one pseudo- communication information really leads to described
What all communication informations in news record information were different from.
Optionally, the terminal device generates at least one pseudo- communication information according to preset rules, comprising:
The terminal device generate at random at least one name and at least one numeric string, it is described at least one name and extremely
A few numeric string constitutes described at least one pseudo- communication information;Alternatively,
The terminal device generates at least one pseudo- communication according to the communication information for being marked as harassing and wrecking information in memory
Information.
Second aspect, the embodiment of the present invention provide a kind of terminal device, comprising:
Storage unit is used for storage Pseudo address list information;
Processing unit, for detecting the input operation of the first application of starting;
The processing unit is also used to operate in response to the input, exports the first prompt information, the first prompt letter
Breath is for prompting whether allow the first application access address list information stored in the storage unit;
The processing unit is also used to: when receiving the instruction for not allowing address list information described in first application access
When, exit first application;When receiving the instruction for allowing address list information described in first application access, start institute
State the first application, the first application access puppet address list information.
Optionally, the processing unit is for receiving the finger for allowing address list information described in first application access
After order, and for being also used to before starting first application:
Export the second prompt information;Whether second prompt information allows described in first application access for prompting
The true address list information stored in memory;
Receive the instruction for not allowing true address list information described in first application access.
Optionally, the processing unit is for receiving the finger for allowing address list information described in first application access
After order, and for being also used to before starting first application:
Export third prompt information;Whether the third prompt information allows described in first application access for prompting
True address list information or pseudo- address list information in terminal device;
Receive the instruction for allowing puppet address list information described in first application access.
Optionally, before the first application access puppet address list information, the processing unit is specifically used for:
At least one communication information is read from the true address list information constitutes the pseudo- address list information;It is described extremely
A few communication information is that the terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, described at least one pseudo- communication information constitutes described pseudo- logical
News record information;Each puppet communication information in described at least one pseudo- communication information, in the true address list information
What all communication informations were different from.
Optionally, the processing unit is specific to use when for generating at least one pseudo- communication information according to preset rules
In:
At least one name and at least one numeric string, at least one described name and at least one numeric string are generated at random
Constitute described at least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information that the storage unit is marked as harassing and wrecking information.
The third aspect, the embodiment of the present invention provide a kind of terminal device, comprising:
Memory is used for storage Pseudo address list information;
Processor, for detecting the input operation of the first application of starting;
The processor is also used to operate in response to the input, exports the first prompt information, first prompt information
Address list information for prompting whether to allow to store in memory described in first application access;
The processor is also used to: when receiving the instruction for not allowing address list information described in first application access
When, exit first application;When receiving the instruction for allowing address list information described in first application access, described in starting
First application, the first application access puppet address list information.
Optionally, the processor is for receiving the instruction for allowing address list information described in first application access
Later, and for being also used to before starting first application:
Export the second prompt information;Whether second prompt information allows described in first application access for prompting
The true address list information stored in memory;
Receive the instruction for not allowing true address list information described in first application access.
Optionally, the processor is for receiving the instruction for allowing address list information described in first application access
Later, and for being also used to before starting first application:
Export third prompt information;Whether the third prompt information allows described in first application access for prompting
True address list information or pseudo- address list information in terminal device;
Receive the instruction for allowing puppet address list information described in first application access.
Optionally, before the first application access puppet address list information, the processor is specifically used for:
At least one communication information is read from the true address list information constitutes the pseudo- address list information;It is described extremely
A few communication information is that the terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, described at least one pseudo- communication information constitutes described pseudo- logical
News record information;Each puppet communication information in described at least one pseudo- communication information, in the true address list information
What all communication informations were different from.
Optionally, the processor is specifically used for when for generating at least one pseudo- communication information according to preset rules:
At least one name and at least one numeric string, at least one described name and at least one numeric string are generated at random
Constitute described at least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information for being marked as harassing and wrecking information in the memory.
Fourth aspect, the embodiment of the present invention provide a kind of terminal device, including processor and memory;Wherein, described to deposit
Reservoir is for storing one or more computer programs;When one or more computer programs of memory storage are described
When processor executes, so that the terminal device realizes any one possible design of first aspect or above-mentioned first aspect
Method.
5th aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium
Matter is stored with computer program, and the computer program includes program instruction, and described program instructs when executed by a computer, makes
The method that the computer executes any one possible design of first aspect or above-mentioned first aspect.
6th aspect, the embodiment of the present invention provide a kind of computer program product, and the computer program product is stored with
Computer program, the computer program include program instruction, and described program instructs when executed by a computer, make the calculating
The method that machine executes any one possible design of first aspect or above-mentioned first aspect.
The present invention has the beneficial effect that:
In the present invention in the technical solution of embodiment, terminal device detects the input operation for starting the first application;
Terminal device is operated in response to input, exports the first prompt information, the first prompt information is for prompting whether allow the first application
Access the address list information in terminal device;If terminal device receives the finger for not allowing the first application access address list information
It enables, then exits the first application;If terminal device receives the instruction for allowing the first application access address list information, start first
Using the first application access puppet address list information.In this way, address list information is only allowed access to when user uses
Could start some were in application, these applications had not only can be used normally in user, but also can protect true address list information not
It is leaked, protects the privacy of user.
Detailed description of the invention
Fig. 1 is that a kind of process using starting method based on pseudo- address list information provided in an embodiment of the present invention is illustrated
Figure;
Fig. 2 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that the described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.
Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts all
Other embodiments shall fall within the protection scope of the present invention.
The shapes and sizes of each component do not reflect actual proportions in attached drawing, and purpose is schematically illustrate the content of present invention.
In order to skilled addressee readily understands that technical solution of the present invention, is described below application background of the invention.
Currently, some developers, when developing some APP, the entry condition provided with the APP, user is using the APP
When, need to meet the APP entry condition, which, which just can star, provides corresponding function for user.For example, some APP's opens
Dynamic condition is to get the permission of the accessing address list information in mobile phone, therefore, when user wants using these APP, it has to
To the permission of these APP open visit address list informations, privacy of user is easy to cause to reveal.If user is not desired to leakage address list letter
Breath, does not allow the permission of these APP open visit address list informations, then can not start these APP, thus is not available these
The function that APP is provided.
To sum up, current mobile phone can not accomplish not only can to avoid leakage user address list information, but also can allow user just
Being often used entry condition is the APP for getting the permission of accessing address list information.Therefore, user is easy when using these APP
Face a difficult selection the predicament of selection, and user experience is poor.
To solve the above-mentioned problems, the embodiment of the invention provides a kind of applies starting side based on pseudo- address list information
Method.When this method is applied to mobile phone, it is to obtain the power of accessing address list information that these entry conditions, which had both can be used normally, in user
The APP of limit, and can protect not being leaked for true address list information, facilitate the privacy for protecting user.
The application starting method provided in an embodiment of the present invention based on pseudo- address list information is described below.
It please refers to shown in Fig. 1, for a kind of application starting method based on pseudo- address list information provided in an embodiment of the present invention
Flow diagram.This method can be applied to a terminal device, which can be mobile phone, phone wrist-watch, iPad etc.
The equipment for being stored with address list information.This method process includes:
S101, terminal device detect the input operation for starting the first application.
Illustratively, input operation can be the icon that user clicks the first application on the display screen of terminal device, or
Person is that user clicks some key (key is used for the first application of starting when being triggered) on terminal device, and the present invention is real
Example is applied not limit.
It is with the first application be entry condition is to get access communication it should be noted that in embodiments of the present invention
For the APP for recording the permission of information.Certainly, the entry condition of the first application can also be other conditions, such as entry condition
It is to obtain to check in address list information there is which contact person to have registered the first application;Alternatively, entry condition can also be any need
Access the condition of user privacy information in terminal device, wherein for privacy information include in short message APP address list letter
Address list information, etc. in breath, wechat APP, the embodiment of the present invention is not construed as limiting.
S102, terminal device are operated in response to input, export the first prompt information, and whether the first prompt information is used for prompt
Allow the address list information in the first application access terminal device.
Optionally, it is operated when terminal device is responded with the input in dynamic first application, exports the mode of the first prompt information
Can there are many, such as:
Mode 1, terminal device show the first prompt information on a display screen, for prompting whether allow the first application access
Address list information in terminal device, i.e. the first prompt information are text information.
Mode 2, terminal device the first prompt information of voice broadcast, for prompting whether allow the first application access terminal
Address list information in equipment, i.e. the first prompt information are voice messaging.
Certainly, terminal device can be combined with mode 1 and mode 2 exports the first prompt information, or in other ways
The first prompt information is exported, the embodiment of the present invention does not limit.
If S103, terminal device receive the instruction for not allowing the first application access address list information, exits first and answer
With;If terminal device receives the instruction for allowing the first application access address list information, the first application of starting, the first application is visited
Ask pseudo- address list information.
Optionally, after terminal device exports the first prompt information, if terminal device, which receives, does not allow the first application
The first application is then exited in the instruction of accessing address list information.The first application access address list is allowed to believe if terminal device receives
The instruction of breath then starts the first application, the first application access puppet address list information.
It should be understood that a kind of possible implementation is, and the first prompt information of display screen display of terminal device, described
One prompt information are as follows: whether allow the address list information in the first application access terminal device, two controls are also shown on display screen
Part "Yes" and "No" exit the first application when terminal device detects the control for "No", when terminal device detects needle
When to the control of "Yes", the first application of terminal device starting, and the first application access puppet address list information.This implementation
In, after terminal device receives the instruction for allowing the first application access address list information, the first application of starting, first application
Default access puppet address list information, to prevent privacy of user from divulging a secret.
Alternatively possible implementation is the first prompt information of display screen display of terminal device, the first prompt letter
Breath are as follows: whether allow the address list information in the first application access terminal device, also shown on display screen two control "Yes" and
"No" exits application when terminal device detects the control for "No", when terminal detects the control for "Yes",
Whether the display screen of terminal device shows the second prompt information: the true address list in the first application access terminal device being allowed to believe
Breath, display screen also shows two controls of "Yes" and "No", and when terminal device detects that "Yes" control is triggered, starting first is answered
With, and the true address list information of the first application access.When terminal device detects that "No" control is triggered, starting first is answered
With the first application access puppet address list information.In this case, allow the first application access logical when terminal device receives
It after the instruction of news record information, continues as user and choice is provided, i.e., whether true communication is accessed by the first application of user's selection
Information is recorded, when user selects "Yes", then starts the first application, and the true address list information of the first application access, when user selects
When selecting "No", then start the first application, and the first application access puppet address list information.In this implementation, work as terminal device
After receiving the instruction for not allowing the true address list information of the first application access, the first application of starting, the first application default is visited
Pseudo- address list information is asked, to prevent privacy of user from divulging a secret.
Alternatively possible implementation is the first prompt information of display screen display of terminal device, the first prompt letter
Breath are as follows: whether allow the address list information in the first application access terminal device, also shown on display screen two control "Yes" and
"No" exits application when terminal device detects the control for "No", when terminal detects the control for "Yes",
The display screen of terminal device shows third prompt information: the true address list information in the first application access terminal device of permission is also
It is pseudo- address list, display screen also shows " true address list information " and " pseudo- address list information " two controls, when terminal device is examined
When measuring " true address list information " control and being triggered, the first application of starting, and the true address list information of the first application access.
When terminal device detects that " pseudo- address book information " control is triggered, the first application of starting, the first application access puppet communication
Record information.In this case, it after terminal device receives the instruction for allowing the first application access address list information, continues as
User provides choice, i.e., selects the true address list information of the first application access or pseudo- address list information by user, when with
When family selects " true address list information ", then start the first application, and the true address list information of the first application access, when user selects
When selecting " pseudo- address list information ", then start the first application, and the first application access puppet address list information.
Optionally, for terminal device after determining that the first application is allowed access to pseudo- address list information, terminal device can be with
It detects in memory with the presence or absence of pseudo- address list information.Wherein, the memory can with terminal device internal storage, or with
The external memory etc. of terminal device connection, the embodiment of the present invention does not limit.
Illustratively, if terminal device determines that, there is no pseudo- address list information in memory, terminal device automatically creates puppet
Address list information or terminal device export the 4th prompt information, for prompting user to create pseudo- address list information;Later eventually
Pseudo- address list information is stored in memory by end equipment.Terminal device provides the access path of pseudo- address list information for the first application
(access path can be the store path of pseudo- address list information in memory).If terminal device, which determines, has puppet in memory
Address list information (the puppet address list information can be user setting), terminal device provide pseudo- address list information for the first application
Access path.Wherein, terminal device may include: that terminal device will for the access path that the first application provides pseudo- address list information
The access path of true address list information is hidden, and shows that the access path of pseudo- address list information or terminal device are logical by puppet
The access address of news record information is sent to the first application.
Illustratively, the mode for the access path that terminal device provides pseudo- address list information for the first application can have more
Kind.For example, when terminal device detects that terminal device provides there are when a pseudo- address list information in memory for the first application
The access path of pseudo- address list information.When terminal device detects that there are at least two pseudo- address list informations, terminals in memory
Equipment provides the access path of a pseudo- address list information at least two pseudo- address list informations at random for the first application, or
Person, terminal device export the 5th prompt information, and for prompting the path of the first application access puppet address list information of selection, terminal is set
It is standby to operate (the control either choice box that first operation can be the pseudo- address list information of user's triggering first) in response to first,
The access path of the first pseudo- address list information at least two pseudo- address list informations is provided for the first application.First pseudo- address list
Information is any one pseudo- address list information at least two pseudo- address list informations.
It should be noted that the creation mode of pseudo- address list information can there are many.The pseudo- address list letter of creation is described below
Several examples of breath.
Example 1, pseudo- address list information are that user is customized.For example, the communication information of the customized newly-built contact person of user
Or creation blank page, as communication information, terminal device reads these communication informations and constitutes pseudo- address list information.In this example,
User can create pseudo- address list information according to the hobby of oneself, can promote the experience of user.
Example 2, terminal device can read at least one communication information from true address list information and constitute pseudo- address list
Information.Wherein, at least one communication information is that terminal device contacts the less communication information of number.In this example, without using
Family creates pseudo- address list information, can save user's operation.
Example 3, terminal device generate at least one pseudo- communication information, at least one pseudo- communication information structure according to preset rules
At pseudo- address list information;Each puppet communication information at least one pseudo- communication information, with the institute in true address list information
There is communication information to be different from.In this example, terminal device can create pseudo- address list information there are many mode, such as:
Mode 1, terminal device can generate at random at least one name and at least one numeric string, at least one name and
At least one numeric string constitutes at least one pseudo- communication information.For example, terminal device generates at least one name of contact person at random,
At least one phone number or base number are generated at random, later by least one name of contact person and at least one cell-phone number
Code or base number correspond (or one-to-many, such as a name of contact person corresponds to multiple phone numbers and/or multiple
Base number) at least one pseudo- communication information is constituted, at least one pseudo- communication information is created as pseudo- address list by terminal device to be believed
Breath.
Mode 2, terminal device can be by the names in true address list information (such as belonging to name of contact person, contact person
Business Name etc.) retain, and by true address list information the corresponding numeric string of name (phone number of example contact person or
Base number) in any several numbers upset sequence, later, by the name in the numeric string after upsetting and true address list information
The pseudo- communication information of corresponding generation obtains at least one pseudo- communication information, and terminal device is by least one pseudo- communication information later
It is created as pseudo- address list information.For example, certain communication information is in true address list information: the name of contact person is " Li Si ",
Phone number is " 13000003322 ", and terminal device can retain the name " Li Si " of contact person, by latter four of phone number
Phone number after upsetting is " 13000002233 ", and terminal device will be in the phone number after upsetting and true address list information
The pseudo- communication information of the corresponding generation of name of contact person, obtained pseudo- communication information is: the name of contact person is " Li Si ", mobile phone
Number is " 13000002233 ".
Mode 3, terminal device can generate at least one according to the communication information for being marked as harassing and wrecking information in memory
Pseudo- communication information.For example, terminal device can will be marked as the phone number or base number of harassing call in memory
Pseudo- communication information is generated, at least one pseudo- communication information is obtained, at least one pseudo- communication information is created as by terminal device later
Pseudo- address list information.
It should be noted that the storage address for being stored in reservoir of each puppet address list information is not identical, i.e. access is every
The path of a puppet address list information is different.
By foregoing description it is found that terminal device is detected for starting in the present invention in the technical solution of embodiment
The input operation of first application;Terminal device is operated in response to input, exports the first prompt information, the first prompt information is for mentioning
Show the address list information whether allowed in the first application access terminal device;The first application is not allowed to visit if terminal device receives
It asks the instruction of address list information, then exits the first application;If terminal device, which receives, allows the first application access address list information
Instruction, then start first application, the first application access puppet address list information.In this way, when user uses only quilt
Allow could start some of accessing address list information in application, these applications had not only can be used normally in user, but also can protect
Not being leaked for true address list information, protects the privacy of user.
Under based on the same inventive concept, the embodiment of the invention provides a kind of terminal devices.It please refers to shown in Fig. 2, for this
A kind of structural schematic diagram for terminal device that inventive embodiments provide.
As shown in Fig. 2, terminal device 200 includes:
Storage unit 201 is used for storage Pseudo address list information;
Processing unit 202, for detecting the input operation of the first application of starting;
Processing unit 202 is also used to operate in response to input, exports the first prompt information, the first prompt information is for prompting
Whether the address list information that in first application access storage unit 201 stores is allowed;
Processing unit 202 is also used to: when receiving the instruction for not allowing the first application access address list information, exiting
One application;When receiving the instruction for allowing the first application access address list information, the first application of starting, the first application access puppet
Address list information.
Optionally, processing unit 202 for receive allow the first application access address list information instruction after, and
For being also used to before starting the first application:
Export the second prompt information;Whether the second prompt information allows to store in the first application access memory for prompting
True address list information;
Receive the instruction for not allowing the true address list information of the first application access.
Optionally, processing unit 202 for receive allow the first application access address list information instruction after, and
For being also used to before starting the first application:
Export third prompt information;Whether third prompt information allows in the first application access terminal device for prompting
True address list information or pseudo- address list information;
Receive the instruction for allowing the first application access puppet address list information.
Optionally, before the first application access puppet address list information, processing unit 202 is specifically used for:
At least one communication information is read from true address list information constitutes pseudo- address list information;At least one communication letter
Breath is that terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, at least one pseudo- communication information constitutes pseudo- address list letter
Breath;Each puppet communication information at least one pseudo- communication information, all with all communication informations in true address list information
It is different.
Optionally, processing unit is specifically used for when for generating at least one pseudo- communication information according to preset rules:
At least one name and at least one numeric string are generated at random, at least one name and at least one numeric string are constituted
At least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information for being marked as harassing and wrecking information in storage unit 201.
Terminal device 200 and the aforementioned application starting method shown in FIG. 1 based on pseudo- address list information in the present embodiment
It is based on the invention under same design, by aforementioned to the detailed description using starting method based on pseudo- address list information, originally
Field technical staff can be apparent from the implementation process of terminal device 200 in the present embodiment, so in order to illustrate the letter of book
Clean, details are not described herein.
Under based on the same inventive concept, the embodiment of the invention provides a kind of terminal devices.It please refers to shown in Fig. 3, for this
A kind of structural schematic diagram for terminal device that inventive embodiments provide.
As shown in figure 3, terminal device 300 includes:
Memory 301 is used for storage Pseudo address list information;
Processor 302, for detecting the input operation of the first application of starting;
Processor 302 is also used to operate in response to input, exports the first prompt information, and the first prompt information is for prompt
The no address list information for allowing to store in the first application access memory 301;
Processor 302 is also used to: when receiving the instruction for not allowing the first application access address list information, exiting first
Using;When receiving the instruction for allowing the first application access address list information, the first application of starting, the first application access puppet is led to
News record information.
Optionally, processor 302 for receive allow the first application access address list information instruction after, and
For being also used to before starting the first application:
Export the second prompt information;Whether the second prompt information allows to store in the first application access memory for prompting
True address list information;
Receive the instruction for not allowing the true address list information of the first application access.
Optionally, processor 302 for receive allow the first application access address list information instruction after, and
For being also used to before starting the first application:
Export third prompt information;Whether third prompt information allows in the first application access terminal device for prompting
True address list information or pseudo- address list information;
Receive the instruction for allowing the first application access puppet address list information.
Optionally, before the first application access puppet address list information, processor 302 is specifically used for:
At least one communication information is read from true address list information constitutes pseudo- address list information;At least one communication letter
Breath is that terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, at least one pseudo- communication information constitutes pseudo- address list letter
Breath;Each puppet communication information at least one pseudo- communication information, all with all communication informations in true address list information
It is different.
Optionally, processing unit is specifically used for when for generating at least one pseudo- communication information according to preset rules:
At least one name and at least one numeric string are generated at random, at least one name and at least one numeric string are constituted
At least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information for being marked as harassing and wrecking information in memory 301.
Terminal device 300 and the aforementioned application starting method shown in FIG. 1 based on pseudo- address list information in the present embodiment
It is based on the invention under same design, by aforementioned to the detailed description using starting method based on pseudo- address list information, originally
Field technical staff can be apparent from the implementation process of terminal device 300 in the present embodiment, so in order to illustrate the letter of book
Clean, details are not described herein.
Under based on the same inventive concept, the embodiment of the invention provides a kind of terminal devices.It please refers to shown in Fig. 4, for this
A kind of structural schematic diagram for terminal device that inventive embodiments provide.As shown in figure 4, terminal device 400 includes 401 He of processor
Memory 402.Optionally, processor 401 can be general central processing unit (Central Processing Unit,
) or application-specific integrated circuit (Application Specific Integrated Circuit, ASIC) or scene CPU
Programmable gate array (Field Programmable Gate Array, FPGA) is also possible to one or more for controlling journey
The integrated circuit that sequence executes.
Optionally, memory 402 may include high-speed random access memory, can also include nonvolatile storage, example
Such as disk memory, flush memory device or other non-volatile solid state memory parts, the embodiment of the present invention are not construed as limiting.
Optionally, memory 402 is for storing one or more computer programs;When memory 402 store one or
Multiple computer programs by processor 401 execute when so that terminal device 400 can be realized it is complete in embodiment shown in FIG. 1
Portion or part steps.
Terminal device 400 and the aforementioned application starting method shown in FIG. 1 based on pseudo- address list information in the present embodiment
It is based on the invention under same design, by aforementioned to the detailed description using starting method based on pseudo- address list information, originally
Field technical staff can be apparent from the implementation process of terminal device 400 in the present embodiment, so in order to illustrate the letter of book
Clean, details are not described herein.
Under based on the same inventive concept, the embodiment of the invention provides a kind of computer readable storage mediums.Optionally, it counts
Calculation machine readable storage medium storing program for executing has a computer program, and computer program includes program instruction, program instruction when executed by a computer,
The step of making computer execute the above-mentioned application starting method based on pseudo- address list information.By computer journey in this present embodiment
Sequence and it is aforementioned it is shown in FIG. 1 based on pseudo- address list information be based on the invention under same design, by preceding using starting method
It states to the detailed description using starting method based on pseudo- address list information, those skilled in the art can be apparent from this reality
The implementation process of computer program in example is applied, so details are not described herein in order to illustrate the succinct of book.
Under based on the same inventive concept, the embodiment of the invention provides a kind of computer program products.Optionally, computer
Program product is stored with computer program, and computer program includes program instruction, and program instruction when executed by a computer, makes to count
Calculation machine executes the step of above-mentioned application starting method based on pseudo- address list information.By in this present embodiment computer program with
It is aforementioned it is shown in FIG. 1 based on pseudo- address list information be based on the invention under same design, by aforementioned right using starting method
The detailed description using starting method based on pseudo- address list information, those skilled in the art can be apparent from the present embodiment
The implementation process of middle computer program, so details are not described herein in order to illustrate the succinct of book.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of apply starting method based on pseudo- address list information characterized by comprising
Terminal device detects the input operation for starting the first application;
The terminal device is operated in response to the input, exports the first prompt information, first prompt information is for prompting
Whether address list information in first application access described in terminal device is allowed;
If the terminal device receives the instruction for not allowing address list information described in first application access, exit described
First application;
If the terminal device receives the instruction for allowing address list information described in first application access, start described the
One application, the first application access puppet address list information.
2. the method as described in claim 1, which is characterized in that receiving in the terminal device allows first application to visit
After the instruction for asking the address list information, before starting first application, the method also includes:
The terminal device exports the second prompt information;Whether second prompt information allows first application for prompting
Access the true address list information in the terminal device;
The terminal device receives the instruction for not allowing true address list information described in first application access.
3. the method as described in claim 1, which is characterized in that receiving in the terminal device allows first application to visit
After the instruction for asking the address list information, before starting first application, the method also includes:
The terminal device exports third prompt information;The third prompt information allows first application access for prompting
True address list information or pseudo- address list information in the terminal device;
The terminal device receives the instruction for allowing puppet address list information described in first application access.
4. method a method according to any one of claims 1-3, which is characterized in that the first application access puppet address list information it
Before, the method also includes:
The terminal device reads at least one communication information from the true address list information and constitutes the pseudo- address list letter
Breath;At least one communication information is that the terminal device contacts the less communication information of number;Alternatively,
The terminal device generates at least one pseudo- communication information according to preset rules, and described at least one pseudo- communication information is constituted
The puppet address list information;Each puppet communication information in described at least one pseudo- communication information, with the true address list
What all communication informations in information were different from.
5. method as claimed in claim 4, which is characterized in that the terminal device generates at least one puppet according to preset rules
Communication information, comprising:
The terminal device generates at least one name and at least one numeric string, at least one described name and at least one at random
A numeric string constitutes described at least one pseudo- communication information;Alternatively,
The terminal device generates at least one pseudo- communication information according to the communication information for being marked as harassing and wrecking information in memory.
6. a kind of terminal device characterized by comprising
Storage unit is used for storage Pseudo address list information;
Processing unit, for detecting the input operation of the first application of starting;
The processing unit is also used to operate in response to the input, exports the first prompt information, and first prompt information is used
Whether allow the first application access address list information stored in the storage unit in prompt;
The processing unit is also used to: when receiving the instruction for not allowing address list information described in first application access,
Exit first application;When receiving the instruction for allowing address list information described in first application access, start described the
One application, the first application access puppet address list information.
7. terminal device as claimed in claim 6, which is characterized in that the processing unit is allowing described for receiving
After the instruction of address list information described in one application access, and for being also used to before starting first application:
Export the second prompt information;Second prompt information is for prompting whether allow storage described in first application access
The true address list information stored in device;
Receive the instruction for not allowing true address list information described in first application access.
8. a kind of terminal device, which is characterized in that including processor and memory;Wherein,
The memory is for storing one or more computer programs;When one or more computers of memory storage
When program is executed by the processor, so that the terminal device executes method a method as claimed in any one of claims 1 to 5.
9. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program include program instruction, and described program instructs when executed by a computer, execute the computer such as
Method as claimed in any one of claims 1 to 5.
10. a kind of computer program product, which is characterized in that the computer program product is stored with computer program, described
Computer program includes program instruction, and described program instructs when executed by a computer, executes the computer as right is wanted
Seek any method in 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910465587.6A CN110209437A (en) | 2019-05-30 | 2019-05-30 | It is a kind of that starting method and terminal device are applied based on pseudo- address list information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910465587.6A CN110209437A (en) | 2019-05-30 | 2019-05-30 | It is a kind of that starting method and terminal device are applied based on pseudo- address list information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110209437A true CN110209437A (en) | 2019-09-06 |
Family
ID=67789731
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910465587.6A Pending CN110209437A (en) | 2019-05-30 | 2019-05-30 | It is a kind of that starting method and terminal device are applied based on pseudo- address list information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110209437A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN103581417A (en) * | 2012-08-02 | 2014-02-12 | 北京网秦天下科技有限公司 | Privacy protection device of mobile terminal and privacy protection method thereof |
CN105072255A (en) * | 2015-07-10 | 2015-11-18 | 北京奇虎科技有限公司 | Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment |
CN105592452A (en) * | 2014-10-24 | 2016-05-18 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for preventing private data from being read maliciously |
CN106357866A (en) * | 2016-09-27 | 2017-01-25 | 维沃移动通信有限公司 | Contact list management method and mobile intelligent terminal |
-
2019
- 2019-05-30 CN CN201910465587.6A patent/CN110209437A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581417A (en) * | 2012-08-02 | 2014-02-12 | 北京网秦天下科技有限公司 | Privacy protection device of mobile terminal and privacy protection method thereof |
CN103533026A (en) * | 2013-09-22 | 2014-01-22 | 四川智爱电子信息科技有限责任公司 | Cloud platform-based mobile phone contact list information disguising method |
CN105592452A (en) * | 2014-10-24 | 2016-05-18 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for preventing private data from being read maliciously |
CN105072255A (en) * | 2015-07-10 | 2015-11-18 | 北京奇虎科技有限公司 | Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment |
CN106357866A (en) * | 2016-09-27 | 2017-01-25 | 维沃移动通信有限公司 | Contact list management method and mobile intelligent terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10587591B2 (en) | Generating a password | |
US10367779B2 (en) | Method and client terminal for prompting instant communication message | |
US9813882B1 (en) | Mobile notifications based upon notification content | |
CN109040409B (en) | Method and device for processing data and message | |
US20180131649A1 (en) | Method and Apparatus for Prompting Work Status | |
US20120238257A1 (en) | System and method for selectively restricting portable information handling system features | |
AU2020200074A1 (en) | Verification code obtaining method and apparatus, and terminal | |
CN106569585B (en) | A kind of method and terminal managing program process | |
CN103473039B (en) | The option based on context is generated in response to notice | |
US20150111559A1 (en) | System, method and article for managing mobile devices | |
US20130318625A1 (en) | Method for protecting data stored in device and device thereof | |
RU2630553C2 (en) | Method, instrumentation, and device for adding connected expansion to address book | |
US20120115435A1 (en) | Privacy in Mobile Device Communications | |
WO2016145706A1 (en) | Method and device for implementing user mode switching on smart terminal, and smart terminal | |
WO2020248602A1 (en) | Blockchain-based relationship binding method, apparatus and device | |
CN110399576B (en) | Page switching method and device, readable medium and electronic equipment | |
CN105453072B (en) | The data maintenance of customer-centric | |
CN106330678A (en) | Application message reminding method and system | |
CN108932086A (en) | Display methods, device and the storage medium of application interface | |
CN108509788A (en) | Information sharing method and device, computer readable storage medium, terminal | |
US9135416B2 (en) | GUI-based authentication for a computing system | |
US10362065B2 (en) | Management of actions initiated by applications in client devices | |
CN107291472A (en) | The processing method and processing device of the prompting message of application program | |
CN106445479B (en) | Information-pushing method and device | |
US11830098B2 (en) | Data leak prevention using user and device contexts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190906 |