CN110209437A - It is a kind of that starting method and terminal device are applied based on pseudo- address list information - Google Patents

It is a kind of that starting method and terminal device are applied based on pseudo- address list information Download PDF

Info

Publication number
CN110209437A
CN110209437A CN201910465587.6A CN201910465587A CN110209437A CN 110209437 A CN110209437 A CN 110209437A CN 201910465587 A CN201910465587 A CN 201910465587A CN 110209437 A CN110209437 A CN 110209437A
Authority
CN
China
Prior art keywords
address list
terminal device
information
list information
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910465587.6A
Other languages
Chinese (zh)
Inventor
毛文瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910465587.6A priority Critical patent/CN110209437A/en
Publication of CN110209437A publication Critical patent/CN110209437A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of to apply starting method and terminal device based on pseudo- address list information, this method comprises: terminal device detects the input operation for starting the first application;Terminal device is operated in response to input, exports the first prompt information, the first prompt information is for prompting whether to allow the address list information in the first application access terminal device;If terminal device receives the instruction for not allowing the first application access address list information, the first application is exited;If terminal device receives the instruction for allowing the first application access address list information, the first application of starting, the first application access puppet address list information.In this way, as user using be only allowed access to that address list information could start some in application, these applications had not only can be used normally in user, but also can protect not being leaked for true address list information, protect the privacy of user.

Description

It is a kind of that starting method and terminal device are applied based on pseudo- address list information
Technical field
The present invention relates to field of communication technology, espespecially a kind of application starting method and terminal based on pseudo- address list information is set It is standby.
Background technique
Currently, mobile phone is one of most commonly used terminal of user, user can obtain much information by mobile phone and be used for work Make, learn, entertain etc..And user obtains the approach of information by mobile phone, most of is the application installed by mobile phone (Application, APP) is obtained, such as Baidu APP, microblogging APP etc..The APP installed on mobile phone can obtain for user Information provides convenience.
However, some APP need to obtain the part permission of mobile phone when being installed or starting for the first time, to obtain The part private data of user, then could start and provide certain functions for user, if not obtaining the part permission, these APP It will be unable to start.For example, some APP when starting for the first time, prompts the user APP to need to obtain the accessing address list information of mobile phone Permission can not start if the permission of the accessing address list information of mobile phone has not been obtained in the APP.Therefore, user wants to use These APP, it has to the permission of these APP open visit address list informations, privacy of user is easy to cause to reveal, for example, this A little APP send promotional information, advertisement etc. or unauthorized theft using some contact persons of the address list of user into address list The contact method of some contact persons is sent to third party in address list.
Summary of the invention
The embodiment of the present invention provides a kind of application starting method and terminal device based on pseudo- address list information, to protect The privacy of user.
In a first aspect, the embodiment of the present invention provides a kind of application starting method based on pseudo- address list information, comprising:
Terminal device detects the input operation for starting the first application;
The terminal device is operated in response to the input, exports the first prompt information, and first prompt information is used for Whether prompt allows the address list information in terminal device described in first application access;
If the terminal device receives the instruction for not allowing address list information described in first application access, exit First application;
If the terminal device receives the instruction for allowing address list information described in first application access, start institute State the first application, the first application access puppet address list information.
Optionally, the terminal device receive allow address list information described in first application access instruction it Afterwards, before starting first application, the method also includes:
The terminal device exports the second prompt information;Second prompt information is for prompting whether allow described first True address list information in terminal device described in application access;
The terminal device receives the instruction for not allowing true address list information described in first application access.
Optionally, the terminal device receive allow address list information described in first application access instruction it Afterwards, before starting first application, the method also includes:
The terminal device exports third prompt information;The third prompt information is for prompting whether allow described first True address list information or pseudo- address list information in terminal device described in application access;
The terminal device receives the instruction for allowing puppet address list information described in first application access.
Optionally, before the first application access puppet address list information, the method also includes:
The terminal device reads at least one communication information from the true address list information and constitutes the pseudo- communication Record information;At least one communication information is that the terminal device contacts the less communication information of number;Alternatively,
The terminal device generates at least one pseudo- communication information, described at least one pseudo- communication information according to preset rules Constitute the pseudo- address list information;Each puppet communication information in described at least one pseudo- communication information really leads to described What all communication informations in news record information were different from.
Optionally, the terminal device generates at least one pseudo- communication information according to preset rules, comprising:
The terminal device generate at random at least one name and at least one numeric string, it is described at least one name and extremely A few numeric string constitutes described at least one pseudo- communication information;Alternatively,
The terminal device generates at least one pseudo- communication according to the communication information for being marked as harassing and wrecking information in memory Information.
Second aspect, the embodiment of the present invention provide a kind of terminal device, comprising:
Storage unit is used for storage Pseudo address list information;
Processing unit, for detecting the input operation of the first application of starting;
The processing unit is also used to operate in response to the input, exports the first prompt information, the first prompt letter Breath is for prompting whether allow the first application access address list information stored in the storage unit;
The processing unit is also used to: when receiving the instruction for not allowing address list information described in first application access When, exit first application;When receiving the instruction for allowing address list information described in first application access, start institute State the first application, the first application access puppet address list information.
Optionally, the processing unit is for receiving the finger for allowing address list information described in first application access After order, and for being also used to before starting first application:
Export the second prompt information;Whether second prompt information allows described in first application access for prompting The true address list information stored in memory;
Receive the instruction for not allowing true address list information described in first application access.
Optionally, the processing unit is for receiving the finger for allowing address list information described in first application access After order, and for being also used to before starting first application:
Export third prompt information;Whether the third prompt information allows described in first application access for prompting True address list information or pseudo- address list information in terminal device;
Receive the instruction for allowing puppet address list information described in first application access.
Optionally, before the first application access puppet address list information, the processing unit is specifically used for:
At least one communication information is read from the true address list information constitutes the pseudo- address list information;It is described extremely A few communication information is that the terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, described at least one pseudo- communication information constitutes described pseudo- logical News record information;Each puppet communication information in described at least one pseudo- communication information, in the true address list information What all communication informations were different from.
Optionally, the processing unit is specific to use when for generating at least one pseudo- communication information according to preset rules In:
At least one name and at least one numeric string, at least one described name and at least one numeric string are generated at random Constitute described at least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information that the storage unit is marked as harassing and wrecking information.
The third aspect, the embodiment of the present invention provide a kind of terminal device, comprising:
Memory is used for storage Pseudo address list information;
Processor, for detecting the input operation of the first application of starting;
The processor is also used to operate in response to the input, exports the first prompt information, first prompt information Address list information for prompting whether to allow to store in memory described in first application access;
The processor is also used to: when receiving the instruction for not allowing address list information described in first application access When, exit first application;When receiving the instruction for allowing address list information described in first application access, described in starting First application, the first application access puppet address list information.
Optionally, the processor is for receiving the instruction for allowing address list information described in first application access Later, and for being also used to before starting first application:
Export the second prompt information;Whether second prompt information allows described in first application access for prompting The true address list information stored in memory;
Receive the instruction for not allowing true address list information described in first application access.
Optionally, the processor is for receiving the instruction for allowing address list information described in first application access Later, and for being also used to before starting first application:
Export third prompt information;Whether the third prompt information allows described in first application access for prompting True address list information or pseudo- address list information in terminal device;
Receive the instruction for allowing puppet address list information described in first application access.
Optionally, before the first application access puppet address list information, the processor is specifically used for:
At least one communication information is read from the true address list information constitutes the pseudo- address list information;It is described extremely A few communication information is that the terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, described at least one pseudo- communication information constitutes described pseudo- logical News record information;Each puppet communication information in described at least one pseudo- communication information, in the true address list information What all communication informations were different from.
Optionally, the processor is specifically used for when for generating at least one pseudo- communication information according to preset rules:
At least one name and at least one numeric string, at least one described name and at least one numeric string are generated at random Constitute described at least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information for being marked as harassing and wrecking information in the memory.
Fourth aspect, the embodiment of the present invention provide a kind of terminal device, including processor and memory;Wherein, described to deposit Reservoir is for storing one or more computer programs;When one or more computer programs of memory storage are described When processor executes, so that the terminal device realizes any one possible design of first aspect or above-mentioned first aspect Method.
5th aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium Matter is stored with computer program, and the computer program includes program instruction, and described program instructs when executed by a computer, makes The method that the computer executes any one possible design of first aspect or above-mentioned first aspect.
6th aspect, the embodiment of the present invention provide a kind of computer program product, and the computer program product is stored with Computer program, the computer program include program instruction, and described program instructs when executed by a computer, make the calculating The method that machine executes any one possible design of first aspect or above-mentioned first aspect.
The present invention has the beneficial effect that:
In the present invention in the technical solution of embodiment, terminal device detects the input operation for starting the first application; Terminal device is operated in response to input, exports the first prompt information, the first prompt information is for prompting whether allow the first application Access the address list information in terminal device;If terminal device receives the finger for not allowing the first application access address list information It enables, then exits the first application;If terminal device receives the instruction for allowing the first application access address list information, start first Using the first application access puppet address list information.In this way, address list information is only allowed access to when user uses Could start some were in application, these applications had not only can be used normally in user, but also can protect true address list information not It is leaked, protects the privacy of user.
Detailed description of the invention
Fig. 1 is that a kind of process using starting method based on pseudo- address list information provided in an embodiment of the present invention is illustrated Figure;
Fig. 2 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that the described embodiment is only a part of the embodiment of the present invention, instead of all the embodiments. Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts all Other embodiments shall fall within the protection scope of the present invention.
The shapes and sizes of each component do not reflect actual proportions in attached drawing, and purpose is schematically illustrate the content of present invention.
In order to skilled addressee readily understands that technical solution of the present invention, is described below application background of the invention.
Currently, some developers, when developing some APP, the entry condition provided with the APP, user is using the APP When, need to meet the APP entry condition, which, which just can star, provides corresponding function for user.For example, some APP's opens Dynamic condition is to get the permission of the accessing address list information in mobile phone, therefore, when user wants using these APP, it has to To the permission of these APP open visit address list informations, privacy of user is easy to cause to reveal.If user is not desired to leakage address list letter Breath, does not allow the permission of these APP open visit address list informations, then can not start these APP, thus is not available these The function that APP is provided.
To sum up, current mobile phone can not accomplish not only can to avoid leakage user address list information, but also can allow user just Being often used entry condition is the APP for getting the permission of accessing address list information.Therefore, user is easy when using these APP Face a difficult selection the predicament of selection, and user experience is poor.
To solve the above-mentioned problems, the embodiment of the invention provides a kind of applies starting side based on pseudo- address list information Method.When this method is applied to mobile phone, it is to obtain the power of accessing address list information that these entry conditions, which had both can be used normally, in user The APP of limit, and can protect not being leaked for true address list information, facilitate the privacy for protecting user.
The application starting method provided in an embodiment of the present invention based on pseudo- address list information is described below.
It please refers to shown in Fig. 1, for a kind of application starting method based on pseudo- address list information provided in an embodiment of the present invention Flow diagram.This method can be applied to a terminal device, which can be mobile phone, phone wrist-watch, iPad etc. The equipment for being stored with address list information.This method process includes:
S101, terminal device detect the input operation for starting the first application.
Illustratively, input operation can be the icon that user clicks the first application on the display screen of terminal device, or Person is that user clicks some key (key is used for the first application of starting when being triggered) on terminal device, and the present invention is real Example is applied not limit.
It is with the first application be entry condition is to get access communication it should be noted that in embodiments of the present invention For the APP for recording the permission of information.Certainly, the entry condition of the first application can also be other conditions, such as entry condition It is to obtain to check in address list information there is which contact person to have registered the first application;Alternatively, entry condition can also be any need Access the condition of user privacy information in terminal device, wherein for privacy information include in short message APP address list letter Address list information, etc. in breath, wechat APP, the embodiment of the present invention is not construed as limiting.
S102, terminal device are operated in response to input, export the first prompt information, and whether the first prompt information is used for prompt Allow the address list information in the first application access terminal device.
Optionally, it is operated when terminal device is responded with the input in dynamic first application, exports the mode of the first prompt information Can there are many, such as:
Mode 1, terminal device show the first prompt information on a display screen, for prompting whether allow the first application access Address list information in terminal device, i.e. the first prompt information are text information.
Mode 2, terminal device the first prompt information of voice broadcast, for prompting whether allow the first application access terminal Address list information in equipment, i.e. the first prompt information are voice messaging.
Certainly, terminal device can be combined with mode 1 and mode 2 exports the first prompt information, or in other ways The first prompt information is exported, the embodiment of the present invention does not limit.
If S103, terminal device receive the instruction for not allowing the first application access address list information, exits first and answer With;If terminal device receives the instruction for allowing the first application access address list information, the first application of starting, the first application is visited Ask pseudo- address list information.
Optionally, after terminal device exports the first prompt information, if terminal device, which receives, does not allow the first application The first application is then exited in the instruction of accessing address list information.The first application access address list is allowed to believe if terminal device receives The instruction of breath then starts the first application, the first application access puppet address list information.
It should be understood that a kind of possible implementation is, and the first prompt information of display screen display of terminal device, described One prompt information are as follows: whether allow the address list information in the first application access terminal device, two controls are also shown on display screen Part "Yes" and "No" exit the first application when terminal device detects the control for "No", when terminal device detects needle When to the control of "Yes", the first application of terminal device starting, and the first application access puppet address list information.This implementation In, after terminal device receives the instruction for allowing the first application access address list information, the first application of starting, first application Default access puppet address list information, to prevent privacy of user from divulging a secret.
Alternatively possible implementation is the first prompt information of display screen display of terminal device, the first prompt letter Breath are as follows: whether allow the address list information in the first application access terminal device, also shown on display screen two control "Yes" and "No" exits application when terminal device detects the control for "No", when terminal detects the control for "Yes", Whether the display screen of terminal device shows the second prompt information: the true address list in the first application access terminal device being allowed to believe Breath, display screen also shows two controls of "Yes" and "No", and when terminal device detects that "Yes" control is triggered, starting first is answered With, and the true address list information of the first application access.When terminal device detects that "No" control is triggered, starting first is answered With the first application access puppet address list information.In this case, allow the first application access logical when terminal device receives It after the instruction of news record information, continues as user and choice is provided, i.e., whether true communication is accessed by the first application of user's selection Information is recorded, when user selects "Yes", then starts the first application, and the true address list information of the first application access, when user selects When selecting "No", then start the first application, and the first application access puppet address list information.In this implementation, work as terminal device After receiving the instruction for not allowing the true address list information of the first application access, the first application of starting, the first application default is visited Pseudo- address list information is asked, to prevent privacy of user from divulging a secret.
Alternatively possible implementation is the first prompt information of display screen display of terminal device, the first prompt letter Breath are as follows: whether allow the address list information in the first application access terminal device, also shown on display screen two control "Yes" and "No" exits application when terminal device detects the control for "No", when terminal detects the control for "Yes", The display screen of terminal device shows third prompt information: the true address list information in the first application access terminal device of permission is also It is pseudo- address list, display screen also shows " true address list information " and " pseudo- address list information " two controls, when terminal device is examined When measuring " true address list information " control and being triggered, the first application of starting, and the true address list information of the first application access. When terminal device detects that " pseudo- address book information " control is triggered, the first application of starting, the first application access puppet communication Record information.In this case, it after terminal device receives the instruction for allowing the first application access address list information, continues as User provides choice, i.e., selects the true address list information of the first application access or pseudo- address list information by user, when with When family selects " true address list information ", then start the first application, and the true address list information of the first application access, when user selects When selecting " pseudo- address list information ", then start the first application, and the first application access puppet address list information.
Optionally, for terminal device after determining that the first application is allowed access to pseudo- address list information, terminal device can be with It detects in memory with the presence or absence of pseudo- address list information.Wherein, the memory can with terminal device internal storage, or with The external memory etc. of terminal device connection, the embodiment of the present invention does not limit.
Illustratively, if terminal device determines that, there is no pseudo- address list information in memory, terminal device automatically creates puppet Address list information or terminal device export the 4th prompt information, for prompting user to create pseudo- address list information;Later eventually Pseudo- address list information is stored in memory by end equipment.Terminal device provides the access path of pseudo- address list information for the first application (access path can be the store path of pseudo- address list information in memory).If terminal device, which determines, has puppet in memory Address list information (the puppet address list information can be user setting), terminal device provide pseudo- address list information for the first application Access path.Wherein, terminal device may include: that terminal device will for the access path that the first application provides pseudo- address list information The access path of true address list information is hidden, and shows that the access path of pseudo- address list information or terminal device are logical by puppet The access address of news record information is sent to the first application.
Illustratively, the mode for the access path that terminal device provides pseudo- address list information for the first application can have more Kind.For example, when terminal device detects that terminal device provides there are when a pseudo- address list information in memory for the first application The access path of pseudo- address list information.When terminal device detects that there are at least two pseudo- address list informations, terminals in memory Equipment provides the access path of a pseudo- address list information at least two pseudo- address list informations at random for the first application, or Person, terminal device export the 5th prompt information, and for prompting the path of the first application access puppet address list information of selection, terminal is set It is standby to operate (the control either choice box that first operation can be the pseudo- address list information of user's triggering first) in response to first, The access path of the first pseudo- address list information at least two pseudo- address list informations is provided for the first application.First pseudo- address list Information is any one pseudo- address list information at least two pseudo- address list informations.
It should be noted that the creation mode of pseudo- address list information can there are many.The pseudo- address list letter of creation is described below Several examples of breath.
Example 1, pseudo- address list information are that user is customized.For example, the communication information of the customized newly-built contact person of user Or creation blank page, as communication information, terminal device reads these communication informations and constitutes pseudo- address list information.In this example, User can create pseudo- address list information according to the hobby of oneself, can promote the experience of user.
Example 2, terminal device can read at least one communication information from true address list information and constitute pseudo- address list Information.Wherein, at least one communication information is that terminal device contacts the less communication information of number.In this example, without using Family creates pseudo- address list information, can save user's operation.
Example 3, terminal device generate at least one pseudo- communication information, at least one pseudo- communication information structure according to preset rules At pseudo- address list information;Each puppet communication information at least one pseudo- communication information, with the institute in true address list information There is communication information to be different from.In this example, terminal device can create pseudo- address list information there are many mode, such as:
Mode 1, terminal device can generate at random at least one name and at least one numeric string, at least one name and At least one numeric string constitutes at least one pseudo- communication information.For example, terminal device generates at least one name of contact person at random, At least one phone number or base number are generated at random, later by least one name of contact person and at least one cell-phone number Code or base number correspond (or one-to-many, such as a name of contact person corresponds to multiple phone numbers and/or multiple Base number) at least one pseudo- communication information is constituted, at least one pseudo- communication information is created as pseudo- address list by terminal device to be believed Breath.
Mode 2, terminal device can be by the names in true address list information (such as belonging to name of contact person, contact person Business Name etc.) retain, and by true address list information the corresponding numeric string of name (phone number of example contact person or Base number) in any several numbers upset sequence, later, by the name in the numeric string after upsetting and true address list information The pseudo- communication information of corresponding generation obtains at least one pseudo- communication information, and terminal device is by least one pseudo- communication information later It is created as pseudo- address list information.For example, certain communication information is in true address list information: the name of contact person is " Li Si ", Phone number is " 13000003322 ", and terminal device can retain the name " Li Si " of contact person, by latter four of phone number Phone number after upsetting is " 13000002233 ", and terminal device will be in the phone number after upsetting and true address list information The pseudo- communication information of the corresponding generation of name of contact person, obtained pseudo- communication information is: the name of contact person is " Li Si ", mobile phone Number is " 13000002233 ".
Mode 3, terminal device can generate at least one according to the communication information for being marked as harassing and wrecking information in memory Pseudo- communication information.For example, terminal device can will be marked as the phone number or base number of harassing call in memory Pseudo- communication information is generated, at least one pseudo- communication information is obtained, at least one pseudo- communication information is created as by terminal device later Pseudo- address list information.
It should be noted that the storage address for being stored in reservoir of each puppet address list information is not identical, i.e. access is every The path of a puppet address list information is different.
By foregoing description it is found that terminal device is detected for starting in the present invention in the technical solution of embodiment The input operation of first application;Terminal device is operated in response to input, exports the first prompt information, the first prompt information is for mentioning Show the address list information whether allowed in the first application access terminal device;The first application is not allowed to visit if terminal device receives It asks the instruction of address list information, then exits the first application;If terminal device, which receives, allows the first application access address list information Instruction, then start first application, the first application access puppet address list information.In this way, when user uses only quilt Allow could start some of accessing address list information in application, these applications had not only can be used normally in user, but also can protect Not being leaked for true address list information, protects the privacy of user.
Under based on the same inventive concept, the embodiment of the invention provides a kind of terminal devices.It please refers to shown in Fig. 2, for this A kind of structural schematic diagram for terminal device that inventive embodiments provide.
As shown in Fig. 2, terminal device 200 includes:
Storage unit 201 is used for storage Pseudo address list information;
Processing unit 202, for detecting the input operation of the first application of starting;
Processing unit 202 is also used to operate in response to input, exports the first prompt information, the first prompt information is for prompting Whether the address list information that in first application access storage unit 201 stores is allowed;
Processing unit 202 is also used to: when receiving the instruction for not allowing the first application access address list information, exiting One application;When receiving the instruction for allowing the first application access address list information, the first application of starting, the first application access puppet Address list information.
Optionally, processing unit 202 for receive allow the first application access address list information instruction after, and For being also used to before starting the first application:
Export the second prompt information;Whether the second prompt information allows to store in the first application access memory for prompting True address list information;
Receive the instruction for not allowing the true address list information of the first application access.
Optionally, processing unit 202 for receive allow the first application access address list information instruction after, and For being also used to before starting the first application:
Export third prompt information;Whether third prompt information allows in the first application access terminal device for prompting True address list information or pseudo- address list information;
Receive the instruction for allowing the first application access puppet address list information.
Optionally, before the first application access puppet address list information, processing unit 202 is specifically used for:
At least one communication information is read from true address list information constitutes pseudo- address list information;At least one communication letter Breath is that terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, at least one pseudo- communication information constitutes pseudo- address list letter Breath;Each puppet communication information at least one pseudo- communication information, all with all communication informations in true address list information It is different.
Optionally, processing unit is specifically used for when for generating at least one pseudo- communication information according to preset rules:
At least one name and at least one numeric string are generated at random, at least one name and at least one numeric string are constituted At least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information for being marked as harassing and wrecking information in storage unit 201.
Terminal device 200 and the aforementioned application starting method shown in FIG. 1 based on pseudo- address list information in the present embodiment It is based on the invention under same design, by aforementioned to the detailed description using starting method based on pseudo- address list information, originally Field technical staff can be apparent from the implementation process of terminal device 200 in the present embodiment, so in order to illustrate the letter of book Clean, details are not described herein.
Under based on the same inventive concept, the embodiment of the invention provides a kind of terminal devices.It please refers to shown in Fig. 3, for this A kind of structural schematic diagram for terminal device that inventive embodiments provide.
As shown in figure 3, terminal device 300 includes:
Memory 301 is used for storage Pseudo address list information;
Processor 302, for detecting the input operation of the first application of starting;
Processor 302 is also used to operate in response to input, exports the first prompt information, and the first prompt information is for prompt The no address list information for allowing to store in the first application access memory 301;
Processor 302 is also used to: when receiving the instruction for not allowing the first application access address list information, exiting first Using;When receiving the instruction for allowing the first application access address list information, the first application of starting, the first application access puppet is led to News record information.
Optionally, processor 302 for receive allow the first application access address list information instruction after, and For being also used to before starting the first application:
Export the second prompt information;Whether the second prompt information allows to store in the first application access memory for prompting True address list information;
Receive the instruction for not allowing the true address list information of the first application access.
Optionally, processor 302 for receive allow the first application access address list information instruction after, and For being also used to before starting the first application:
Export third prompt information;Whether third prompt information allows in the first application access terminal device for prompting True address list information or pseudo- address list information;
Receive the instruction for allowing the first application access puppet address list information.
Optionally, before the first application access puppet address list information, processor 302 is specifically used for:
At least one communication information is read from true address list information constitutes pseudo- address list information;At least one communication letter Breath is that terminal device contacts the less communication information of number;Alternatively,
At least one pseudo- communication information is generated according to preset rules, at least one pseudo- communication information constitutes pseudo- address list letter Breath;Each puppet communication information at least one pseudo- communication information, all with all communication informations in true address list information It is different.
Optionally, processing unit is specifically used for when for generating at least one pseudo- communication information according to preset rules:
At least one name and at least one numeric string are generated at random, at least one name and at least one numeric string are constituted At least one pseudo- communication information;Alternatively,
At least one pseudo- communication information is generated according to the communication information for being marked as harassing and wrecking information in memory 301.
Terminal device 300 and the aforementioned application starting method shown in FIG. 1 based on pseudo- address list information in the present embodiment It is based on the invention under same design, by aforementioned to the detailed description using starting method based on pseudo- address list information, originally Field technical staff can be apparent from the implementation process of terminal device 300 in the present embodiment, so in order to illustrate the letter of book Clean, details are not described herein.
Under based on the same inventive concept, the embodiment of the invention provides a kind of terminal devices.It please refers to shown in Fig. 4, for this A kind of structural schematic diagram for terminal device that inventive embodiments provide.As shown in figure 4, terminal device 400 includes 401 He of processor Memory 402.Optionally, processor 401 can be general central processing unit (Central Processing Unit, ) or application-specific integrated circuit (Application Specific Integrated Circuit, ASIC) or scene CPU Programmable gate array (Field Programmable Gate Array, FPGA) is also possible to one or more for controlling journey The integrated circuit that sequence executes.
Optionally, memory 402 may include high-speed random access memory, can also include nonvolatile storage, example Such as disk memory, flush memory device or other non-volatile solid state memory parts, the embodiment of the present invention are not construed as limiting.
Optionally, memory 402 is for storing one or more computer programs;When memory 402 store one or Multiple computer programs by processor 401 execute when so that terminal device 400 can be realized it is complete in embodiment shown in FIG. 1 Portion or part steps.
Terminal device 400 and the aforementioned application starting method shown in FIG. 1 based on pseudo- address list information in the present embodiment It is based on the invention under same design, by aforementioned to the detailed description using starting method based on pseudo- address list information, originally Field technical staff can be apparent from the implementation process of terminal device 400 in the present embodiment, so in order to illustrate the letter of book Clean, details are not described herein.
Under based on the same inventive concept, the embodiment of the invention provides a kind of computer readable storage mediums.Optionally, it counts Calculation machine readable storage medium storing program for executing has a computer program, and computer program includes program instruction, program instruction when executed by a computer, The step of making computer execute the above-mentioned application starting method based on pseudo- address list information.By computer journey in this present embodiment Sequence and it is aforementioned it is shown in FIG. 1 based on pseudo- address list information be based on the invention under same design, by preceding using starting method It states to the detailed description using starting method based on pseudo- address list information, those skilled in the art can be apparent from this reality The implementation process of computer program in example is applied, so details are not described herein in order to illustrate the succinct of book.
Under based on the same inventive concept, the embodiment of the invention provides a kind of computer program products.Optionally, computer Program product is stored with computer program, and computer program includes program instruction, and program instruction when executed by a computer, makes to count Calculation machine executes the step of above-mentioned application starting method based on pseudo- address list information.By in this present embodiment computer program with It is aforementioned it is shown in FIG. 1 based on pseudo- address list information be based on the invention under same design, by aforementioned right using starting method The detailed description using starting method based on pseudo- address list information, those skilled in the art can be apparent from the present embodiment The implementation process of middle computer program, so details are not described herein in order to illustrate the succinct of book.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of apply starting method based on pseudo- address list information characterized by comprising
Terminal device detects the input operation for starting the first application;
The terminal device is operated in response to the input, exports the first prompt information, first prompt information is for prompting Whether address list information in first application access described in terminal device is allowed;
If the terminal device receives the instruction for not allowing address list information described in first application access, exit described First application;
If the terminal device receives the instruction for allowing address list information described in first application access, start described the One application, the first application access puppet address list information.
2. the method as described in claim 1, which is characterized in that receiving in the terminal device allows first application to visit After the instruction for asking the address list information, before starting first application, the method also includes:
The terminal device exports the second prompt information;Whether second prompt information allows first application for prompting Access the true address list information in the terminal device;
The terminal device receives the instruction for not allowing true address list information described in first application access.
3. the method as described in claim 1, which is characterized in that receiving in the terminal device allows first application to visit After the instruction for asking the address list information, before starting first application, the method also includes:
The terminal device exports third prompt information;The third prompt information allows first application access for prompting True address list information or pseudo- address list information in the terminal device;
The terminal device receives the instruction for allowing puppet address list information described in first application access.
4. method a method according to any one of claims 1-3, which is characterized in that the first application access puppet address list information it Before, the method also includes:
The terminal device reads at least one communication information from the true address list information and constitutes the pseudo- address list letter Breath;At least one communication information is that the terminal device contacts the less communication information of number;Alternatively,
The terminal device generates at least one pseudo- communication information according to preset rules, and described at least one pseudo- communication information is constituted The puppet address list information;Each puppet communication information in described at least one pseudo- communication information, with the true address list What all communication informations in information were different from.
5. method as claimed in claim 4, which is characterized in that the terminal device generates at least one puppet according to preset rules Communication information, comprising:
The terminal device generates at least one name and at least one numeric string, at least one described name and at least one at random A numeric string constitutes described at least one pseudo- communication information;Alternatively,
The terminal device generates at least one pseudo- communication information according to the communication information for being marked as harassing and wrecking information in memory.
6. a kind of terminal device characterized by comprising
Storage unit is used for storage Pseudo address list information;
Processing unit, for detecting the input operation of the first application of starting;
The processing unit is also used to operate in response to the input, exports the first prompt information, and first prompt information is used Whether allow the first application access address list information stored in the storage unit in prompt;
The processing unit is also used to: when receiving the instruction for not allowing address list information described in first application access, Exit first application;When receiving the instruction for allowing address list information described in first application access, start described the One application, the first application access puppet address list information.
7. terminal device as claimed in claim 6, which is characterized in that the processing unit is allowing described for receiving After the instruction of address list information described in one application access, and for being also used to before starting first application:
Export the second prompt information;Second prompt information is for prompting whether allow storage described in first application access The true address list information stored in device;
Receive the instruction for not allowing true address list information described in first application access.
8. a kind of terminal device, which is characterized in that including processor and memory;Wherein,
The memory is for storing one or more computer programs;When one or more computers of memory storage When program is executed by the processor, so that the terminal device executes method a method as claimed in any one of claims 1 to 5.
9. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program include program instruction, and described program instructs when executed by a computer, execute the computer such as Method as claimed in any one of claims 1 to 5.
10. a kind of computer program product, which is characterized in that the computer program product is stored with computer program, described Computer program includes program instruction, and described program instructs when executed by a computer, executes the computer as right is wanted Seek any method in 1-5.
CN201910465587.6A 2019-05-30 2019-05-30 It is a kind of that starting method and terminal device are applied based on pseudo- address list information Pending CN110209437A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910465587.6A CN110209437A (en) 2019-05-30 2019-05-30 It is a kind of that starting method and terminal device are applied based on pseudo- address list information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910465587.6A CN110209437A (en) 2019-05-30 2019-05-30 It is a kind of that starting method and terminal device are applied based on pseudo- address list information

Publications (1)

Publication Number Publication Date
CN110209437A true CN110209437A (en) 2019-09-06

Family

ID=67789731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910465587.6A Pending CN110209437A (en) 2019-05-30 2019-05-30 It is a kind of that starting method and terminal device are applied based on pseudo- address list information

Country Status (1)

Country Link
CN (1) CN110209437A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533026A (en) * 2013-09-22 2014-01-22 四川智爱电子信息科技有限责任公司 Cloud platform-based mobile phone contact list information disguising method
CN103581417A (en) * 2012-08-02 2014-02-12 北京网秦天下科技有限公司 Privacy protection device of mobile terminal and privacy protection method thereof
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment
CN105592452A (en) * 2014-10-24 2016-05-18 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for preventing private data from being read maliciously
CN106357866A (en) * 2016-09-27 2017-01-25 维沃移动通信有限公司 Contact list management method and mobile intelligent terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581417A (en) * 2012-08-02 2014-02-12 北京网秦天下科技有限公司 Privacy protection device of mobile terminal and privacy protection method thereof
CN103533026A (en) * 2013-09-22 2014-01-22 四川智爱电子信息科技有限责任公司 Cloud platform-based mobile phone contact list information disguising method
CN105592452A (en) * 2014-10-24 2016-05-18 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for preventing private data from being read maliciously
CN105072255A (en) * 2015-07-10 2015-11-18 北京奇虎科技有限公司 Mobile equipment privacy authority control method, mobile equipment privacy authority control device and corresponding mobile phone equipment
CN106357866A (en) * 2016-09-27 2017-01-25 维沃移动通信有限公司 Contact list management method and mobile intelligent terminal

Similar Documents

Publication Publication Date Title
US10587591B2 (en) Generating a password
US10367779B2 (en) Method and client terminal for prompting instant communication message
US9813882B1 (en) Mobile notifications based upon notification content
CN109040409B (en) Method and device for processing data and message
US20180131649A1 (en) Method and Apparatus for Prompting Work Status
US20120238257A1 (en) System and method for selectively restricting portable information handling system features
AU2020200074A1 (en) Verification code obtaining method and apparatus, and terminal
CN106569585B (en) A kind of method and terminal managing program process
CN103473039B (en) The option based on context is generated in response to notice
US20150111559A1 (en) System, method and article for managing mobile devices
US20130318625A1 (en) Method for protecting data stored in device and device thereof
RU2630553C2 (en) Method, instrumentation, and device for adding connected expansion to address book
US20120115435A1 (en) Privacy in Mobile Device Communications
WO2016145706A1 (en) Method and device for implementing user mode switching on smart terminal, and smart terminal
WO2020248602A1 (en) Blockchain-based relationship binding method, apparatus and device
CN110399576B (en) Page switching method and device, readable medium and electronic equipment
CN105453072B (en) The data maintenance of customer-centric
CN106330678A (en) Application message reminding method and system
CN108932086A (en) Display methods, device and the storage medium of application interface
CN108509788A (en) Information sharing method and device, computer readable storage medium, terminal
US9135416B2 (en) GUI-based authentication for a computing system
US10362065B2 (en) Management of actions initiated by applications in client devices
CN107291472A (en) The processing method and processing device of the prompting message of application program
CN106445479B (en) Information-pushing method and device
US11830098B2 (en) Data leak prevention using user and device contexts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190906