CN110232275A - A kind of control method and terminal device - Google Patents

A kind of control method and terminal device Download PDF

Info

Publication number
CN110232275A
CN110232275A CN201910336144.7A CN201910336144A CN110232275A CN 110232275 A CN110232275 A CN 110232275A CN 201910336144 A CN201910336144 A CN 201910336144A CN 110232275 A CN110232275 A CN 110232275A
Authority
CN
China
Prior art keywords
terminal device
application
input
user
operating system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910336144.7A
Other languages
Chinese (zh)
Other versions
CN110232275B (en
Inventor
胡洋洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910336144.7A priority Critical patent/CN110232275B/en
Publication of CN110232275A publication Critical patent/CN110232275A/en
Application granted granted Critical
Publication of CN110232275B publication Critical patent/CN110232275B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading

Abstract

The embodiment of the present invention provides a kind of control method and terminal device, is related to field of communication technology, the security performance to solve the problems, such as existing terminal device is poor.This method comprises: the input of detection user;In the case where detecting the input of user is the first input, closes the first application of terminal device running background or set disabled status for the use state of the first application;Wherein, which is following any one: input that triggering terminal equipment apply in terminal device front stage operation second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.This method is applied in the scene of terminal device operation application.

Description

A kind of control method and terminal device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of control method and terminal devices.
Background technique
With the rapid development of communication technology, terminal device using more and more extensive, safety of the user to terminal device Performance requirement is also higher and higher.
Currently, including that many is related to the application of user privacy information, such as the third with payment function in terminal device Fang Yingyong, the application such as Mobile banking's application.In order to avoid the privacy information of user is compromised, these applications would generally provide safety Input method.In this way, when paying or logging on terminal device line in application, the safe input method that user can be provided by the application The privacy informations such as password or user name are inputted, to prevent the private information disclosure of user.
However, the application due to terminal device running background has the ability for obtaining the data in terminal device, During being paid on terminal device line or logging in application, even if user is (such as close by safe input method input privacy information Code etc.), the application privacy information that also available user inputs of terminal device running background.In this way, may be such that user Privacy information be compromised, it is poor so as to cause the security performance of terminal device.
Summary of the invention
The embodiment of the present invention provides a kind of control method and terminal device, to solve the security performance of existing terminal device Poor problem.
In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:
In a first aspect, the embodiment of the invention provides a kind of control method, this method comprises: the input of detection user;And In the case where detecting the input of user is the first input, closes the first application of terminal device running background or answered first Use state is set as disabled status.Wherein, which is following any one: triggering terminal equipment is set in terminal The input of the standby application of front stage operation second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.
Second aspect, the embodiment of the invention provides a kind of terminal device, which includes detection module and processing Module.Detection module, for detecting the input of user;Processing module, for detecting that the input of user is the in detection module In the case where one input, closes the first application of terminal device running background or be set as disabling by the use state of the first application State.Wherein, which is following any one: triggering terminal equipment is applied defeated in terminal device front stage operation second Enter, the input that triggering terminal equipment passes through the second application execution predetermined registration operation.
The third aspect, the embodiment of the invention provides a kind of terminal device, the terminal device include processor, memory and It is stored in the computer program that can be run on the memory and on the processor, when which is executed by the processor The step of realizing the control method in such as above-mentioned first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, is realized when which is executed by processor such as the control method in above-mentioned first aspect Step.
In embodiments of the present invention, it can detecte the input of user;And inputted in the input for detecting user for first In the case of, it closes the first application of terminal device running background or sets disabled status for first use state applied. Wherein, which is following any one: input that triggering terminal equipment apply in terminal device front stage operation second is touched Send out the input that terminal device passes through the second application execution predetermined registration operation.With this solution, due to terminal device running background The data of the application (the i.e. second application) of terminal device front stage operation may be obtained using (i.e. first application), such as obtain the User's name, user information and the password of user's input in two applications etc., therefore when terminal device detects that user triggers Terminal device is applied in terminal device front stage operation second or terminal device detects user's triggering terminal equipment by second When the certain specific operations of application execution (such as input password etc.), terminal device can close the first of terminal device running background Using, or by the use state of the first of terminal device running background the application set disabled status.In this way, can be made One application can not obtain the data of the second application of terminal device front stage operation, i.e., the first application can not be obtained from the second application So as to protect the privacy information of user, and then the security performance of terminal device can be improved in the privacy information of user.
Detailed description of the invention
Fig. 1 is the configuration diagram of Android operation system provided in an embodiment of the present invention;
Fig. 2 is one of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 3 is the two of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 4 is the three of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 5 is the four of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 6 is the five of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 7 is the six of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 8 is the seven of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 9 is the eight of the schematic diagram of control method provided in an embodiment of the present invention;
Figure 10 is one of the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Figure 11 is the second structural representation of terminal device provided in an embodiment of the present invention;
Figure 12 is the third structural representation of terminal device provided in an embodiment of the present invention;
Figure 13 is the hardware schematic of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships, For example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Symbol herein "/" indicates that affiliated partner is relationship such as A/B expression A or B perhaps.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs As, rather than it is used for the particular order of description object.For example, the first operating system and the second operating system etc. are for distinguishing not Same operating system, rather than the particular order for describing operating system.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more, For example, multiple operating systems refer to two or more operating system etc..
Some term/nouns involved in the embodiment of the present invention are explained first below.
Operating system: for the application operation in the hardware resource of management terminal device, controlling terminal equipment, and being user The set of the system software at interactive operation interface is provided.
The use state of application: it is used to indicate the state that can terminal device operate application.
Disabled status: the state of any operation can not be carried out to application by being used to indicate terminal device, for example, can be equivalent to The application is not installed in terminal device.
Initiate mode: it is used to indicate the state that terminal device can normally operate application.
The user data of application: the user data generated during being used to indicate terminal device operation application.
The embodiment of the present invention provides a kind of control method and terminal device, can detecte the input of user;And it is detecting In the case that the input of user is the first input, the first application of closing terminal device running background or the use applied first State is set as disabled status.Wherein, which is following any one: triggering terminal equipment is transported on terminal device foreground The input of the application of row second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.With this solution, due to end The application (the i.e. first application) of end equipment running background may obtain the application (the i.e. second application) of terminal device front stage operation Data, such as obtain user's name, user information and the password etc. of user's input in the second application, therefore work as terminal Equipment detects that user's triggering terminal equipment detects that user touches in the application of terminal device front stage operation second or terminal device When sending out terminal device by the certain specific operations of the second application execution (such as input password etc.), terminal device can close terminal First application of equipment running background, or disabling shape is set by the use state of the first application of terminal device running background State.In this way, can make the first application that can not obtain the second data applied of terminal device front stage operation, i.e., first applies nothing Method obtains the privacy information of user from the second application, so as to protect the privacy information of user, and then terminal can be improved The security performance of equipment.
Terminal device in the embodiment of the present invention can be the terminal device with operating system.The operating system can be Android (Android) operating system can be ios operating system, can also be other possible operating systems, and the present invention is implemented Example is not especially limited.
Optionally, the terminal device in the embodiment of the present invention can be the terminal device with an operating system, can also Think the terminal device with multiple operating systems.It can specifically be determined according to actual use demand, the embodiment of the present invention is not made It limits.
Below by taking Android operation system as an example, software applied by control method provided in an embodiment of the present invention is introduced Environment.
As shown in Figure 1, showing for the possible display framework based on Android operation system of one kind provided in an embodiment of the present invention It is intended to.In Fig. 1, the framework of Android operation system includes 4 layers, is respectively as follows: application layer, application framework layer, system Runtime Library layer and inner nuclear layer (being specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation for the frame for abiding by application program In the case where principle, some application programs are developed based on application framework layer.Application framework layer includes window management clothes Be engaged in layer (window manager service), boundary layer (surface), interface session layer (surface session), and Interface object layer (surface composer client).
The operations such as starting, addition and the deletion of interfaces windows of the window management service layer for processing terminal equipment;Boundary Window of the surface layer for the interface in display terminal;Interface session layer plays the role of mark in the session of interface;Interface Object layer is used to indicate the client role in the session of interface.
System Runtime Library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour As system it is provided needed for all kinds of resources.Android operation system running environment is used to provide software loop for Android operation system Border.System Runtime Library layer further includes interface combinations layer (surface flinger) and display layer (display hard ware).
Interface combinations layer forms a complete interface for the content in combined interface layer;Display layer is used to indicate end The display screen of end equipment.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.Inner nuclear layer Including frame buffer layer (frame buffer).
Frame buffer layer is for connecting system software and system hardware.
It should be noted that above-mentioned Fig. 1 is for including an operating system in terminal device based on operating system Display framework schematic diagram.It can also include multiple operating systems in terminal device when specific implementation, i.e., it can be in terminal device Display framework including multiple operating systems, wherein each display framework is similar with display framework described in Fig. 1, to avoid weight Multiple, details are not described herein again.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The system architecture of operating system, the software program of control method provided in an embodiment of the present invention is realized in exploitation, so that the control Method processed can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal device can be by Androids The software program is run in operating system realizes control method provided in an embodiment of the present invention.
Terminal device in the embodiment of the present invention can be mobile terminal, or immobile terminal.Illustratively, it moves Dynamic terminal can be mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, super movement People's computer (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal Digital assistant, PDA) etc., immobile terminal can be personal computer (personal computer, PC), electricity Depending on machine (television, TV), automatic teller machine or self-service machine etc., the embodiment of the present invention is not especially limited.
The executing subject of control method provided in an embodiment of the present invention can be above-mentioned terminal device, or the end It can be realized the functional module and/or functional entity of the control method in end equipment, it specifically can be according to actual use demand It determines, the embodiment of the present invention is not construed as limiting.Below by taking terminal device as an example, control method provided in an embodiment of the present invention is carried out Illustrative explanation.
In the embodiment of the present invention, when terminal device runs a certain application on terminal device foreground (hereinafter referred to as foreground) When (such as second application in the embodiment of the present invention), if terminal device backstage (hereinafter referred to as backstage) operation has other answer With (such as in the embodiment of the present invention first application), then these applications may obtain data of the application of front stage operation, The standby leakage of privacy information so as to will lead to user.In this way, when terminal device detects user's triggering terminal equipment at end The a certain application of end equipment front stage operation or terminal device detect that user's triggering terminal equipment passes through the certain spies of the application execution When fixed operation (such as input password, account information etc.), terminal device can close the application of running background, or backstage is transported The use state of capable application is set as disabled status, so that these applications can not obtain the data of the application of front stage operation, So as to protect the privacy information of user, and then the security performance of terminal device can be improved.
Lower mask body combines each attached drawing illustratively to illustrate control method provided in an embodiment of the present invention.
As shown in Fig. 2, the embodiment of the present invention provides a kind of control method, this method may include following S201 and S202。
The input of S201, terminal device detection user.
S202, detect user input be first input in the case where, terminal device close terminal device backstage transport The use state of the first application is set disabled status by the first capable application.
Wherein, above-mentioned first input can be following any one: user's triggering terminal equipment is transported on terminal device foreground The input of the application of row second, user's triggering terminal equipment pass through the input of the second application execution predetermined registration operation.
In the embodiment of the present invention, terminal device can detecte the input of user, when terminal device detects that above-mentioned first is defeated Fashionable, terminal device can specifically operate above-mentioned first application execution.
Specifically, in the embodiment of the present invention, when terminal device detects that user's triggering terminal equipment is a certain in front stage operation When using (i.e. above-mentioned second application), terminal device can close above-mentioned first application;Alternatively, when terminal device detects user Triggering terminal equipment is in front stage operation second in application, terminal device can set disabling shape for the use state of the first application State.When terminal device detects user's triggering terminal equipment by the above-mentioned predetermined registration operation of the second application execution, terminal device can To close the first application;Alternatively, when terminal device detects that user's triggering terminal equipment is above-mentioned default by the second application execution When operation, terminal device can set disabled status for the use state of the first application.
It is appreciated that above-mentioned terminal device can serve to indicate that in a certain application of front stage operation: terminal device is set in terminal The interface of the application is shown in standby display screen, user can pass through the input in the interface of the application, triggering terminal equipment Pass through application execution operation corresponding with the input of user.Above-mentioned terminal device can be used for referring in a certain application of running background Show: operation has the process of the application in the operating system of terminal device, but does not show the application in the display screen of terminal device Interface.
It should be noted that the use state of the first application is set disabling shape by terminal device in the embodiment of the present invention State is it is to be understood that terminal device closes the application process of first application, and the first application is used shape in terminal device State is set as after disabled status, and terminal device can not be to any operation of the first application execution, and at the interface of terminal device The middle mark (such as icon etc. of the first application) for cancelling display instruction first application, is equivalent in terminal device and does not install this First application.Terminal device closes above-mentioned first application it is to be understood that terminal device closes the application process of first application.
Optionally, in the embodiment of the present invention, terminal device can periodically detect the input of user.
Optionally, in the embodiment of the present invention, the period that terminal device detects the input of user can be pre- in terminal device The numerical value set, the period of the input of terminal device detection user can be the manufacturer of terminal device according to the performance of terminal device It is preset in terminal device.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Illustratively, the period of the input of terminal device detection user arbitrarily can may for 1 second, 2 seconds or 3 seconds etc. Duration.
Optionally, in the embodiment of the present invention, above-mentioned first input may include two kinds of situations, respectively situation one and situation Two.Lower mask body illustratively illustrates the both of these case (i.e. situation one and situation two) of the first input.
The input of situation one: the first is the input that user's triggering terminal equipment is applied in terminal device front stage operation second.
Optionally, above situation one may include at least one of following: user by the input of the icon to the second application, Triggering terminal equipment is in the application of front stage operation second (i.e. input of the user by the icon to the second application, triggering terminal equipment The interface of the second application of display in the display screen of terminal device);Terminal device is applied in running background second, and user triggers eventually End equipment is by the second application from being switched to foreground from the background.
It is appreciated that in actual implementation, above situation one can also include other any possible implementations.Specifically may be used To determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
The input of situation two: the first is the input that user's triggering terminal equipment passes through the second application execution predetermined registration operation.
It should be noted that for situation two, when user's triggering terminal equipment passes through the default behaviour of above-mentioned second application execution When making, terminal device is second application in the application of front stage operation.
Optionally, in the embodiment of the present invention, above-mentioned predetermined registration operation can be operation preset in terminal device.The default behaviour Making can be preset in terminal device according to the use demand of possible user for the manufacturer of terminal device, or terminal The manufacturer of equipment provides setting interface, and user is preset in terminal device according to itself use demand.It specifically can be according to reality Border use demand, the embodiment of the present invention are not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned predetermined registration operation may include: login account, input user name, input it is close Code, transmission message and programme path etc. may relate to the operation of user privacy information.It specifically can be according to actual use demand It determines, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned first application can be any application in terminal device, or Target application etc. in terminal device.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, when above-mentioned first application is the target application in terminal device, which is answered With may include in terminal device except system application in addition to application, such as third-party application etc..
It should be noted that when above-mentioned first application is any in application, if terminal device detects in terminal device Above-mentioned first input, then terminal device can close all applications of running background;Alternatively, by all applications of running background Use state is set as disabled status.When above-mentioned first application is the target application in terminal device, if terminal device detects To above-mentioned first input, then terminal device can close the target application of running background;Alternatively, by the target application of running background Use state be set as disabled status.
It is appreciated that when including non-targeted application (such as system application of terminal device etc.) in the application of running background When, if terminal device detects above-mentioned first input, terminal device can not make the non-targeted application of running background any Processing, i.e., these non-targeted applications are still in running background.
Optionally, in the embodiment of the present invention, above-mentioned second application can be arbitrarily to apply in terminal device, or The application of first object type.It can specifically be determined according to actual use demand, be not construed as limiting in the embodiment of the present invention.
Optionally, in the embodiment of the present invention, above-mentioned first object type may include paying class, financial class, communication class, with And shopping class etc. arbitrarily may relate to the application type of user privacy information.It can specifically be determined according to actual use demand, this It is not construed as limiting in inventive embodiments.
Above-mentioned S201 and S202 is illustratively illustrated in conjunction with example below.
Illustratively, it is assumed that above-mentioned first application is the third-party application in terminal device, and above-mentioned second application is terminal Payment class application in equipment, and above-mentioned first input is the input that user's triggering terminal equipment is applied in front stage operation second, And when terminal device detects the above-mentioned first input, the use state of the first application is set disabling shape by terminal device State.So, when the running background of terminal device there are three in application, these three applications be respectively as follows: " using 1 ", " using 2 " and " applying 3 ", wherein " applying 1 " is the system application in terminal device, and " applying 2 " and " applying 3 " is the third in terminal device Fang Yingyong.If terminal device detects user's triggering terminal equipment, in front stage operation application " payment 1 ", (i.e. above-mentioned second is answered With), then " applying 2 " and " applying 3 " (" apply 2 " and " applying 3 " is the first application) can be used shape by terminal device State is set as disabled status, so that " applying 2 " and " applying 3 " can not obtain the hidden of user from application " payment 1 " Personal letter breath, to protect the privacy information of user.Wherein, " 1 is applied " to continue in running background.
Optionally, in the embodiment of the present invention, the case where input of user is the above-mentioned first input is detected in terminal device Under, terminal device can determine whether backstage has run above-mentioned first application, if running background has above-mentioned first application, Terminal device can close first application or set disabled status for first use state applied, and in front stage operation Above-mentioned second application;If above-mentioned first application of backstage not running, terminal device can operationally state the second application.
Illustratively, in conjunction with Fig. 2, as shown in figure 3, above-mentioned S202 specifically can by following S202a-S202c, or S202a and S202c is realized.
S202a, detect user input be first input in the case where, terminal device determine terminal device backstage be No operation has the first application.
S202b, terminal device close the first application of terminal device running background or set the use state of the first application It is set to disabled status.
S202c, the second application of terminal device operation.
It should be noted that above-mentioned the second application of terminal device operation can serve to indicate that terminal in the embodiment of the present invention Equipment is applied in front stage operation second.
In the embodiment of the present invention, in the case where terminal device detects that the input of user is the above-mentioned first input, terminal Equipment can determine whether backstage has run above-mentioned first application, if running background has above-mentioned first application, terminal is set It is standby to close first application or set disabled status for first use state applied, and in front stage operation above-mentioned the Two applications;If above-mentioned first application of backstage not running, terminal device can be in above-mentioned second application of front stage operation.Such as This, in control method provided in an embodiment of the present invention, when terminal device in running background second in application, backstage not running One application, so that the first application can not obtain the privacy information of user from the second application, so as to protect, user's is hidden Personal letter breath, and then the security performance of terminal device can be improved.
It should be noted that the embodiment of the present invention can not limit in the case where running background has the above-mentioned first application Sequence is executed between S202b and S202c.I.e. the embodiment of the present invention can first carry out S202b, execute S202c afterwards;It can also be first S202c is executed, executes S202b afterwards.Wherein, above-mentioned Fig. 3 is illustratively illustrated for rear execution S202c with first carrying out S202b 's.
The embodiment of the present invention provides a kind of control method, since the application (the i.e. first application) of terminal device running background can The data of the application (the i.e. second application) of terminal device front stage operation can be obtained, such as obtain the user name in the second application Title, user information and password of user's input etc., therefore when terminal device detects that user's triggering terminal equipment is set in terminal The standby application of front stage operation second or terminal device detect that user's triggering terminal equipment is certain specific by the second application execution When operation (such as input password etc.), terminal device can close the first application of terminal device running background, or by terminal The use state of first application of equipment running background is set as disabled status.In this way, can make the first application that can not obtain The data of second application of terminal device front stage operation, i.e., the first application can not obtain the privacy letter of user from the second application Breath, so as to protect the privacy information of user, and then can be improved the security performance of terminal device.
Optionally, in the embodiment of the present invention, after above-mentioned second application of terminal device operation, terminal device can be determined It whether include that (the included input method of the i.e. second application, such as first in the embodiment of the present invention are defeated for input method in second application Enter method).In the case where including input method in above-mentioned second application, then terminal device can be shown in the interface of the second application Show the dummy keyboard of the input method;In the case where not including input method in above-mentioned second application, terminal device can be second The dummy keyboard of the input method of the system of display terminal in the interface of application.So that user passes through the defeated of safety Enter method input information, to guarantee the safety of the information of user's input.
Illustratively, in conjunction with Fig. 3, as shown in figure 4, after above-mentioned S202c, control method provided in an embodiment of the present invention It can also include following S203 and S204 or S203 and S205.
Whether it includes the first input method that S203, terminal device determine in the second application.
S204, terminal device show the first dummy keyboard in the interface of second application.
Wherein, above-mentioned first dummy keyboard can be the dummy keyboard of above-mentioned first input method.
S205, terminal device show the second dummy keyboard in the interface of second application.
Wherein, above-mentioned second dummy keyboard can be the dummy keyboard of the second input method, and above-mentioned second input method can be The system input method of terminal device.
In the embodiment of the present invention, after above-mentioned second application of terminal device operation, terminal device can determine above-mentioned the It whether include input method (i.e. above-mentioned first input method) in two applications.And determine this second application in whether include input method it Afterwards, if include first input method in second application, terminal device can be shown in the interface of second application The dummy keyboard (i.e. above-mentioned first dummy keyboard) for showing first input method, so that user can be existed by first dummy keyboard Information is inputted in second application.If do not include first input method in second application, terminal device can be at this The dummy keyboard (i.e. above-mentioned second dummy keyboard) of the system input method of display terminal in the interface of second application, thus with Family can input information in the second application by second dummy keyboard.In this way, user can be made to pass through the input of safety Method inputs information in the second application, to guarantee the safety of the information of user's input.
It is appreciated that above-mentioned first input method can be input method included in above-mentioned second application, such as the second application Safe input method.
Optionally, in the embodiment of the present invention, determine whether above-mentioned second application includes above-mentioned first input in terminal device After method, user can by an input (such as third input) in the embodiment of the present invention, triggering terminal equipment this Above-mentioned first dummy keyboard or above-mentioned second dummy keyboard are shown in the interface of two applications.
Specifically, determining whether above-mentioned second application includes above-mentioned first input in terminal device in the embodiment of the present invention After method, in the case where second application includes first input method, user can be inputted by third, triggering terminal equipment Above-mentioned first dummy keyboard is shown in the interface of second application;First input method is not included the case where in second application Under, user can be inputted by third, and triggering terminal equipment shows above-mentioned second dummy keyboard in the interface of second application.
In the embodiment of the present invention, above-mentioned third input can be user's triggering terminal equipment at the interface of above-mentioned second application The input of middle display dummy keyboard.
Optionally, in the embodiment of the present invention, above-mentioned third input can be information of the user in the interface of the second application The input of input area.Specifically, the third input can for user the information input area click input, double-click it is defeated Enter or any possible inputs such as long-pressing input.It can specifically be determined according to actual use demand, the embodiment of the present invention is not made It limits.
In the embodiment of the present invention, long-pressing input can be greater than or equal in above- mentioned information input area default for user The input that duration is pressed.
Optionally, in the embodiment of the present invention, above-mentioned preset duration can be numerical value preset in terminal device.When this is default Length can be preset in terminal device for the manufacturer of terminal device.It can specifically be determined according to actual use demand, the present invention Embodiment is not construed as limiting.
In the embodiment of the present invention, since above-mentioned first input method is the input method in the second application, terminal device can To determine that first input method is the input method of safety, if terminal device shows that above-mentioned first is empty in the interface of the second application Quasi- keyboard, then user can be made to input information by the input method of safety.Correspondingly, since above-mentioned second input method is to be System input method, therefore terminal device can also determine that the second input method is the input method of safety, if terminal device is answered second Above-mentioned second dummy keyboard is shown in interface, then user can be made to input information by the input method of safety.In this way, No matter user uses the dummy keyboard of the first input method to input information, or inputs letter using the dummy keyboard of the second input method Breath can guarantee user using safe input method input information, so as to avoid user from using nonsystematic input method (example Such as third party's input method) input information, and then can guarantee the safety of the information of user's input.
Optionally, in the embodiment of the present invention, terminal device can also detect the application of terminal device front stage operation, work as terminal When equipment detects the front stage operation of terminal device a certain specific application (such as third application in the embodiment of the present invention), eventually End equipment can forbid the application in terminal device in addition to the application of front stage operation, and (such as the 4th in the embodiment of the present invention answers With) some functions (such as objective function in the embodiment of the present invention) of using terminal equipment, to prevent these applications from passing through this A little functions obtain the information of the application of front stage operation, thereby may be ensured that the privacy information of user is not leaked.
Illustratively, in conjunction with Fig. 2, as shown in figure 5, after above-mentioned S202, control method provided in an embodiment of the present invention It can also include following S206 and S207.
The application of S206, terminal device detection terminal device front stage operation.
S207, detect terminal device front stage operation application be third application in the case where, forbid the 4th application make With the objective function of terminal device.
Wherein, above-mentioned 4th application can be the application in the application of terminal device in addition to the application of above-mentioned third, above-mentioned Objective function may include at least one of following: sound-recording function, screenshotss function, read/write function.
In the embodiment of the present invention, terminal device can detecte the application of terminal device front stage operation, when terminal device detects In the case that application to terminal device front stage operation is the application of above-mentioned third, terminal device can forbid above-mentioned 4th application to make With the objective function of terminal device, it can so prevent the 4th application from obtaining the number in third application by the target application According to thereby may be ensured that the privacy information of user is not leaked to obtain the privacy information of user.
It should be noted that above-mentioned read/write function may include reading function and writing function in the embodiment of the present invention.Wherein, Reading function includes short message reading and access picture library etc. can be with the function of the data in reading terminal equipment;Writing function may include writing The function of the content of edit in application in terminal device such as mail and editor's information.
Optionally, in the embodiment of the present invention, above-mentioned third application can be arbitrarily to apply in terminal device, or The application of second target type.It can specifically be determined according to actual use demand, be not construed as limiting in the embodiment of the present invention.
Optionally, in the embodiment of the present invention, above-mentioned second target type may include paying class, financial class, communication class, with And shopping class etc. arbitrarily may relate to the application type of user privacy information.It can specifically be determined according to actual use demand, this It is not construed as limiting in inventive embodiments.
Optionally, in the embodiment of the present invention, above-mentioned 4th application can in terminal device in addition to the application of above-mentioned third Whole applications, or may have the application of security risk in terminal device, such as the third party in terminal device answers With.It can specifically be determined according to actual use demand, be not construed as limiting in the embodiment of the present invention.
It should be noted that the execution that can not be limited between S201-S202 and S206-S207 in the embodiment of the present invention is suitable Sequence.I.e. the embodiment of the present invention can first carry out S201-S202, execute S206-S207 afterwards;S206-S207 can also be first carried out, after Execute S201-S202.Wherein, above-mentioned Fig. 5 is illustratively illustrated for rear execution S206-S207 with first carrying out S201-S202 's.
In the embodiment of the present invention, due to functions such as sound-recording function, screenshotss function and read/write functions in terminal device (i.e. above-mentioned objective function) has the ability for obtaining the data in terminal device, therefore above-mentioned 4th application can be by using this A little functions obtain the data that terminal device is applied using above-mentioned third, i.e., the privacy of the above-mentioned 4th available user of application is believed Breath.In this way, terminal device forbid the 4th using objective function in the case where, can make the 4th application can not obtain end The data that end equipment is applied using above-mentioned third, thereby may be ensured that the safety of the privacy information of user, and then end can be improved The security performance of end equipment.
Optionally, in the embodiment of the present invention, disabled status is set by the use state that above-mentioned first answers in terminal device Later, if terminal device determines terminal device and exits above-mentioned second application, terminal device first can be applied this State is set as initiate mode, so that first application can be used normally in user.
Illustratively, in conjunction with Fig. 2, as shown in fig. 6, after above-mentioned S202, control method provided in an embodiment of the present invention It can also include following S208.
S208, after terminal device exits the second application, terminal device by first application use state be set as opening Use state.
In the embodiment of the present invention, after the use state that above-mentioned first applies is set disabled status by terminal device, If terminal device exits above-mentioned second application, the use state that above-mentioned first applies can be set as opening by terminal device With state, so that first application can be used normally in user.
It should be noted that above-mentioned terminal device exits second and is used to indicate terminal device in the embodiment of the present invention Terminate the second application of operation (i.e. terminal device backstage and the equal not running in terminal device foreground second application).
In the embodiment of the present invention, due to terminal device exit it is above-mentioned second application after, even if terminal device backstage Above-mentioned first application is run, first applies the information that can not also obtain user in second application, therefore terminal device can incite somebody to action The use state of first application is set as initiate mode, so that first application can be used normally in user.
Optionally, in the embodiment of the present invention, disabled status is set by the use state that above-mentioned first answers in terminal device Later, if terminal device determines that terminal device exits above-mentioned second application, above-mentioned second application is exited in terminal device Later, terminal device can delete the user data of the second application saved in terminal device (such as in the embodiment of the present invention Target data), to prevent the user data from leaking;Alternatively, terminal device can be to the second application saved in terminal device Ciphering user data, so that other application can not access the user data of second application, so as to prevent the number of users According to being compromised.In this way, the security performance of terminal device can be improved.
Illustratively, in conjunction with Fig. 2, as shown in fig. 7, after above-mentioned S202, control method provided in an embodiment of the present invention It can also include following S209.
S209, after terminal device exits the second application, terminal device delete target data or the target data is added It is close.
Wherein, above-mentioned target data can be the user data of above-mentioned second application saved in terminal device.
In the embodiment of the present invention, after terminal device exits above-mentioned second application, terminal device can delete above-mentioned mesh Mark data;Alternatively, being encrypted to the target data, to guarantee that the target data is not leaked.
Optionally, in the embodiment of the present invention, before terminal device is to the encryption of above-mentioned target data, terminal device can be shown Show prompt information, to prompt user that Crypted password is arranged to the target data, then terminal device can be according to the Crypted password Target data is encrypted, so that other application can not access the target data.
In the embodiment of the present invention, above-mentioned terminal device is encrypted to target data it is to be understood that the target data is for it It is using invisible, so that these applications can not obtain/access the target data.
In the embodiment of the present invention, deleting above-mentioned target data due to terminal device can prevent other application from obtaining the target Data or terminal device are also possible to prevent other application to the encryption of above-mentioned target data and obtain the target data, therefore at end End equipment exits after above-mentioned second application, and terminal device passes through above two mode (delete target data and to target data Encryption) in any one mode so that user is not leaked using second user data applied, so as to protect The privacy information of user, and then the security performance of terminal device can be improved.
In the embodiment of the present invention, below again by taking two operating system as an example, to the terminal device packet in the embodiment of the present invention The case where including multiple operating systems is illustratively illustrated.
Optionally, in the embodiment of the present invention, when including two operating systems in terminal device (such as in the embodiment of the present invention The first operating system and the second operating system) when, control method provided in an embodiment of the present invention can be applied to the two behaviour Make each operating system in system, also can be applied to an operating system of the two operating systems, (such as the present invention is real Apply the second operating system in example).
In the embodiment of the present invention, it is applied in above-mentioned two operating system in control method provided in an embodiment of the present invention In the case where each operating system, the control method of terminal device is similar with the control method of the description in above-described embodiment, is It avoids repeating, details are not described herein again.
Optionally, in the embodiment of the present invention, it is applied to above-mentioned two operation in control method provided in an embodiment of the present invention In the case where an operating system (hereinafter referred to as the second operating system) in system, if the operating system of terminal device operation For another operating system (hereinafter referred to as the first operating system), then user can pass through the use to first operating system The input (the hereinafter referred to as second input) of certain an object (such as target object in the embodiment of the present invention) in the interface of family, triggering is eventually End equipment runs second operating system, so that terminal device can execute in above-described embodiment in second operating system Control method the step of.
Optionally, the terminal device in the embodiment of the present invention can be single screen terminal device, or multi-screen terminal is set It is standby.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, when the quantity difference of the screen of terminal device, terminal device can be rung in different forms Answer above-mentioned second input.Specifically, when the quantity of the screen of terminal device is one (i.e. terminal device is single screen terminal device), eventually The form that end equipment responds second input can be form one;When the quantity of the screen of terminal device is greater than (i.e. a terminal device For multi-screen terminal device) when, the form that terminal device responds second input can be form two.Lower mask body terminal device is rung Should second input both forms (i.e. form one and form two) illustratively illustrated.
Form one: in the case where the operating system of terminal device operation is the first operating system, user can be by right Second input of certain an object (such as target object in the embodiment of the present invention), touching in the user interface of first operating system It sends out terminal device and the operating system that terminal device is run is switched to the second operating system from the first operating system, so that terminal Equipment can execute the step of control method in above-described embodiment in second operating system.
Illustratively, in conjunction with Fig. 2, as shown in figure 8, before above-mentioned S201, control method provided in an embodiment of the present invention It can also include following S210 and S211.Wherein, S201 can specifically be realized by following S201a.
S210, terminal device receive second input of the user to target object.
S211, terminal device switch the operating system of terminal device from the first operating system in response to second input For the second operating system.
S201a, terminal device detect the input of user in second operating system.
Wherein, above-mentioned target object can be target identification or target key, and above-mentioned second input can be terminal device The received input in the first operating system.
In the embodiment of the present invention, in the case where the operating system of terminal device operation is above-mentioned first operating system, use Family can be by the input to above-mentioned target object, and triggering terminal equipment is by the operating system of terminal device from the first operating system It is switched to the second operating system, so that terminal device detects the input of user in second operating system, then terminal The input for the user that equipment can detect in the second operating system according to terminal device, executes sheet in the second operating system The control method that inventive embodiments provide.
Optionally, in the embodiment of the present invention, if above-mentioned target object is above-mentioned target identification, which can Think the mark that the second operating system is used to indicate in above-mentioned first operating system.
Optionally, in the embodiment of the present invention, above-mentioned target identification arbitrarily can may be used for an icon or an interface etc. To be used to indicate the mark of the second operating system.It can specifically be determined according to actual use demand, the embodiment of the present invention does not limit It is fixed.
Optionally, in the embodiment of the present invention, when above-mentioned target object is above-mentioned target identification, above-mentioned second input can be with Input, double-click input are clicked to the target identification for user, or again by any possible input such as input.It specifically can root Factually border use demand determines, the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, above-mentioned heavy press inputs and can be preset for user on above-mentioned target identification with being greater than or equal to The input that the pressure of pressure value is pressed.
Optionally, in the embodiment of the present invention, above-mentioned preset pressure value can be numerical value preset in terminal device.This is default Pressure value can be preset in terminal device for the manufacturer of terminal device.It can specifically be determined according to actual use demand, this Inventive embodiments are not construed as limiting.
Optionally, in the embodiment of the present invention, if above-mentioned target object is above-mentioned target key, which can Think a key, or the combination button of multiple key combinations.It can specifically be determined according to actual use demand, this hair Bright embodiment is not construed as limiting.
Illustratively, when above-mentioned target key is a key, which can be power button, artificial intelligence Any possible key of (artificial intelligence, AI) key or volume button etc..When above-mentioned target key For multiple key combinations combination button when, the target key can be power button and volume button combination or power supply The combination of any possible key such as combination of key and AI key.
Optionally, in the embodiment of the present invention, when above-mentioned target object is above-mentioned target key, above-mentioned second input can be with It is user to any possible input such as the long-pressing input of target key or short-press input.It specifically can be according to actual use need Ask determining, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned first operating system and above-mentioned second operating system can set for terminal Two different operating systems in standby.
In the embodiment of the present invention, above-mentioned first operating system and above-mentioned second operating system can exist for terminal device manufacturer It is developed on the basis of the source code of operating system.
Optionally, in the embodiment of the present invention, above-mentioned first operating system can compare for terminal device manufacturer Exploitation degree High operating system, the operating system that above-mentioned second operating system can be relatively low for terminal device manufacturer Exploitation degree.
It should be noted that in the embodiment of the present invention, the relatively low operating system of terminal device manufacturer Exploitation degree and behaviour The source code similarity-rough set for making system is high, the source of terminal device manufacturer Exploitation degree relatively high operating system and operating system Code similarity-rough set is low.
It will be appreciated, of course, that above-mentioned second operating system can also be the corresponding behaviour of platform that operating system manufacturer provides Make system.
Optionally, in the embodiment of the present invention, after the operating system modification that operating system manufacturer provides it, operation system Uniting manufacturer can be to the system mend of terminal device manufacturer release modification, so that the operating system that terminal device manufacturer uses is more It is perfect, safe etc..After the system mend that operating system manufacturer modifies to the release of terminal device manufacturer, terminal device manufacturer can Using operating system (such as above-mentioned first operating system and the second operation system on the system mend real-time update terminal device System).In this way, terminal device can be made to exist after the second operating system of the terminal device on real-time update terminal device Control method provided in an embodiment of the present invention is executed in the second more perfect, safe operating system, it can so that terminal is set The standby software environment for executing the control method is more perfect, safe.
It should be noted that for above-mentioned " form one ", when terminal device grasps the operating system of terminal device from first After the second operating system is switched to as system, terminal device can execute in above-described embodiment in second operating system The step of control method, to avoid repeating, details are not described herein again.
Form two: in the case where terminal device runs the first operating system and the second operating system of not running, Yong Huke To pass through of certain an object (such as target object in the embodiment of the present invention) in the user interface to first operating system Two inputs, the second operating system of triggering terminal equipment operation (such as terminal device shows the second behaviour in the second screen of terminal device Make the user interface of system), then terminal device can execute the controlling party in above-described embodiment in second operating system The step of method.
It should be noted that it is that two (i.e. terminal device is double screen that above-mentioned " form two ", which is using the quantity of the screen of terminal device, Terminal device) for illustratively illustrated, the realization for other situations of the quantity greater than one of the screen of terminal device Mode is similar with the implementation that the quantity of the screen of terminal device is two, and details are not described herein again.
Illustratively, in conjunction with Fig. 2, as shown in figure 9, before above-mentioned S201, control method provided in an embodiment of the present invention It can also include following S212 and S213.Wherein, S201 can specifically be realized by following S201b.
S212, terminal device receive second input of the user to target object.
S213, terminal device run the second operating system in response to second input.
S201b, terminal device detect the input of user in second operating system.
Wherein, above-mentioned target object can be target identification or target key, and above-mentioned second input can be terminal device The received input in the first operating system, first operating system is corresponding with the first screen of terminal device, above-mentioned second operation System is corresponding with the second screen of terminal device.
In the embodiment of the present invention, the first operating system is run in terminal device, and the case where the second operating system of not running Under, user can be by the input to above-mentioned target object, and triggering terminal equipment runs the second operating system, so that terminal Equipment detects the input of user in second operating system, and then terminal device can be in the second operation according to terminal device The input of the user detected in system executes control method provided in an embodiment of the present invention in the second operating system.
In the embodiment of the present invention, above-mentioned first operating system is corresponding with the first screen of terminal device can be with are as follows: terminal device The user interface of first operating system is shown in the first screen of terminal device;Above-mentioned second operating system and terminal device Second screen correspondence can be with are as follows: terminal device shows the user interface of second operating system in the second screen of terminal device.
In other words, the application in the first screen of terminal device (shown in the first screen application icon instruction answer With) can be run in the first operating system, and the user data that the application in first screen generates can be stored in the first behaviour Make in system.Correspondingly, in the second screen of terminal device application (shown in the second screen application icon instruction answer With) can be run in the second operating system, and the user data that the application in second screen generates can be stored in the second behaviour Make in system.
In the embodiment of the present invention, after terminal device runs above-mentioned second operating system, terminal device can be after reforwarding Above-mentioned first operating system of row.That is, terminal device can run the first operating system and the second operating system simultaneously.
Optionally, for above-mentioned " form two ", the terminal device in the embodiment of the present invention may include multiple processors, or The processor of person's terminal device is multi-core processor.It can specifically be determined according to actual use demand, the embodiment of the present invention is not made It limits.
Specifically, a processor in terminal device can correspond to one when terminal device includes multiple processors Operating system.By taking terminal device includes two processors as an example, the two processors are respectively processor 1 and processor 2.Its In, processor 1 can be corresponding with above-mentioned first operating system, and processor 2 can be corresponding with above-mentioned second operating system.
Certainly, after terminal device runs above-mentioned second operating system, terminal device can also be with out of service above-mentioned the One operating system.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, for the associated description that above-mentioned target object and second input, specifically it may refer to above-mentioned The detailed description inputted in " form one " to target object and second, details are not described herein again.
It should be noted that for above-mentioned " form two ", after terminal device runs the second operating system, terminal device It is the step of control method in above-described embodiment can be executed in second operating system, no longer superfluous herein to avoid repeating It states.
In the embodiment of the present invention, when in terminal device including two operating system, terminal device can be in the two behaviour Make to execute control method provided in an embodiment of the present invention in the operating system (i.e. above-mentioned second operating system) in system, one Aspect can not influence the performance of the operating system (i.e. above-mentioned first operating system) of manufacturer's offer of terminal device, another party Face can improve the safety of terminal device by executing control method provided in an embodiment of the present invention in the second operating system Performance.
It should be noted that above-mentioned each control method shown in the drawings is to combine this hair in the embodiment of the present invention Illustratively illustrate for an attached drawing in bright embodiment.When specific implementation, above-mentioned each control method shown in the drawings The other combinable any attached drawings that can be combined with illustrating in above-described embodiment realize that details are not described herein again.
As shown in Figure 10, the embodiment of the present invention provides a kind of terminal device 300, which includes detection module 301 and processing module 302.Detection module 301, for detecting the input of user;Processing module 302, in detection module 301 In the case where detecting that the input of user is the first input, close 300 running background of terminal device the first application or by this The use state of one application is set as disabled status.Wherein, which is following any one: triggering terminal equipment is at end The input of the application of end equipment front stage operation second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.
In conjunction with Figure 10, as shown in figure 11, terminal device 300 further includes receiving module 303.Receiving module 303, for examining It surveys before the input that module 301 detects user, receives second input of the user to target object;Processing module 302 is also used to ring It should be inputted in receiving module 303 received second, the operating system of terminal device is switched to the second behaviour from the first operating system Make system;Detection module 301, specifically for detecting the input of user in second operating system.Wherein, which is Target identification or target key, which is terminal device received input in the first operating system.
In conjunction with Figure 10, as shown in figure 12, terminal device 300 further includes display module 304.Processing module 302 is also used to transport After row second is applied, determine in the second application whether include the first input method;Display module 304, in processing module 302 It determines in the case where including first input method in second application, shows the first virtual key in the interface of second application Disk, alternatively, in the case where it does not include first input method that processing module 302, which determines in second application, in second application Interface in show the second dummy keyboard.Wherein, which is the dummy keyboard of the first input method, this is second virtual Keyboard is the dummy keyboard of the second input method, which is the system input method of terminal device.
Wherein, above-mentioned second application can be run by above-mentioned processing module 302.
Optionally, detection module 301 are also used to detect the application of terminal device front stage operation;Processing module 302, is also used In the case that the application for detecting terminal device front stage operation in detection module 301 is third application, the 4th application is forbidden to make With the objective function of terminal device.Wherein, the 4th application is the application in the application of terminal device in addition to third application, The objective function includes at least one of the following: sound-recording function, screenshotss function, read/write function.
Optionally, processing module 302 are also used to after setting disabled status for the use state of the first application, It exits after the second application, sets initiate mode for first use state applied.
Optionally, it is being moved back after being also used to set disabled status for the use state of the first application processing module 302 Out second application after, delete target data or to the target data encrypt.Wherein, which is to save in terminal device This second application user data.
Terminal device provided in an embodiment of the present invention can be realized what terminal device in above-mentioned control method embodiment executed Each process, and identical technical effect can be reached, to avoid repeating, details are not described herein again.
Present invention implementation provides a kind of terminal device, since the application (the i.e. first application) of terminal device running background may The data of the application (the i.e. second application) of terminal device front stage operation can be obtained, such as obtain the user's name in the second application, User information and the password etc. of user's input, therefore when terminal device detects user's triggering terminal equipment in terminal device The application of front stage operation second or terminal device detect that user's triggering terminal equipment passes through a certain specific behaviour of the second application execution When making (such as preset operation in terminal device), terminal device can close the first application of terminal device running background, or The use state of the first application of terminal device running background is set disabled status by person.In this way, the first application can be made The data of the second application of terminal device front stage operation can not be obtained, i.e., the first application can not obtain user's from the second application So as to protect the privacy information of user, and then the security performance of terminal device can be improved in privacy information.
A kind of hardware schematic of Figure 13 terminal device of each embodiment to realize the present invention.As shown in figure 13, terminal Equipment 100 includes but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensing Device 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110 (can be multiple Processor a, or processor) and the components such as power supply 111.It will be understood by those skilled in the art that showing in Figure 13 Terminal device structure out does not constitute the restriction to terminal device, and terminal device may include than illustrating more or fewer portions Part perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal device includes but is not limited to Mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 110, for detecting the input of user;And in the feelings that the input for detecting user is the first input Under condition, closes the first application of terminal device running background or set disabled status for first use state applied.Its In, which is following any one: input that triggering terminal equipment apply in terminal device front stage operation second triggers Terminal device passes through the input of the second application execution predetermined registration operation.
Present invention implementation provides a kind of terminal device, since the application (the i.e. first application) of terminal device running background may The data of the application (the i.e. second application) of terminal device front stage operation can be obtained, such as obtain the user's name in the second application, User information and the password etc. of user's input, therefore when terminal device detects user's triggering terminal equipment in terminal device The application of front stage operation second or terminal device detect that user's triggering terminal equipment passes through a certain specific behaviour of the second application execution When making (such as preset operation in terminal device), terminal device can close the first application of terminal device running background, or The use state of the first application of terminal device running background is set disabled status by person.In this way, the first application can be made The data of the second application of terminal device front stage operation can not be obtained, i.e., the first application can not obtain user's from the second application So as to protect the privacy information of user, and then the security performance of terminal device can be improved in privacy information.
It is appreciated that above-mentioned processor 110 may include the terminal device in above-described embodiment in the embodiment of the present invention Detection module 301 and processing module 302 in structural schematic diagram (such as Figure 10 etc.).
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by wireless communication system and network and other set Standby communication.
Terminal device provides wireless broadband internet by network module 102 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 103 can be received by radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function that end equipment 100 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 103 includes loudspeaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor (graphics processing unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 101 is converted in the case where telephone calling model.
Terminal device 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when terminal device 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 105 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode can be used Forms such as (organic light-emitting diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with terminal device Family setting and the related key signals input of function control.Specifically, user input unit 107 include touch panel 1071 and Other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receiving area It manages the order that device 110 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touching The type for touching event provides corresponding visual output on display panel 1061.Although in Figure 13, touch panel 1071 and aobvious Show that panel 1061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments In, can be integrated by touch panel 1071 and display panel 1061 and realize the function that outputs and inputs of terminal device, it is specific this Place is without limitation.
Interface unit 108 is the interface that external device (ED) is connect with terminal device 100.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 100 or can be used in 100 He of terminal device Data are transmitted between external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place Managing device 110 may include one or more processing units;Optionally, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Terminal device 100 can also include the power supply 111 (such as battery) powered to all parts, optionally, power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 100 includes some unshowned functional modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of terminal device, including processor 110 as shown in fig. 13 that, storage Device 109 is stored in the computer program that can be run on memory 109 and on processor 110, and the computer program is by processor 110 realize each process of above-mentioned control method embodiment when executing, and can reach identical technical effect, to avoid repeating, Which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned control method embodiment when being executed by processor, and can reach Identical technical effect, to avoid repeating, which is not described herein again.Wherein, which may include read-only Memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or Person's CD etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (14)

1. a kind of control method is applied to terminal device, which is characterized in that the described method includes:
Detect the input of user;
Detect user input be first input in the case where, close the terminal device running background first application or Disabled status is set by the use state that described first applies;
Wherein, first input is following any one: triggering the terminal device in the terminal device front stage operation the The input that the input of two applications, the triggering terminal device pass through the second application execution predetermined registration operation.
2. the method according to claim 1, wherein the method is also wrapped before the input of the detection user It includes:
Second input of the user to target object is received, the target object is target identification or target key, and described second is defeated Enter the received input in the first operating system for the terminal device, the of first operating system and the terminal device One screen is corresponding;
In response to second input, the second operating system, second operating system and the second of the terminal device are run Screen corresponds to;
The input of the detection user, comprising:
The input of user is detected in second operating system.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
After running second application, determine in second application whether include the first input method;
In the case where including first input method in second application, first is shown in the interface of second application Dummy keyboard, first dummy keyboard are the dummy keyboard of first input method;
In the case where not including first input method in second application, the is shown in the interface of second application Two dummy keyboards, second dummy keyboard are the dummy keyboard of the second input method, and second input method is that the terminal is set Standby system input method.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
Detect the application of the terminal device front stage operation;
In the case where detecting the application of the terminal device front stage operation is third application, forbid the 4th using described The objective function of terminal device, the 4th application are answering in addition to third application in the application of the terminal device With;
Wherein, the objective function includes at least one of the following: sound-recording function, screenshotss function, read/write function.
5. method according to claim 1 or 2, which is characterized in that the use state applied described first is arranged After disabled status, the method also includes:
After exiting second application, initiate mode is set by the use state that described first applies.
6. method according to claim 1 or 2, which is characterized in that the use state applied described first is arranged After disabled status, the method also includes:
Exit it is described second application after, delete target data or to the target data encrypt, the target data is institute State the user data of second application saved in terminal device.
7. a kind of terminal device, which is characterized in that the terminal device includes detection module and processing module;
The detection module, for detecting the input of user;
The processing module closes institute in the case where for detecting that the input of user is the first input in the detection module It states the first application of terminal device running background or sets disabled status for the use state that described first applies;
Wherein, first input is following any one: triggering the terminal device in the terminal device front stage operation the The input that the input of two applications, the triggering terminal device pass through the second application execution predetermined registration operation.
8. terminal device according to claim 7, which is characterized in that the terminal device further includes receiving module;
The receiving module, for receiving user to the of target object before the input of detection module detection user Two inputs, the target object are target identification or target key, and second input is the terminal device in the first operation Received input in system, first operating system are corresponding with the first screen of the terminal device;
The processing module is also used to run the second operating system in response to received second input of the receiving module, Second operating system is corresponding with the second screen of the terminal device;
The detection module, specifically for detecting the input of user in second operating system.
9. terminal device according to claim 7 or 8, which is characterized in that the terminal device further includes display module;
The processing module is also used to after running second application, determines in second application whether include first Input method;
The display module includes the case where first input method for determining in second application in the processing module Under, the first dummy keyboard is shown in the interface of second application, alternatively, determining second application in the processing module In do not include first input method in the case where, show the second dummy keyboard in the interface of second application, described the One dummy keyboard is the dummy keyboard of first input method, and second dummy keyboard is the dummy keyboard of the second input method, Second input method is the system input method of the terminal device.
10. terminal device according to claim 7 or 8, which is characterized in that the detection module is also used to detect described The application of terminal device front stage operation;
The processing module is also used to detect that the application of the terminal device front stage operation is answered for third in the detection module In the case where, forbid the 4th using the terminal device objective function, it is described 4th application be the terminal device Application in except the third application in addition to application;
Wherein, the objective function includes at least one of the following: sound-recording function, screenshotss function, read/write function.
11. terminal device according to claim 7 or 8, which is characterized in that the processing module is also used to will be described The use state of first application is set as after disabled status, and after exiting second application, described first is applied Use state is set as initiate mode.
12. terminal device according to claim 7 or 8, which is characterized in that the processing module is also used to described The use state of one application is set as after disabled status, after exiting second application, delete target data or to institute Target data encryption is stated, the target data is the user data of second application saved in the terminal device.
13. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor Any one of described in control method the step of.
14. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence realizes the step such as control method described in any one of claims 1 to 6 when the computer program is executed by processor Suddenly.
CN201910336144.7A 2019-04-24 2019-04-24 Control method and terminal equipment Active CN110232275B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910336144.7A CN110232275B (en) 2019-04-24 2019-04-24 Control method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910336144.7A CN110232275B (en) 2019-04-24 2019-04-24 Control method and terminal equipment

Publications (2)

Publication Number Publication Date
CN110232275A true CN110232275A (en) 2019-09-13
CN110232275B CN110232275B (en) 2021-04-27

Family

ID=67860262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910336144.7A Active CN110232275B (en) 2019-04-24 2019-04-24 Control method and terminal equipment

Country Status (1)

Country Link
CN (1) CN110232275B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114647450A (en) * 2020-12-18 2022-06-21 Oppo广东移动通信有限公司 Information input method, information input device, electronic equipment and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100174631A1 (en) * 2009-01-07 2010-07-08 Onbest Technology Holdings Limited Secure device firmware
CN103714459A (en) * 2013-12-26 2014-04-09 电子科技大学 Secure payment system and method of intelligent terminal
US20150373023A1 (en) * 2014-06-22 2015-12-24 Citrix Systems, Inc. Enabling User Entropy Encryption in Non-Compliant Mobile Applications
CN105912272A (en) * 2016-04-14 2016-08-31 华为技术有限公司 Device and method controlling operation of multiple safety applications
CN107102891A (en) * 2017-03-01 2017-08-29 北京珠穆朗玛移动通信有限公司 The management method and mobile terminal of a kind of application based on dual system
CN108229151A (en) * 2016-12-09 2018-06-29 武汉安天信息技术有限责任公司 A kind of anti-short message applied to mobile terminal kidnaps method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100174631A1 (en) * 2009-01-07 2010-07-08 Onbest Technology Holdings Limited Secure device firmware
CN103714459A (en) * 2013-12-26 2014-04-09 电子科技大学 Secure payment system and method of intelligent terminal
US20150373023A1 (en) * 2014-06-22 2015-12-24 Citrix Systems, Inc. Enabling User Entropy Encryption in Non-Compliant Mobile Applications
CN105912272A (en) * 2016-04-14 2016-08-31 华为技术有限公司 Device and method controlling operation of multiple safety applications
CN108229151A (en) * 2016-12-09 2018-06-29 武汉安天信息技术有限责任公司 A kind of anti-short message applied to mobile terminal kidnaps method and device
CN107102891A (en) * 2017-03-01 2017-08-29 北京珠穆朗玛移动通信有限公司 The management method and mobile terminal of a kind of application based on dual system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
易昀: "数字视音频嵌入式应用软件开发平台的研制", 《万方数据库》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114647450A (en) * 2020-12-18 2022-06-21 Oppo广东移动通信有限公司 Information input method, information input device, electronic equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN110232275B (en) 2021-04-27

Similar Documents

Publication Publication Date Title
CN109542282A (en) A kind of interface display method and terminal device
CN110062105A (en) A kind of interface display method and terminal device
CN108595946A (en) A kind of method and terminal of protection privacy
CN109857495A (en) A kind of display control method and terminal device
CN110058836A (en) A kind of output method and terminal device of audio signal
CN110007822A (en) A kind of interface display method and terminal device
CN110489385A (en) A kind of information processing method and terminal device
CN110049187A (en) A kind of display methods and terminal device
CN108171034A (en) A kind of method and terminal for protecting privacy
CN110233933A (en) A kind of call method and terminal device
CN109753350A (en) A kind of method for managing resource and terminal device
CN110058911A (en) A kind of application control method and terminal device
CN110069305A (en) A kind of screen interface switching method and terminal device
CN110147174A (en) A kind of control method and terminal device
CN110046013A (en) A kind of interface display method and terminal device
CN109521920A (en) A kind of application icon control method and terminal device
CN109284064A (en) A kind of interface display method and terminal device
CN108804151A (en) A kind of method and terminal of re-launching applications
CN108153460A (en) A kind of icon hiding method and terminal
CN110012151A (en) A kind of information display method and terminal device
CN110457935A (en) A kind of authority configuring method and terminal device
CN109992192A (en) A kind of interface display method and terminal device
CN109933266A (en) A kind of display methods and terminal device
CN109766156A (en) A kind of conversation establishing method and terminal device
CN110232275A (en) A kind of control method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant