CN110232275A - A kind of control method and terminal device - Google Patents
A kind of control method and terminal device Download PDFInfo
- Publication number
- CN110232275A CN110232275A CN201910336144.7A CN201910336144A CN110232275A CN 110232275 A CN110232275 A CN 110232275A CN 201910336144 A CN201910336144 A CN 201910336144A CN 110232275 A CN110232275 A CN 110232275A
- Authority
- CN
- China
- Prior art keywords
- terminal device
- application
- input
- user
- operating system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44594—Unloading
Abstract
The embodiment of the present invention provides a kind of control method and terminal device, is related to field of communication technology, the security performance to solve the problems, such as existing terminal device is poor.This method comprises: the input of detection user;In the case where detecting the input of user is the first input, closes the first application of terminal device running background or set disabled status for the use state of the first application;Wherein, which is following any one: input that triggering terminal equipment apply in terminal device front stage operation second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.This method is applied in the scene of terminal device operation application.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of control method and terminal devices.
Background technique
With the rapid development of communication technology, terminal device using more and more extensive, safety of the user to terminal device
Performance requirement is also higher and higher.
Currently, including that many is related to the application of user privacy information, such as the third with payment function in terminal device
Fang Yingyong, the application such as Mobile banking's application.In order to avoid the privacy information of user is compromised, these applications would generally provide safety
Input method.In this way, when paying or logging on terminal device line in application, the safe input method that user can be provided by the application
The privacy informations such as password or user name are inputted, to prevent the private information disclosure of user.
However, the application due to terminal device running background has the ability for obtaining the data in terminal device,
During being paid on terminal device line or logging in application, even if user is (such as close by safe input method input privacy information
Code etc.), the application privacy information that also available user inputs of terminal device running background.In this way, may be such that user
Privacy information be compromised, it is poor so as to cause the security performance of terminal device.
Summary of the invention
The embodiment of the present invention provides a kind of control method and terminal device, to solve the security performance of existing terminal device
Poor problem.
In order to solve the above-mentioned technical problem, the embodiments of the present invention are implemented as follows:
In a first aspect, the embodiment of the invention provides a kind of control method, this method comprises: the input of detection user;And
In the case where detecting the input of user is the first input, closes the first application of terminal device running background or answered first
Use state is set as disabled status.Wherein, which is following any one: triggering terminal equipment is set in terminal
The input of the standby application of front stage operation second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.
Second aspect, the embodiment of the invention provides a kind of terminal device, which includes detection module and processing
Module.Detection module, for detecting the input of user;Processing module, for detecting that the input of user is the in detection module
In the case where one input, closes the first application of terminal device running background or be set as disabling by the use state of the first application
State.Wherein, which is following any one: triggering terminal equipment is applied defeated in terminal device front stage operation second
Enter, the input that triggering terminal equipment passes through the second application execution predetermined registration operation.
The third aspect, the embodiment of the invention provides a kind of terminal device, the terminal device include processor, memory and
It is stored in the computer program that can be run on the memory and on the processor, when which is executed by the processor
The step of realizing the control method in such as above-mentioned first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums
Computer program is stored in matter, is realized when which is executed by processor such as the control method in above-mentioned first aspect
Step.
In embodiments of the present invention, it can detecte the input of user;And inputted in the input for detecting user for first
In the case of, it closes the first application of terminal device running background or sets disabled status for first use state applied.
Wherein, which is following any one: input that triggering terminal equipment apply in terminal device front stage operation second is touched
Send out the input that terminal device passes through the second application execution predetermined registration operation.With this solution, due to terminal device running background
The data of the application (the i.e. second application) of terminal device front stage operation may be obtained using (i.e. first application), such as obtain the
User's name, user information and the password of user's input in two applications etc., therefore when terminal device detects that user triggers
Terminal device is applied in terminal device front stage operation second or terminal device detects user's triggering terminal equipment by second
When the certain specific operations of application execution (such as input password etc.), terminal device can close the first of terminal device running background
Using, or by the use state of the first of terminal device running background the application set disabled status.In this way, can be made
One application can not obtain the data of the second application of terminal device front stage operation, i.e., the first application can not be obtained from the second application
So as to protect the privacy information of user, and then the security performance of terminal device can be improved in the privacy information of user.
Detailed description of the invention
Fig. 1 is the configuration diagram of Android operation system provided in an embodiment of the present invention;
Fig. 2 is one of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 3 is the two of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 4 is the three of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 5 is the four of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 6 is the five of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 7 is the six of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 8 is the seven of the schematic diagram of control method provided in an embodiment of the present invention;
Fig. 9 is the eight of the schematic diagram of control method provided in an embodiment of the present invention;
Figure 10 is one of the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Figure 11 is the second structural representation of terminal device provided in an embodiment of the present invention;
Figure 12 is the third structural representation of terminal device provided in an embodiment of the present invention;
Figure 13 is the hardware schematic of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation for describing affiliated partner, indicates may exist three kinds of relationships,
For example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Symbol herein
"/" indicates that affiliated partner is relationship such as A/B expression A or B perhaps.
Term " first " and " second " in description and claims of this specification etc. are for distinguishing different pairs
As, rather than it is used for the particular order of description object.For example, the first operating system and the second operating system etc. are for distinguishing not
Same operating system, rather than the particular order for describing operating system.
In embodiments of the present invention, " illustrative " or " such as " etc. words for indicate make example, illustration or explanation.This
Be described as in inventive embodiments " illustrative " or " such as " any embodiment or design scheme be not necessarily to be construed as comparing
Other embodiments or design scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport
Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " plurality " is refer to two or more,
For example, multiple operating systems refer to two or more operating system etc..
Some term/nouns involved in the embodiment of the present invention are explained first below.
Operating system: for the application operation in the hardware resource of management terminal device, controlling terminal equipment, and being user
The set of the system software at interactive operation interface is provided.
The use state of application: it is used to indicate the state that can terminal device operate application.
Disabled status: the state of any operation can not be carried out to application by being used to indicate terminal device, for example, can be equivalent to
The application is not installed in terminal device.
Initiate mode: it is used to indicate the state that terminal device can normally operate application.
The user data of application: the user data generated during being used to indicate terminal device operation application.
The embodiment of the present invention provides a kind of control method and terminal device, can detecte the input of user;And it is detecting
In the case that the input of user is the first input, the first application of closing terminal device running background or the use applied first
State is set as disabled status.Wherein, which is following any one: triggering terminal equipment is transported on terminal device foreground
The input of the application of row second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.With this solution, due to end
The application (the i.e. first application) of end equipment running background may obtain the application (the i.e. second application) of terminal device front stage operation
Data, such as obtain user's name, user information and the password etc. of user's input in the second application, therefore work as terminal
Equipment detects that user's triggering terminal equipment detects that user touches in the application of terminal device front stage operation second or terminal device
When sending out terminal device by the certain specific operations of the second application execution (such as input password etc.), terminal device can close terminal
First application of equipment running background, or disabling shape is set by the use state of the first application of terminal device running background
State.In this way, can make the first application that can not obtain the second data applied of terminal device front stage operation, i.e., first applies nothing
Method obtains the privacy information of user from the second application, so as to protect the privacy information of user, and then terminal can be improved
The security performance of equipment.
Terminal device in the embodiment of the present invention can be the terminal device with operating system.The operating system can be
Android (Android) operating system can be ios operating system, can also be other possible operating systems, and the present invention is implemented
Example is not especially limited.
Optionally, the terminal device in the embodiment of the present invention can be the terminal device with an operating system, can also
Think the terminal device with multiple operating systems.It can specifically be determined according to actual use demand, the embodiment of the present invention is not made
It limits.
Below by taking Android operation system as an example, software applied by control method provided in an embodiment of the present invention is introduced
Environment.
As shown in Figure 1, showing for the possible display framework based on Android operation system of one kind provided in an embodiment of the present invention
It is intended to.In Fig. 1, the framework of Android operation system includes 4 layers, is respectively as follows: application layer, application framework layer, system
Runtime Library layer and inner nuclear layer (being specifically as follows Linux inner core).
Wherein, application layer includes each application program (including system application and in Android operation system
Tripartite's application program).
Application framework layer is the frame of application program, and developer can be in the exploitation for the frame for abiding by application program
In the case where principle, some application programs are developed based on application framework layer.Application framework layer includes window management clothes
Be engaged in layer (window manager service), boundary layer (surface), interface session layer (surface session), and
Interface object layer (surface composer client).
The operations such as starting, addition and the deletion of interfaces windows of the window management service layer for processing terminal equipment;Boundary
Window of the surface layer for the interface in display terminal;Interface session layer plays the role of mark in the session of interface;Interface
Object layer is used to indicate the client role in the session of interface.
System Runtime Library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour
As system it is provided needed for all kinds of resources.Android operation system running environment is used to provide software loop for Android operation system
Border.System Runtime Library layer further includes interface combinations layer (surface flinger) and display layer (display hard ware).
Interface combinations layer forms a complete interface for the content in combined interface layer;Display layer is used to indicate end
The display screen of end equipment.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior
Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.Inner nuclear layer
Including frame buffer layer (frame buffer).
Frame buffer layer is for connecting system software and system hardware.
It should be noted that above-mentioned Fig. 1 is for including an operating system in terminal device based on operating system
Display framework schematic diagram.It can also include multiple operating systems in terminal device when specific implementation, i.e., it can be in terminal device
Display framework including multiple operating systems, wherein each display framework is similar with display framework described in Fig. 1, to avoid weight
Multiple, details are not described herein again.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1
The system architecture of operating system, the software program of control method provided in an embodiment of the present invention is realized in exploitation, so that the control
Method processed can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal device can be by Androids
The software program is run in operating system realizes control method provided in an embodiment of the present invention.
Terminal device in the embodiment of the present invention can be mobile terminal, or immobile terminal.Illustratively, it moves
Dynamic terminal can be mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device, super movement
People's computer (ultra-mobile personal computer, UMPC), net book or personal digital assistant (personal
Digital assistant, PDA) etc., immobile terminal can be personal computer (personal computer, PC), electricity
Depending on machine (television, TV), automatic teller machine or self-service machine etc., the embodiment of the present invention is not especially limited.
The executing subject of control method provided in an embodiment of the present invention can be above-mentioned terminal device, or the end
It can be realized the functional module and/or functional entity of the control method in end equipment, it specifically can be according to actual use demand
It determines, the embodiment of the present invention is not construed as limiting.Below by taking terminal device as an example, control method provided in an embodiment of the present invention is carried out
Illustrative explanation.
In the embodiment of the present invention, when terminal device runs a certain application on terminal device foreground (hereinafter referred to as foreground)
When (such as second application in the embodiment of the present invention), if terminal device backstage (hereinafter referred to as backstage) operation has other answer
With (such as in the embodiment of the present invention first application), then these applications may obtain data of the application of front stage operation,
The standby leakage of privacy information so as to will lead to user.In this way, when terminal device detects user's triggering terminal equipment at end
The a certain application of end equipment front stage operation or terminal device detect that user's triggering terminal equipment passes through the certain spies of the application execution
When fixed operation (such as input password, account information etc.), terminal device can close the application of running background, or backstage is transported
The use state of capable application is set as disabled status, so that these applications can not obtain the data of the application of front stage operation,
So as to protect the privacy information of user, and then the security performance of terminal device can be improved.
Lower mask body combines each attached drawing illustratively to illustrate control method provided in an embodiment of the present invention.
As shown in Fig. 2, the embodiment of the present invention provides a kind of control method, this method may include following S201 and
S202。
The input of S201, terminal device detection user.
S202, detect user input be first input in the case where, terminal device close terminal device backstage transport
The use state of the first application is set disabled status by the first capable application.
Wherein, above-mentioned first input can be following any one: user's triggering terminal equipment is transported on terminal device foreground
The input of the application of row second, user's triggering terminal equipment pass through the input of the second application execution predetermined registration operation.
In the embodiment of the present invention, terminal device can detecte the input of user, when terminal device detects that above-mentioned first is defeated
Fashionable, terminal device can specifically operate above-mentioned first application execution.
Specifically, in the embodiment of the present invention, when terminal device detects that user's triggering terminal equipment is a certain in front stage operation
When using (i.e. above-mentioned second application), terminal device can close above-mentioned first application;Alternatively, when terminal device detects user
Triggering terminal equipment is in front stage operation second in application, terminal device can set disabling shape for the use state of the first application
State.When terminal device detects user's triggering terminal equipment by the above-mentioned predetermined registration operation of the second application execution, terminal device can
To close the first application;Alternatively, when terminal device detects that user's triggering terminal equipment is above-mentioned default by the second application execution
When operation, terminal device can set disabled status for the use state of the first application.
It is appreciated that above-mentioned terminal device can serve to indicate that in a certain application of front stage operation: terminal device is set in terminal
The interface of the application is shown in standby display screen, user can pass through the input in the interface of the application, triggering terminal equipment
Pass through application execution operation corresponding with the input of user.Above-mentioned terminal device can be used for referring in a certain application of running background
Show: operation has the process of the application in the operating system of terminal device, but does not show the application in the display screen of terminal device
Interface.
It should be noted that the use state of the first application is set disabling shape by terminal device in the embodiment of the present invention
State is it is to be understood that terminal device closes the application process of first application, and the first application is used shape in terminal device
State is set as after disabled status, and terminal device can not be to any operation of the first application execution, and at the interface of terminal device
The middle mark (such as icon etc. of the first application) for cancelling display instruction first application, is equivalent in terminal device and does not install this
First application.Terminal device closes above-mentioned first application it is to be understood that terminal device closes the application process of first application.
Optionally, in the embodiment of the present invention, terminal device can periodically detect the input of user.
Optionally, in the embodiment of the present invention, the period that terminal device detects the input of user can be pre- in terminal device
The numerical value set, the period of the input of terminal device detection user can be the manufacturer of terminal device according to the performance of terminal device
It is preset in terminal device.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Illustratively, the period of the input of terminal device detection user arbitrarily can may for 1 second, 2 seconds or 3 seconds etc.
Duration.
Optionally, in the embodiment of the present invention, above-mentioned first input may include two kinds of situations, respectively situation one and situation
Two.Lower mask body illustratively illustrates the both of these case (i.e. situation one and situation two) of the first input.
The input of situation one: the first is the input that user's triggering terminal equipment is applied in terminal device front stage operation second.
Optionally, above situation one may include at least one of following: user by the input of the icon to the second application,
Triggering terminal equipment is in the application of front stage operation second (i.e. input of the user by the icon to the second application, triggering terminal equipment
The interface of the second application of display in the display screen of terminal device);Terminal device is applied in running background second, and user triggers eventually
End equipment is by the second application from being switched to foreground from the background.
It is appreciated that in actual implementation, above situation one can also include other any possible implementations.Specifically may be used
To determine that the embodiment of the present invention is not construed as limiting according to actual use demand.
The input of situation two: the first is the input that user's triggering terminal equipment passes through the second application execution predetermined registration operation.
It should be noted that for situation two, when user's triggering terminal equipment passes through the default behaviour of above-mentioned second application execution
When making, terminal device is second application in the application of front stage operation.
Optionally, in the embodiment of the present invention, above-mentioned predetermined registration operation can be operation preset in terminal device.The default behaviour
Making can be preset in terminal device according to the use demand of possible user for the manufacturer of terminal device, or terminal
The manufacturer of equipment provides setting interface, and user is preset in terminal device according to itself use demand.It specifically can be according to reality
Border use demand, the embodiment of the present invention are not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned predetermined registration operation may include: login account, input user name, input it is close
Code, transmission message and programme path etc. may relate to the operation of user privacy information.It specifically can be according to actual use demand
It determines, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned first application can be any application in terminal device, or
Target application etc. in terminal device.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, when above-mentioned first application is the target application in terminal device, which is answered
With may include in terminal device except system application in addition to application, such as third-party application etc..
It should be noted that when above-mentioned first application is any in application, if terminal device detects in terminal device
Above-mentioned first input, then terminal device can close all applications of running background;Alternatively, by all applications of running background
Use state is set as disabled status.When above-mentioned first application is the target application in terminal device, if terminal device detects
To above-mentioned first input, then terminal device can close the target application of running background;Alternatively, by the target application of running background
Use state be set as disabled status.
It is appreciated that when including non-targeted application (such as system application of terminal device etc.) in the application of running background
When, if terminal device detects above-mentioned first input, terminal device can not make the non-targeted application of running background any
Processing, i.e., these non-targeted applications are still in running background.
Optionally, in the embodiment of the present invention, above-mentioned second application can be arbitrarily to apply in terminal device, or
The application of first object type.It can specifically be determined according to actual use demand, be not construed as limiting in the embodiment of the present invention.
Optionally, in the embodiment of the present invention, above-mentioned first object type may include paying class, financial class, communication class, with
And shopping class etc. arbitrarily may relate to the application type of user privacy information.It can specifically be determined according to actual use demand, this
It is not construed as limiting in inventive embodiments.
Above-mentioned S201 and S202 is illustratively illustrated in conjunction with example below.
Illustratively, it is assumed that above-mentioned first application is the third-party application in terminal device, and above-mentioned second application is terminal
Payment class application in equipment, and above-mentioned first input is the input that user's triggering terminal equipment is applied in front stage operation second,
And when terminal device detects the above-mentioned first input, the use state of the first application is set disabling shape by terminal device
State.So, when the running background of terminal device there are three in application, these three applications be respectively as follows: " using 1 ", " using 2 " and
" applying 3 ", wherein " applying 1 " is the system application in terminal device, and " applying 2 " and " applying 3 " is the third in terminal device
Fang Yingyong.If terminal device detects user's triggering terminal equipment, in front stage operation application " payment 1 ", (i.e. above-mentioned second is answered
With), then " applying 2 " and " applying 3 " (" apply 2 " and " applying 3 " is the first application) can be used shape by terminal device
State is set as disabled status, so that " applying 2 " and " applying 3 " can not obtain the hidden of user from application " payment 1 "
Personal letter breath, to protect the privacy information of user.Wherein, " 1 is applied " to continue in running background.
Optionally, in the embodiment of the present invention, the case where input of user is the above-mentioned first input is detected in terminal device
Under, terminal device can determine whether backstage has run above-mentioned first application, if running background has above-mentioned first application,
Terminal device can close first application or set disabled status for first use state applied, and in front stage operation
Above-mentioned second application;If above-mentioned first application of backstage not running, terminal device can operationally state the second application.
Illustratively, in conjunction with Fig. 2, as shown in figure 3, above-mentioned S202 specifically can by following S202a-S202c, or
S202a and S202c is realized.
S202a, detect user input be first input in the case where, terminal device determine terminal device backstage be
No operation has the first application.
S202b, terminal device close the first application of terminal device running background or set the use state of the first application
It is set to disabled status.
S202c, the second application of terminal device operation.
It should be noted that above-mentioned the second application of terminal device operation can serve to indicate that terminal in the embodiment of the present invention
Equipment is applied in front stage operation second.
In the embodiment of the present invention, in the case where terminal device detects that the input of user is the above-mentioned first input, terminal
Equipment can determine whether backstage has run above-mentioned first application, if running background has above-mentioned first application, terminal is set
It is standby to close first application or set disabled status for first use state applied, and in front stage operation above-mentioned the
Two applications;If above-mentioned first application of backstage not running, terminal device can be in above-mentioned second application of front stage operation.Such as
This, in control method provided in an embodiment of the present invention, when terminal device in running background second in application, backstage not running
One application, so that the first application can not obtain the privacy information of user from the second application, so as to protect, user's is hidden
Personal letter breath, and then the security performance of terminal device can be improved.
It should be noted that the embodiment of the present invention can not limit in the case where running background has the above-mentioned first application
Sequence is executed between S202b and S202c.I.e. the embodiment of the present invention can first carry out S202b, execute S202c afterwards;It can also be first
S202c is executed, executes S202b afterwards.Wherein, above-mentioned Fig. 3 is illustratively illustrated for rear execution S202c with first carrying out S202b
's.
The embodiment of the present invention provides a kind of control method, since the application (the i.e. first application) of terminal device running background can
The data of the application (the i.e. second application) of terminal device front stage operation can be obtained, such as obtain the user name in the second application
Title, user information and password of user's input etc., therefore when terminal device detects that user's triggering terminal equipment is set in terminal
The standby application of front stage operation second or terminal device detect that user's triggering terminal equipment is certain specific by the second application execution
When operation (such as input password etc.), terminal device can close the first application of terminal device running background, or by terminal
The use state of first application of equipment running background is set as disabled status.In this way, can make the first application that can not obtain
The data of second application of terminal device front stage operation, i.e., the first application can not obtain the privacy letter of user from the second application
Breath, so as to protect the privacy information of user, and then can be improved the security performance of terminal device.
Optionally, in the embodiment of the present invention, after above-mentioned second application of terminal device operation, terminal device can be determined
It whether include that (the included input method of the i.e. second application, such as first in the embodiment of the present invention are defeated for input method in second application
Enter method).In the case where including input method in above-mentioned second application, then terminal device can be shown in the interface of the second application
Show the dummy keyboard of the input method;In the case where not including input method in above-mentioned second application, terminal device can be second
The dummy keyboard of the input method of the system of display terminal in the interface of application.So that user passes through the defeated of safety
Enter method input information, to guarantee the safety of the information of user's input.
Illustratively, in conjunction with Fig. 3, as shown in figure 4, after above-mentioned S202c, control method provided in an embodiment of the present invention
It can also include following S203 and S204 or S203 and S205.
Whether it includes the first input method that S203, terminal device determine in the second application.
S204, terminal device show the first dummy keyboard in the interface of second application.
Wherein, above-mentioned first dummy keyboard can be the dummy keyboard of above-mentioned first input method.
S205, terminal device show the second dummy keyboard in the interface of second application.
Wherein, above-mentioned second dummy keyboard can be the dummy keyboard of the second input method, and above-mentioned second input method can be
The system input method of terminal device.
In the embodiment of the present invention, after above-mentioned second application of terminal device operation, terminal device can determine above-mentioned the
It whether include input method (i.e. above-mentioned first input method) in two applications.And determine this second application in whether include input method it
Afterwards, if include first input method in second application, terminal device can be shown in the interface of second application
The dummy keyboard (i.e. above-mentioned first dummy keyboard) for showing first input method, so that user can be existed by first dummy keyboard
Information is inputted in second application.If do not include first input method in second application, terminal device can be at this
The dummy keyboard (i.e. above-mentioned second dummy keyboard) of the system input method of display terminal in the interface of second application, thus with
Family can input information in the second application by second dummy keyboard.In this way, user can be made to pass through the input of safety
Method inputs information in the second application, to guarantee the safety of the information of user's input.
It is appreciated that above-mentioned first input method can be input method included in above-mentioned second application, such as the second application
Safe input method.
Optionally, in the embodiment of the present invention, determine whether above-mentioned second application includes above-mentioned first input in terminal device
After method, user can by an input (such as third input) in the embodiment of the present invention, triggering terminal equipment this
Above-mentioned first dummy keyboard or above-mentioned second dummy keyboard are shown in the interface of two applications.
Specifically, determining whether above-mentioned second application includes above-mentioned first input in terminal device in the embodiment of the present invention
After method, in the case where second application includes first input method, user can be inputted by third, triggering terminal equipment
Above-mentioned first dummy keyboard is shown in the interface of second application;First input method is not included the case where in second application
Under, user can be inputted by third, and triggering terminal equipment shows above-mentioned second dummy keyboard in the interface of second application.
In the embodiment of the present invention, above-mentioned third input can be user's triggering terminal equipment at the interface of above-mentioned second application
The input of middle display dummy keyboard.
Optionally, in the embodiment of the present invention, above-mentioned third input can be information of the user in the interface of the second application
The input of input area.Specifically, the third input can for user the information input area click input, double-click it is defeated
Enter or any possible inputs such as long-pressing input.It can specifically be determined according to actual use demand, the embodiment of the present invention is not made
It limits.
In the embodiment of the present invention, long-pressing input can be greater than or equal in above- mentioned information input area default for user
The input that duration is pressed.
Optionally, in the embodiment of the present invention, above-mentioned preset duration can be numerical value preset in terminal device.When this is default
Length can be preset in terminal device for the manufacturer of terminal device.It can specifically be determined according to actual use demand, the present invention
Embodiment is not construed as limiting.
In the embodiment of the present invention, since above-mentioned first input method is the input method in the second application, terminal device can
To determine that first input method is the input method of safety, if terminal device shows that above-mentioned first is empty in the interface of the second application
Quasi- keyboard, then user can be made to input information by the input method of safety.Correspondingly, since above-mentioned second input method is to be
System input method, therefore terminal device can also determine that the second input method is the input method of safety, if terminal device is answered second
Above-mentioned second dummy keyboard is shown in interface, then user can be made to input information by the input method of safety.In this way,
No matter user uses the dummy keyboard of the first input method to input information, or inputs letter using the dummy keyboard of the second input method
Breath can guarantee user using safe input method input information, so as to avoid user from using nonsystematic input method (example
Such as third party's input method) input information, and then can guarantee the safety of the information of user's input.
Optionally, in the embodiment of the present invention, terminal device can also detect the application of terminal device front stage operation, work as terminal
When equipment detects the front stage operation of terminal device a certain specific application (such as third application in the embodiment of the present invention), eventually
End equipment can forbid the application in terminal device in addition to the application of front stage operation, and (such as the 4th in the embodiment of the present invention answers
With) some functions (such as objective function in the embodiment of the present invention) of using terminal equipment, to prevent these applications from passing through this
A little functions obtain the information of the application of front stage operation, thereby may be ensured that the privacy information of user is not leaked.
Illustratively, in conjunction with Fig. 2, as shown in figure 5, after above-mentioned S202, control method provided in an embodiment of the present invention
It can also include following S206 and S207.
The application of S206, terminal device detection terminal device front stage operation.
S207, detect terminal device front stage operation application be third application in the case where, forbid the 4th application make
With the objective function of terminal device.
Wherein, above-mentioned 4th application can be the application in the application of terminal device in addition to the application of above-mentioned third, above-mentioned
Objective function may include at least one of following: sound-recording function, screenshotss function, read/write function.
In the embodiment of the present invention, terminal device can detecte the application of terminal device front stage operation, when terminal device detects
In the case that application to terminal device front stage operation is the application of above-mentioned third, terminal device can forbid above-mentioned 4th application to make
With the objective function of terminal device, it can so prevent the 4th application from obtaining the number in third application by the target application
According to thereby may be ensured that the privacy information of user is not leaked to obtain the privacy information of user.
It should be noted that above-mentioned read/write function may include reading function and writing function in the embodiment of the present invention.Wherein,
Reading function includes short message reading and access picture library etc. can be with the function of the data in reading terminal equipment;Writing function may include writing
The function of the content of edit in application in terminal device such as mail and editor's information.
Optionally, in the embodiment of the present invention, above-mentioned third application can be arbitrarily to apply in terminal device, or
The application of second target type.It can specifically be determined according to actual use demand, be not construed as limiting in the embodiment of the present invention.
Optionally, in the embodiment of the present invention, above-mentioned second target type may include paying class, financial class, communication class, with
And shopping class etc. arbitrarily may relate to the application type of user privacy information.It can specifically be determined according to actual use demand, this
It is not construed as limiting in inventive embodiments.
Optionally, in the embodiment of the present invention, above-mentioned 4th application can in terminal device in addition to the application of above-mentioned third
Whole applications, or may have the application of security risk in terminal device, such as the third party in terminal device answers
With.It can specifically be determined according to actual use demand, be not construed as limiting in the embodiment of the present invention.
It should be noted that the execution that can not be limited between S201-S202 and S206-S207 in the embodiment of the present invention is suitable
Sequence.I.e. the embodiment of the present invention can first carry out S201-S202, execute S206-S207 afterwards;S206-S207 can also be first carried out, after
Execute S201-S202.Wherein, above-mentioned Fig. 5 is illustratively illustrated for rear execution S206-S207 with first carrying out S201-S202
's.
In the embodiment of the present invention, due to functions such as sound-recording function, screenshotss function and read/write functions in terminal device
(i.e. above-mentioned objective function) has the ability for obtaining the data in terminal device, therefore above-mentioned 4th application can be by using this
A little functions obtain the data that terminal device is applied using above-mentioned third, i.e., the privacy of the above-mentioned 4th available user of application is believed
Breath.In this way, terminal device forbid the 4th using objective function in the case where, can make the 4th application can not obtain end
The data that end equipment is applied using above-mentioned third, thereby may be ensured that the safety of the privacy information of user, and then end can be improved
The security performance of end equipment.
Optionally, in the embodiment of the present invention, disabled status is set by the use state that above-mentioned first answers in terminal device
Later, if terminal device determines terminal device and exits above-mentioned second application, terminal device first can be applied this
State is set as initiate mode, so that first application can be used normally in user.
Illustratively, in conjunction with Fig. 2, as shown in fig. 6, after above-mentioned S202, control method provided in an embodiment of the present invention
It can also include following S208.
S208, after terminal device exits the second application, terminal device by first application use state be set as opening
Use state.
In the embodiment of the present invention, after the use state that above-mentioned first applies is set disabled status by terminal device,
If terminal device exits above-mentioned second application, the use state that above-mentioned first applies can be set as opening by terminal device
With state, so that first application can be used normally in user.
It should be noted that above-mentioned terminal device exits second and is used to indicate terminal device in the embodiment of the present invention
Terminate the second application of operation (i.e. terminal device backstage and the equal not running in terminal device foreground second application).
In the embodiment of the present invention, due to terminal device exit it is above-mentioned second application after, even if terminal device backstage
Above-mentioned first application is run, first applies the information that can not also obtain user in second application, therefore terminal device can incite somebody to action
The use state of first application is set as initiate mode, so that first application can be used normally in user.
Optionally, in the embodiment of the present invention, disabled status is set by the use state that above-mentioned first answers in terminal device
Later, if terminal device determines that terminal device exits above-mentioned second application, above-mentioned second application is exited in terminal device
Later, terminal device can delete the user data of the second application saved in terminal device (such as in the embodiment of the present invention
Target data), to prevent the user data from leaking;Alternatively, terminal device can be to the second application saved in terminal device
Ciphering user data, so that other application can not access the user data of second application, so as to prevent the number of users
According to being compromised.In this way, the security performance of terminal device can be improved.
Illustratively, in conjunction with Fig. 2, as shown in fig. 7, after above-mentioned S202, control method provided in an embodiment of the present invention
It can also include following S209.
S209, after terminal device exits the second application, terminal device delete target data or the target data is added
It is close.
Wherein, above-mentioned target data can be the user data of above-mentioned second application saved in terminal device.
In the embodiment of the present invention, after terminal device exits above-mentioned second application, terminal device can delete above-mentioned mesh
Mark data;Alternatively, being encrypted to the target data, to guarantee that the target data is not leaked.
Optionally, in the embodiment of the present invention, before terminal device is to the encryption of above-mentioned target data, terminal device can be shown
Show prompt information, to prompt user that Crypted password is arranged to the target data, then terminal device can be according to the Crypted password
Target data is encrypted, so that other application can not access the target data.
In the embodiment of the present invention, above-mentioned terminal device is encrypted to target data it is to be understood that the target data is for it
It is using invisible, so that these applications can not obtain/access the target data.
In the embodiment of the present invention, deleting above-mentioned target data due to terminal device can prevent other application from obtaining the target
Data or terminal device are also possible to prevent other application to the encryption of above-mentioned target data and obtain the target data, therefore at end
End equipment exits after above-mentioned second application, and terminal device passes through above two mode (delete target data and to target data
Encryption) in any one mode so that user is not leaked using second user data applied, so as to protect
The privacy information of user, and then the security performance of terminal device can be improved.
In the embodiment of the present invention, below again by taking two operating system as an example, to the terminal device packet in the embodiment of the present invention
The case where including multiple operating systems is illustratively illustrated.
Optionally, in the embodiment of the present invention, when including two operating systems in terminal device (such as in the embodiment of the present invention
The first operating system and the second operating system) when, control method provided in an embodiment of the present invention can be applied to the two behaviour
Make each operating system in system, also can be applied to an operating system of the two operating systems, (such as the present invention is real
Apply the second operating system in example).
In the embodiment of the present invention, it is applied in above-mentioned two operating system in control method provided in an embodiment of the present invention
In the case where each operating system, the control method of terminal device is similar with the control method of the description in above-described embodiment, is
It avoids repeating, details are not described herein again.
Optionally, in the embodiment of the present invention, it is applied to above-mentioned two operation in control method provided in an embodiment of the present invention
In the case where an operating system (hereinafter referred to as the second operating system) in system, if the operating system of terminal device operation
For another operating system (hereinafter referred to as the first operating system), then user can pass through the use to first operating system
The input (the hereinafter referred to as second input) of certain an object (such as target object in the embodiment of the present invention) in the interface of family, triggering is eventually
End equipment runs second operating system, so that terminal device can execute in above-described embodiment in second operating system
Control method the step of.
Optionally, the terminal device in the embodiment of the present invention can be single screen terminal device, or multi-screen terminal is set
It is standby.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, when the quantity difference of the screen of terminal device, terminal device can be rung in different forms
Answer above-mentioned second input.Specifically, when the quantity of the screen of terminal device is one (i.e. terminal device is single screen terminal device), eventually
The form that end equipment responds second input can be form one;When the quantity of the screen of terminal device is greater than (i.e. a terminal device
For multi-screen terminal device) when, the form that terminal device responds second input can be form two.Lower mask body terminal device is rung
Should second input both forms (i.e. form one and form two) illustratively illustrated.
Form one: in the case where the operating system of terminal device operation is the first operating system, user can be by right
Second input of certain an object (such as target object in the embodiment of the present invention), touching in the user interface of first operating system
It sends out terminal device and the operating system that terminal device is run is switched to the second operating system from the first operating system, so that terminal
Equipment can execute the step of control method in above-described embodiment in second operating system.
Illustratively, in conjunction with Fig. 2, as shown in figure 8, before above-mentioned S201, control method provided in an embodiment of the present invention
It can also include following S210 and S211.Wherein, S201 can specifically be realized by following S201a.
S210, terminal device receive second input of the user to target object.
S211, terminal device switch the operating system of terminal device from the first operating system in response to second input
For the second operating system.
S201a, terminal device detect the input of user in second operating system.
Wherein, above-mentioned target object can be target identification or target key, and above-mentioned second input can be terminal device
The received input in the first operating system.
In the embodiment of the present invention, in the case where the operating system of terminal device operation is above-mentioned first operating system, use
Family can be by the input to above-mentioned target object, and triggering terminal equipment is by the operating system of terminal device from the first operating system
It is switched to the second operating system, so that terminal device detects the input of user in second operating system, then terminal
The input for the user that equipment can detect in the second operating system according to terminal device, executes sheet in the second operating system
The control method that inventive embodiments provide.
Optionally, in the embodiment of the present invention, if above-mentioned target object is above-mentioned target identification, which can
Think the mark that the second operating system is used to indicate in above-mentioned first operating system.
Optionally, in the embodiment of the present invention, above-mentioned target identification arbitrarily can may be used for an icon or an interface etc.
To be used to indicate the mark of the second operating system.It can specifically be determined according to actual use demand, the embodiment of the present invention does not limit
It is fixed.
Optionally, in the embodiment of the present invention, when above-mentioned target object is above-mentioned target identification, above-mentioned second input can be with
Input, double-click input are clicked to the target identification for user, or again by any possible input such as input.It specifically can root
Factually border use demand determines, the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, above-mentioned heavy press inputs and can be preset for user on above-mentioned target identification with being greater than or equal to
The input that the pressure of pressure value is pressed.
Optionally, in the embodiment of the present invention, above-mentioned preset pressure value can be numerical value preset in terminal device.This is default
Pressure value can be preset in terminal device for the manufacturer of terminal device.It can specifically be determined according to actual use demand, this
Inventive embodiments are not construed as limiting.
Optionally, in the embodiment of the present invention, if above-mentioned target object is above-mentioned target key, which can
Think a key, or the combination button of multiple key combinations.It can specifically be determined according to actual use demand, this hair
Bright embodiment is not construed as limiting.
Illustratively, when above-mentioned target key is a key, which can be power button, artificial intelligence
Any possible key of (artificial intelligence, AI) key or volume button etc..When above-mentioned target key
For multiple key combinations combination button when, the target key can be power button and volume button combination or power supply
The combination of any possible key such as combination of key and AI key.
Optionally, in the embodiment of the present invention, when above-mentioned target object is above-mentioned target key, above-mentioned second input can be with
It is user to any possible input such as the long-pressing input of target key or short-press input.It specifically can be according to actual use need
Ask determining, the embodiment of the present invention is not construed as limiting.
Optionally, in the embodiment of the present invention, above-mentioned first operating system and above-mentioned second operating system can set for terminal
Two different operating systems in standby.
In the embodiment of the present invention, above-mentioned first operating system and above-mentioned second operating system can exist for terminal device manufacturer
It is developed on the basis of the source code of operating system.
Optionally, in the embodiment of the present invention, above-mentioned first operating system can compare for terminal device manufacturer Exploitation degree
High operating system, the operating system that above-mentioned second operating system can be relatively low for terminal device manufacturer Exploitation degree.
It should be noted that in the embodiment of the present invention, the relatively low operating system of terminal device manufacturer Exploitation degree and behaviour
The source code similarity-rough set for making system is high, the source of terminal device manufacturer Exploitation degree relatively high operating system and operating system
Code similarity-rough set is low.
It will be appreciated, of course, that above-mentioned second operating system can also be the corresponding behaviour of platform that operating system manufacturer provides
Make system.
Optionally, in the embodiment of the present invention, after the operating system modification that operating system manufacturer provides it, operation system
Uniting manufacturer can be to the system mend of terminal device manufacturer release modification, so that the operating system that terminal device manufacturer uses is more
It is perfect, safe etc..After the system mend that operating system manufacturer modifies to the release of terminal device manufacturer, terminal device manufacturer can
Using operating system (such as above-mentioned first operating system and the second operation system on the system mend real-time update terminal device
System).In this way, terminal device can be made to exist after the second operating system of the terminal device on real-time update terminal device
Control method provided in an embodiment of the present invention is executed in the second more perfect, safe operating system, it can so that terminal is set
The standby software environment for executing the control method is more perfect, safe.
It should be noted that for above-mentioned " form one ", when terminal device grasps the operating system of terminal device from first
After the second operating system is switched to as system, terminal device can execute in above-described embodiment in second operating system
The step of control method, to avoid repeating, details are not described herein again.
Form two: in the case where terminal device runs the first operating system and the second operating system of not running, Yong Huke
To pass through of certain an object (such as target object in the embodiment of the present invention) in the user interface to first operating system
Two inputs, the second operating system of triggering terminal equipment operation (such as terminal device shows the second behaviour in the second screen of terminal device
Make the user interface of system), then terminal device can execute the controlling party in above-described embodiment in second operating system
The step of method.
It should be noted that it is that two (i.e. terminal device is double screen that above-mentioned " form two ", which is using the quantity of the screen of terminal device,
Terminal device) for illustratively illustrated, the realization for other situations of the quantity greater than one of the screen of terminal device
Mode is similar with the implementation that the quantity of the screen of terminal device is two, and details are not described herein again.
Illustratively, in conjunction with Fig. 2, as shown in figure 9, before above-mentioned S201, control method provided in an embodiment of the present invention
It can also include following S212 and S213.Wherein, S201 can specifically be realized by following S201b.
S212, terminal device receive second input of the user to target object.
S213, terminal device run the second operating system in response to second input.
S201b, terminal device detect the input of user in second operating system.
Wherein, above-mentioned target object can be target identification or target key, and above-mentioned second input can be terminal device
The received input in the first operating system, first operating system is corresponding with the first screen of terminal device, above-mentioned second operation
System is corresponding with the second screen of terminal device.
In the embodiment of the present invention, the first operating system is run in terminal device, and the case where the second operating system of not running
Under, user can be by the input to above-mentioned target object, and triggering terminal equipment runs the second operating system, so that terminal
Equipment detects the input of user in second operating system, and then terminal device can be in the second operation according to terminal device
The input of the user detected in system executes control method provided in an embodiment of the present invention in the second operating system.
In the embodiment of the present invention, above-mentioned first operating system is corresponding with the first screen of terminal device can be with are as follows: terminal device
The user interface of first operating system is shown in the first screen of terminal device;Above-mentioned second operating system and terminal device
Second screen correspondence can be with are as follows: terminal device shows the user interface of second operating system in the second screen of terminal device.
In other words, the application in the first screen of terminal device (shown in the first screen application icon instruction answer
With) can be run in the first operating system, and the user data that the application in first screen generates can be stored in the first behaviour
Make in system.Correspondingly, in the second screen of terminal device application (shown in the second screen application icon instruction answer
With) can be run in the second operating system, and the user data that the application in second screen generates can be stored in the second behaviour
Make in system.
In the embodiment of the present invention, after terminal device runs above-mentioned second operating system, terminal device can be after reforwarding
Above-mentioned first operating system of row.That is, terminal device can run the first operating system and the second operating system simultaneously.
Optionally, for above-mentioned " form two ", the terminal device in the embodiment of the present invention may include multiple processors, or
The processor of person's terminal device is multi-core processor.It can specifically be determined according to actual use demand, the embodiment of the present invention is not made
It limits.
Specifically, a processor in terminal device can correspond to one when terminal device includes multiple processors
Operating system.By taking terminal device includes two processors as an example, the two processors are respectively processor 1 and processor 2.Its
In, processor 1 can be corresponding with above-mentioned first operating system, and processor 2 can be corresponding with above-mentioned second operating system.
Certainly, after terminal device runs above-mentioned second operating system, terminal device can also be with out of service above-mentioned the
One operating system.It can specifically be determined according to actual use demand, the embodiment of the present invention is not construed as limiting.
In the embodiment of the present invention, for the associated description that above-mentioned target object and second input, specifically it may refer to above-mentioned
The detailed description inputted in " form one " to target object and second, details are not described herein again.
It should be noted that for above-mentioned " form two ", after terminal device runs the second operating system, terminal device
It is the step of control method in above-described embodiment can be executed in second operating system, no longer superfluous herein to avoid repeating
It states.
In the embodiment of the present invention, when in terminal device including two operating system, terminal device can be in the two behaviour
Make to execute control method provided in an embodiment of the present invention in the operating system (i.e. above-mentioned second operating system) in system, one
Aspect can not influence the performance of the operating system (i.e. above-mentioned first operating system) of manufacturer's offer of terminal device, another party
Face can improve the safety of terminal device by executing control method provided in an embodiment of the present invention in the second operating system
Performance.
It should be noted that above-mentioned each control method shown in the drawings is to combine this hair in the embodiment of the present invention
Illustratively illustrate for an attached drawing in bright embodiment.When specific implementation, above-mentioned each control method shown in the drawings
The other combinable any attached drawings that can be combined with illustrating in above-described embodiment realize that details are not described herein again.
As shown in Figure 10, the embodiment of the present invention provides a kind of terminal device 300, which includes detection module
301 and processing module 302.Detection module 301, for detecting the input of user;Processing module 302, in detection module 301
In the case where detecting that the input of user is the first input, close 300 running background of terminal device the first application or by this
The use state of one application is set as disabled status.Wherein, which is following any one: triggering terminal equipment is at end
The input of the application of end equipment front stage operation second, triggering terminal equipment pass through the input of the second application execution predetermined registration operation.
In conjunction with Figure 10, as shown in figure 11, terminal device 300 further includes receiving module 303.Receiving module 303, for examining
It surveys before the input that module 301 detects user, receives second input of the user to target object;Processing module 302 is also used to ring
It should be inputted in receiving module 303 received second, the operating system of terminal device is switched to the second behaviour from the first operating system
Make system;Detection module 301, specifically for detecting the input of user in second operating system.Wherein, which is
Target identification or target key, which is terminal device received input in the first operating system.
In conjunction with Figure 10, as shown in figure 12, terminal device 300 further includes display module 304.Processing module 302 is also used to transport
After row second is applied, determine in the second application whether include the first input method;Display module 304, in processing module 302
It determines in the case where including first input method in second application, shows the first virtual key in the interface of second application
Disk, alternatively, in the case where it does not include first input method that processing module 302, which determines in second application, in second application
Interface in show the second dummy keyboard.Wherein, which is the dummy keyboard of the first input method, this is second virtual
Keyboard is the dummy keyboard of the second input method, which is the system input method of terminal device.
Wherein, above-mentioned second application can be run by above-mentioned processing module 302.
Optionally, detection module 301 are also used to detect the application of terminal device front stage operation;Processing module 302, is also used
In the case that the application for detecting terminal device front stage operation in detection module 301 is third application, the 4th application is forbidden to make
With the objective function of terminal device.Wherein, the 4th application is the application in the application of terminal device in addition to third application,
The objective function includes at least one of the following: sound-recording function, screenshotss function, read/write function.
Optionally, processing module 302 are also used to after setting disabled status for the use state of the first application,
It exits after the second application, sets initiate mode for first use state applied.
Optionally, it is being moved back after being also used to set disabled status for the use state of the first application processing module 302
Out second application after, delete target data or to the target data encrypt.Wherein, which is to save in terminal device
This second application user data.
Terminal device provided in an embodiment of the present invention can be realized what terminal device in above-mentioned control method embodiment executed
Each process, and identical technical effect can be reached, to avoid repeating, details are not described herein again.
Present invention implementation provides a kind of terminal device, since the application (the i.e. first application) of terminal device running background may
The data of the application (the i.e. second application) of terminal device front stage operation can be obtained, such as obtain the user's name in the second application,
User information and the password etc. of user's input, therefore when terminal device detects user's triggering terminal equipment in terminal device
The application of front stage operation second or terminal device detect that user's triggering terminal equipment passes through a certain specific behaviour of the second application execution
When making (such as preset operation in terminal device), terminal device can close the first application of terminal device running background, or
The use state of the first application of terminal device running background is set disabled status by person.In this way, the first application can be made
The data of the second application of terminal device front stage operation can not be obtained, i.e., the first application can not obtain user's from the second application
So as to protect the privacy information of user, and then the security performance of terminal device can be improved in privacy information.
A kind of hardware schematic of Figure 13 terminal device of each embodiment to realize the present invention.As shown in figure 13, terminal
Equipment 100 includes but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensing
Device 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110 (can be multiple
Processor a, or processor) and the components such as power supply 111.It will be understood by those skilled in the art that showing in Figure 13
Terminal device structure out does not constitute the restriction to terminal device, and terminal device may include than illustrating more or fewer portions
Part perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal device includes but is not limited to
Mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 110, for detecting the input of user;And in the feelings that the input for detecting user is the first input
Under condition, closes the first application of terminal device running background or set disabled status for first use state applied.Its
In, which is following any one: input that triggering terminal equipment apply in terminal device front stage operation second triggers
Terminal device passes through the input of the second application execution predetermined registration operation.
Present invention implementation provides a kind of terminal device, since the application (the i.e. first application) of terminal device running background may
The data of the application (the i.e. second application) of terminal device front stage operation can be obtained, such as obtain the user's name in the second application,
User information and the password etc. of user's input, therefore when terminal device detects user's triggering terminal equipment in terminal device
The application of front stage operation second or terminal device detect that user's triggering terminal equipment passes through a certain specific behaviour of the second application execution
When making (such as preset operation in terminal device), terminal device can close the first application of terminal device running background, or
The use state of the first application of terminal device running background is set disabled status by person.In this way, the first application can be made
The data of the second application of terminal device front stage operation can not be obtained, i.e., the first application can not obtain user's from the second application
So as to protect the privacy information of user, and then the security performance of terminal device can be improved in privacy information.
It is appreciated that above-mentioned processor 110 may include the terminal device in above-described embodiment in the embodiment of the present invention
Detection module 301 and processing module 302 in structural schematic diagram (such as Figure 10 etc.).
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 110 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 101 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by wireless communication system and network and other set
Standby communication.
Terminal device provides wireless broadband internet by network module 102 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 103 can be received by radio frequency unit 101 or network module 102 or in memory 109
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 103 can also provide and end
The relevant audio output of specific function that end equipment 100 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 103 includes loudspeaker, buzzer and receiver etc..
Input unit 104 is for receiving audio or video signal.Input unit 104 may include graphics processor
(graphics processing unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike
Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 101 is converted in the case where telephone calling model.
Terminal device 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when terminal device 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 105 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (liquid crystal display, LCD), Organic Light Emitting Diode can be used
Forms such as (organic light-emitting diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with terminal device
Family setting and the related key signals input of function control.Specifically, user input unit 107 include touch panel 1071 and
Other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receiving area
It manages the order that device 110 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments
1072.Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it
On or near touch operation after, send processor 110 to determine the type of touch event, be followed by subsequent processing device 110 according to touching
The type for touching event provides corresponding visual output on display panel 1061.Although in Figure 13, touch panel 1071 and aobvious
Show that panel 1061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments
In, can be integrated by touch panel 1071 and display panel 1061 and realize the function that outputs and inputs of terminal device, it is specific this
Place is without limitation.
Interface unit 108 is the interface that external device (ED) is connect with terminal device 100.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal device 100 or can be used in 100 He of terminal device
Data are transmitted between external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place
Managing device 110 may include one or more processing units;Optionally, processor 110 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Terminal device 100 can also include the power supply 111 (such as battery) powered to all parts, optionally, power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal device 100 includes some unshowned functional modules, details are not described herein.
Optionally, the embodiment of the present invention also provides a kind of terminal device, including processor 110 as shown in fig. 13 that, storage
Device 109 is stored in the computer program that can be run on memory 109 and on processor 110, and the computer program is by processor
110 realize each process of above-mentioned control method embodiment when executing, and can reach identical technical effect, to avoid repeating,
Which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned control method embodiment when being executed by processor, and can reach
Identical technical effect, to avoid repeating, which is not described herein again.Wherein, which may include read-only
Memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or
Person's CD etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (14)
1. a kind of control method is applied to terminal device, which is characterized in that the described method includes:
Detect the input of user;
Detect user input be first input in the case where, close the terminal device running background first application or
Disabled status is set by the use state that described first applies;
Wherein, first input is following any one: triggering the terminal device in the terminal device front stage operation the
The input that the input of two applications, the triggering terminal device pass through the second application execution predetermined registration operation.
2. the method according to claim 1, wherein the method is also wrapped before the input of the detection user
It includes:
Second input of the user to target object is received, the target object is target identification or target key, and described second is defeated
Enter the received input in the first operating system for the terminal device, the of first operating system and the terminal device
One screen is corresponding;
In response to second input, the second operating system, second operating system and the second of the terminal device are run
Screen corresponds to;
The input of the detection user, comprising:
The input of user is detected in second operating system.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
After running second application, determine in second application whether include the first input method;
In the case where including first input method in second application, first is shown in the interface of second application
Dummy keyboard, first dummy keyboard are the dummy keyboard of first input method;
In the case where not including first input method in second application, the is shown in the interface of second application
Two dummy keyboards, second dummy keyboard are the dummy keyboard of the second input method, and second input method is that the terminal is set
Standby system input method.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
Detect the application of the terminal device front stage operation;
In the case where detecting the application of the terminal device front stage operation is third application, forbid the 4th using described
The objective function of terminal device, the 4th application are answering in addition to third application in the application of the terminal device
With;
Wherein, the objective function includes at least one of the following: sound-recording function, screenshotss function, read/write function.
5. method according to claim 1 or 2, which is characterized in that the use state applied described first is arranged
After disabled status, the method also includes:
After exiting second application, initiate mode is set by the use state that described first applies.
6. method according to claim 1 or 2, which is characterized in that the use state applied described first is arranged
After disabled status, the method also includes:
Exit it is described second application after, delete target data or to the target data encrypt, the target data is institute
State the user data of second application saved in terminal device.
7. a kind of terminal device, which is characterized in that the terminal device includes detection module and processing module;
The detection module, for detecting the input of user;
The processing module closes institute in the case where for detecting that the input of user is the first input in the detection module
It states the first application of terminal device running background or sets disabled status for the use state that described first applies;
Wherein, first input is following any one: triggering the terminal device in the terminal device front stage operation the
The input that the input of two applications, the triggering terminal device pass through the second application execution predetermined registration operation.
8. terminal device according to claim 7, which is characterized in that the terminal device further includes receiving module;
The receiving module, for receiving user to the of target object before the input of detection module detection user
Two inputs, the target object are target identification or target key, and second input is the terminal device in the first operation
Received input in system, first operating system are corresponding with the first screen of the terminal device;
The processing module is also used to run the second operating system in response to received second input of the receiving module,
Second operating system is corresponding with the second screen of the terminal device;
The detection module, specifically for detecting the input of user in second operating system.
9. terminal device according to claim 7 or 8, which is characterized in that the terminal device further includes display module;
The processing module is also used to after running second application, determines in second application whether include first
Input method;
The display module includes the case where first input method for determining in second application in the processing module
Under, the first dummy keyboard is shown in the interface of second application, alternatively, determining second application in the processing module
In do not include first input method in the case where, show the second dummy keyboard in the interface of second application, described the
One dummy keyboard is the dummy keyboard of first input method, and second dummy keyboard is the dummy keyboard of the second input method,
Second input method is the system input method of the terminal device.
10. terminal device according to claim 7 or 8, which is characterized in that the detection module is also used to detect described
The application of terminal device front stage operation;
The processing module is also used to detect that the application of the terminal device front stage operation is answered for third in the detection module
In the case where, forbid the 4th using the terminal device objective function, it is described 4th application be the terminal device
Application in except the third application in addition to application;
Wherein, the objective function includes at least one of the following: sound-recording function, screenshotss function, read/write function.
11. terminal device according to claim 7 or 8, which is characterized in that the processing module is also used to will be described
The use state of first application is set as after disabled status, and after exiting second application, described first is applied
Use state is set as initiate mode.
12. terminal device according to claim 7 or 8, which is characterized in that the processing module is also used to described
The use state of one application is set as after disabled status, after exiting second application, delete target data or to institute
Target data encryption is stated, the target data is the user data of second application saved in the terminal device.
13. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor
Any one of described in control method the step of.
14. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium
Sequence realizes the step such as control method described in any one of claims 1 to 6 when the computer program is executed by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910336144.7A CN110232275B (en) | 2019-04-24 | 2019-04-24 | Control method and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910336144.7A CN110232275B (en) | 2019-04-24 | 2019-04-24 | Control method and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110232275A true CN110232275A (en) | 2019-09-13 |
CN110232275B CN110232275B (en) | 2021-04-27 |
Family
ID=67860262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910336144.7A Active CN110232275B (en) | 2019-04-24 | 2019-04-24 | Control method and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110232275B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114647450A (en) * | 2020-12-18 | 2022-06-21 | Oppo广东移动通信有限公司 | Information input method, information input device, electronic equipment and computer readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100174631A1 (en) * | 2009-01-07 | 2010-07-08 | Onbest Technology Holdings Limited | Secure device firmware |
CN103714459A (en) * | 2013-12-26 | 2014-04-09 | 电子科技大学 | Secure payment system and method of intelligent terminal |
US20150373023A1 (en) * | 2014-06-22 | 2015-12-24 | Citrix Systems, Inc. | Enabling User Entropy Encryption in Non-Compliant Mobile Applications |
CN105912272A (en) * | 2016-04-14 | 2016-08-31 | 华为技术有限公司 | Device and method controlling operation of multiple safety applications |
CN107102891A (en) * | 2017-03-01 | 2017-08-29 | 北京珠穆朗玛移动通信有限公司 | The management method and mobile terminal of a kind of application based on dual system |
CN108229151A (en) * | 2016-12-09 | 2018-06-29 | 武汉安天信息技术有限责任公司 | A kind of anti-short message applied to mobile terminal kidnaps method and device |
-
2019
- 2019-04-24 CN CN201910336144.7A patent/CN110232275B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100174631A1 (en) * | 2009-01-07 | 2010-07-08 | Onbest Technology Holdings Limited | Secure device firmware |
CN103714459A (en) * | 2013-12-26 | 2014-04-09 | 电子科技大学 | Secure payment system and method of intelligent terminal |
US20150373023A1 (en) * | 2014-06-22 | 2015-12-24 | Citrix Systems, Inc. | Enabling User Entropy Encryption in Non-Compliant Mobile Applications |
CN105912272A (en) * | 2016-04-14 | 2016-08-31 | 华为技术有限公司 | Device and method controlling operation of multiple safety applications |
CN108229151A (en) * | 2016-12-09 | 2018-06-29 | 武汉安天信息技术有限责任公司 | A kind of anti-short message applied to mobile terminal kidnaps method and device |
CN107102891A (en) * | 2017-03-01 | 2017-08-29 | 北京珠穆朗玛移动通信有限公司 | The management method and mobile terminal of a kind of application based on dual system |
Non-Patent Citations (1)
Title |
---|
易昀: "数字视音频嵌入式应用软件开发平台的研制", 《万方数据库》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114647450A (en) * | 2020-12-18 | 2022-06-21 | Oppo广东移动通信有限公司 | Information input method, information input device, electronic equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110232275B (en) | 2021-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109542282A (en) | A kind of interface display method and terminal device | |
CN110062105A (en) | A kind of interface display method and terminal device | |
CN108595946A (en) | A kind of method and terminal of protection privacy | |
CN109857495A (en) | A kind of display control method and terminal device | |
CN110058836A (en) | A kind of output method and terminal device of audio signal | |
CN110007822A (en) | A kind of interface display method and terminal device | |
CN110489385A (en) | A kind of information processing method and terminal device | |
CN110049187A (en) | A kind of display methods and terminal device | |
CN108171034A (en) | A kind of method and terminal for protecting privacy | |
CN110233933A (en) | A kind of call method and terminal device | |
CN109753350A (en) | A kind of method for managing resource and terminal device | |
CN110058911A (en) | A kind of application control method and terminal device | |
CN110069305A (en) | A kind of screen interface switching method and terminal device | |
CN110147174A (en) | A kind of control method and terminal device | |
CN110046013A (en) | A kind of interface display method and terminal device | |
CN109521920A (en) | A kind of application icon control method and terminal device | |
CN109284064A (en) | A kind of interface display method and terminal device | |
CN108804151A (en) | A kind of method and terminal of re-launching applications | |
CN108153460A (en) | A kind of icon hiding method and terminal | |
CN110012151A (en) | A kind of information display method and terminal device | |
CN110457935A (en) | A kind of authority configuring method and terminal device | |
CN109992192A (en) | A kind of interface display method and terminal device | |
CN109933266A (en) | A kind of display methods and terminal device | |
CN109766156A (en) | A kind of conversation establishing method and terminal device | |
CN110232275A (en) | A kind of control method and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |