CN110262813B - Method and apparatus for installing applications - Google Patents
Method and apparatus for installing applications Download PDFInfo
- Publication number
- CN110262813B CN110262813B CN201910553974.5A CN201910553974A CN110262813B CN 110262813 B CN110262813 B CN 110262813B CN 201910553974 A CN201910553974 A CN 201910553974A CN 110262813 B CN110262813 B CN 110262813B
- Authority
- CN
- China
- Prior art keywords
- application
- password
- running
- input
- lock list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the application discloses a method and a device for installing an application. One embodiment of the method comprises: detecting the existence of a second application which is downloaded through a first application and is not installed, wherein the first application is provided with an application lock function; responsive to a current launch of a third application; determining whether the third application is an application in an application lock list of the first application; in response to determining that the third application is an application in the application lock list of the first application, prompting installation of the second application before running the third application and/or after exiting the third application; in response to detecting a confirmation operation to install the second application, the second application is installed. According to the method and the device, the user is prompted to install the second application before the user runs the application in the application lock list of the first application and/or after the user exits the application in the application lock list of the first application, and the installation success rate of the second application is improved on the premise that the user uses the application.
Description
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a method and a device for installing applications.
Background
Currently, an information flow class application or an application market class application may launch a download link of the application. The user may download the application through an information flow class application or an application marketplace class application. However, in many cases, the user downloads the application without installing it, which seriously affects the rendering capability of the information flow class application and the application market class application. To solve this problem, the user is usually guided to install when the user opens the information flow class application or the application market class application again. However, most information flow type applications or application market type applications are not used frequently, so that it is difficult to solve the problem by making a boot installation within the information flow type applications or application market type applications.
Disclosure of Invention
The embodiment of the application provides a method and a device for installing an application.
In a first aspect, an embodiment of the present application provides a method for installing an application, including: detecting the existence of a second application which is downloaded through a first application and is not installed, wherein the first application is provided with an application lock function; responsive to a current launch of a third application; determining whether the third application is an application in an application lock list of the first application; in response to determining that the third application is an application in the application lock list of the first application, prompting installation of the second application before running the third application and/or after exiting the third application; in response to detecting a confirmation operation to install the second application, the second application is installed.
In some embodiments, the method further comprises: and if the installation of the second application is prompted and installed before the third application is run, responding to the completion of the installation of the second application, and running the third application.
In some embodiments, prompting installation of the second application after exiting the third application further comprises: prompting to input a running password of the third application before running the third application; acquiring an input running password in response to detecting a confirmation operation of inputting the running password of the third application; determining whether the input running password matches with a running password of a third application; running the third application in response to the input running password matching the running password of the third application; and prompting the installation of the second application in response to detecting the exit operation of the third application.
In some embodiments, the method further comprises: and prompting to install the second application in response to the input running password not matching the running password of the third application.
In some embodiments, in response to the currently launching the third application, comprising: monitoring the application running on the stack top currently through the first application in response to the first application opening the stack top authority; and if the application on the currently running stack top is monitored, determining the application on the currently running stack top as the currently started third application.
In some embodiments, determining whether the third application is an application in the application lock list of the first application comprises: searching in a pre-stored application lock list of the first application based on the identifier of the third application, wherein the application lock list of the first application is used for storing the identifier of the application for which the password lock is set by the first application; if the search is successful, determining that the third application is the application in the application lock list of the first application; and if the search fails, determining that the third application is not the application in the application lock list of the first application.
In some embodiments, determining whether the third application is an application in the application lock list of the first application comprises: sending the identifier of the third application to the server of the first application; receiving a search result fed back by a server of the first application, wherein the search result is a result of searching in an application lock list of the first application based on the identifier of the third application; based on the lookup result, it is determined whether the third application is an application in the application lock list of the first application.
In some embodiments, prompting installation of the second application comprises: installing a second application through the popup prompt of the first application; and prompting to input a running password of the third application, comprising: and inputting the running password of the third application through the popup prompt of the first application.
In some embodiments, determining whether the entered run password matches the run password of the third application comprises: comparing the input running password with a prestored running password of a third application; if the comparison is consistent, determining that the input running password is matched with the running password of the third application; and if the comparison is inconsistent, determining that the input running password is not matched with the running password of the third application.
In some embodiments, determining whether the entered run password matches the run password of the third application comprises: sending the input running password to a server of a third application; receiving a comparison result fed back by the server of the third application, wherein the comparison result is a result of comparing the input running password with a prestored running password of the third application; and determining whether the input running password is matched with the running password of the third application or not based on the comparison result.
In a second aspect, an embodiment of the present application provides an apparatus for installing an application, including: a detection unit configured to detect that there is a second application downloaded and uninstalled through a first application, wherein the first application is provided with an application lock function; a start unit configured to respond to a current start of a third application; a determination unit configured to determine whether the third application is an application in an application lock list of the first application; a prompting unit configured to prompt installation of the second application before running the third application and/or after exiting the third application in response to determining that the third application is an application in the application lock list of the first application; an installation unit configured to install the second application in response to detecting a confirmation operation of installing the second application.
In some embodiments, the apparatus further comprises: and the running unit is configured to respond to the installation completion of the second application and run the third application if prompting the installation and installation of the second application before running the third application.
In some embodiments, the cue unit comprises: a first prompting subunit configured to prompt for an execution password of the third application before executing the third application; an acquisition subunit configured to acquire the input run password in response to detection of a confirmation operation of inputting the run password of the third application; a determination subunit configured to determine whether the input run password matches a run password of the third application; a running subunit configured to run the third application in response to the input running password matching a running password of the third application; a second prompting subunit configured to prompt installation of the second application in response to detection of an exit operation of the third application.
In some embodiments, the prompting unit further comprises: a third prompting subunit configured to prompt installation of the second application in response to the input run password not matching the run password of the third application.
In some embodiments, the activation unit is further configured to: monitoring the application running on the stack top currently through the first application in response to the first application opening the stack top authority; and if the application on the currently running stack top is monitored, determining the application on the currently running stack top as the currently started third application.
In some embodiments, the determining unit is further configured to: searching in a pre-stored application lock list of the first application based on the identifier of the third application, wherein the application lock list of the first application is used for storing the identifier of the application for which the password lock is set by the first application; if the search is successful, determining that the third application is the application in the application lock list of the first application; and if the search fails, determining that the third application is not the application in the application lock list of the first application.
In some embodiments, the determining unit is further configured to: sending the identifier of the third application to the server of the first application; receiving a search result fed back by a server of the first application, wherein the search result is a result of searching in an application lock list of the first application based on the identifier of the third application; based on the lookup result, it is determined whether the third application is an application in the application lock list of the first application.
In some embodiments, the first prompt subunit is further configured to: installing a second application through the popup prompt of the first application; and the second prompt subunit is further configured to: and inputting the running password of the third application through the popup prompt of the first application.
In some embodiments, the determining subunit is further configured to: comparing the input running password with a prestored running password of a third application; if the comparison is consistent, determining that the input running password is matched with the running password of the third application; and if the comparison is inconsistent, determining that the input running password is not matched with the running password of the third application.
In some embodiments, the determining subunit is further configured to: sending the input running password to a server of a third application; receiving a comparison result fed back by the server of the third application, wherein the comparison result is a result of comparing the input running password with a prestored running password of the third application; and determining whether the input running password is matched with the running password of the third application or not based on the comparison result.
In a third aspect, an embodiment of the present application provides a terminal device, where the terminal device includes: one or more processors; a storage device having one or more programs stored thereon; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the method as described in any implementation of the first aspect.
In a fourth aspect, the present application provides a computer-readable medium, on which a computer program is stored, which, when executed by a processor, implements the method as described in any implementation manner of the first aspect.
According to the method and the device for installing the application, whether the third application is an application in an application lock list of the first application is determined when the second application which is downloaded through the first application and is not installed is detected to exist and the third application is started currently; prompting installation of the second application before running the third application and/or after exiting the third application, in the event that the third application is determined to be an application in the application lock list of the first application; in a case where a confirmation operation of installing the second application is detected, the second application is installed. Before the user runs the application in the application lock list of the first application and/or after the user quits the application in the application lock list of the first application, the user is prompted to install the second application, and the installation success rate of the second application is improved on the premise that the user uses the application.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture to which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for installing an application according to the present application;
FIG. 3 is a flow diagram of yet another embodiment of a method for installing an application according to the present application;
FIG. 4A is a diagram of a first pop-up message;
FIG. 4B is a schematic diagram of a password entry interface;
FIG. 4C is a diagram of a second pop-up message;
fig. 5 is a schematic structural diagram of a computer system suitable for implementing a terminal device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the method for installing an application of the present application may be applied.
As shown in fig. 1, devices 101, 102, 103, 104 and network 105 may be included in system architecture 100. Network 105 is the medium by which communication links are provided between device 101 and devices 102, 103, 104. Network 105 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The devices 101, 102, 103, 104 may be hardware devices or software that support network connectivity to provide various network services. When the device is hardware, it can be a variety of electronic devices including, but not limited to, smart phones, tablets, laptop portable computers, desktop computers, servers, and the like. In this case, the hardware device may be implemented as a distributed device group including a plurality of devices, or may be implemented as a single device. When the device is software, the software can be installed in the electronic devices listed above. At this time, as software, it may be implemented as a plurality of software or software modules for providing a distributed service, for example, or as a single software or software module. And is not particularly limited herein.
In practice, a device may provide a respective network service by installing a respective client application or server application. After the device has installed the client application, it may be embodied as a client in network communications. Accordingly, after the server application is installed, it may be embodied as a server in network communications.
As an example, in fig. 1, the device 101 is embodied as a client, while the devices 102, 103, 104 are embodied as servers. Specifically, the device 101 may be a client installed with the first application and the third application. And, the device 101 has downloaded the second application through the first application. The device 102 may be a server of the first application. The device 103 may be a server for the second application. The device 104 may be a server of a third application. The first application may include, but is not limited to, an information flow class application, an application market class application, and the like, for launching the second application. The second application may be any application, both foreground and background. The third application may be an application in an application lock list of the first application. Typically, the application in the application lock list of the first application is a foreground application.
It should be noted that the method for installing the application provided in the embodiment of the present application may be executed by the device 101.
It should be understood that the number of networks and devices in fig. 1 is merely illustrative. There may be any number of networks and devices, as desired for implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of a method for installing an application in accordance with the present application is shown. The method for installing an application comprises the following steps:
in step 201, it is detected that there is a second application downloaded and not installed by the first application.
In this embodiment, a terminal device (e.g., device 101 shown in fig. 1) may detect whether there is a second application downloaded and not installed by a first application. Wherein the first application may be an application that has been installed on the terminal device. The second application may be an application that has been downloaded but not yet installed. The first application may include, but is not limited to, an information flow class application, an application market class application, and the like, for launching the second application. For example, if the first application is a flow-like application, the second application may be launched on a flow page of the first application, such that the user may download the second application from the flow page of the first application. As another example, the first application is an application marketplace type application, and the user may search for the second application on a search page of the first application and download. In addition, the first application can have an application lock function, and a user can add any foreground application installed on the terminal device into an application lock list of the first application and set an operation password. Thus, when a user wants to launch an application in the application lock list of the first application, the user may be required to enter a run password for the launched application or perform other tasks to run the launched application. The running password may include, but is not limited to, a character string password, a fingerprint password, a gesture password, a face image password, and the like. The second application may be any application, both foreground and background. The foreground application refers to an application using operation, and interaction operation exists between the foreground application and a user in the running process. Background applications refer to applications that manage foreground operations and do not have an interactive relationship with a user during the running process.
In this embodiment, the terminal device may monitor the currently started third application. Wherein the third application may be an application that has been installed on the terminal device. And, the third application may be an application in the application lock list of the first application.
In some optional implementation manners of this embodiment, if the first application with the application lock function wants to monitor the currently started third application, the first application is required to open the top of stack permission. Under the condition that the first application opens the stack top authority, the terminal device can monitor the application running on the stack top currently through the first application. If the currently running top-of-stack application is monitored, then the currently running top-of-stack application is the currently launched third application. Typically, in the early Android (Android) version, the first application may obtain the application currently running at the top of the stack by using the activitymanager. In versions of Android 5.1 and above, the first application may use a usagetmanager. queryusagestats method to obtain the application of the currently running stack top.
In this embodiment, the terminal device may determine whether the third application is an application in the application lock list of the first application. In the case that the third application is an application in the application lock list of the first application, continuing to perform step 204; otherwise, continuing to monitor the currently started third application.
In some optional implementations of this embodiment, the terminal device may store an application lock list of the first application in advance. In this way, the terminal device may perform a search in an application lock list of the first application stored in advance based on the identifier of the third application; if the search is successful, the terminal device may determine that the third application is an application in the application lock list of the first application; if the search fails, the terminal device may determine that the third application is not an application in the application lock list of the first application. Wherein the application lock list of the first application may be used to store an identification of the application for which the passlock was set by the first application. In this way, the terminal device may compare the identifier of the third application with the identifiers of the applications stored in the application lock list of the first application one by one, and if the identifier of the third application is stored in the application lock list of the first application, the terminal device may determine that the third application is an application in the application lock list of the first application; otherwise, the terminal device may determine that the third application is not an application in the application lock list of the first application.
In some optional implementations of the embodiment, a server (e.g., the device 102 shown in fig. 1) of the first application may pre-store an application lock list of the first application. In this way, the terminal device may send the identity of the third application to the server of the first application. The server of the first application can search in a pre-stored application lock list of the first application based on the identification of the third application; if the search is successful, the server of the first application may generate a search result indicating that the third application is an application in the application lock list of the first application; if the search fails, the server of the first application may generate a search result indicating that the third application is not an application in the application lock list of the first application. Subsequently, the server of the first application may feed back the search result to the terminal device. In this way, the terminal device may receive a search result fed back by the server of the first application, and determine whether the third application is an application in the application lock list of the first application based on the search result. The search result may be a result of the server of the first application searching in the application lock list of the first application based on the identifier of the third application.
In this embodiment, in the case where the third application is an application in the application lock list of the first application, the terminal device may prompt installation of the second application before running the third application and/or after exiting the third application. Here, the prompting method may include, but is not limited to, text prompting, picture prompting, voice prompting, video prompting, and the like.
In some optional implementation manners of this embodiment, the terminal device may install the second application through a popup prompt of the first application. In general, the popup may include not only text for prompting installation of the second application but also a button for selecting installation of the second application.
In this embodiment, the terminal device may detect a confirmation operation of installing the second application. In the case where a confirmation operation of installing the second application is detected, the terminal device may install the second application. In general, when the terminal device detects that the user clicks a key on the popup for selecting installation of the second application, it may be considered that a confirmation operation for installing the second application is detected.
In some optional implementation manners of this embodiment, if the terminal device prompts to install the second application and install the second application before running the third application, the terminal device may run the third application when the installation of the second application is completed.
In addition, the execution order of step 201 and step 202 is not limited in this embodiment. That is, the terminal device may first detect whether there is a second application downloaded and uninstalled through the first application, and after detecting that there is a second application downloaded and uninstalled through the first application, monitor the currently started third application. The terminal device may also monitor the currently started third application, and detect whether there is a second application downloaded and not installed through the first application after monitoring the currently started third application. The terminal equipment can also simultaneously detect whether a second application which is downloaded and not installed through the first application exists and monitor a currently started third application. It should be understood that whatever order of execution is within the scope of the claims.
According to the method for installing the application, under the condition that the second application which is downloaded and not installed through the first application is detected to exist and the third application is started currently, whether the third application is the application in the application lock list of the first application is determined; prompting installation of the second application before running the third application and/or after exiting the third application, in the event that the third application is determined to be an application in the application lock list of the first application; in a case where a confirmation operation of installing the second application is detected, the second application is installed. Before the user runs the application in the application lock list of the first application and/or after the user quits the application in the application lock list of the first application, the user is prompted to install the second application, and the installation success rate of the second application is improved on the premise that the user uses the application.
With continued reference to FIG. 3, illustrated is a flow 300 that is yet another embodiment of a method for installing an application in accordance with the present application. The method for installing an application comprises the following steps:
In the present embodiment, the specific operations of steps 301-.
In response to determining that the third application is an application in the application lock list of the first application, step 304, installation of the second application or entry of a run password for the third application is prompted prior to running the third application.
In this embodiment, in the case where it is determined that the third application is an application in the application lock list of the first application, the terminal device (e.g., the device 101 shown in fig. 1) may prompt to install the second application or input a running password of the third application before running the third application. Here, the prompting method may include, but is not limited to, text prompting, picture prompting, voice prompting, video prompting, and the like.
In some optional implementation manners of this embodiment, the terminal device may prompt, through a popup of the first application, to install the second application or input a running password of the third application. In general, the popup may include not only text for prompting installation of the second application or input of a running password of the third application, but also a button for selecting installation of the second application and a button for selecting input of a running password of the third application.
In this embodiment, the specific operation of step 305 has been described in detail in step 205 in the embodiment shown in fig. 2, and is not described herein again.
And step 306, responding to the detected confirmation operation of the input running password of the third application, and acquiring the input running password.
In this embodiment, the terminal device may detect a confirmation operation of inputting the run password of the third application. In the case where a confirmation operation of inputting the run password of the third application is detected, the terminal device may acquire the input run password and proceed to step 307.
In general, when the terminal device detects that the user clicks a button on the popup window for selecting the entry of the run password of the third application, it may be considered that a confirmation operation of the entry of the run password of the third application is detected. At this time, a password input interface may be displayed on the screen of the terminal device. When the user is detected to input the running password in the password input interface, the input running password can be acquired.
In this embodiment, the terminal device may determine whether the input run password matches the run password of the third application. If the input running password does not match the running password of the third application, continue to execute step 308; otherwise, step 309 continues.
In some optional implementations of this embodiment, the terminal device may store the running password of the third application in advance. In this way, the terminal device can compare the input running password with the prestored running password of the third application; if the comparison is consistent, the terminal device can determine that the input running password is matched with the running password of the third application; if the comparison is inconsistent, the terminal device may determine that the input running password is not matched with the running password of the third application.
In some optional implementations of this embodiment, a server (e.g., the device 104 shown in fig. 1) of the third application may store the running password of the third application in advance. In this way, the terminal device can transmit the input running password to the server of the third application. The server of the third application may compare the input operation password with a prestored operation password of the third application; if the comparison is consistent, the server of the third application may generate a comparison result indicating that the input running password is consistent with the prestored running password of the third application; if the comparison is inconsistent, the server of the third application may generate a comparison result indicating that the input operation password is inconsistent with the pre-stored operation password of the third application. Subsequently, the server of the third application may feed back the comparison result to the terminal device. In this way, the terminal device may receive the comparison result fed back by the server of the third application, and determine whether the input operation password matches the operation password of the third application based on the comparison result. The comparison result may be a result of comparing the input operation password with a prestored operation password of the third application.
In this embodiment, in the case that the input running password does not match the running password of the third application, the terminal device may prompt installation of the second application and return to perform step 305. Here, the prompting method may include, but is not limited to, text prompting, picture prompting, voice prompting, video prompting, and the like.
In some optional implementation manners of this embodiment, the terminal device may install the second application through a popup prompt of the first application. In general, the popup may include not only text for prompting installation of the second application but also a button for selecting installation of the second application.
In this embodiment, the terminal device may run the third application in a case where the input running password matches the running password of the third application.
In response to detecting the exit operation of the third application, the installation of the second application is prompted, step 310.
In this embodiment, the terminal device may detect an exit operation of the third application. In the case where the quit operation of the third application is detected, the terminal device may prompt installation of the second application and return to execution of step 305. Here, the prompting method may include, but is not limited to, text prompting, picture prompting, voice prompting, video prompting, and the like.
In some optional implementation manners of this embodiment, the terminal device may install the second application through a popup prompt of the first application. In general, the popup may include not only text for prompting installation of the second application but also a button for selecting installation of the second application.
The embodiment of the application also provides an application scene of the method for installing the application. In the application scenario, a social application and a mailbox application are installed on a mobile phone of a user. The social application has an application lock function. The user adds the mailbox application to the application lock list of the social application and sets the fingerprint password. Meanwhile, the social application is also provided with an information flow page. The information flow page not only displays the information flow, but also displays the download link of the application launched thereon. And the user operates the social application and opens the information flow page for browsing. And when the user browses the download link of the wireless access point connection type application on the information flow page, clicking the download link of the wireless access point connection type application to download. However, after the download of the wireless access point connection-type application is completed, the user does not install it. At this time, because the social application opens the stack top authority, the mobile phone of the user can monitor the currently running application on the stack top through the first application. At this time, if the user opens the mailbox application, the first application monitors that the currently running application on the stack top is the mailbox application. Since the mailbox application is an application in the application lock list of the social application, the mobile phone of the user may display a first popup message of the social application, as specifically shown in fig. 4A, which is used to prompt installation of the wireless access point connection application or input of a fingerprint password of the mailbox application. When the user clicks the key for inputting the fingerprint password of the third application in the first popup message, a password input interface may be displayed on the mobile phone of the user, as shown in fig. 4B specifically, and is used to prompt the user to input the fingerprint password of the mailbox application. After the user inputs the fingerprint password of the mailbox application, the mobile phone of the user runs the mailbox application. When the user clicks an exit key of the mailbox application, the mobile phone of the user may display a second popup message of the social application, as shown in fig. 4C specifically, which is used to prompt installation of the wireless access point connection application. And when the user clicks a key for installing the wireless access point connection type application in the second popup message, the mobile phone of the user installs the wireless access point connection type application.
As can be seen from fig. 3, compared to the embodiment corresponding to fig. 2, the flow 300 of the method for installing an application in the present embodiment highlights the step of prompting the user to install the second application. Therefore, the scheme described in this embodiment can prompt the user to install the second application when the user starts the application in the application lock list of the first application, and can prompt the user to install the second application when the user exits from the application in the application lock list of the first application, thereby improving the installation success rate of the second application on the premise of not interrupting the use of the application by the user.
Referring now to FIG. 5, a block diagram of a computer system 500 suitable for use in implementing a terminal device (e.g., device 101 shown in FIG. 1) of an embodiment of the present application is shown. The terminal device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU)501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output section 505 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511. The computer program performs the above-described functions defined in the method of the present application when executed by the Central Processing Unit (CPU) 501.
It should be noted that the computer readable medium described herein can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or electronic device. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a detection unit, an activation unit, a determination unit, a prompt unit, and an installation unit. Where the names of the units do not constitute a limitation of the units themselves in this case, for example, the detection unit may also be described as a "unit detecting the presence of a second application downloaded and not installed by the first application".
As another aspect, the present application also provides a computer-readable medium, which may be contained in the terminal device described in the above embodiments; or may exist separately without being assembled into the terminal device. The computer readable medium carries one or more programs which, when executed by the terminal device, cause the terminal device to: detecting the existence of a second application which is downloaded through a first application and is not installed, wherein the first application is provided with an application lock function; responsive to a current launch of a third application; determining whether the third application is an application in an application lock list of the first application; in response to determining that the third application is an application in the application lock list of the first application, prompting installation of the second application before running the third application and/or after exiting the third application; (ii) a In response to detecting a confirmation operation to install the second application, the second application is installed.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (11)
1. A method for installing an application, comprising:
detecting the existence of a second application downloaded and uninstalled through a first application, wherein the first application is provided with an application lock function;
responsive to a current launch of a third application;
determining whether the third application is an application in an application lock list of the first application;
in response to determining that the third application is an application in an application lock list of the first application, prompting installation of the second application before running the third application and/or after exiting the third application;
installing the second application in response to detecting a confirmation operation to install the second application;
wherein the method further comprises:
and if the second application is prompted to be installed and installed before the third application is operated, responding to the completion of the installation of the second application, and operating the third application.
2. The method of claim 1, wherein the prompting to install the second application after exiting the third application comprises:
prompting for an execution password of the third application before executing the third application;
acquiring an input running password in response to detecting a confirmation operation of inputting the running password of the third application;
determining whether the input run password matches the run password of the third application;
in response to the input run password matching the run password of the third application, running the third application;
prompting installation of the second application in response to detecting an exit operation of the third application.
3. The method of claim 2, wherein the method further comprises:
and prompting to install the second application in response to the input running password not matching the running password of the third application.
4. The method of claim 1, wherein said responding to a current launch of a third application comprises:
monitoring the application running at the stack top currently through the first application in response to the first application opening the stack top authority;
and if the application on the currently running stack top is monitored, determining the application on the currently running stack top as the currently started third application.
5. The method of claim 1, wherein the determining whether the third application is an application in an application lock list of the first application comprises:
searching in a pre-stored application lock list of the first application based on the identifier of the third application, wherein the application lock list of the first application is used for storing the identifier of the application for which the password lock is set by the first application;
if the search is successful, determining that the third application is the application in the application lock list of the first application;
and if the search fails, determining that the third application is not the application in the application lock list of the first application.
6. The method of claim 1, wherein the determining whether the third application is an application in an application lock list of the first application comprises:
sending the identifier of the third application to the server of the first application;
receiving a search result fed back by the server of the first application, wherein the search result is a result of searching in an application lock list of the first application based on the identifier of the third application;
determining whether the third application is an application in an application lock list of the first application based on the search result.
7. The method of claim 2, wherein the prompting to install the second application comprises:
installing the second application through a popup prompt of the first application; and
the prompting to input the running password of the third application comprises the following steps:
and inputting the running password of the third application through the popup prompt of the first application.
8. The method of claim 2, wherein the determining whether the input run password matches the run password of the third application comprises:
comparing the input running password with a prestored running password of the third application;
if the comparison is consistent, determining that the input running password is matched with the running password of the third application;
and if the comparison is inconsistent, determining that the input running password is not matched with the running password of the third application.
9. The method of claim 2, wherein the determining whether the input run password matches the run password of the third application comprises:
sending the input running password to a server of the third application;
receiving a comparison result fed back by the server of the third application, wherein the comparison result is a result of comparing the input running password with a prestored running password of the third application;
and determining whether the input running password is matched with the running password of the third application or not based on the comparison result.
10. A terminal device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-9.
11. A computer-readable medium, on which a computer program is stored, wherein the computer program, when being executed by a processor, carries out the method according to any one of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910553974.5A CN110262813B (en) | 2019-06-25 | 2019-06-25 | Method and apparatus for installing applications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910553974.5A CN110262813B (en) | 2019-06-25 | 2019-06-25 | Method and apparatus for installing applications |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110262813A CN110262813A (en) | 2019-09-20 |
CN110262813B true CN110262813B (en) | 2020-11-17 |
Family
ID=67921253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910553974.5A Active CN110262813B (en) | 2019-06-25 | 2019-06-25 | Method and apparatus for installing applications |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110262813B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113885755A (en) * | 2021-09-30 | 2022-01-04 | 北京达佳互联信息技术有限公司 | Application processing prompting method and device, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9436968B1 (en) * | 2012-12-05 | 2016-09-06 | Parallels IP Holdings GmbH | System and method for application license management in virtual environments |
CN106445594A (en) * | 2016-09-23 | 2017-02-22 | 海信集团有限公司 | Method and device for installing system applications and terminal device |
CN106845211A (en) * | 2016-12-16 | 2017-06-13 | 北京奇虎科技有限公司 | Mobile terminal and its application start method and device |
CN107577955A (en) * | 2017-08-23 | 2018-01-12 | 北京国信云服科技有限公司 | A kind of android system application Hook methods and application lock |
CN107861666A (en) * | 2017-11-24 | 2018-03-30 | 北京小米移动软件有限公司 | desktop application installation method and device |
CN108846272A (en) * | 2018-07-13 | 2018-11-20 | 厦门美图移动科技有限公司 | Application security management method and device and electronic equipment |
CN109522710A (en) * | 2018-10-18 | 2019-03-26 | 深圳市沃特沃德股份有限公司 | Using the method and device of unlock |
CN109766103A (en) * | 2019-01-16 | 2019-05-17 | 上海连尚网络科技有限公司 | Method and apparatus for handling information |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103402195B (en) * | 2013-07-29 | 2017-09-26 | 广州供电局有限公司 | The application processing method and enterprise-level mobile solution platform of enterprise-level mobile terminal |
US10142309B2 (en) * | 2014-12-19 | 2018-11-27 | Dropbox, Inc. | No password user account access |
WO2017039320A1 (en) * | 2015-08-31 | 2017-03-09 | 삼성전자 주식회사 | Method and device for downloading profile in communication system |
CN105446782A (en) * | 2015-12-24 | 2016-03-30 | 深圳市金立通信设备有限公司 | Management method of terminal application and terminal |
-
2019
- 2019-06-25 CN CN201910553974.5A patent/CN110262813B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9436968B1 (en) * | 2012-12-05 | 2016-09-06 | Parallels IP Holdings GmbH | System and method for application license management in virtual environments |
CN106445594A (en) * | 2016-09-23 | 2017-02-22 | 海信集团有限公司 | Method and device for installing system applications and terminal device |
CN106845211A (en) * | 2016-12-16 | 2017-06-13 | 北京奇虎科技有限公司 | Mobile terminal and its application start method and device |
CN107577955A (en) * | 2017-08-23 | 2018-01-12 | 北京国信云服科技有限公司 | A kind of android system application Hook methods and application lock |
CN107861666A (en) * | 2017-11-24 | 2018-03-30 | 北京小米移动软件有限公司 | desktop application installation method and device |
CN108846272A (en) * | 2018-07-13 | 2018-11-20 | 厦门美图移动科技有限公司 | Application security management method and device and electronic equipment |
CN109522710A (en) * | 2018-10-18 | 2019-03-26 | 深圳市沃特沃德股份有限公司 | Using the method and device of unlock |
CN109766103A (en) * | 2019-01-16 | 2019-05-17 | 上海连尚网络科技有限公司 | Method and apparatus for handling information |
Also Published As
Publication number | Publication date |
---|---|
CN110262813A (en) | 2019-09-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10127057B2 (en) | Method and apparatus for dynamically implementing application function | |
CN111666546B (en) | Application login method and device | |
CN108681662B (en) | Method and device for installing program | |
CN110708346A (en) | Information processing system and method | |
CN106201574B (en) | Application interface starting method and device | |
US9389873B2 (en) | Kiosk application mode for operating system | |
US20220043898A1 (en) | Methods and apparatuses for acquiring information | |
CN109766103B (en) | Method and apparatus for processing information | |
CN109510881A (en) | Method, apparatus, electronic equipment and the readable storage medium storing program for executing of sharing files | |
CN113630253A (en) | Login method, device, computer system and readable storage medium | |
CN110262813B (en) | Method and apparatus for installing applications | |
CN113434254B (en) | Client deployment method, client deployment apparatus, computer device, and storage medium | |
CN114840379A (en) | Log generation method, device, server and storage medium | |
CN109218338B (en) | Information processing system, method and device | |
CN111666567A (en) | Detection method, device, computer program and medium for malicious modification of application program | |
CN115913913B (en) | Network card pre-starting execution environment function fault positioning method and device | |
CN112016080A (en) | Application authority management method and device and electronic equipment | |
CN109145591B (en) | Plug-in loading method of application program | |
CN111988829B (en) | Access method and device of wireless local area network | |
CN108471635B (en) | Method and apparatus for connecting wireless access points | |
CN107256170B (en) | Method and device for activating input method setting items of terminal equipment | |
CN112733113A (en) | Device authentication method, device, system, electronic device and medium | |
CN113760727A (en) | Interface regression testing method and device | |
CN108804713B (en) | Image output method, electronic device, and computer-readable medium | |
CN114090104A (en) | Applet starting control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |