CN113655937A - Application management method and device, electronic equipment and readable storage medium - Google Patents

Application management method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN113655937A
CN113655937A CN202110914700.1A CN202110914700A CN113655937A CN 113655937 A CN113655937 A CN 113655937A CN 202110914700 A CN202110914700 A CN 202110914700A CN 113655937 A CN113655937 A CN 113655937A
Authority
CN
China
Prior art keywords
application
target
input
control
background
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110914700.1A
Other languages
Chinese (zh)
Inventor
许根林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Hangzhou Co Ltd
Original Assignee
Vivo Mobile Communication Hangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Hangzhou Co Ltd filed Critical Vivo Mobile Communication Hangzhou Co Ltd
Priority to CN202110914700.1A priority Critical patent/CN113655937A/en
Publication of CN113655937A publication Critical patent/CN113655937A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses an application management method and device, electronic equipment and a readable storage medium, and belongs to the technical field of electronics. The application management method comprises the following steps: receiving a first input to a target control under the condition that a first interface is displayed, wherein the first interface is used for indicating the background running condition of an application, and the target control is used for indicating target function information; and responding to the first input, closing a target application, wherein the target application has the authority of acquiring the target function information, and the target application runs in the background.

Description

Application management method and device, electronic equipment and readable storage medium
Technical Field
The application belongs to the technical field of electronics, and particularly relates to an application management method and device, electronic equipment and a readable storage medium.
Background
Currently, a large number of applications are included in electronic devices. For any application program, in the running process, user data needs to be acquired under the permission of a user.
In the using process, after a user opens a certain application program, the user can directly switch to other related application program interfaces through the designated icon in the application program interface; or, the user can directly switch to the home screen interface through a designated icon in the application program interface; or, the middle background running management interface can be directly switched through the designated icon in the application program interface, and then other application programs in the background running management interface are directly opened; the application is caused to run in the background automatically, regardless of the several circumstances described above. In this way, the application program may acquire the user data all the time in the background running process, thereby resulting in a high risk of user data leakage.
Therefore, in the prior art, the application program runs in the background, so that the risk of user data leakage is high.
Disclosure of Invention
The embodiment of the application management method aims to solve the problem that in the prior art, an application program runs in a background, so that the risk of user data leakage is high.
In a first aspect, an embodiment of the present application provides an application management method, where the method includes: receiving a first input to a target control under the condition that a first interface is displayed, wherein the first interface is used for indicating the background running condition of an application, and the target control is used for indicating target function information; and responding to the first input, closing a target application, wherein the target application has the authority of acquiring the target function information, and the target application runs in the background.
In a second aspect, an embodiment of the present application provides an application management apparatus, including: the device comprises a receiving module, a first display module and a second display module, wherein the receiving module is used for receiving first input of a target control under the condition that a first interface is displayed, the first interface is used for indicating background running conditions of an application, and the target control is used for indicating target function information; and the closing module is used for responding to the first input and closing the target application, wherein the target application has the authority of acquiring the target function information, and the target application runs in a background.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In this way, in the embodiment of the present application, first, in the first interface for indicating the background running condition of the application, a target control is preset, where the target control is used to indicate target function information, and in the present application, in order to reduce the risk of user data leakage, the target function information may be function information related to user data, such as camera function information, recording function information, and the like. Then, under the condition that the first interface is displayed, the user can perform first input on the target control, the electronic device responds to the first input, detects whether the target application runs in the background or not, detects whether the user has granted the right of the target application to acquire the target function information or not, and forcibly closes the target application under the condition that the target application runs in the background and has the right of acquiring the target function information, so that the target application is stopped from running in the background, and the target application is prevented from continuously acquiring the user data in time. Therefore, the target application running in the background can be closed in time to prevent the target application from continuously acquiring the user data, and therefore the risk of user data leakage is reduced.
Drawings
FIG. 1 is a flow chart of an application management method of an embodiment of the present application;
FIG. 2 is one of the interface schematic diagrams of the electronic device of the embodiment of the present application;
FIG. 3 is a second schematic interface diagram of an electronic device according to an embodiment of the present application;
FIG. 4 is a third schematic interface diagram of an electronic device according to an embodiment of the present application;
fig. 5 is a block diagram of an application management apparatus according to an embodiment of the present application;
fig. 6 is one of the hardware configuration diagrams of the electronic device according to the embodiment of the present application;
fig. 7 is a second schematic diagram of a hardware structure of the electronic device according to the embodiment of the present application.
+ detailed description of the invention
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The application management method provided by the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Fig. 1 shows a flowchart of an application management method according to an embodiment of the present application, which is applied to an electronic device, and includes:
s1: and under the condition that a first interface is displayed, receiving first input of a target control, wherein the first interface is used for indicating the background running condition of the application, and the target control is used for indicating target function information.
It is understood that the target control includes, but is not limited to, a text label, a symbol label, and an image label.
For example, referring to fig. 2, the target control in the present embodiment may be any one of control 1 and control 2; correspondingly, the control 1 represents the image identifier of the camera function, and the control 2 represents the image identifier of the sound recording function.
The target control is used for indicating target function information.
The target function information includes function information related to user data. Further, the target function information includes function information related to the user privacy data.
The target function information may include at least one of camera function information, sound recording function information, positioning function information, photograph function information, address book function information, and the like.
For example, referring to the interface shown in fig. 2, two controls, namely a control 1 and a control 2, are displayed, where the control 1 is used to indicate camera function information, and the control 2 is used to indicate recording function information. And the target control in this embodiment may be at least one of the two controls.
In further embodiments, more controls may be provided in the first interface for indicating more functional information related to the user privacy data according to more requirements of the user.
In this embodiment, the first interface is used to indicate a background running condition of the application, and the first interface may be used to receive a first input from a user.
Optionally, the first interface may be a newly added interface, the interface is used for indicating a background running condition of the application, and the first interface displays a target control.
Optionally, the first interface may be an existing interface for indicating a background running condition of the application, and a target control may be newly added to the existing interface.
For example, referring to fig. 2, the interface shown is a recent task interface, the recent task interface displays various application interfaces running in the background, such as an application 1 interface, an application 2 interface, an application 3 interface, and the like, and a control 1 and a control 2 may be added in a blank area of the recent task interface.
Wherein, the user can open the recent task interface through the preset input.
In this embodiment, a first input to a target control in a first interface may be received while the first interface is displayed.
The first input comprises touch input performed by a user on a screen, and is not limited to input of clicking, sliding, dragging and the like; the first input may also be a blank input, a gesture action, a face action, and the like of the user, and the first input further includes an input of a physical key on the device by the user, and is not limited to an input of a press and the like. Furthermore, the first input includes one or more inputs, wherein the plurality of inputs may be continuous or intermittent.
For example, the user clicks on a target control; as another example, the user presses the target control for a long time.
S2: and responding to the first input, closing the target application, wherein the target application has the authority of acquiring the target function information, and the target application runs in the background.
In this step, two detections are required for the target application in response to a first input of the target control by the user; first, whether the target application is running in the background; and the second item is whether the user grants the authority of the target application to acquire the target function information.
Further, only when both items are "yes", the target application may be closed, i.e. the target application is forcibly closed, and the target application is terminated to run in the background.
Alternatively, the target application may be any application in the electronic device.
In this way, in the embodiment of the present application, first, in the first interface for indicating the background running condition of the application, a target control is preset, where the target control is used to indicate target function information, and in the present application, in order to reduce the risk of user data leakage, the target function information may be function information related to user data, such as camera function information, recording function information, and the like. Then, under the condition that the first interface is displayed, the user can perform first input on the target control, the electronic device responds to the first input, detects whether the target application runs in the background or not, detects whether the user has granted the right of the target application to acquire the target function information or not, and forcibly closes the target application under the condition that the target application runs in the background and has the right of acquiring the target function information, so that the target application is stopped from running in the background, and the target application is prevented from continuously acquiring the user data in time. Therefore, the target application running in the background can be closed in time to prevent the target application from continuously acquiring the user data, and therefore the risk of user data leakage is reduced.
In a flow of an application management method according to another embodiment of the present application, the first input includes a first sub-input and a second sub-input.
Correspondingly, S2 includes:
substep A1: and responding to the first sub-input, displaying an application control list, wherein the application control list comprises at least one application control, and the application control is used for indicating an application with the authority of acquiring the target function information.
The application control list comprises at least one application control, and the application control is used for indicating an application with the permission of acquiring the target function information.
In this embodiment, in an application scenario, the first input includes a first sub-input and a second sub-input.
By reference, the implementation of the first sub-input is: the user presses the target control for a long time.
In the step, after the user presses the target control for a long time, a list configuration interface pops up, and an application control list is displayed in the interface.
At least one application control is sequentially displayed in the application control list, and each application control is used for indicating one application.
Before the application control list is displayed, all applications granted with the authority of acquiring the target function information by the user in the electronic equipment are identified based on the first sub-input of the user aiming at the target control, and then the identified applications are sequentially displayed in the form of corresponding application controls to form the application control list.
The application control in the present application includes, but is not limited to, a text mark, a symbol mark, and an image mark.
For example, the application control is a text identifier, and the text is specifically an application name.
Substep A2: receiving a second sub-input to a target application control in the list of application controls, the target application control corresponding to the target application.
The second sub-input is used to select a target application control in the application control list, so that the present embodiment may force the target application running in the background to be closed.
The number of the target application controls may be multiple, and each target application control corresponds to one target application.
For example, referring to fig. 3, the application control list is presented in a form of a "prohibited applications running in the background" list, a plurality of display fields are sequentially displayed in the list from top to bottom, in each display field, a corresponding application name and an application icon are displayed, and at the same time, a corresponding application control is displayed on the right side of the display field. Specifically, the control is a switch image identifier, which is hereinafter referred to as a switch. The switch comprises two states, namely an off state and an on state. In this embodiment, a user may click a switch corresponding to a target application, and switch the switch from an off state to an on state, thereby achieving a purpose of selecting the target application. Specifically, referring to fig. 3, the user may use the applications 2 and 4 indicated by the dashed boxes as target applications, and click the corresponding switches, so as to switch the switches of the applications 2 and 4 from the off state to the on state.
It should be noted that the dashed box in fig. 3 is used to indicate the application selected by the user, and may not be displayed in the interface in the actual display effect.
As another example, the switch image identifier may be replaced by a box image identifier.
Referring to fig. 4, to the right of each display bar, a small box is illustratively displayed, and the small box includes two states, an unchecked state and a checked state. In this embodiment, the user may double click the small box to switch the unchecked state to the checked state, thereby achieving the purpose of selecting the target application. Specifically, referring to fig. 4, the user may use the application 2 and the application 4 indicated by the dashed boxes as the target application, and double-click the corresponding small boxes to switch the small boxes of the application 2 and the application 4 from the unchecked state to the checked state.
It should be noted that the dashed box in fig. 4 is used to indicate the application selected by the user, and may not be displayed in the interface in the actual display effect.
Substep A3: and in response to the second sub-input, closing the target application under the condition that the target application is currently running in the background.
In this step, if the target application selected by the user corresponds to the situation that the target application is currently running in the background, the target application is directly closed, and the background running of the target application is terminated.
In this embodiment, the user may call up an application list to which the user grants the target function information acquisition permission through the first sub-input to the target control, and further, the user may select, through the second sub-input, an application in the list for which the user does not want to acquire the target function information in the background as the target application. Therefore, based on the selection of the user, the present embodiment may forcibly close the target application under the condition that the target application is currently running in the background, so as to achieve the purpose of reducing the risk of user data leakage. Therefore, the embodiment better meets the requirements of the user on different applications, and flexibly controls the running condition of each application in the background on the basis of protecting the user data.
In a flow of the application management method according to another embodiment of the present application, the application control list includes a first application control and a second application control, where the first application control is used to indicate an application that is currently running in a background, and the second application control is used to indicate an application that is not currently running in the background.
The number of the first application controls can be multiple, and each first application control is used for indicating one application which is currently running in the background; the number of the second application controls may be multiple, and each second application control is used for indicating an application which is not currently running in the background.
In this embodiment, all applications in the application control list may be running in the background, some may not be running in the background, and in either case, the user may make a selection.
In this embodiment, the first application control and the second application control may be distinguished in different display manners. For example, for a first application control, a highlighted display may be presented; for the second application control, a gray display may appear. For another example, referring to fig. 3, in the display column corresponding to each application in the list, it is marked whether the application is running in the background or not running in the background.
Therefore, in this embodiment, the user may determine whether to select an application as the target application by referring to whether each application is running in the background.
In the application management method according to another embodiment of the present application, a history of occurrence of sensitive behaviors of each application may also be counted, for example, a behavior of each application acquiring target function information during background running. Therefore, in the display column corresponding to each application in the application control list, the history of the sensitive behavior of the corresponding application can be displayed, so that the user can intuitively know the risk of leakage of user data caused by each application in the list so as to decide whether to select a certain application as the target application.
In the flow of the application management method according to another embodiment of the present application, after the sub-step a2, the S2 further includes:
substep B1: and responding to the second sub-input, under the condition that the target application is not currently operated in the background, if the target application is detected to be started to be operated in the background at the target moment, closing the target application.
In this step, if the target application selected by the user is not currently running in the background, the target application does not need to be closed currently. But at some future time (i.e., the target time), the target application is immediately closed and the background running of the target application is terminated as soon as the target application starts running in the background.
For example, when the target application is switched from foreground running to background running, the target application is automatically closed.
Based on the foregoing embodiment, for an application currently running in the background, if the application has the right to acquire target function information, the user can directly control the application to exit the background through a quick input mode. In this embodiment, if the application that is not currently running in the background has the right to acquire the target function information, the user may set the application in advance in a shortcut input manner, and once the application enters the background running, the application is immediately controlled to exit the background. Therefore, in the embodiment, in combination with the foregoing embodiment, different management control measures can be implemented for target applications in different operating states, so as to reduce the risk of user data leakage caused by obtaining target function information.
In a flow of an application management method according to another embodiment of the present application, the first input includes a third sub-input.
Correspondingly, S2 includes:
substep C1: and responding to the third sub-input, and identifying each application with the authority of acquiring the target function information in each application currently running in the background.
In this embodiment, in yet another scenario, the first input includes a third sub-input.
For example, the third sub-input is implemented as: the user clicks on the target control.
In the step, after the user clicks the target control, all the applications which are currently running in the background are automatically identified, and in all the applications, each application with the authority of acquiring the target function information is identified.
Substep C2: and closing each application which is currently operated in the background and has the authority of acquiring the target function information.
In this step, each application is forcibly closed immediately after being recognized.
And the applications which are currently operated in the background and have the authority of acquiring the target function information comprise the target applications.
In this embodiment, all applications that are currently running in the background and are granted the right to acquire the target function information by the user may be forcibly turned off at one time based on the third sub-input performed by the user. Therefore, according to the embodiment, all related applications running in the background can be prevented from continuously acquiring the target function information, the protection degree on the user data is higher, and the risk of user data leakage can be greatly reduced.
In conclusion, the application management method is provided to help a user conveniently and quickly clear relevant sensitive applications running in a background and effectively manage each application; meanwhile, the method and the device can improve the system safety, reduce the leakage risk of the user data and reasonably protect the user data.
The system comprises a background process, a target control and a system control, wherein the target control is used for indicating target function information and can be automatically closed by the system after being input by a user. For example, the target function information includes at least one of camera function information and sound recording function information, so that a background process for acquiring the two pieces of function information can be shut down.
It should be noted that, in the application management method provided in the embodiment of the present application, the execution subject may be an application management device, or a control module in the application management device for executing the application management method. In the embodiment of the present application, an application management apparatus executing an application management method is taken as an example, and the application management apparatus provided in the embodiment of the present application is described.
Fig. 5 shows a block diagram of an application management apparatus according to another embodiment of the present application, the apparatus including:
the system comprises a receiving module 10, a first display module and a second display module, wherein the receiving module is used for receiving a first input of a target control under the condition that a first interface is displayed, the first interface is used for indicating the background running condition of an application, and the target control is used for indicating target function information;
and a closing module 20, configured to close, in response to the first input, a target application, where the target application has a right to acquire target function information, and the target application runs in a background.
In this way, in the embodiment of the present application, first, in the first interface for indicating the background running condition of the application, a target control is preset, where the target control is used to indicate target function information, and in the present application, in order to reduce the risk of user data leakage, the target function information may be function information related to user data, such as camera function information, recording function information, and the like. Then, under the condition that the first interface is displayed, the user can perform first input on the target control, the electronic device responds to the first input, detects whether the target application runs in the background or not, detects whether the user has granted the right of the target application to acquire the target function information or not, and forcibly closes the target application under the condition that the target application runs in the background and has the right of acquiring the target function information, so that the target application is stopped from running in the background, and the target application is prevented from continuously acquiring the user data in time. Therefore, the target application running in the background can be closed in time to prevent the target application from continuously acquiring the user data, and therefore the risk of user data leakage is reduced.
Optionally, the first input comprises a first sub-input and a second sub-input;
a shutdown module 20, comprising:
the display unit is used for responding to the first sub-input and displaying an application control list, the application control list comprises at least one application control, and the application control is used for indicating an application with the authority of acquiring the target function information;
the receiving unit is used for receiving a second sub-input of a target application control in the application control list, and the target application control corresponds to a target application;
and the closing unit is used for responding to the second sub-input and closing the target application under the condition that the target application is currently operated in the background.
Optionally, the application control list includes a first application control and a second application control, where the first application control is used to indicate an application currently running in the background, and the second application control is used to indicate an application not currently running in the background.
Optionally, the closing unit is further configured to, in response to the second sub-input, in a case that the target application is not currently running in the background, close the target application if it is detected that the target application starts running in the background at the target moment.
The application management device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The application management device in the embodiment of the present application may be a device having an action system. The action system may be an Android (Android) action system, an ios action system, or other possible action systems, and the embodiment of the present application is not particularly limited.
The application management device provided in the embodiment of the present application can implement each process implemented by the above method embodiment, and is not described here again to avoid repetition.
Optionally, as shown in fig. 6, an electronic device 100 is further provided in this embodiment of the present application, and includes a processor 101, a memory 102, and a program or an instruction stored in the memory 102 and executable on the processor 101, where the program or the instruction is executed by the processor 101 to implement each process of any one of the foregoing embodiments of the application management method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 7 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 1000 includes, but is not limited to: a radio frequency unit 1001, a network module 1002, an audio output unit 1003, an input unit 1004, a sensor 1005, a display unit 1006, a user input unit 1007, an interface unit 1008, a memory 1009, and a processor 1010.
Those skilled in the art will appreciate that the electronic device 1000 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 1010 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 7 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
The user input unit 1007 is configured to receive a first input to a target control under the condition that a first interface is displayed, where the first interface is used to indicate a background running condition of an application, and the target control is used to indicate target function information; a processor 1010, configured to close a target application in response to the first input, where the target application has a right to acquire the target function information, and the target application runs in a background.
In this way, in the embodiment of the present application, first, in the first interface for indicating the background running condition of the application, a target control is preset, where the target control is used to indicate target function information, and in the present application, in order to reduce the risk of user data leakage, the target function information may be function information related to user data, such as camera function information, recording function information, and the like. Then, under the condition that the first interface is displayed, the user can perform first input on the target control, the electronic device responds to the first input, detects whether the target application runs in the background or not, detects whether the user has granted the right of the target application to acquire the target function information or not, and forcibly closes the target application under the condition that the target application runs in the background and has the right of acquiring the target function information, so that the target application is stopped from running in the background, and the target application is prevented from continuously acquiring the user data in time. Therefore, the target application running in the background can be closed in time to prevent the target application from continuously acquiring the user data, and therefore the risk of user data leakage is reduced.
Optionally, the first input comprises a first sub-input and a second sub-input; a display unit 1006, configured to display an application control list in response to the first sub-input, where the application control list includes at least one application control, and the application control is used to indicate an application having an authority to acquire the target function information; a user input unit 1007, further configured to receive a second sub-input to a target application control in the application control list, where the target application control corresponds to the target application; the processor 1010 is further configured to close the target application in response to the second sub-input in a case where the target application is currently running in the background.
Optionally, the application control list includes a first application control and a second application control, where the first application control is used to indicate an application currently running in the background, and the second application control is used to indicate an application not currently running in the background.
Optionally, the processor 1010 is further configured to, in response to the second sub-input, in a case that the target application is not currently running in the background, if it is detected that the target application starts running in the background at a target time, close the target application.
In conclusion, the application management method is provided to help a user conveniently and quickly clear relevant sensitive applications running in a background and effectively manage each application; meanwhile, the method and the device can improve the system safety, reduce the leakage risk of the user data and reasonably protect the user data.
The system comprises a background process, a target control and a system control, wherein the target control is used for indicating target function information and can be automatically closed by the system after being input by a user. For example, the target function information includes at least one of camera function information and sound recording function information, so that a background process for acquiring the two pieces of function information can be shut down.
It should be understood that in the embodiment of the present application, the input Unit 1004 may include a Graphics Processing Unit (GPU) 10041 and a microphone 10042, and the Graphics Processing Unit 10041 processes image data of a still picture or a video image obtained by an image capturing device (such as a camera) in a video image capturing mode or an image capturing mode. The display unit 1006 may include a display panel 10061, and the display panel 10061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1007 includes a touch panel 10071 and other input devices 10072. The touch panel 10071 is also referred to as a touch screen. The touch panel 10071 may include two parts, a touch detection device and a touch controller. Other input devices 10072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and an action stick, which are not described in detail herein. The memory 1009 may be used to store software programs as well as various data, including but not limited to applications and action systems. The processor 1010 may integrate an application processor, which primarily handles motion systems, user pages, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 1010.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the foregoing application management method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the foregoing application management method embodiment, and can achieve the same technical effect, and for avoiding repetition, details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method for application management, the method comprising:
receiving a first input to a target control under the condition that a first interface is displayed, wherein the first interface is used for indicating the background running condition of an application, and the target control is used for indicating target function information;
and responding to the first input, closing a target application, wherein the target application has the authority of acquiring the target function information, and the target application runs in the background.
2. The method of claim 1, wherein the first input comprises a first sub-input and a second sub-input;
the closing of the target application in response to the first input comprises:
responding to the first sub-input, displaying an application control list, wherein the application control list comprises at least one application control, and the application control is used for indicating an application with the authority of acquiring the target function information;
receiving a second sub-input to a target application control in the application control list, the target application control corresponding to the target application;
in response to the second sub-input, closing the target application if the target application is currently running in the background.
3. The method of claim 2, wherein the list of application controls includes a first application control and a second application control, the first application control indicating an application that is currently running in the background, and the second application control indicating an application that is not currently running in the background.
4. The method of claim 2, wherein after receiving the second sub-input for the target application control in the list of application controls, the method further comprises:
responding to the second sub-input, and under the condition that the target application is not currently operated in the background, if the target application is detected to be started to be operated in the background at the target moment, closing the target application.
5. An application management apparatus, characterized in that the apparatus comprises:
the device comprises a receiving module, a first display module and a second display module, wherein the receiving module is used for receiving first input of a target control under the condition that a first interface is displayed, the first interface is used for indicating background running conditions of an application, and the target control is used for indicating target function information;
and the closing module is used for responding to the first input and closing the target application, wherein the target application has the authority of acquiring the target function information, and the target application runs in a background.
6. The apparatus of claim 5, wherein the first input comprises a first sub-input and a second sub-input;
the shutdown module includes:
a display unit, configured to display an application control list in response to the first sub-input, where the application control list includes at least one application control, and the application control is used to indicate an application having a right to acquire the target function information;
a receiving unit, configured to receive a second sub-input to a target application control in the application control list, where the target application control corresponds to the target application;
a closing unit, configured to, in response to the second sub-input, close the target application when the target application is currently running in the background.
7. The apparatus of claim 6, wherein the list of application controls comprises a first application control and a second application control, wherein the first application control is used for indicating applications that are currently running in the background, and wherein the second application control is used for indicating applications that are not currently running in the background.
8. The apparatus of claim 6, wherein the closing unit is further configured to close the target application if it is detected that the target application starts to run in the background at a target time if the target application is not currently running in the background in response to the second sub-input.
9. An electronic device comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the application management method according to any one of claims 1 to 4.
10. A readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the application management method according to any one of claims 1 to 4.
CN202110914700.1A 2021-08-10 2021-08-10 Application management method and device, electronic equipment and readable storage medium Pending CN113655937A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110914700.1A CN113655937A (en) 2021-08-10 2021-08-10 Application management method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110914700.1A CN113655937A (en) 2021-08-10 2021-08-10 Application management method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN113655937A true CN113655937A (en) 2021-11-16

Family

ID=78491318

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110914700.1A Pending CN113655937A (en) 2021-08-10 2021-08-10 Application management method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN113655937A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114489419A (en) * 2022-01-13 2022-05-13 荣耀终端有限公司 Authority control method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250223A (en) * 2016-07-28 2016-12-21 宇龙计算机通信科技(深圳)有限公司 A kind of background process management method and terminal unit
CN109753350A (en) * 2018-12-29 2019-05-14 维沃移动通信有限公司 A kind of method for managing resource and terminal device
WO2020150917A1 (en) * 2019-01-23 2020-07-30 华为技术有限公司 Application permission management method and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250223A (en) * 2016-07-28 2016-12-21 宇龙计算机通信科技(深圳)有限公司 A kind of background process management method and terminal unit
CN109753350A (en) * 2018-12-29 2019-05-14 维沃移动通信有限公司 A kind of method for managing resource and terminal device
WO2020150917A1 (en) * 2019-01-23 2020-07-30 华为技术有限公司 Application permission management method and electronic device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
绿巨人;: "不让系统自动功能误事", 个人电脑, no. 12 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114489419A (en) * 2022-01-13 2022-05-13 荣耀终端有限公司 Authority control method and electronic equipment

Similar Documents

Publication Publication Date Title
CN111857509A (en) Split screen display method and device and electronic equipment
CN112269508B (en) Display method and device and electronic equipment
CN113794795B (en) Information sharing method and device, electronic equipment and readable storage medium
CN112099684A (en) Search display method and device and electronic equipment
CN112148163A (en) Screen recording method and device and electronic equipment
CN113138818A (en) Interface display method and device and electronic equipment
CN112286612A (en) Information display method and device and electronic equipment
CN112764611B (en) Application program control method and device and electronic equipment
CN113655937A (en) Application management method and device, electronic equipment and readable storage medium
CN113709307A (en) Message display method and device and electronic equipment
CN111857466B (en) Message display method and device
CN112181559A (en) Interface display method and device and electronic equipment
CN113824841B (en) Notification message processing method and device, electronic equipment and readable storage medium
CN114416264A (en) Message display method and device
CN112099626B (en) Interface display method, interface display device and electronic equipment
CN114564707A (en) Application authority management method and device and electronic equipment
CN111859356B (en) Application program login method and device
CN112162689B (en) Input method and device and electronic equipment
CN113515216A (en) Application program switching method and device and electronic equipment
CN114138395A (en) Application management method and device and electronic equipment
CN114283476A (en) Unlocking control method and device, electronic equipment and readable storage medium
CN113238691A (en) Application icon management method and device and electronic equipment
CN113485760A (en) Application running method and device
CN113253884A (en) Touch method, touch device and electronic equipment
CN111880702A (en) Interface switching method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination