CN115277670A - Network connection control method and device of target application and electronic equipment - Google Patents

Network connection control method and device of target application and electronic equipment Download PDF

Info

Publication number
CN115277670A
CN115277670A CN202210727244.4A CN202210727244A CN115277670A CN 115277670 A CN115277670 A CN 115277670A CN 202210727244 A CN202210727244 A CN 202210727244A CN 115277670 A CN115277670 A CN 115277670A
Authority
CN
China
Prior art keywords
target
application
file
target file
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210727244.4A
Other languages
Chinese (zh)
Inventor
朱远鹏
张成骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202210727244.4A priority Critical patent/CN115277670A/en
Publication of CN115277670A publication Critical patent/CN115277670A/en
Priority to PCT/CN2023/101144 priority patent/WO2023246715A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The application discloses a network connection control method and device of a target application and an electronic device, and belongs to the technical field of data processing. The method comprises the following steps: receiving a first input to a target file, wherein the first input is used for opening the target file; and responding to the first input, and performing network connection control on the target application under the condition that the application for processing the target file is the target application.

Description

Network connection control method and device of target application and electronic equipment
Technical Field
The application belongs to the technical field of data processing, and particularly relates to a network connection control method and device for a target application and an electronic device.
Background
With the rise of mobile terminals, more and more people process related files on the mobile terminals, and then a large number of file checking or editing applications exist on the mobile terminals, and the files checked or edited by users can be automatically uploaded to the cloud by the file checking or editing applications, so that the users can conveniently check or edit the files on multiple devices. However, a user can often process some files with high confidentiality in the mobile terminal, and when the files are checked or edited in the file processing application, the application can automatically upload the files to the cloud, so that leakage of confidential files can be caused, and the use experience of the user is greatly influenced.
In the prior art, a file opened in a file processing application is automatically uploaded to a cloud, or a user closes an automatic uploading switch of the file processing application, and all files are not uploaded. However, the existing mode has poor user experience, and if the confidential documents are uploaded by the user, the corresponding switch needs to be repeatedly switched on and off to ensure normal use. In some document processing applications, document security is not known, although there is a statement that the user's confidential document will not be used as other action.
Disclosure of Invention
The embodiment of the application aims to provide a network connection control method and device for a target application and an electronic device, and can solve the problem that in the prior art, when a file processing application automatically uploads an opened file, the file is leaked, and the file security is low.
In a first aspect, an embodiment of the present application provides a network connection control method for a target application, where the method includes: receiving a first input to a target file, wherein the first input is used for opening the target file; and responding to the first input, and performing network connection control on the target application under the condition that the application for processing the target file is the target application.
In a second aspect, an embodiment of the present application provides a network connection control apparatus for a target application, where the apparatus includes: the system comprises a receiving module, a processing module and a display module, wherein the receiving module is used for receiving a first input of a target file, and the first input is used for opening the target file; and the control module is used for responding to the first input and carrying out network connection control on the target application under the condition that the application for processing the target file is the target application.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In a sixth aspect, embodiments of the present application provide a computer program product, stored on a storage medium, for execution by at least one processor to implement the method according to the first aspect.
In the embodiment of the application, a first input to a target file is received, wherein the first input is used for opening the target file; and responding to the first input, and performing network connection control on the target application under the condition that the application for processing the target file is the target application. In this embodiment, a viewing or editing operation of a user on a target file is received, and when it is detected that the viewing or editing operation of the target file needs to be performed through a target application, network connection control is performed on the target application to control automatic file uploading of the target application, so that the target file is prevented from being uploaded privately under the condition that the permission of the user is not obtained, and the file security is improved. And then solved among the prior art file processing application automatic upload open file, there is the risk that the file was revealed, and lead to the problem of file security low.
Drawings
Fig. 1 is a flowchart illustrating a network connection control method for a target application according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a network connection control method for a target application according to another embodiment of the present application;
fig. 3 is a schematic diagram of a framework of a network connection control device of a target application according to an embodiment of the present application;
fig. 4 is a schematic diagram of a frame structure of an electronic device according to an embodiment of the present application;
fig. 5 is a schematic hardware structure diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below clearly with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived from the embodiments in the present application by a person skilled in the art, are within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The network connection control method for the target application provided in the embodiment of the present application is described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
According to a first aspect of the embodiments of the present application, a method for controlling network connection of a target application is provided, as shown in fig. 1, the method may specifically include the following steps:
s102, receiving a first input of a target file, wherein the first input is used for opening the target file;
and S104, responding to the first input, and performing network connection control on the target application under the condition that the application for processing the target file is the target application.
The method in the embodiment is applied to a mobile terminal, and the mobile terminal includes, but is not limited to, a smart phone, a tablet computer, a PC, a wearable electronic device, a microcomputer, and the like, which have multiple functions. Meanwhile, the terminal system of the mobile terminal includes, but is not limited to, windows, iOS, android and other systems, and the terminal system of the mobile terminal is not limited in this embodiment.
The target file in this embodiment includes, but is not limited to, text, image, voice, video, and the like, and the data format of the target file is not limited in this embodiment. For example, target files for text classes include, but are not limited to, txt, word, and PDF formats.
Specifically, in this embodiment, the target application may perform operations such as viewing or editing on the target file. In addition, while the target file is subjected to processing operation of file viewing or editing, the target application may also perform operations such as data transmission to the cloud, that is, the target application is an application capable of cloud uploading and cloud storage, for example, a cloud disk application or a network disk application. It can be appreciated that the presence of the network connection request is detected in one or more processes corresponding to the target application. The data transmission of the target application to the cloud includes, but is not limited to, uploading and storing the target file to the cloud. Therefore, in this embodiment, if the application that processes the target file is the target application, it is necessary to perform network connection control on the target application.
In the embodiment, a first input acted on a target file by a user is received, wherein the first input comprises but is not limited to sliding, clicking, long-pressing and other operations acted on a touch screen of the mobile terminal. In addition, the first input may also be based on a key of the mobile terminal and a selection operation of an external device. In this embodiment, the specific operation mode of the first input is not limited.
After receiving a first input of a target file, displaying an application list corresponding to the target file on a graphical user interface of the mobile terminal, wherein the application list comprises one or more applications capable of opening the target file, and then selecting an application for processing the target file according to a selection operation of a user.
In addition, a default application for opening the target file may be preset, and the target file may be directly opened through the default application after the first input is received.
In one example, a first PDF application is preset as a default application for a file in the PDF format, and when a first input applied to a target file in the PDF format by a user is received, the target application is opened by the first PDF application.
In this embodiment, the network connection control includes, but is not limited to, performing network disconnection on the target application, for example, performing network disconnection on the target application in a system framework of the mobile terminal, acquiring, by the terminal system, a name of the target application package, and disconnecting, from a system framework layer, networking requests of all application processes under the name of the target application package. It should be noted that, in the case of disconnecting the networking requests of all application processes under the target application package name from the system framework layer, the network connection and data transmission of the mobile terminal are not affected, that is, the networking requests of the application processes of other applications in the mobile terminal are not affected, and only the application process of the target file that opens the target file is disconnected.
Or, the network connection control further includes encrypting the target file to realize that the target file uploaded to the external space by the target application cannot be identified or opened, thereby completing the network connection control of the target application.
It should be noted that, in this embodiment, a first input to the target file is received, where the first input is used to open the target file; and responding to the first input, and performing network connection control on the target application under the condition that the application for processing the target file is the target application. In this embodiment, a viewing or editing operation of a user on a target file is received, and when it is detected that the viewing or editing operation of the target file needs to be performed through a target application, network connection control is performed on the target application to control automatic file uploading of the target application, so that the target file is prevented from being uploaded privately under the condition that the permission of the user is not obtained, and the file security is improved. And then solved among the prior art file processing application automatic upload open file, there is the risk that the file was revealed, and lead to the problem of file security low.
Optionally, in this embodiment, in response to the first input, in a case that the application processing the target file is the target application, performing network connection control on the target application, including but not limited to: determining that the application processing the target file is the target application when a networking request exists in the application process of the application processing the target file or the application processing the target file is located in a preset application list; and breaking the network of the target application.
Specifically, when it is detected that an application process of an application that processes a target file has a networking request, the application runs the risk of transmitting the file to a cloud or other space, and therefore the application that the application process has the networking request is the target application.
In addition, whether the application processing the target file is the target application or not can be determined according to a preset application list set in advance. The applications in the preset application list are all applications that upload content to the cloud or other spaces according to historical usage or what the user tries to obtain.
In one example, whether a networking request exists in an application process corresponding to an application for opening a target file in a system framework of a mobile terminal is judged, if the networking request does not exist, the application for processing the target file is a local application, and because networking operation does not exist in the running process of the application, the application cannot upload the target file and the like. If the networking request exists in the application process of the application, the application for processing the target file is determined to be the target application, and the application may upload the target file and the like.
In another example, according to a preset application list defined by a user preset, if the application processing the target file is located in the preset application list, the application processing the target file is determined to be the target application.
In another example, whether the application is the target application is determined according to a file transfer protocol supported by the application processing the target file, for example, if the current file transfer protocol of the application processing the target file is a preset file transfer protocol, such as an HTTP protocol, the application processing the target file is determined to be the target application.
In summary, if it is determined that the application processing the target file is the target application, it indicates that there is a risk of privately uploading the target file when the target file is processed by the target application, and therefore, in this embodiment, the target application is disconnected from the network to prevent the target application from uploading the target file.
By the above example, if the application for processing the target file is determined to be the target application, the network is disconnected for the target application, the target application with potential safety hazard is accurately identified, the target file is prevented from being uploaded privately under the condition that the target application is not allowed by a user, and the file safety is improved.
Optionally, in this embodiment, the network breaking is performed on the target application, which includes but is not limited to: displaying prompt information, wherein the prompt information is used for indicating whether the target file is a privacy file; receiving a second input of the prompt message; and responding to the second input, and in the case that the target file is determined to be the privacy file, performing network disconnection on the target application.
In a specific application scenario, if the application for processing the target file is the target application, displaying a first popup, wherein prompt information exists in the first popup, and the prompt information is used for prompting a user to confirm whether the target file is a privacy file. And then, receiving a second input of the prompt message in the first popup by the user, and if the second input is that the target file is a private file, disconnecting the network of the target application in the terminal system framework. Specifically, in the terminal system, the application package name of the target application is acquired, and then the network request of the application process of the target application is interrupted.
In addition, if the second input of the user is that the target file is a non-private file, the target application is not subjected to networking control.
By the above example, when the target file is opened by the target application, the user is prompted to confirm whether the target file is a private file by displaying the prompt information, a flexible target file processing mode is provided for the user, and different use requirements of the user on the target file are met.
Optionally, in this embodiment, after performing network connection control on the target application in response to the first input and in a case that the application that processes the target file is the target application, the method further includes, but is not limited to: performing target operation on the target file; wherein the target operation comprises at least one of: adding a watermark to the target file; and encrypting the target file.
In an actual application scenario, after a target file is leaked, tracing the leakage mode of the target file is needed. In order to facilitate tracing of the target file in the following process, in this embodiment, after the target file is processed by the target application, a target operation is performed on the target file, for example, a watermark is added to the target file for a file of a type such as a document, a picture, and a video. The watermark may be information such as the opening time of the target file and the package name of the start application, and in this embodiment, specific content of the watermark is not limited.
In some embodiments, the target file may be encrypted, and an encryption key for encrypting the target file is generated by information such as an encoding or package name of the target application and an opening time of the target file. Therefore, encryption keys of different target applications at different time are different, and thereby tracing the source of the leaked target file can be realized.
Through the embodiment, when the target file is processed through the target application, the target operation is performed on the target file, so that the leakage mode and the leakage time of the target file can be traced accurately when the target file is leaked.
Optionally, in this embodiment, after performing network connection control on the target application in a case that the application processing the target file is the target application in response to the first input, the method further includes, but is not limited to: deleting the cache of the target application when receiving the quit instruction; network connection control for the target application is restored.
Specifically, after completing the relevant operation on the target file, the user makes an exit instruction for exiting the application. After an exit instruction of a user for acting on the target application is received, deleting the local file cache of the target application so as to avoid local file backup of a local folder or a local storage space of the target application with the target file. In addition, after the deletion of the local file cache of the target application is completed, the network connection of the target application is recovered.
It should be noted that, in this embodiment, the network connection of the target application should be recovered after the deletion of the local file cache of the target application is completed, so as to prevent the target application from uploading the backup file of the target file in the local file cache.
As an optional embodiment, after the deletion of the local file cache of the target application is completed, a second popup is displayed to the mobile terminal on the graphical user interface, and a prompt message in the second popup is used to prompt that the deletion of the local file cache of the target file is completed. The prompt in the second popup may be "view trace cleared".
With the above example, upon receiving an exit instruction, the cache of the target application is deleted; and the network connection control of the target application is recovered, so that the backup file of the target file is prevented from being uploaded privately under the condition that the target file is not allowed by a user, and the file security is improved.
As a specific embodiment, as shown in fig. 2, a schematic flow chart of a network connection control method for another target application in this embodiment is shown, where the method specifically includes the following steps:
s201, receiving selection operation of a user, and opening a target file through a specified application;
s202, judging whether the designated application is a target application;
specifically, if not, jumping to S203; if yes, jumping to S204.
S203, opening a flow of normal files without performing networking control on the target application;
s204, displaying prompt information on a graphical user interface;
specifically, a first popup is displayed in the graphical user interface, and the first popup is used for displaying prompt information and receiving user input. The prompt message of the first popup is to confirm whether the target file is a private file or not to a user, and a selection control can be provided for receiving the input of the user;
s205, determining whether the target file is a privacy file according to user input;
specifically, if not, jumping to S203; if yes, go to S206.
S206, opening the target file by using a traceless mode;
s207, performing network disconnection on the target application from the terminal system framework layer;
specifically, the terminal system acquires an application package name of the target application, and disconnects networking requests of all processes under the application package name from a terminal system framework layer, at the moment, the target application cannot be networked, and file uploading operations such as cloud backup cannot be performed;
s208, processing the target file;
specifically, the processing operation in this step is that the user performs an actual operation according to actual experience, and views, edits, and the like the file content of the target file, which is not described in this embodiment.
S209, adding a watermark into the target file;
specifically, the watermark is added to the target file according to the information such as the opening time of the target file and the package name of the start application.
S210, after the processing operation of the target file is completed, the local file cache of the target application is cleared;
specifically, after the user completes the file processing operation (read/write), the user clicks to quit the target application, and simultaneously deletes the local file cache of the target application, so that the behavior that the target application has a local backup file and is subsequently uploaded in a network is avoided.
S211, displaying cleaning information on a graphical user interface;
specifically, after the local file cache of the target application is cleared, a second popup is displayed on the graphical user interface, and the clearing information in the second popup is that the viewing trace is cleared.
According to the embodiment of the invention, a first input to a target file is received, wherein the first input is used for opening the target file; and in response to the first input, performing network connection control on the target application in the case that the application processing the target file is the target application. In this embodiment, a viewing or editing operation of a user on a target file is received, and when it is detected that the viewing or editing operation of the target file needs to be performed through a target application, network connection control is performed on the target application to control automatic file uploading of the target application, so that the target file is prevented from being uploaded privately under the condition that the permission of the user is not obtained, and the file security is improved. And then solved among the prior art file processing application automatic upload open file, there is the risk that the file was revealed, and lead to the problem of file security low.
In the network connection control method for the target application provided by the embodiment of the application, the execution subject may be a network connection control device for the target application. In the embodiment of the present application, a network connection control method for a network connection control apparatus of a target application to execute the target application is taken as an example, and the network connection control apparatus of the target application provided in the embodiment of the present application is described.
According to a second aspect of the embodiments of the present application, there is provided a network connection control apparatus for a target application, as shown in fig. 3, the apparatus including:
a receiving module 30, configured to receive a first input to a target file, where the first input is used to open the target file;
a control module 32, configured to, in response to the first input, perform network connection control on the target application when the application that processes the target file is the target application.
Optionally, in this embodiment, the control module 30 includes:
the determining submodule is used for determining that the application for processing the target file is the target application when a networking request exists in the application process of the application for processing the target file or the application for processing the target file is located in a preset application list;
and the control sub-module is used for carrying out network disconnection on the target application.
Optionally, in this embodiment, the control sub-module includes:
the display unit is used for displaying prompt information, wherein the prompt information is used for indicating whether the target file is a privacy file;
the receiving unit is used for receiving second input of the prompt message;
and the control unit is used for responding to the second input, and performing network disconnection on the target application under the condition that the target file is determined to be the privacy file.
Optionally, in this embodiment, the method further includes:
the execution module is used for performing target operation on the target file after performing network connection control on the target application under the condition that the application for processing the target file is the target application in response to the first input;
wherein the target operation comprises at least one of:
adding a watermark to the target file;
and encrypting the target file.
Optionally, in this embodiment, the method further includes:
the processing module is used for deleting the cache of the target application when receiving an exit instruction after performing network connection control on the target application under the condition that the application for processing the target file is the target application in response to the first input;
the control module is further configured to resume network connection control of the target application.
By the above embodiment, a first input to a target file is received, wherein the first input is used to open the target file; and responding to the first input, and performing network connection control on the target application under the condition that the application for processing the target file is the target application. In this embodiment, a viewing or editing operation of a user on a target file is received, and when it is detected that the viewing or editing operation of the target file needs to be performed through a target application, network connection control is performed on the target application to control automatic file uploading of the target application, so that the target file is prevented from being uploaded privately under the condition that the permission of the user is not obtained, and the file security is improved. And then solved among the prior art file processing application automatic upload open file, there is the risk that the file was revealed, and lead to the problem of file security low.
The file device in the embodiment of the present application may be an electronic device, and may also be a component in the electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be a device other than a terminal. The electronic Device may be, for example, a Mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic Device, a Mobile Internet Device (MID), an Augmented Reality (AR)/Virtual Reality (VR) Device, a robot, a wearable Device, an ultra-Mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and may also be a server, a Network Attached Storage (Network Attached Storage, NAS), a personal computer (NAS), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not limited in particular.
The network connection control of the target application in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The network connection control of the target application provided in the embodiment of the present application can implement each process implemented by the method embodiments in fig. 1 to fig. 2, and is not described herein again to avoid repetition.
Optionally, as shown in fig. 4, an electronic device 400 is further provided in an embodiment of the present application, and includes a processor 401 and a memory 402, where the memory 402 stores a program or an instruction that can be executed on the processor 401, and when the program or the instruction is executed by the processor 401, the steps of the method embodiment of the network connection control method for a target application are implemented, and the same technical effects can be achieved, and are not described herein again to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 5 is a schematic diagram of a hardware structure of an electronic device implementing the embodiment of the present application.
The electronic device 500 includes, but is not limited to: a radio frequency unit 501, a network module 502, an audio output unit 503, an input unit 504, a sensor 505, a display unit 506, a user input unit 507, an interface unit 508, a memory 509, a processor 510, and the like.
Those skilled in the art will appreciate that the electronic device 500 may further include a power supply (e.g., a battery) for supplying power to various components, and the power supply may be logically connected to the processor 510 via a power management system, so as to implement functions of managing charging, discharging, and power consumption via the power management system. The electronic device structure shown in fig. 5 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is omitted here.
A user input unit 507, configured to receive a first input to a target file, where the first input is used to open the target file;
a processor 510, configured to perform network connection control on the target application in response to the first input, if the application that processes the target file is the target application.
By the above example, network connection control is performed on the target application to realize automatic file uploading control on the target application, so that private file uploading of the target file is avoided under the condition that the target file is not allowed by a user, and the file security is improved.
Optionally, the processor 510 is configured to determine that the application processing the target file is the target application when it is detected that a networking request exists in an application process of the application processing the target file, or when the application processing the target file is located in a preset application list;
and a processor 510, configured to perform network disconnection on the target application.
Through the above example, the target application is subjected to the offline processing, so that the target application is prevented from uploading the target file.
Optionally, the display unit 506 is configured to display prompt information, where the prompt information is used to indicate whether the target file is a private file;
a user input unit 507 for receiving a second input of the prompt information;
a processor 510, configured to respond to the second input, and in a case that the target file is determined to be a private file, perform network disconnection on the target application.
By the above example, when the target file is opened by the target application, the user is prompted by the prompt message to confirm whether the target file is a private file, a flexible processing mode of the target file is provided for the user, and different use requirements of the user on the target file are met.
Optionally, the processor 510, in response to the first input, in a case that the application processing the target file is a target application, performing network connection control on the target application, and then performing a target operation on the target file; wherein the target operation comprises at least one of: adding a watermark to the target file; and encrypting the target file.
Through the embodiment, when the target file is subjected to file processing through the target application, the target operation is performed on the target file, so that the leakage mode and the leakage time of the target file can be traced accurately when the target file is leaked.
Optionally, the processor 510 is configured to, after performing network connection control on the target application in a case that an application that processes the target file is a target application in response to the first input, delete the cache of the target application when receiving an exit instruction;
a processor 510 for restoring network connection control to the target application.
By the above example, after the user completes the file processing of the target file, when the target application exits, the cache of the target application is deleted; and the network connection control of the target application is recovered, so that the backup file of the target file is prevented from being uploaded privately under the condition that the target file is not allowed by a user, and the file security is improved.
It should be understood that, in the embodiment of the present application, the input Unit 504 may include a Graphics Processing Unit (GPU) 5041 and a microphone 5042, and the Graphics processor 5041 processes image data of still pictures or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 506 may include a display panel 5061, and the display panel 5061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 507 includes at least one of a touch panel 5071 and other input devices 5072. A touch panel 5071, also referred to as a touch screen. The touch panel 5071 may include two parts of a touch detection device and a touch controller. Other input devices 5072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory 509 may be used to store software programs as well as various data. The memory 509 may mainly include a first storage area storing a program or an instruction and a second storage area storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory 509 may include volatile memory or non-volatile memory, or the memory 509 may include both volatile and non-volatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct bus RAM (DRRAM). The memory 509 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
Processor 510 may include one or more processing units; optionally, the processor 510 integrates an application processor, which mainly handles operations related to the operating system, user interface, and applications, and a modem processor, which mainly handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into processor 510.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the method embodiment of the network connection control method for the target application, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the method embodiment of the network connection control method for target application, and the same technical effect can be achieved, and details are not repeated here to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Embodiments of the present application provide a computer program product, where the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the processes of the method embodiment of the network connection control method for the target application, and the same technical effects can be achieved, and details are not described here to avoid repetition.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the present embodiments are not limited to those precise embodiments, which are intended to be illustrative rather than restrictive, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope of the appended claims.

Claims (11)

1. A network connection control method for a target application, the method comprising:
receiving a first input to a target file, wherein the first input is used for opening the target file;
and responding to the first input, and performing network connection control on the target application under the condition that the application for processing the target file is the target application.
2. The method of claim 1, wherein the performing network connection control on the target application in the case that the application processing the target file is the target application in response to the first input comprises:
determining that the application processing the target file is the target application when a networking request exists in an application process of the application processing the target file or the application processing the target file is located in a preset application list;
and carrying out network disconnection on the target application.
3. The method of claim 2, wherein the web-breaking the target application comprises:
displaying prompt information, wherein the prompt information is used for indicating whether the target file is a privacy file;
receiving a second input of the prompt message;
and responding to the second input, and under the condition that the target file is determined to be a privacy file, performing network disconnection on the target application.
4. The method according to claim 1, wherein after the performing network connection control on the target application in a case where the application processing the target file is the target application in response to the first input, further comprises:
performing target operation on the target file;
wherein the target operation comprises at least one of:
adding a watermark to the target file;
and encrypting the target file.
5. The method of claim 1, wherein after performing network connection control on the target application in response to the first input if the application processing the target file is the target application, further comprising:
deleting the cache of the target application when an exit instruction is received;
resuming network connection control of the target application.
6. A network connection control apparatus for a target application, the apparatus comprising:
the system comprises a receiving module, a processing module and a display module, wherein the receiving module is used for receiving a first input of a target file, and the first input is used for opening the target file;
and the control module is used for responding to the first input and performing network connection control on the target application under the condition that the application for processing the target file is the target application.
7. The apparatus of claim 6, wherein the control module comprises:
the determining submodule is used for determining that the application for processing the target file is the target application when a networking request exists in the application process of the application for processing the target file or the application for processing the target file is located in a preset application list;
and the control submodule is used for carrying out network disconnection on the target application.
8. The apparatus of claim 7, wherein the control sub-module comprises:
the display unit is used for displaying prompt information, wherein the prompt information is used for indicating whether the target file is a privacy file or not;
the receiving unit is used for receiving second input of the prompt message;
and the control unit is used for responding to the second input, and performing network disconnection on the target application under the condition that the target file is determined to be the privacy file.
9. The apparatus of claim 6, further comprising:
the execution module is used for carrying out target operation on the target file;
wherein the target operation comprises at least one of:
adding a watermark to the target file;
and encrypting the target file.
10. The apparatus of claim 1, further comprising:
the processing module is used for deleting the cache of the target application when receiving an exit instruction after performing network connection control on the target application under the condition that the application for processing the target file is the target application in response to the first input;
the control module is further configured to resume network connection control of the target application.
11. An electronic device, comprising a processor and a memory, the memory storing a program or instructions executable on the processor, the program or instructions, when executed by the processor, implementing the steps of the network connection control method of a target application according to any one of claims 1-5.
CN202210727244.4A 2022-06-24 2022-06-24 Network connection control method and device of target application and electronic equipment Pending CN115277670A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210727244.4A CN115277670A (en) 2022-06-24 2022-06-24 Network connection control method and device of target application and electronic equipment
PCT/CN2023/101144 WO2023246715A1 (en) 2022-06-24 2023-06-19 Network connection control method and apparatus for target application, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210727244.4A CN115277670A (en) 2022-06-24 2022-06-24 Network connection control method and device of target application and electronic equipment

Publications (1)

Publication Number Publication Date
CN115277670A true CN115277670A (en) 2022-11-01

Family

ID=83761165

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210727244.4A Pending CN115277670A (en) 2022-06-24 2022-06-24 Network connection control method and device of target application and electronic equipment

Country Status (2)

Country Link
CN (1) CN115277670A (en)
WO (1) WO2023246715A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023246715A1 (en) * 2022-06-24 2023-12-28 维沃移动通信有限公司 Network connection control method and apparatus for target application, and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346137A (en) * 2013-07-24 2015-02-11 腾讯科技(深圳)有限公司 Application network management method, system, and computer readable storage medium
CN111753286A (en) * 2020-06-16 2020-10-09 Oppo广东移动通信有限公司 Terminal device monitoring method and device, terminal device and storage medium
CN112752316A (en) * 2020-12-28 2021-05-04 维沃移动通信有限公司 Electronic equipment networking control method and device, electronic equipment and storage medium
CN216122668U (en) * 2021-05-13 2022-03-22 广州视源电子科技股份有限公司 Remote display system of electronic equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9948651B1 (en) * 2015-12-14 2018-04-17 Symantec Corporation Automatic shared personal image privacy level detection and management
US11405363B2 (en) * 2019-06-26 2022-08-02 Microsoft Technology Licensing, Llc File upload control for client-side applications in proxy solutions
US11115595B2 (en) * 2019-09-03 2021-09-07 Mediatek Inc. Privacy-aware image encryption
CN114580006A (en) * 2020-11-30 2022-06-03 京东方科技集团股份有限公司 Resource access control method and electronic equipment
CN115277670A (en) * 2022-06-24 2022-11-01 维沃移动通信有限公司 Network connection control method and device of target application and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346137A (en) * 2013-07-24 2015-02-11 腾讯科技(深圳)有限公司 Application network management method, system, and computer readable storage medium
CN111753286A (en) * 2020-06-16 2020-10-09 Oppo广东移动通信有限公司 Terminal device monitoring method and device, terminal device and storage medium
CN112752316A (en) * 2020-12-28 2021-05-04 维沃移动通信有限公司 Electronic equipment networking control method and device, electronic equipment and storage medium
CN216122668U (en) * 2021-05-13 2022-03-22 广州视源电子科技股份有限公司 Remote display system of electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023246715A1 (en) * 2022-06-24 2023-12-28 维沃移动通信有限公司 Network connection control method and apparatus for target application, and electronic device

Also Published As

Publication number Publication date
WO2023246715A1 (en) 2023-12-28

Similar Documents

Publication Publication Date Title
CN112035878A (en) Information display method and device and electronic equipment
WO2023246715A1 (en) Network connection control method and apparatus for target application, and electronic device
CN107862035B (en) Network reading method and device for conference record, intelligent tablet and storage medium
CN111817944A (en) Picture sharing method and device and electronic equipment
CN109756539B (en) Screen capture control method and related equipment
WO2023030116A1 (en) Display method and apparatus
EP4351117A1 (en) Information display method and apparatus, and electronic device
CN107566354B (en) Webpage content detection method and device and storage medium
CN114844853A (en) Information processing method, information processing apparatus, electronic device, and medium
KR102095666B1 (en) Information input methods, devices, programs and storage media
CN114780192A (en) Remote assistance method, remote assistance device and electronic equipment
CN105320892B (en) Communication record storage method and related system for social communication application
CN115374451A (en) Message processing method, device, equipment and computer readable storage medium
CN112947834A (en) Information input method and device and electronic equipment
CN113347076B (en) Session information deleting method and device
CN113407959B (en) Operation execution method and device and electronic equipment
CN113398581B (en) Game picture display method, game picture display device, electronic equipment and readable storage medium
US20220309151A1 (en) Method for providing remote service capable of multilingual input and server performing the same
CN115600229A (en) Information display method and device
CN115390712A (en) Icon hiding method and device, electronic equipment and storage medium
CN111656349B (en) Method for managing access and display service of confidential information and data through virtual desktop
CN106648734B (en) Access management method and device for application program
CN114185906A (en) Content updating method and content updating device
CN116737302A (en) Chat window display method and device and electronic equipment
KR20070025677A (en) Portable terminal and method for managing images

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination