WO2019071581A1 - 一种应用启动的控制方法及用户终端 - Google Patents
一种应用启动的控制方法及用户终端 Download PDFInfo
- Publication number
- WO2019071581A1 WO2019071581A1 PCT/CN2017/106099 CN2017106099W WO2019071581A1 WO 2019071581 A1 WO2019071581 A1 WO 2019071581A1 CN 2017106099 W CN2017106099 W CN 2017106099W WO 2019071581 A1 WO2019071581 A1 WO 2019071581A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- information
- user terminal
- preset
- operation instruction
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
Definitions
- the present invention relates to the field of terminal technologies, and in particular, to a control method for starting an application and a user terminal.
- an application triggers the launch of another application.
- application 1 is an e-commerce application and application 2 is a payment application.
- the application 1 needs to invoke the payment interface of the application 2 to perform a payment operation, so the application 1 transmits a display instruction for displaying the payment interface of the application 2 to the system of the user terminal. After the system receives the display instruction, the application 2 is launched and the payment interface of the application 2 is displayed.
- Application 1 triggering launch application 2 may also be referred to as application 1 pulling up application 2.
- An application is "pushed up" to refer to an application that has not started the process and is started by another application/mobile system.
- control mode initiated by the application requires the user to manually set whether the application is allowed to be started in advance, which is not intelligent.
- the embodiment of the invention discloses an application startup control method and a user terminal, which can intelligently control the startup of the application.
- an embodiment of the present invention provides an application startup control method, which is applied to a user terminal, and the method includes: receiving an operation instruction sent by a first application, where the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is The operation of the second application is required to be completed; determining whether the operation instruction carries the preset information, where the preset information is information included in the software development kit SDK used by the first application; if the operation instruction carries the preset information, the startup is prohibited. The second application; if the operation instruction does not carry the preset information, the second application is controlled according to the operation instruction.
- the second application can be intelligently identified according to the operation instruction, without the user setting the application that is allowed to be started in the application configuration list in advance.
- the intelligence of the application launch control is increased.
- the specific implementation of the second application is controlled according to the operation instruction.
- the first information is obtained according to the operation instruction, where the first information includes an operating state of the first application, or the first information includes the second information.
- the permission information of the application, or the first information includes a state of the gadget of the second application; and the second application is controlled according to the first information.
- the running state of the first application may be running in the foreground or running in the background.
- the application type of the first application may be a Bluetooth management application or another application type.
- a widget also known as a widget, is an application that can be placed directly on the desktop to provide functionality.
- the target operation is to start a target interface of the second application, where the first information includes an operating state of the first application, and the specific implementation manner of the second application is controlled according to the first information:
- the second application is prohibited from being started; if the running state of the first application is running in the foreground, the second application is started.
- the second application that is maliciously launched is less likely. Therefore, when the running state of the first application is running in the foreground, the second application can be started. It can be seen that by implementing the embodiment, it is possible to intelligently identify whether the application is maliciously launched, and intelligently intercept the maliciously launched application.
- the target operation is to start a target interface of the second application, where the first information includes an operating state of the first application, and the specific implementation manner of starting the second application according to the first information may be: if the first application is running If the status is running in the background, the second application is disabled; if the running status of the first application is running in the foreground, the interface information of the target interface is obtained; if the interface information indicates that the target interface is a non-transparent interface, the second application is started; Indicates that the target interface is a transparent interface, and it is forbidden to start the second application.
- the target interface is a transparent interface
- the user cannot see the specific operation of the second application, and the second application may perform a malicious operation. Therefore, the second application is started only when the target interface is a non-transparent interface, which effectively avoids maliciously launching the application.
- the size of the target interface may also be obtained; if the size of the target interface is smaller than the preset size, the second application is closed. If the target interface is too small, the user cannot see or notice the specific operation of the second application, and the second application may perform malicious operations. Therefore, the second application is continued only when the size of the target interface is larger than the preset size, which effectively avoids maliciously launching the application.
- the target operation is to start the target service of the second application
- the first information includes the rights information of the second application
- the specific implementation manner of the second application to start the control according to the first information may be: if the first information is determined according to the rights information
- the second application has a preset permission to start the second application.
- the user terminal may further determine, according to other information, whether to start the second application.
- the permission information of the second application is used to indicate the authority that the second application has.
- the preset permission can be a notification usage permission or the like.
- Notification usage rights are permissions that can listen for changes to the notifications of the current system. Therefore, an application with notification usage rights is an application with high authority.
- An application with a high privilege is a trusted application. After an application with a high privilege is launched, no malicious operation is performed, so the application is not maliciously launched and can be launched. It can be seen that the implementation of the second application can be intelligently controlled by implementing the embodiment.
- the target operation is to start the target service of the second application
- the first information is the running state of the first application
- the specific implementation manner of starting the second application according to the first information may be: if the first application is running If the state is running in the background, and the gadget of the second application is in the active state, the second application is started; if the running state of the first application is running in the background, and the gadget of the second application is inactive, the second is prohibited from being started.
- the second application is started; if the application type of the second application is If it is not the first preset type, and the gadget of the second application is in an inactive state, it is prohibited to start the second application.
- the first preset type may include any one or more of a payment application, a voice engine application, and a sharing application.
- payment applications, voice engine applications, and sharing applications are applications that users often use.
- the first application is not a malicious application hidden in the background. Therefore, the operation instruction is used to start the service of the second application, and when the first application is the foreground application, the payment application, the voice engine application, and the sharing application can be started.
- the activated gadget is not a malicious launch, so the second application with the gadget active can be launched. It can be seen that the implementation of the second application can be intelligently controlled by implementing the embodiment.
- the specific implementation manner of obtaining the first information according to the operation instruction may be: if the target operation is to start the target service of the second application, and determining, according to the permission information, that the second application does not have the preset permission, acquiring the first application The running state. It can be seen that by implementing the implementation manner, the maliciously launched application can be intercepted more accurately, and the startup of the second application can be intelligently controlled.
- the target operation is to start the target data query function of the second application, where the first information is the running state of the first application, and the specific implementation manner of starting the second application according to the first information may be: if the first application is The running state is running in the background, and the gadget of the second application is activated, the second application is started; if the running state of the first application is running in the background, and the gadget of the second application is inactive, the startup is prohibited.
- a second application if the running state of the first application is running in the foreground, and the gadget of the second application is in the activated state or the application type of the second application is the second preset type, the second application is started; If the application type is not the second preset type, and the gadget of the second application is in the inactive state, the second application is prohibited from being started.
- the second preset type may include a sharing class application.
- sharing applications are applications that users often use.
- the first application is not a malicious application hidden in the background. Therefore, the operation instruction is used to start the data query function of the second application, and when the first application is the foreground application, the sharing application can be started.
- the activated gadget is not a malicious launch, so the second application with the gadget active can be launched. It can be seen that the implementation of the second application can be intelligently controlled by implementing the embodiment.
- the target operation is to send the target broadcast information to the second application, where the first information is a state in which the first information is a gadget of the second application, and the specific implementation manner of starting the second application according to the first information may be : if the gadget of the second application is in the active state, the second application is started; if the gadget of the second application is not in the activated state, the second application is prohibited from being activated.
- the gadget that normally launches the activation is not a malicious launch, so the second application that the gadget is active can be launched. It can be seen that the implementation of the second application can be intelligently controlled by implementing the embodiment.
- the system of the user terminal may also be started; generating system broadcast information, the system broadcast information is used for sending to the third application; if the gadget of the third application is activated, or If the application type of the third application is the third preset type, the third application is started; if the gadget of the third application is in the inactive state, and the application type of the third application is not the third preset type, the startup is prohibited.
- system broadcast information the system broadcast information is used for sending to the third application
- the gadget of the third application is activated, or If the application type of the third application is the third preset type, the third application is started; if the gadget of the third application is in the inactive state, and the application type of the third application is not the third preset type, the startup is prohibited.
- the third preset type may be a blind type application or the like. Since blind people do not operate the phone, the blind type application is usually started by the system broadcast. Therefore, when the system broadcasts the blind type application, the blind type application needs to be launched. And usually the activated gadget is not a malicious launch, so the second application with the gadget active can be launched. It can be seen that the implementation of the second application can be intelligently controlled by implementing the embodiment.
- the Bluetooth connection with the Bluetooth device is successful, detecting the fourth application with the Bluetooth media browsing service; if the fourth application is not activated, prohibiting starting the fourth application.
- an embodiment of the present invention further provides an application startup control method, which is applied to a user terminal, where The method includes: starting a system of the user terminal; generating system broadcast information, the system broadcast information is used for sending to the third application; if the gadget of the third application is activated, or the application type of the third application is the third preset type, Then, the third application is started; if the gadget of the third application is in an inactive state, and the application type of the third application is not the third preset type, the third application is prohibited from being started.
- the third preset type may be a blind type application or the like. Since blind people do not operate the phone, the blind type application is usually started by the system broadcast. Therefore, when the system broadcasts the blind type application, the blind type application needs to be launched. And usually the activated gadget is not a malicious launch, so the second application with the gadget active can be launched. It can be seen that the implementation of the second application can be intelligently controlled by implementing the embodiment.
- the embodiment of the present invention further provides an application startup control method, which is applied to a user terminal, and the method includes: detecting a fourth application having a Bluetooth media browsing service if a Bluetooth connection with the Bluetooth device is detected successfully; If the fourth application is not activated, the fourth application is prohibited from being started.
- the startup of the malicious application can be intelligently intercepted without the user setting the application that is allowed to be launched in the application configuration list in advance.
- the embodiment of the present invention further provides an application startup control method, which is applied to a user terminal, and the method includes: receiving an operation instruction sent by a first application, where the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation
- the first information is obtained according to the operation instruction, and the first information includes the running state of the first application and the feature information of the second application; and the second application is controlled according to the first information.
- the specific implementation manner of performing the start control on the second application according to the first information may be: determining the first weight value according to the feature information of the second application; if the running state information is running in the foreground, determining according to the type of the operation instruction. The second weight value; if the sum of the first weight value and the second weight value is greater than a preset threshold, the second application is started.
- the running status information is running in the background, acquiring an application type of the second application, where the application type of the first application is a hardware service type application or a non-hardware service type application; according to the application type and the operation instruction of the first application The type determines a third weight value; if the sum of the first weight value and the third weight value is greater than a preset threshold, the second application is started.
- the feature information of the second application includes whether the installation package name of the second application includes a preset keyword, whether the second application has fingerprint permission, whether the second application is a permission trust application, and whether the second application is a high frequency use. Whether the application, the second application has camera rights, and whether the second application has at least one of network connection rights.
- the step of acquiring the first information according to the operation instruction is performed.
- the preset application may be an application frequently used by a majority of users set by the system, for example, a payment application or an instant messaging application. Applications that are frequently used by users are generally not malicious applications, so they can be launched.
- a user terminal having the first aspect, the first aspect
- This function can be implemented in hardware or in hardware by executing the corresponding software.
- the hardware or software includes one or more modules corresponding to the functions described above. This module can be software and/or hardware.
- the first aspect, the possible implementation of the first aspect, the second aspect, the third aspect, the fourth aspect, or the possible implementation manner of the fourth aspect may be referred to due to the principle and the beneficial effects of the user terminal. And the beneficial effects brought about by the user terminal. Therefore, the implementation of the user terminal may refer to the foregoing first aspect, the possible implementation manner of the first aspect, the second aspect, the third aspect, the fourth aspect, or the possible implementation manner of the fourth aspect. It will not be repeated here.
- a user terminal includes: a memory for storing one or more programs; and a processor, configured to invoke a program stored in the memory to implement the first aspect, the first aspect,
- a possible implementation, a second aspect, a third aspect, a fourth aspect, or a solution in a possible implementation manner of the fourth aspect, where the user terminal solves the problem and the beneficial effects can be referred to the foregoing first aspect, and the first aspect may The implementation, the second aspect, the third aspect, the fourth aspect, or the possible implementation manners and the beneficial effects of the fourth aspect are not repeated here.
- a computer readable storage medium storing a computer program, the computer program comprising program instructions, the program instructions, when executed by a processor, causing the processor to perform execution of the above.
- a computer program product which, when run on a computer, causes the computer to perform the first aspect, a possible implementation of the first aspect, the second aspect, the third aspect, the fourth aspect or the fourth Possible implementation of the aspect.
- FIG. 1 is a schematic flowchart of a method for controlling application startup according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of another application startup control method according to an embodiment of the present invention.
- FIG. 3 is a schematic flowchart of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 4 is a schematic flowchart of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 5 is a schematic flowchart of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 6 is a schematic flowchart diagram of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 7 is a schematic flowchart diagram of still another application startup control method according to an embodiment of the present invention.
- FIG. 8 is a schematic flowchart diagram of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 9 is a schematic flowchart of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 10 is a schematic flowchart of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 11 is a schematic flowchart diagram of still another application startup control method according to an embodiment of the present invention.
- FIG. 12 is a schematic flowchart diagram of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 13 is a schematic flowchart diagram of still another application startup control method according to an embodiment of the present invention.
- FIG. 14 is a schematic flowchart of still another application-initiated control method according to an embodiment of the present invention.
- FIG. 15 is a schematic structural diagram of a user terminal according to an embodiment of the present disclosure.
- FIG. 16 is a schematic structural diagram of another user terminal according to an embodiment of the present disclosure.
- FIG. 17 is a schematic structural diagram of still another user terminal according to an embodiment of the present disclosure.
- FIG. 18 is a schematic structural diagram of still another user terminal according to an embodiment of the present disclosure.
- FIG. 19 is a schematic structural diagram of still another user terminal according to an embodiment of the present invention.
- the first application and the second application are developed using the same software development kit (SDK) with the same functionality as in the SDK.
- SDK software development kit
- the SDK may be pre-configured to include at least one of an interface, a service, a data query function, and broadcast information.
- the interface 1 is an interface preset by the SDK, because the first application and the second application use the same SDK (ie, the first application and the second application are in development) Both use the same SDK), both of which have interface 1.
- the function of sending an operation instruction to the system may also be preset in the SDK, that is, an application using the SDK, and when the system is running, the SDK preset operation instruction is sent to the system.
- the SDK preset operation instruction is sent to the system.
- an operation instruction for the interface 1 for starting the second application that also uses the SDK is sent to the user terminal system.
- the user terminal system After receiving the operation instruction, the user terminal system starts the second application and then starts the interface 1 of the second application. Since the maker of the SDK can predict or know which applications currently use the SDK, the identifier of the application using the SDK can be carried in the preset operation instruction, and the interface identifier of the interface preset by the SDK is SDK.
- Preset is good, so when an application using the SDK runs in the system, the application sends an SDK preset operation instruction to the system to try to start the application corresponding to the application identifier preset in the operation instruction. And the interface 1 of the application, regardless of whether the application corresponding to the application identifier preset in the operation instruction is installed in the system. If the application corresponding to the application identifier pre-set in the operation command has been installed in the system, it may be started by the system according to the operation instruction.
- the user terminal system when the first application is installed, the user terminal system records the identifier of the first application and the identifier of the interface 1 in the registration information of the first application.
- the user terminal system when the second application is installed, the user terminal system records the identifier of the second application and the identifier of the interface 1 in the registration information of the second application.
- the identifier of the interface 1 is recorded in the registration information of the first application and the registration information of the second application.
- the system Based on the identity of the first application, the system can determine its corresponding first application. Based on the identity of the second application, the system can determine its corresponding second application. Based on the identification of interface 1, the system can determine interface 1.
- the first application After the first application is started, the first application sends an operation instruction to the user terminal system, where the operation instruction includes an identifier of the second application and an identifier of the interface 1 for the identifier of the interface 1 of the user terminal system to start the second application. .
- the user terminal After receiving the operation instruction, the user terminal searches for the identifier of the second application and the identifier of the interface 1 in the registration information of the second application.
- the identifier of the interface 1 is recorded in both the registration information of the first application and the registration information of the second application. Therefore, the user terminal system can find the identifier of the second application and the identifier of the interface 1 in the registration information of the second application.
- the user terminal system After the user terminal system finds the identifier of the second application and the identifier of the interface 1 in the registration information of the second application, if the second application is not activated, the user terminal system starts the second application first, and then starts the interface 1 of the second application. .
- the first application may also trigger the startup of the second application by starting the interface of the second application.
- the first application can transmit an operation instruction for launching a target interface of the second application to the user terminal system.
- the user terminal system After receiving the operation instruction, the user terminal system starts the second application and then starts the target interface of the second application.
- the second application is registered in the user terminal system during installation, and the user terminal system records the identifier of the second application and the interface identifier of the second application in the registration information of the second application. The system may determine the corresponding second application according to the identifier of the second application.
- the system may determine a corresponding interface of the second application corresponding to the interface identifier.
- the first application may send an operation instruction to the user terminal system, where the operation instruction carries an identifier of the second application and an identifier of the target interface of the second application, where the target interface may be any interface, and the operation instruction is used to indicate that the user terminal system is started.
- the target interface of the second application After receiving the operation instruction, the user terminal system searches for the identifier of the second application and the identifier of the target interface in the registration information of the second application.
- the user terminal system After the user terminal system finds the identifier of the second application and the identifier of the target interface in the registration information of the second application, if the second application is not activated, the user terminal system starts the second application first, and then starts the target interface of the second application. . In this way, the developer of the first application needs to negotiate with the developer of the second application to obtain the identifier of the target interface of the second application.
- the first application is an instant messaging application and the second application is a news application.
- the instant messaging application can send an operational command to the user terminal system that carries the identity of the news application and the identity of interface 1.
- the user terminal system After receiving the operation instruction, the user terminal system searches for the identifier of the news application and the identifier of the interface 1 in the registration information of the news application. After the user terminal system finds the identifier of the news application and the identifier of the interface 1 in the registration information of the news application, if the news application is not activated, the user terminal system starts the news application first, and then starts the interface 1 of the news application.
- the first application and the second application have the service 1 as an example.
- the service 1 is preset in the same SDK, and the first application and the second application use the SDK.
- the first application may transmit an operation instruction for starting the service 1 of the second application to the user terminal system. After receiving the operation instruction, the user terminal system starts the second application and then starts the service 1 of the second application.
- the identifier of the application using the SDK can be carried in a preset operation instruction, and the service of the service 1 preset by the SDK is similar.
- the identifier is preset by the SDK, so when an application using the SDK is running in the system, the application sends an SDK preset operation instruction to the system to try to start the application identifier corresponding to the preset in the operation instruction.
- the application, and the service 1 of the application regardless of whether the application corresponding to the application identifier in the operation instruction is installed in the system. If the application corresponding to the application identifier pre-set in the operation command has been installed in the system, it may be started by the system according to the operation instruction.
- the user terminal system when the first application is installed in the system, because the SDK presets the service 1, the user terminal system records the identifier of the first application and the identifier of the service 1 in the registration information of the first application.
- the user terminal system when the second application is installed, the user terminal system records the identifier of the second application and the identifier of the service 1 in the registration information of the second application.
- the registration information of the first application and the registration information of the second application all have the same identifier of the service 1.
- the system can determine its corresponding first application.
- the system can determine its corresponding second application.
- the system can determine service 1.
- the first application After the first application is started, the first application sends an operation instruction to the user terminal system, the operation instruction including an identifier of the second application and an identifier of the service 1, the operation instruction being used to instruct the user terminal system to start the service 1 of the second application.
- the user terminal After receiving the operation instruction, the user terminal searches for the identifier of the second application and the identifier of the service 1 in the registration information of the second application. Due to the registration information of the first application and the second application The same service 1 identifier is recorded in the registration information. Therefore, the user terminal system can find the identifier of the second application and the identifier of the service 1 in the registration information of the second application.
- the user terminal system After the user terminal system finds the identifier of the second application and the identifier of the service 1 in the registration information of the second application, if the second application is not activated, the user terminal system starts the second application first, and then starts the service of the second application. .
- the first application may also trigger the startup of the second application by starting the service of the second application.
- the first application may send an operation instruction to the user terminal system to start the target service of the second application.
- the user terminal system After receiving the operation instruction, the user terminal system starts the second application and then starts the target service of the second application.
- the second application may be registered in the user terminal system during installation, and the user terminal system records the identifier of the second application and the service identifier of the second application in the registration information, and the system may determine the second application according to the service identifier. The corresponding services provided.
- the first application may send an operation instruction to the user terminal system, where the operation instruction carries an identifier of the second application and an identifier of the target service of the second application, where the target service may be any service of the second application, the operation instruction is used to indicate the user
- the terminal system starts the target service of the second application.
- the user terminal system After receiving the operation instruction, the user terminal system searches for the identifier of the second application and the identifier of the target service in the registration information. After the user terminal system finds the identifier of the second application and the identifier of the target service in the registration information, if the second application is not activated, the user terminal system starts the second application first, and then starts the target service of the second application. In this way, the developer of the first application needs to negotiate with the developer of the second application to obtain the identity of the target service of the second application.
- the first application is an instant messaging application and the second application is a music playback application.
- the instant messaging application sends an operation command to the user terminal system, the operation instruction carrying an identification of the music playing application and an identification of the download service.
- the user terminal system searches for the identifier of the music playing application and the identifier of the download service in the registration information of the music playing application.
- the user terminal system finds the identifier of the music playing application and the identifier of the download service in the registration information of the music playing application, if the music playing application is not activated, the user terminal system starts the music playing application first, and then starts the download service of the music playing application. .
- the first application and the second application have the data query function 1 as an example.
- the data query function 1 is preset in the same SDK, and the first application and the second application use the SDK.
- the first application may transmit an operation instruction for starting the data query function 1 of the second application to the user terminal system. After receiving the operation instruction, the user terminal system starts the second application, and then starts the data query function 1 of the second application.
- the identifier of the application using the SDK can be carried in a preset operation instruction, and the SDK default data query function 1
- the data query function identifier is preset by the SDK, so when an application using the SDK runs in the system, the application sends an SDK preset operation instruction to the system to try to start the preset in the operation instruction.
- the application identifies the corresponding application, and the data query function 1 of the application, regardless of whether the application corresponding to the application identifier in the operation instruction is installed in the system. If the application corresponding to the application identifier pre-set in the operation command has been installed in the system, it may be started by the system according to the operation instruction.
- the user terminal system when the first application is installed in the system, because the SDK presets the data query function 1, the user terminal system records the identifier of the first application and the identifier of the data query function 1 in the registration information of the first application.
- the user terminal system when the second application is installed, the user terminal system records the identifier of the second application and the identifier of the data query function 1 in the registration information of the second application.
- the registration information of the first application and the registration information of the second application all have the same identifier of the data query function 1.
- the system can determine its corresponding first application.
- the second application The identification of the system, the system can determine its corresponding second application. Based on the identification of the data query function 1, the system can determine the data query function 1.
- the first application After the first application is started, the first application sends an operation instruction to the user terminal system, where the operation instruction includes an identifier of the second application, an identifier of the data query function 1, and data to be queried, the operation instruction is used to indicate that the user terminal system is started.
- the data query function 1 of the second application feeds back the query result to the first application.
- the user terminal After receiving the operation instruction, the user terminal searches for the identifier of the second application and the identifier of the data query function 1 in the registration information of the second application.
- the same data query function 1 identifier is recorded in the registration information of the first application and the registration information of the second application. Therefore, the user terminal system can find the identifier of the second application and the identifier of the data query function 1 in the registration information of the second application.
- the user terminal system After the user terminal system finds the identifier of the second application and the identifier of the data query function 1 in the registration information of the second application, if the second application is not activated, the user terminal system starts the second application first, and then starts the second application. Data query function 1.
- the first application may also trigger the startup of the second application by starting the data query function of the second application.
- the first application can transmit an operation instruction for starting the data query function of the second application to the user terminal system.
- the user terminal system After receiving the operation instruction, the user terminal system starts the second application, and then starts the data query function of the second application.
- the second application may be registered in the user terminal system during installation, and the user terminal system records the identifier of the second application and the data query function identifier of the second application in the registration information. According to the query function identifier, the user terminal system can determine the query function provided by the second application.
- the first application may send an operation instruction to the user terminal system, where the operation instruction carries the identifier of the second application and the query function identifier of the second application and the data to be queried (such as querying a contact), the operation instruction is used to indicate the user terminal system
- the query function of the second application is started, and the query result is fed back to the first application (such as the contact that is queried to the first application).
- the user terminal system After receiving the operation instruction, the user terminal system searches for the identifier of the second application and the query function identifier in the registration information.
- the user terminal system After the user terminal system finds the identifier of the second application and the identifier of the query function in the registration information of the second application, if the second application is not activated, the user terminal system starts the second application first, and then starts the query function of the second application. .
- This approach may also be referred to as the first application launching the second application in a manner that initiates a data query function. In this way, the developer of the first application needs to negotiate with the developer of the second application to obtain the identifier of the data query function of the second application.
- the first application is an instant messaging application and the second application is a contact application.
- the instant messaging application needs to know which contacts in the contacts application are registered with the account of the instant messaging application. Therefore, the instant messaging application needs to obtain the contact phone number from the contact application, and send the contact number to the server of the instant messaging application to check whether there is an account of the instant messaging application corresponding to the contact number. Therefore, the instant messaging application can send an operation instruction to the user terminal system, where the operation instruction carries the identifier of the contact application and the data query function identifier and the data that needs to be queried (ie, the contact number needs to be queried).
- the user terminal system After receiving the operation instruction, the user terminal system searches for the identifier of the contact application and the data query function identifier in the registration information of the contact application. After the user terminal system finds the identifier of the contact application and the data query function identifier in the registration information of the contact application, if the contact application is not activated, the user terminal system starts the contact application first, and then starts the data query of the contact application. Function to query the contact number in the contact application and return the queried contact number to the instant messaging application.
- the first application and the second application have the broadcast information 1 as an example.
- the broadcast information 1 is preset in the same SDK, and the first application and the second application use the SDK.
- the identifier of the application using the SDK can be carried in a preset operation instruction, and the broadcast information 1 preset by the SDK is The SDK is preset, so when using the SDK When the application is running in the system, the application sends an SDK preset operation instruction to the system to try to start the application corresponding to the application identifier preset in the operation instruction, and send the broadcast information 1 to the application, regardless of Whether the application corresponding to the application identifier in the operation instruction is installed in the system is preset.
- the application corresponding to the application identifier pre-set in the operation command may be started by the system according to the operation instruction. Specifically, when the first application and the second application are installed, the broadcast information 1 is subscribed to by the system in the user terminal system. After the first application is launched, the first application sends an operation instruction to the user terminal system, the operation instruction including the broadcast information 1. After the user terminal receives the operation instruction, if the second application is not activated, the user terminal system starts the second application first, and then sends the broadcast information 1 to the second application.
- the first application may also trigger the activation of the second application by sending the broadcast information to the second application.
- the first application and the second application subscribe to the broadcast information that needs to be received in the user terminal system.
- both the first application and the second application subscribe to the broadcast information 1 in the user terminal system.
- an operation instruction is sent to the user terminal system, and the operation instruction carries the broadcast information 1.
- the user terminal system receives the operation instruction, if the second application is not activated, the user terminal system starts the second application first, and then The second application sends broadcast information 1.
- the first application is an instant messaging application and the second application is a news application.
- the instant messaging application and the news application subscribe to the "startup completed" broadcast message in the user terminal system. If the instant messaging application is started, the broadcast message "Startup Complete" is sent to the user terminal system. After receiving the broadcast information, the user terminal system detects that the news application is not activated, and then the user terminal system first starts the news application, and then sends the broadcast information "startup complete" to the news application.
- system can also launch the second application by sending broadcast information.
- Applications can broadcast information in the system subscription system. After the system is started, system broadcast information is generated, and system broadcast information is sent to the application that subscribes to the broadcast information. If the application for subscribing to the system broadcast information is not activated, the application is started first, and the system broadcast information is sent to the application.
- the second application may be maliciously launched.
- the first application and the second application may be applications of the same company. Since the application is the same company, after the first application is started, the second application is often started by one of the above methods, and the first application is The second application performs malicious actions that the user cannot see. And starting too many applications can also cause the user terminal to run slower. Therefore, it is necessary to control the maliciously launched application.
- the user needs to manually set whether the application is allowed to be started in advance, which is not intelligent.
- the embodiment of the present application provides an application startup control method and a user terminal, which does not require the user to manually set whether the application is allowed to be started in advance, and can intelligently control the startup of the application, and the malicious application and the application that is not needed to be used. The start of the interception.
- FIG. 1 is a method for controlling application startup according to an embodiment of the present application.
- the control method initiated by the application includes the following sections 101 to 104, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the operation instruction sent by the first application is received by the user terminal system.
- the user terminal system refers to the operating system of the user terminal.
- the user terminal system may be an Android system or an IOS system or the like.
- the target operation may be a target interface for starting the second application, or the target operation may be a target service for starting the second application, or the target operation may be a target data query function for starting the second application, or the target operation may be
- the second application sends the target broadcast information, or the target operation may be other operations that need to be started before the second application is started, which is not limited in this embodiment.
- the target interface may be any interface of the second application
- the target service may be any service of the second application
- the target data query function may be any data query function of the second application
- the target broadcast information may be the second application. Any broadcast information subscribed to.
- the operation instruction may carry the identifier of the second application and the identifier of the target interface. If the target operation is to start the target service of the second application, the operation instruction may carry the identifier of the second application and the identifier of the target service. If the target operation is to start the target data query function of the second application, the operation instruction may carry the identifier of the second application and the identifier of the target data query function. If the target operation is to send the target broadcast information to the second application, the operation instruction further carries the target broadcast information that needs to be sent to the second application.
- the first application may be an application of the user terminal, or the first application may be an application of the other terminal, which is not limited in this embodiment.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the user terminal after receiving the operation instruction, determines whether the operation instruction carries the preset information.
- the preset information is information included in the SDK used by the first application. Specifically, the preset information is information included in the SDK used to develop the first application.
- the first application using the SDK can be understood as the function of the first application having the SDK.
- multiple applications have the same SDK functionality. After one of the applications is launched, other applications can be triggered by launching the SDK function of other applications.
- the first application and the second application have the same SDK functionality.
- an operation instruction is sent to the user terminal system, and the operation instruction is used to start the interface 1 of the second application.
- the interface 1 is an interface in the SDK, and the user terminal system starts the second application first, and then starts the second application.
- Application interface 1 For example, after the first application is started, an operation instruction is sent to the user terminal system, where the operation instruction is used to start the service 1 of the second application, and the service is a service in the SDK, and then the user terminal system starts the second application and then starts.
- Service 1 of the second application For example, after the first application is started, an operation instruction is sent to the user terminal system, and the operation instruction is used to start the data query function 1 of the second application.
- the data query function 1 is a data query function in the SDK, and the user terminal system first The second application is started, and the data query function 1 of the second application is started.
- an operation instruction is sent to the user terminal system, where the operation instruction is used for the broadcast information 1 to the second application, and the broadcast information 1 is the broadcast information in the SDK, then the user terminal system starts the second The application then sends the broadcast information 1 to the second application.
- an application that is started is an application that the user does not want to start, and is a malicious startup application. Therefore, the second application launched by the mode can be intercepted, that is, the second application is not started.
- an SDK corresponds to a common information
- the interface identifier, the service identifier, the query function identifier, and the broadcast information identifier in the same SDK have common information.
- the SDK 1 includes the identifier of the interface 1, the identifier of the interface 2, the identifier of the service 1, the identifier of the service 2, the identifier of the data query function 1, the identifier of the data query function 2, the identifier of the broadcast information 1, and the identifier of the broadcast information 2.
- the identifier of interface 1 is "aaa interface 1"
- the identifier of interface 2 is "aaa interface 2".
- the identifier of service 1 is “aaa service 1", and the identifier of service 2 is “aaa service 2".
- the identifier of the data query function 1 is “aaa data query function 1", and the identifier of the data query function 2 is “aaa data query function”. 2".
- the identifier of the broadcast information 1 is “aaa broadcast information 1”, and the identifier of the broadcast information 2 is “aaa broadcast information 2.” Therefore, the public information is "aaa”.
- the preset information can be set to "aaa”.
- the user terminal system receives the first application sending operation instruction, and the operation instruction carries the identifier of the second application and the identifier of the interface 1.
- the identifier of interface 1 is "aaa interface 1".
- the user terminal system recognizes that the operation command includes "aaa”, so the user terminal system does not start the second application.
- the user terminal prohibits starting the second application.
- the user terminal performs start control on the second application according to the operation instruction.
- the second application can be intelligently identified according to the operation instruction, without the user setting the application that is allowed to be started in the application configuration list in advance. Therefore, by implementing the method described in FIG. 1, the intelligence of the application startup control is increased.
- the specific implementation manner that the user terminal performs the start control on the second application according to the operation instruction may be: the user terminal acquires the first information according to the operation instruction; and the user terminal starts and controls the second application according to the first information.
- the first information includes an operating status of the first application, or the first information includes rights information of the second application, or the first information includes a status of the gadget of the second application.
- the running state of the first application may be running in the foreground or running in the background.
- a widget also known as a widget, is an application that can be placed directly on the desktop to provide functionality.
- the status of the gadget includes active and not active. Gadgets that are on the desktop are active gadgets, and gadgets that are not on the desktop are gadgets that are not active.
- activated gadgets can be weather forecasts and calendars placed on the desktop.
- FIG. 2 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 201-207, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to instruct the user terminal to perform a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the user terminal prohibits starting the second application.
- the user terminal prohibits starting the second application.
- the user terminal starts the second application.
- 204 is a specific implementation manner in which the user terminal acquires the first information according to the operation instruction.
- 205 and 206 are specific implementation manners for the user terminal to initiate control of the second application according to the first information.
- the second application that is maliciously launched is less likely. Therefore, when the running state of the first application is running in the foreground, the second application can be started.
- the size of the target interface is obtained; if the size of the target interface is smaller than the preset size, the second application is closed.
- the second application is continued only when the size of the target interface is larger than the preset size, which effectively avoids maliciously launching the application.
- FIG. 3 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 301 to 309, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the user terminal prohibits starting the second application.
- the user terminal prohibits starting the second application.
- the user terminal after the user terminal acquires the running state of the first application, if the running state of the first application is running in the background, the user terminal prohibits starting the second application.
- the user terminal acquires interface information of the target interface.
- the user terminal after the user terminal acquires the running state of the first application, if the running state of the first application is running in the foreground, the user terminal acquires interface information of the target interface.
- the user terminal starts the second application.
- the user terminal after the user terminal acquires the interface information of the target interface, if the interface information indicates that the target interface is a non-transparent interface, the user terminal starts the second application.
- the user terminal prohibits starting the second application.
- the user terminal after the user terminal acquires the interface information of the target interface, if the interface information indicates that the target interface is a transparent interface, the user terminal does not start the second application.
- the part 304 is a specific implementation manner in which the user terminal acquires the first information according to the operation instruction.
- Sections 305 to 308 are specific implementation manners in which the user terminal initiates control of the second application according to the first information.
- the target interface is a transparent interface
- the user cannot see the specific operation of the second application, and the second application may perform a malicious operation. Therefore, the second application is started only when the target interface is a non-transparent interface, effectively avoiding malicious startup. application.
- the size of the target interface is obtained; if the size of the target interface is smaller than the preset size, the second application is closed.
- the second application is continued only when the size of the target interface is larger than the preset size, which effectively avoids maliciously launching the application.
- FIG. 4 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 401 to 406, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the 404 is a specific implementation manner in which the user terminal acquires the first information according to the operation instruction.
- 405 is a specific implementation manner in which the user terminal performs start control on the second application according to the first information.
- the second application after the user terminal acquires the rights information of the second application, if it is determined that the second application has the preset rights according to the rights information, the second application is started.
- the permission information of the second application is used to indicate the authority that the second application has.
- the preset permission can be a notification usage permission or the like.
- Notification usage rights are permissions that can listen for changes to the notifications of the current system. Therefore, an application with notification usage rights is an application with high authority.
- An application with a high privilege is a trusted application. After an application with a high privilege is launched, no malicious operation is performed, so the application is not maliciously launched and can be launched.
- part 406 is optional. If it is determined according to the authority information that the second application does not have the preset authority, the user terminal may further determine, according to other information, whether to start the second application.
- FIG. 5 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 501 to 508, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the state of the gadget of the second application may be acquired, and then the state of the gadget of the second application is determined to be an activated state. If the gadget of the second application is active, the second application is launched. Otherwise, the second application is not started.
- the gadget that normally launches the activation is not a malicious launch, so the second application that the gadget is active can be launched.
- the foregoing 506 is an optional step. If the running state of the first application is running in the background, and the gadget of the second application is not in the activated state, the user terminal may further determine whether to start the second application according to other information.
- the user terminal starts the second application.
- the first preset type may include any one or more of a payment application, a voice engine application, and a sharing application.
- payment applications, voice engine applications, and sharing applications are applications that users often use.
- the first application is not a malicious application hidden in the background. Therefore, the operation instruction is used to start the service of the second application, and when the first application is the foreground application, the payment application, the voice engine application, and the sharing application can be started. .
- the running state of the first application After the running state of the first application is obtained, the running state of the first application is determined to be running in the foreground, and then the gadget of the second application is determined to be in an active state, or whether the application type of the second application is the first Set the type.
- the second application may be determined to be in an activated state. If the second application's gadget is in an active state, the second application is started; if the second application's gadget is in an inactive state, the second application is determined. Whether the application type is the first preset type. If the application type of the second application is the first preset type, the second application is started. If the application type of the second application is not the first preset type, the second application is prohibited from being started.
- the application type of the second application is the first preset type, and if the application type of the second application is the first preset type, the second application is started. If the application type of the second application is not the first preset type, it is determined whether the gadget of the second application is in an active state. If the gadget of the second application is active, the second application is launched. If the gadget of the second application is in an inactive state, it is prohibited to start the second application.
- the foregoing 508 is an optional step. If the running state of the first application is the foreground running, and the application type of the second application is not the first preset type, and the gadget of the second application is in the inactive state, the user terminal Can also be based on Other information continues to determine if the second application is launched.
- FIG. 6 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 601 to 612, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the user terminal determines, according to the rights information, whether the second application has the preset authority.
- the user terminal starts the second application.
- the specific implementation principle of the 605 part is the same as the specific implementation principle of the 405 part in FIG. 4, and the corresponding description of the 405 part can be referred to, and details are not described herein.
- the user terminal starts the second application.
- the user terminal prohibits starting the second application.
- the embodiment of the present application does not limit whether the user terminal determines whether the second application has the preset authority according to the authority information, and the execution order of the running state of the first application.
- the running status of the first application may be acquired first. If the running state of the first application is running in the background, and the gadget of the second application is in the active state, the second application is started. If the running state of the first application is running in the foreground, and the application type of the second application is the first preset type or the gadget of the second application is in the activated state, the second application is started. If the running state of the first application is running in the background, and the gadget of the second application is in an inactive state, determining whether the second application has the preset permission according to the permission information.
- the second application is started. If it is determined according to the authority information that the second application has the preset authority, the second application is prohibited from being started. If the running state of the first application is running in the foreground, and the application type of the second application is not the first preset type, and the gadget of the second application is In the inactive state, it is determined according to the permission information whether the second application has a preset authority. If it is determined according to the authority information that the second application has the preset authority, the second application is started. If it is determined according to the authority information that the second application does not have the preset authority, the second application is prohibited from being started.
- FIG. 7 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following 701 to 708 parts, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the user terminal prohibits starting the second application.
- the specific implementation principles of the 701 to 703 are the same as those of the 102 to 103 in FIG. 1 .
- the user terminal starts the second application.
- the second preset type may include a sharing class application.
- sharing applications are applications that users often use.
- the first application is not a malicious application hidden in the background. Therefore, the operation instruction is used to start the data query function of the second application, and when the first application is the foreground application, the sharing application can be started.
- the activated gadget is not a malicious launch, so the second application with the gadget active can be launched. It can be seen that the implementation of the second application can be intelligently controlled by implementing the embodiment.
- the running state of the first application After the running state of the first application is obtained, the running state of the first application is determined to be running in the foreground, and then the gadget of the second application is determined to be in an active state, or whether the application type of the second application is the second pre-determination. Set the type.
- the second application may be determined to be in an activated state. If the second application's gadget is in an active state, the second application is started; if the second application's gadget is in an inactive state, the second application is determined. Whether the application type is the second preset type. If the application type of the second application is the second preset type, the second application is started. If the application type of the second application is not the second preset type, the second application is prohibited from being started.
- the application type of the second application is the second preset type, and if the application type of the second application is The second preset type starts the second application. If the application type of the second application is not the second preset type, it is determined whether the gadget of the second application is in an active state. If the gadget of the second application is active, the second application is launched. If the gadget of the second application is in an inactive state, it is prohibited to start the second application.
- the foregoing 706 is an optional step. If the running state of the first application is running in the background, and the gadget of the second application is not in the active state, the user terminal may further determine whether to start the second application according to other information.
- the foregoing 708 is an optional step. If the running state of the first application is the foreground running, and the application type of the second application is not the second preset type, and the gadget of the second application is in the inactive state, the user terminal It is also possible to determine whether to start the second application based on other information.
- FIG. 8 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 801 to 806, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the specific implementation principles of the 801 to 803 are the same as those of the 102 to 103 in FIG. 1 .
- the user terminal acquires the state of the gadget of the second application.
- the user terminal starts the second application.
- the gadget that normally launches the activation is not a malicious launch, so the second application that the gadget is active can be launched.
- FIG. 9 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following parts 901 to 908, wherein:
- the user terminal starts a system of the user terminal.
- the user terminal generates system broadcast information.
- the system broadcast information is used for sending to the third application.
- the third application is an application on the user terminal that subscribes to system broadcast information.
- the system broadcast information is triggered.
- the gadget of the third application is in an active state, or the application type of the third application is a third preset type, the user terminal starts the third application.
- the gadget of the third application is in an activated state, or whether the application type of the third application is a third preset type.
- the third preset type may be a blind type application or the like. Because blind people do not operate mobile phones, usually blind humans Applications are launched by the system broadcast. Therefore, when the system broadcasts the blind type application, the blind type application needs to be launched.
- the user terminal prohibits starting the third application.
- Sections 901 through 904 may be performed before the execution of section 905.
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the user terminal performs start control on the second application according to the operation instruction.
- the specific implementation principle of the 905-908 part is the same as the specific implementation principle of the parts 101-104 in FIG. 1 , and the descriptions of the corresponding parts of the 101-104 part are omitted.
- FIG. 10 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following parts 1001 to 1009, wherein:
- the user terminal generates system broadcast information.
- the system broadcast information is used for sending to the third application.
- the third application is an application on the user terminal that subscribes to system broadcast information.
- the system broadcast information is triggered.
- the gadget of the third application is in an active state, or the application type of the third application is a third preset type, the user terminal starts the third application.
- the gadget of the third application is in an activated state, or whether the application type of the third application is a third preset type.
- the third preset type may be a blind type application or the like. Since blind people do not operate the phone, the blind type application is usually started by the system broadcast. Therefore, when the system broadcasts the blind type application, the blind type application needs to be launched.
- the user terminal prohibits starting the third application.
- FIG. 11 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 1101 to 1109, wherein:
- the user terminal generates system broadcast information.
- the gadget of the third application is in an active state, or the application type of the third application is a third preset type, the user terminal starts the third application.
- the user terminal prohibits starting the third application.
- Sections 1101 to 1104 may be performed before the 1105 portion is executed.
- the specific implementation principle of the parts 1101 to 1104 is the same as the specific implementation principle of the parts 901 to 904 in FIG. 9 , and the descriptions of the corresponding parts of the 901 to 904 are not described herein.
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal determines whether the preset information is carried in the operation instruction.
- the preset information is information included in the SDK used by the first application.
- the user terminal performs start control on the second application according to the operation instruction.
- the specific implementation principle of the parts 1105 to 1108 is the same as the specific implementation principle of the parts 101 to 104 in FIG. 1 , and the descriptions of the corresponding parts in the 101 to 104 sections are omitted.
- the user terminal detects the fourth application with the Bluetooth media browsing service.
- the Bluetooth device is an in-vehicle device
- the application a has a Bluetooth media browsing service. After the user terminal detects that a Bluetooth connection is established with the in-vehicle device, the application a is activated so that the in-vehicle device can browse the information in the application a.
- application a is an address book so that the in-vehicle device can browse the contact information in the address book.
- parts 1101 to 1104 may also be optional parts.
- Parts 1109 and 1110 can be executed before or after parts 1105 to 1108.
- FIG. 12 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 1201 to 1202, wherein:
- the user terminal If it is detected that the Bluetooth connection with the Bluetooth device is successful, the user terminal detects the fourth application with the Bluetooth media browsing service.
- FIG. 13 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following parts 1301 to 1303, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to indicate that the user terminal performs a target operation, and the target operation is an operation that needs to start the second application to complete.
- the first application is an application of the user terminal.
- the operation instruction sent by the first application is received by the user terminal system.
- the user terminal system refers to the operating system of the user terminal.
- the user terminal system may be an Android system or an IOS system or the like.
- the target operation may be a target interface for starting the second application, or the target operation may be a target service for starting the second application, or the target operation may be a target data query function for starting the second application, or the target operation may be
- the second application sends the target broadcast information, or the target operation may be other operations that need to be started before the second application is started, which is not limited in this embodiment.
- the target interface may be any interface of the second application
- the target service may be any service of the second application
- the target data query function may be any data query function of the second application
- the target broadcast information may be the second application. Any broadcast information subscribed to.
- the operation instruction may carry the identifier of the second application and the identifier of the target interface. If the target operation is to start the target service of the second application, the operation instruction may carry the identifier of the second application and the identifier of the target service. If the target operation is to start the target data query function of the second application, the operation instruction may carry the identifier of the second application and the identifier of the target data query function. If the target operation is to send the target broadcast information to the second application, the operation instruction further carries the target broadcast information that needs to be sent to the second application.
- the user terminal acquires the first information according to the operation instruction.
- the specific implementation manner of the user terminal acquiring the first information according to the operation instruction may be: if the target operation is to start the target interface of the second application, or the target operation is to start the target service of the second application, or the target operation is started.
- the target data query function of the second application, or the target operation is to send the target broadcast information to the second application, and the user terminal acquires the running state information of the first application and the feature information of the second application.
- the first information includes an operating state of the first application and feature information of the second application.
- the running state of the first application may be running in the foreground or running in the background.
- the feature information of the second application includes whether the installation package name of the second application includes a preset keyword, whether the second application has fingerprint permission, whether the second application is a permission trust application, and whether the second application is a high frequency use. Whether the application, the second application has camera rights, and whether the second application has at least one of network connection rights.
- the preset keyword may be the installation package name of the security high application or the installation package name of the frequently used application, for example, the preset keyword may be the installation package name of the payment application.
- Whether the second application has fingerprint authority means whether some operations of the second application require fingerprint verification.
- Whether the second application is a high frequency use application refers to whether the usage time of the second application exceeds a preset number of times in a preset time period, or the usage duration in the preset time period exceeds a preset time length.
- the user terminal starts and controls the second application according to the first information.
- the second application can be intelligently identified according to the first information, without the user setting the application that is allowed to be started in the application configuration list in advance. Therefore, by implementing the method described in FIG. 13, the intelligence of the application startup control is increased.
- the user terminal may further detect whether the second application is a preset application; if the second application is a preset application, start the second application; if the second application is not the preset application, execute Section 1302.
- the preset application may be an application frequently used by a majority of users set by the system, for example, a payment application or an instant messaging application.
- FIG. 14 is another application startup control method provided by an embodiment of the present application.
- the control method initiated by the application includes the following sections 1401 to 1408, wherein:
- the user terminal receives an operation instruction sent by the first application.
- the operation instruction is used to instruct the user terminal to perform a target operation, and the target operation is an operation that needs to start the second application to complete.
- the user terminal acquires the first information according to the operation instruction.
- the first information includes an operating state of the first application and feature information of the second application.
- the user terminal determines the first weight value according to the feature information of the second application.
- the feature information of the second application includes that the installation package name of the second application includes a preset keyword, the second application has a fingerprint authority, the second application is a permission trust application, and the second application is a high frequency use.
- the second application has fingerprint authority and obtains a first weight value of 10.
- the second application is a permission trust application, and the first weight value is 20.
- the second application is a high frequency use application, resulting in a first weight value of 20.
- the second application has the photographing authority, and the first weight value is 5.
- the second application has network connection rights and obtains a first weight value of 5.
- the installation package name of the second application includes a preset keyword, the possibility that the second application is a malicious application is low. Therefore, the installation package name of the second application can be assigned a higher weight value when the preset keyword is included.
- the second application is a rights trust application or the second application is a high frequency use application, the second application is less likely to be a malicious application. Therefore, the second application can be given a higher weight value for the permission trust application or the second application for the high frequency use application.
- the user terminal determines the second weight value according to the type of the operation instruction.
- the user terminal starts the second application.
- the application type of the first application is a hardware service type application or a non-hardware service type application.
- hardware service applications may include Bluetooth-like applications, WiFi-like applications, sensor applications, and the like.
- the user terminal determines a third weight value according to an application type of the first application and a type of the operation instruction.
- the operation instruction is an operation instruction for starting the service of the second application
- the system of the user terminal acquires the running state of the first application
- the running state is the foreground operation, directly according to the operation instruction and the The operational state of an application determines that the second weight value is 10.
- the application type of the first application is also acquired, and the third weight value is determined according to the operation instruction, the running state of the first application, and the application type of the first application. If the application type of the first application is a non-hardware service type application, it is determined that the third weight value is 5.
- the hardware service type application pulls up a malicious application less. Therefore, when the first application running state is running in the background, the corresponding weight value may be further determined according to the application type of the first application. This helps to make the weight value more accurate.
- FIG. 15 is a schematic structural diagram of a user terminal according to an embodiment of the present invention.
- the user terminal described in this embodiment includes: a receiving module 1501 and a processing module 1502. among them:
- the receiving module 1501 is configured to receive an operation instruction sent by the first application, where the operation instruction is used to indicate that the user terminal performs the target operation, and the target operation is an operation that needs to start the second application to complete; the processing module 1502 is configured to determine whether the operation instruction is Carrying the preset information, the preset information is the information included in the software development kit SDK used by the first application; the processing module 1502 is further configured to: if the processing module 1502 determines that the operation instruction carries the preset information, prohibiting starting the second application; The processing module 1502 is further configured to: if the processing module 1502 determines that the operation instruction does not carry preset information, according to the operation The instruction initiates control of the second application.
- the specific manner in which the processing module 1502 initiates the second application according to the operation instruction is: acquiring the first information according to the operation instruction, where the first information includes an operating state of the first application, or the first information includes the second application.
- the permission information, or the first information includes an application type of the first application, or the first information includes a state of the gadget of the second application; and the second application is controlled according to the first information.
- the target operation is to start a target interface of the second application, where the first information includes an operating state of the first application, and the specific manner in which the processing module 1502 starts and controls the second application according to the first information is: When the running state is running in the background, the second application is prohibited from being started; if the running state of the first application is running in the foreground, the second application is started.
- the target operation is to start a target interface of the second application, where the first information includes an operating state of the first application, and the specific manner in which the processing module 1502 starts and controls the second application according to the first information is: If the running state is running in the background, the second application is disabled; if the running state of the first application is running in the foreground, the interface information of the target interface is obtained; if the interface information indicates that the target interface is a non-transparent interface, the second application is started; The information indicates that the target interface is a transparent interface, and the second application is prohibited from being started.
- the processing module 1502 is further configured to: after the second application is started, obtain a size of the target interface; and the processing module 1502 is further configured to: if the size of the target interface is smaller than the preset size, close the second application.
- the target operation is to start the target service of the second application
- the first information includes the right information of the second application
- the specific manner of the control module 1502 for starting and controlling the second application according to the first information is: if determining according to the rights information
- the second application has a preset authority, and the second application is started.
- the target operation is to start the target service of the second application, where the first information is the running state of the first application, and the specific manner in which the processing module 1502 starts the second application according to the first information is: if the first application is The running state is running in the background, and the gadget of the second application is activated, the second application is started; if the running state of the first application is running in the background, and the gadget of the second application is inactive, the startup is prohibited.
- the second application is started if the running state of the first application is running in the foreground, and the gadget of the second application is in an active state or the application type of the second application is the first preset type. If the application type of the second application is not the first preset type, and the gadget of the second application is in an inactive state, the second application is prohibited from being activated.
- the processing module 1502 obtains the first information according to the operation instruction, where the target operation is to start the target service of the second application, and if the second application does not have the preset permission according to the permission information, obtain the first The operational status of the application.
- the first preset type includes at least one of a payment application, a voice engine application, and a sharing application.
- the target operation is to start a target data query function of the second application, where the first information is an operation state of the first application, and the specific manner in which the processing module 1502 starts and controls the second application according to the first information is: The running state of the application is running in the background, and the gadget of the second application is activated, the second application is started; if the running state of the first application is running in the background, and the gadget of the second application is inactive, the prohibition is Starting the second application; if the running state of the first application is running in the foreground, and the gadget of the second application is in the activated state or the application type of the second application is the second preset type, the second application is started; if the second application is The application type is not the second preset type, and the gadget of the second application is in an inactive state, and the second application is prohibited from being started.
- the second preset type is a sharing application.
- the target operation is to send the target broadcast information to the second application, where the first information is a state in which the first information is a gadget of the second application, and the processing module 1502 performs a specific control on the second application according to the first information. If the gadget of the second application is in the active state, the second application is started; if the gadget of the second application is not activated, the second application is prohibited from being activated.
- the user terminal further includes: a startup module, where: the startup module is configured to start a system of the user terminal before receiving the operation instruction sent by the first application; the processing module 1502 is further configured to generate system broadcast information, and the system broadcasts The information is used for sending to the third application; the processing module 1502 is further configured to: if the gadget of the third application is in an activated state, or the application type of the third application is a third preset type, start the third application; the processing module 1502 And if the gadget of the third application is in an inactive state, and the application type of the third application is not the third preset type, prohibiting starting the third application.
- the startup module is configured to start a system of the user terminal before receiving the operation instruction sent by the first application
- the processing module 1502 is further configured to generate system broadcast information, and the system broadcasts The information is used for sending to the third application
- the processing module 1502 is further configured to: if the gadget of the third application is in an activated state, or the application type of the third application is a third
- the third preset type may be a blind human application.
- the Bluetooth connection with the Bluetooth device is successful, detecting the fourth application with the Bluetooth media browsing service; if the fourth application is not activated, prohibiting starting the fourth application.
- FIG. 16 is a schematic structural diagram of a user terminal according to an embodiment of the present invention.
- the user terminal described in this embodiment includes: a startup module 1601 and a processing module 1602. among them:
- the startup module 1601 is further configured to: start a system of the user terminal before receiving the operation instruction sent by the first application; the processing module 1602 is configured to generate system broadcast information, where the system broadcast information is sent to the third application; and the processing module 1602
- the third application is also started if the gadget of the third application is in an active state, or the application type of the third application is a third preset type; the processing module 1602 is further configured to: if the gadget of the third application is in the When the state is activated and the application type of the third application is not the third preset type, the third application is prohibited from being started.
- the third preset type may be a blind human application.
- FIG. 17 is a schematic structural diagram of a user terminal according to an embodiment of the present invention.
- the user terminal described in this embodiment includes: a detection module 1701 and a control module 1702. among them:
- the detecting module 1701 is configured to detect a fourth application that has a Bluetooth media browsing service if the Bluetooth connection is successfully connected to the Bluetooth device, and the control module 1702 is configured to prohibit starting the fourth application if the fourth application is not activated. .
- FIG. 18 is a schematic structural diagram of a user terminal according to an embodiment of the present invention.
- the user terminal described in this embodiment includes: a receiving module 1801 and a processing module 1802. among them:
- the receiving module 1801 is configured to receive an operation instruction sent by the first application, where the operation instruction is used to indicate that the user terminal performs the target operation, the target operation is an operation that needs to be started to complete the second application, and the processing module 1802 is configured to acquire according to the operation instruction.
- the first information includes a running state of the first application and feature information of the second application, and the processing module 1802 is further configured to perform start control on the second application according to the first information.
- the manner in which the processing module 1802 performs the start control on the second application according to the first information is specifically: determining the first weight value according to the feature information of the second application; and if the running state information is running in the foreground, according to the type of the operation instruction Determining a second weight value; if the sum of the first weight value and the second weight value is greater than a preset threshold, starting the second application.
- the processing module 1802 is further configured to acquire an application of the second application if the running status information is running in the background.
- a type the application type of the first application is a hardware service type application or a non-hardware service type application; the processing module 1802 is further configured to determine a third weight value according to an application type of the first application and a type of the operation instruction; the processing module 1802 further And if the sum of the first weight value and the third weight value is greater than a preset threshold, starting the second application.
- the feature information of the second application includes whether the installation package name of the second application includes a preset keyword, whether the second application has fingerprint permission, whether the second application is a permission trust application, and whether the second application is a high frequency use. Whether the application, the second application has camera rights, and whether the second application has at least one of network connection rights.
- the processing module 1802 is further configured to: after receiving the operation instruction, detecting whether the second application is a preset application; the processing module 1802 is further configured to: if the processing module 1802 detects that the second application is a preset application, start The second application; the processing module 1802 is further configured to: if the processing module 1802 detects that the second application is not the preset application, the trigger processing module 1802 acquires the first information according to the operation instruction.
- FIG. 19 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
- the terminal described in this embodiment includes: a radio frequency (RF) circuit 110, a memory 120, other input devices 130, a display screen 140, a sensor 150, an input/output subsystem 170, a processor 1120, and a power supply 190. And other components.
- RF radio frequency
- the terminal structure shown in FIG. 19 does not constitute a limitation of the terminal, and may include more or less components than those illustrated, or combine some components, or split some components, or Different parts are arranged.
- the display screen 140 belongs to a user interface (UI), and the terminal can include a user interface that is smaller than the illustration or the like.
- UI user interface
- the RF circuit 110 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processor 1120 processes the data. In addition, the uplink data is designed to be sent to the base station.
- the radio frequency circuit includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like.
- the radio frequency circuit 110 can also communicate with the network and other devices through wireless communication.
- the wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access). , Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (Short Messaging Service), and the like.
- the memory 120 can be used to store software programs and modules, and the processor 1120 executes various functional applications and data processing of the terminal 1 by running software programs and modules stored in the memory 120.
- the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored. Data created based on the use of the terminal (such as audio data, phone book, etc.).
- memory 120 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- Other input devices 130 can be used to receive input numeric or character information, as well as to generate key signal inputs related to user settings and function controls of the terminal.
- the other input devices 130 may include, but are not limited to, a physical keyboard, function keys (such as a volume control button, a switch button, etc.), a trackball, a mouse, a joystick, and a light mouse.
- function keys such as a volume control button, a switch button, etc.
- a trackball such as a volume control button, a switch button, etc.
- mouse such as a volume control button, a switch button, etc.
- a joystick such as a mouse
- a light mouse Depending on one or more of the output's touch-sensitive surface, or the extension of the touch-sensitive surface formed by the touch screen.
- Other input devices 130 are coupled to other input device controllers 171 of input/output subsystem 170 and are in signal communication with processor 1120 under the control of other device input controllers 171.
- the display screen 140 can be used to display information input by the user or information provided to the user as well as various menus of the terminal, and can also accept user input.
- the specific display screen 140 may include a display panel 141 and a touch panel 142.
- the display panel 141 can be configured by using an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
- the touch panel 142 also referred to as a touch screen, a touch sensitive screen, etc., can collect contact or non-contact operations on or near the user (eg, the user uses any suitable object or accessory such as a finger, a stylus, etc. on the touch panel 142.
- the operation in the vicinity of the touch panel 142 may also include a somatosensory operation; the operation includes a single-point control operation, a multi-point control operation, and the like, and drives the corresponding connection device according to a preset program.
- the touch panel 142 may include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation and posture of the user, and detects a signal brought by the touch operation, and transmits a signal to the touch controller; the touch controller receives the touch information from the touch detection device, and converts the signal into a processor. The processed information is sent to the processor 1120 and can receive commands from the processor 1120 and execute them.
- the touch panel 142 can be implemented by using various types such as resistive, capacitive, infrared, and surface acoustic waves, and the touch panel 142 can be implemented by any technology developed in the future.
- the touch panel 142 can cover the display panel 141, and the user can display the content according to the display panel 141 (the display content includes, but is not limited to, a soft keyboard, a virtual mouse, a virtual button, an icon, etc.) on the display panel 141. The operation is performed on or near the covered touch panel 142.
- the touch panel 142 After detecting the operation thereon or nearby, the touch panel 142 transmits to the processor 1120 through the input/output subsystem 170 to determine user input, and then the processor 1120 according to the user The input provides a corresponding visual output on display panel 141 via input/output subsystem 170.
- the touch panel 142 and the display panel 141 are two independent components to implement the input and input functions of the terminal, in some embodiments, the touch panel 142 may be integrated with the display panel 141. Realize the input and output functions of the terminal.
- the terminal may also include at least one type of sensor 150, such as a light sensor, a speed sensor, a GPS sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 141 according to the brightness of the ambient light, and the proximity sensor may close the display panel 141 and/or when the terminal moves to the ear. Or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the terminal can be used to identify the attitude of the terminal (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the terminal can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- attitude of the terminal such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
- vibration recognition related functions such as pedometer, tapping
- the terminal can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- the input/output subsystem 170 is used to control external devices for input and output, and may include other device input controllers 171, sensor controllers 172, and display controllers 173.
- one or more other input control device controllers 171 receive signals from other input devices 130 and/or send signals to other input devices 130.
- Other input devices 130 may include physical buttons (press buttons, rocker buttons, etc.) , dial, slide switch, joystick, click wheel, light mouse (light mouse is a touch-sensitive surface that does not display visual output, or an extension of a touch-sensitive surface formed by a touch screen). It is worth noting that other input control device controllers 171 can be connected to any one or more of the above devices.
- Display controller 173 in input/output subsystem 170 receives signals from display 140 and/or transmits to display screen 140 signal. After the display 140 detects the user input, the display controller 173 converts the detected user input into an interaction with the user interface object displayed on the display screen 140, ie, implements human-computer interaction. Sensor controller 172 can receive signals from one or more sensors 150 and/or send signals to one or more sensors 150.
- the processor 1120 is a control center of the terminal, which connects various parts of the entire terminal using various interfaces and lines, and executes by executing or executing software programs and/or modules stored in the memory 120, and calling data stored in the memory 120.
- the processor 1120 may include one or more processing units; preferably, the processor 1120 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
- the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1120.
- the terminal also includes a power supply 190 (such as a battery) that supplies power to the various components.
- a power supply 190 such as a battery
- the power supply can be logically coupled to the processor 1120 through a power management system to manage functions such as charging, discharging, and power consumption through the power management system.
- the terminal may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
- the processor 1120 can invoke the program instructions stored in the memory 120 to implement the method as shown in the embodiment of the present invention.
- the computer readable storage medium may be an internal storage unit of the terminal described in any of the foregoing embodiments, such as a hard disk or a memory of the terminal.
- the computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk equipped on the terminal, a smart memory card (SMC), and a Secure Digital (SD) card. , Flash Card, etc.
- the computer readable storage medium may also include both an internal storage unit of the terminal and an external storage device.
- the computer readable storage medium is for storing the computer program and other programs and data required by the terminal.
- the computer readable storage medium can also be used to temporarily store data that has been output or is about to be output.
- the principle of the terminal to solve the problem in the embodiment of the present invention is similar to the method embodiment of the present invention. Therefore, the implementation of the terminal may refer to the implementation of the method, and is not described here.
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Telephone Function (AREA)
Abstract
本发明实施例公开了一种应用启动的控制方法及用户终端,该方法应用于用户终端,该方法包括:接收第一应用发送的操作指令,操作指令用于指示用户终端进行目标操作,目标操作为需要启动第二应用以完成的操作;判断操作指令中是否携带预设信息,预设信息为第一应用所使用的软件开发工具包SDK包括的信息;若操作指令携带预设信息,则禁止启动第二应用;若操作指令不携带预设信息,则根据操作指令对第二应用进行启动控制。可见,通过实施本发明实施例,增加了应用启动控制的智能性。
Description
本发明涉及终端技术领域,尤其涉及一种应用启动的控制方法及用户终端。
在实际应用中,通常出现一个应用触发启动另一个应用的情况。例如,应用1为电商应用,应用2为支付类应用。应用1需要调用应用2的支付界面进行支付操作,因此应用1会向用户终端的系统发送用于显示应用2的支付界面的显示指令。系统接收显示指令之后,启动应用2,并显示应用2的支付界面。应用1触发启动应用2也可以称为应用1拉起应用2。应用被“拉起”,是指一个没有启动进程的应用,被另外一个应用/手机系统启动进程。
在实际应用中,被触发启动的应用可能会很多,某些启动的应用可能为恶意启动的应用。因此,需要对启动应用进行控制。在实际应用中,为了避免恶意启动应用,需要用户在设置页面设置应用是否允许被其他应用触发启动。用户终端将应用的设置信息保存在应用配置列表。在某个应用被其他应用触发启动时,用户终端根据应用配置列表中该应用的设置信息确定是否启动该应用。
可见,这种应用启动的控制方式,需要用户提前手动设置应用是否允许被启动,这种方式并不智能。
发明内容
本发明实施例公开了一种应用启动的控制方法及用户终端,能够智能地对应用的启动进行控制。
第一方面,本发明实施例提供了一种应用启动的控制方法,应用于用户终端,该方法包括:接收第一应用发送的操作指令,操作指令用于指示用户终端进行目标操作,目标操作为需要启动第二应用以完成的操作;判断操作指令中是否携带预设信息,预设信息为第一应用所使用的软件开发工具包SDK包括的信息;若操作指令携带预设信息,则禁止启动第二应用;若操作指令不携带预设信息,则根据操作指令对第二应用进行启动控制。
可见,通过实施第一方面所描述的方法,可根据操作指令智能地识别是否为恶意启动第二应用,而不用用户提前去应用配置列表中设置允许启动的应用。因此,通过实施第一方面所描述的方法,增加了应用启动控制的智能性。
可选的,根据操作指令对第二应用进行启动控制的具体实施方式可以为:根据操作指令,获取第一信息,该第一信息包括第一应用的运行状态,或该第一信息包括第二应用的权限信息,或该第一信息包括第二应用的小工具的状态;根据第一信息对第二应用进行启动控制。其中,第一应用的运行状态可以为前台运行或后台运行。其中,第一应用的应用类型可以为蓝牙管理类应用或其他应用类型。小工具(widget)又称小组件,是指可以直接放在桌面上提供功能的应用。
通过实施该实施方式能够更进一步判断是否为恶意启动应用,因此能够更准确地对恶意启动的应用进行拦截。
可选的,目标操作为启动第二应用的目标界面,该第一信息包括第一应用的运行状态,根据第一信息对第二应用进行启动控制的具体实施方式可以为:若第一应用的运行状态为后台运行,则禁止启动第二应用;若第一应用的运行状态为前台运行,则启动第二应用。
通常若第一应用为前台应用,则恶意启动的第二应用的可能性较小。因此,当第一应用的运行状态为前台运行时,可启动第二应用。可见,通过实施该实施方式能够智能地识别是否为恶意启动应用,能够智能地对恶意启动的应用进行拦截。
可选的,目标操作为启动第二应用的目标界面,第一信息包括第一应用的运行状态,根据第一信息对第二应用进行启动控制的具体实施方式可以为:若第一应用的运行状态为后台运行,则禁止启动第二应用;若第一应用的运行状态为前台运行,获取目标界面的界面信息;若界面信息指示目标界面为非透明界面,则启动第二应用;若界面信息指示目标界面为透明界面,则禁止启动第二应用。
若目标界面为透明界面,则用户不能看见第二应用具体的操作,第二应用可能进行恶意操作。因此,只在目标界面为非透明界面时,才启动第二应用,有效地避免了恶意启动应用。
可选的,启动第二应用之后,还可获取目标界面的尺寸;若目标界面的尺寸小于预设尺寸,则关闭第二应用。目标界面过小,则用户不能看见或者注意不到第二应用具体的操作,第二应用可能进行恶意操作。因此,只在目标界面的尺寸大于预设尺寸时,才继续运行第二应用,有效地避免了恶意启动应用。
可选的,目标操作为启动第二应用的目标服务,第一信息包括第二应用的权限信息,根据第一信息对第二应用进行启动控制的具体实施方式可以为:若根据权限信息确定第二应用具有预设权限,则启动第二应用。
可选的,若根据权限信息确定第二应用不具有预设权限,则禁止启动第二应用。或者,若根据权限信息确定第二应用不具有预设权限,用户终端还可根据其他信息进行判断是否启动第二应用。
其中,第二应用的权限信息用于指示第二应用具有的权限。例如,预设权限可以为通知使用权限等。通知使用权限是指可以监听当前系统的通知的变化的权限。因此,具有通知使用权的应用为权限很高的应用。权限很高的应用为信任的应用,启动权限很高的应用之后不会执行恶意操作,因此该应用不是恶意启动,可以启动该应用。可见,通过实施该实施方式能够智能地控制第二应用的启动。
可选的,目标操作为启动第二应用的目标服务,第一信息为第一应用的运行状态,根据第一信息对第二应用进行启动控制的具体实施方式可以为:若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用;若第一应用的运行状态为后台运行,并且第二应用的小工具处于未激活状态,则禁止启动第二应用;若第一应用的运行状态为前台运行,并且第二应用的小工具处于激活状态或第二应用的应用类型为第一预设类型,则启动第二应用;若第二应用的应用类型不为第一预设类型,并且第二应用的小工具处于未激活状态,则禁止启动第二应用。
例如,第一预设类型可以包括支付类应用、语音引擎类应用、分享类应用中的任何一种或多种。通常,支付类应用、语音引擎类应用、分享类应用是用户经常使用的应用。并
且第一应用并不是隐藏在后台的恶意应用,因此,操作指令用于启动第二应用的服务,并且第一应用为前台应用时,可将支付类应用、语音引擎类应用、分享类应用启动。并且通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。可见,通过实施该实施方式能够智能地控制第二应用的启动。
可选的,根据操作指令,获取第一信息的具体实施方式可以为:若目标操作为启动第二应用的目标服务,并且根据权限信息确定第二应用不具有预设权限,则获取第一应用的运行状态。可见,通过实施该实施方式能够更加准确地拦截恶意启动的应用,能够智能地控制第二应用的启动。
可选的,目标操作为启动第二应用的目标数据查询功能,第一信息为第一应用的运行状态,根据第一信息对第二应用进行启动控制的具体实施方式可以为:若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用;若第一应用的运行状态为后台运行,并且第二应用的小工具处于未激活状态,则禁止启动第二应用;若第一应用的运行状态为前台运行,并且第二应用的小工具处于激活状态或第二应用的应用类型为第二预设类型,则启动第二应用;若第二应用的应用类型不为第二预设类型,并且第二应用的小工具处于未激活状态,则禁止启动第二应用。
例如,第二预设类型可以包括分享类应用。通常,分享类应用是用户经常使用的应用。并且第一应用并不是隐藏在后台的恶意应用,因此,操作指令用于启动第二应用的数据查询功能,并且第一应用为前台应用时,可将分享类应用启动。并且通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。可见,通过实施该实施方式能够智能地控制第二应用的启动。
可选的,目标操作为向第二应用发送目标广播信息,第一信息为第一信息为第二应用的小工具的状态,根据第一信息对第二应用进行启动控制的具体实施方式可以为:若第二应用的小工具处于激活状态,则启动第二应用;若第二应用的小工具未处于激活状态,则禁止启动第二应用。通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。可见,通过实施该实施方式能够智能地控制第二应用的启动。
可选的,接收第一应用发送的操作指令之前,还可启动用户终端的系统;生成系统广播信息,系统广播信息用于发送至第三应用;若第三应用的小工具处于激活状态,或第三应用的应用类型为第三预设类型,则启动第三应用;若第三应用的小工具处于未激活状态,并且第三应用的应用类型不为第三预设类型,则禁止启动第三应用。
其中,第三预设类型可以为盲人类型应用等。由于盲人不方面操作手机,通常盲人类型应用都会由系统广播启动。因此,在系统广播启动盲人类型应用时,需要将盲人类型应用启动。并且通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。可见,通过实施该实施方式能够智能地控制第二应用的启动。
可选的,若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;若第四应用未启动,则禁止启动第四应用。
在实际应用中,通常很多恶意应用为了启动,也会在系统注册蓝牙媒体浏览服务。因此,通过实施该实施方式,可对恶意应用的启动进行智能地拦截。
第二方面,本发明实施例还提供了一种应用启动的控制方法,应用于用户终端,该方
法包括:启动用户终端的系统;生成系统广播信息,系统广播信息用于发送至第三应用;若第三应用的小工具处于激活状态,或第三应用的应用类型为第三预设类型,则启动第三应用;若第三应用的小工具处于未激活状态,并且第三应用的应用类型不为第三预设类型,则禁止启动第三应用。
其中,第三预设类型可以为盲人类型应用等。由于盲人不方面操作手机,通常盲人类型应用都会由系统广播启动。因此,在系统广播启动盲人类型应用时,需要将盲人类型应用启动。并且通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。可见,通过实施该实施方式能够智能地控制第二应用的启动。
第三方面,本发明实施例还提供了一种应用启动的控制方法,应用于用户终端,该方法包括:若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;若第四应用未启动,则禁止启动第四应用。
在实际应用中,通常很多恶意应用为了启动,也会在系统注册蓝牙媒体浏览服务。因此,通过实施该实施方式,不用用户提前去应用配置列表中设置允许启动的应用,可对恶意应用的启动进行智能地拦截。
第四方面,本发明实施例还提供了一种应用启动的控制方法,应用于用户终端,该方法包括:接收第一应用发送的操作指令,操作指令用于指示用户终端进行目标操作,目标操作为需要启动第二应用以完成的操作;根据操作指令,获取第一信息,第一信息包括第一应用的运行状态和第二应用的特征信息;根据第一信息对第二应用进行启动控制。
可见,通过实施第三方面所描述的方法,可根据第一信息智能地识别是否启动第二应用,而不用用户提前去应用配置列表中设置允许启动的应用。因此,通过实施第三方面所描述的方法,增加了应用启动控制的智能性。
可选的,根据第一信息对第二应用进行启动控制的具体实施方式可以为:根据第二应用的特征信息确定第一权重值;若运行状态信息为前台运行,则根据操作指令的类型确定第二权重值;若第一权重值与第二权重值之和大于预设阈值,则启动第二应用。
可见,通过实施该实施方式,可以准确地对恶意启动的应用进行拦截。
可选的,若运行状态信息为后台运行,则获取第二应用的应用类型,第一应用的应用类型为硬件服务类应用或非硬件服务类应用;根据第一应用的应用类型和操作指令的类型确定第三权重值;若第一权重值与第三权重值之和大于预设阈值,则启动第二应用。
可见,通过实施该实施方式,可以准确地对恶意启动的应用进行拦截。
可选的,第二应用的特征信息包括第二应用的安装包名称是否包括预设关键词、第二应用是否具有指纹权限、第二应用是否为权限信任应用、第二应用是否为高频使用应用、第二应用是否具有拍照权限、第二应用是否具有网络连接权限中的至少一种。
可选的,接收操作指令之后,根据操作指令,获取第一信息之前,还可检测第二应用是否为预设应用;若第二应用为预设应用,则启动第二应用;若第二应用不为预设应用,则执行根据操作指令,获取第一信息的步骤。其中,预设应用可以为系统默认设置的广大用户经常使用的应用,例如可以为支付应用或即时通讯应用。广大用户经常使用的应用一般不是恶意应用,因此可以启动。
第五方面,提供了一种用户终端,该用户终端具有实现上述第一方面、第一方面可能
的实现方式、第二方面、第三方面、第四方面或第四方面可能的实现方式中用户终端行为的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。该模块可以是软件和/或硬件。基于同一发明构思,由于该用户终端解决问题的原理以及有益效果可以参见上述第一方面、第一方面可能的实现方式、第二方面、第三方面、第四方面或第四方面可能的实现方式以及所带来的有益效果,因此该用户终端的实施可以参见上述第一方面、第一方面可能的实现方式、第二方面、第三方面、第四方面或第四方面可能的实现方式,重复之处不再赘述。
第六方面,提供了一种用户终端,该用户终端包括:存储器,用于存储一个或多个程序;处理器,用于调用存储在该存储器中的程序以实现上述第一方面、第一方面可能的实现方式、第二方面、第三方面、第四方面或第四方面可能的实现方式中的方案,该用户终端解决问题的实施方式以及有益效果可以参见上述第一方面、第一方面可能的实现方式、第二方面、第三方面、第四方面或第四方面可能的实现方式以及有益效果,重复之处不再赘述。
第七方面,提供了一种计算机可读存储介质,所述计算机存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时使所述处理器执行执行上述第一方面、第一方面可能的实现方式、第二方面、第三方面、第四方面或第四方面可能的实现方式以及有益效果,重复之处不再赘述。
第八方面,提供了一种计算机程序产品,当其在计算机上运行时,使得计算机执行上述第一方面、第一方面可能的实现方式、第二方面、第三方面、第四方面或第四方面可能的实现方式。
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种应用启动的控制方法的流程示意图;
图2是本发明实施例提供的另一种应用启动的控制方法的流程示意图;
图3是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图4是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图5是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图6是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图7是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图8是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图9是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图10是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图11是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图12是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图13是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图14是本发明实施例提供的又一种应用启动的控制方法的流程示意图;
图15是本发明实施例提供的一种用户终端的结构示意图;
图16是本发明实施例提供的另一种用户终端的结构示意图;
图17是本发明实施例提供的又一种用户终端的结构示意图;
图18是本发明实施例提供的又一种用户终端的结构示意图;
图19是本发明实施例提供的又一种用户终端的结构示意图。
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施例的技术方案进行描述。
在实际应用中,由第一应用触发启动第二应用的情况十分常见。例如,第一应用和第二应用使用相同的软件开发工具包(software development kit,SDK)开发,具有SDK中相同的功能。该SDK可预设有包括界面、服务、数据查询功能和广播信息中的至少一种。以第一应用和第二应用具有界面1为例,该界面1为SDK预设的界面,由于第一应用和第二应用使用了同一个SDK(即,第一应用和第二应用在开发时使用了同一个SDK),这两个应用均具有界面1。在该SDK中也可以预置向系统发送操作指令的功能,即使用了该SDK的应用,在系统中运行时,会向系统发送该SDK预设的操作指令。例如,使用了该SDK的第一应用在系统中运行时,会向用户终端系统发送预置于该SDK中的,用于启动同样使用了该SDK的第二应用的界面1的操作指令。用户终端系统接收该操作指令之后,先启动第二应用,再启动第二应用的界面1。由于SDK的制作者可以预测或者获知当前有哪些应用会使用该SDK,其可以将这些使用该SDK的应用的标识携带在预设的操作指令中,而SDK预设的界面1的界面标识是SDK预设好的,故当一个使用该SDK的应用在系统中运行时,该应用就会向系统发送SDK预置的操作指令,以尝试启动预设在该操作指令中的应用标识对应的应用,以及该应用的界面1,而不论预设在操作指令中的该应用标识对应的应用在系统中是否安装。若恰好预置在操作指令中的应用标识所对应的应用在系统中已被安装,则可能会被系统根据该操作指令启动。
具体地,第一应用安装时,用户终端系统会在第一应用的注册信息中记录第一应用的标识、界面1的标识。同理,第二应用安装时,用户终端系统会在第二应用的注册信息中记录第二应用的标识、界面1的标识。其中,第一应用的注册信息和第二应用的注册信息中记录了界面1的标识。根据该第一应用的标识,系统可确定出其对应的第一应用。根据该第二应用的标识,系统可确定出其对应的第二应用。根据界面1的标识,系统可确定出界面1。在第一应用启动之后,第一应用向用户终端系统发送操作指令,该操作指令包括第二应用的标识和界面1的标识,该操作指令用于用户终端系统启动第二应用的界面1的标识。用户终端接收操作指令之后,在第二应用的注册信息中查找第二应用的标识以及界面1的标识。由于第一应用的注册信息和第二应用的注册信息中都记录了界面1的标识。因此,用户终端系统在第二应用的注册信息中可查找到第二应用的标识和界面1的标识。用户终端系统在第二应用的注册信息中查找到第二应用的标识和界面1的标识之后,若第二应用未启动,则用户终端系统先启动第二应用,再启动第二应用的界面1。
当然若第一应用和第二应用不具有同一个SDK的界面,第一应用也可以通过启动第二应用的界面的方式触发启动第二应用。例如,第一应用可向用户终端系统发送用于启动第二应用的目标界面的操作指令。用户终端系统接收该操作指令之后,先启动第二应用,再启动第二应用的目标界面。具体地,第二应用在安装时在用户终端系统进行注册,用户终端系统会在第二应用的注册信息中记录第二应用的标识和第二应用的界面标识。根据该第二应用的标识,系统可确定出其对应的第二应用,根据该界面标识,系统可确定出该界面标识对应的第二应用的相应界面。第一应用可向用户终端系统发送操作指令,该操作指令携带第二应用的标识和第二应用的目标界面的标识,该目标界面可以是任意一个界面,该操作指令用于指示用户终端系统启动第二应用的目标界面。用户终端系统接收到该操作指令之后,在第二应用的注册信息中查找第二应用的标识和目标界面的标识。用户终端系统在第二应用的注册信息中查找到第二应用的标识和目标界面的标识之后,若第二应用未启动,则用户终端系统先启动第二应用,再启动第二应用的目标界面。这种方式需要第一应用的开发者与第二应用的开发者协商得到第二应用的目标界面的标识。
举例来说,第一应用为即时通讯应用,第二应用为新闻应用。即时通讯应用可向用户终端系统发送操作指令,该操作指令携带新闻应用的标识和界面1的标识。用户终端系统接收到该操作指令之后,在新闻应用的注册信息中查找新闻应用的标识和界面1的标识。用户终端系统在新闻应用的注册信息中查找到新闻应用的标识和界面1的标识之后,若新闻应用未启动,则用户终端系统先启动新闻应用,再启动新闻应用的界面1。
再如,以第一应用和第二应用具有服务1为例,类似地,该服务1被预置在同一SDK中,而第一应用和第二应用使用了该SDK。第一应用可向用户终端系统发送用于启动第二应用的服务1的操作指令。用户终端系统接收该操作指令之后,先启动第二应用,再启动第二应用的服务1。
类似地,由于SDK的制作者可以预测或者获知当前有哪些应用会使用该SDK,其可以将这些使用该SDK的应用的标识携带在预设的操作指令中,而SDK预设的服务1的服务标识是SDK预设好的,故当一个使用该SDK的应用在系统中运行时,该应用就会向系统发送SDK预置的操作指令,以尝试启动预设在该操作指令中的应用标识对应的应用,以及该应用的服务1,而不论该预设在操作指令中的应用标识对应的应用在系统中是否安装。若恰好预置在操作指令中的应用标识所对应的应用在系统中已被安装,则可能会被系统根据该操作指令启动。
具体地,第一应用在系统中安装时,因为该SDK预置了服务1,用户终端系统会在第一应用的注册信息中记录第一应用的标识、服务1的标识。同理,第二应用安装时,用户终端系统会在第二应用的注册信息中记录第二应用的标识、服务1的标识。其中,第一应用的注册信息和第二应用的注册信息中均有同样的服务1的标识。根据该第一应用的标识,系统可确定出其对应的第一应用。根据该第二应用的标识,系统可确定出其对应的第二应用。根据该服务1的标识,系统可确定出服务1。在第一应用启动之后,第一应用向用户终端系统发送操作指令,该操作指令包括第二应用的标识和服务1的标识,该操作指令用于指示用户终端系统启动第二应用的服务1。用户终端接收操作指令之后,在第二应用的注册信息中查找第二应用的标识以及服务1的标识。由于第一应用的注册信息和第二应用
的注册信息中记录了相同的服务1的标识。因此,用户终端系统在第二应用的注册信息中可查找到第二应用的标识和服务1的标识。用户终端系统在第二应用的注册信息中查找到第二应用的标识和服务1的标识之后,若第二应用未启动,则用户终端系统先启动第二应用,再启动第二应用的服务1。
当然若第一应用和第二应用不具有同一个SDK的服务,第一应用也可以通过启动第二应用的服务的方式触发启动第二应用。例如,第一应用可向用户终端系统发送用于启动第二应用的目标服务的操作指令。用户终端系统接收该操作指令之后,先启动第二应用,再启动第二应用的目标服务。具体地,第二应用可在安装时在用户终端系统进行注册,用户终端系统会在注册信息中记录第二应用的标识和第二应用的服务标识,根据该服务标识,系统可确定第二应用提供的相应服务。第一应用可向用户终端系统发送操作指令,该操作指令携带第二应用的标识和第二应用的目标服务的标识,目标服务可以是第二应用的任意一个服务,该操作指令用于指示用户终端系统启动第二应用的目标服务。用户终端系统接收到该操作指令之后,在注册信息中查找第二应用的标识和目标服务的标识。用户终端系统在注册信息中查找到第二应用的标识和目标服务的标识之后,若第二应用未启动,则用户终端系统先启动第二应用,再启动第二应用的目标服务。这种方式需要第一应用的开发者与第二应用的开发者协商得到第二应用的目标服务的标识。
举例来说,第一应用为即时通讯应用,第二应用为音乐播放应用。即时通讯应用向用户终端系统发送操作指令,该操作指令携带音乐播放应用的标识和下载服务的标识。用户终端系统接收到该操作指令之后,在音乐播放应用的注册信息中查找音乐播放应用的标识和下载服务的标识。用户终端系统在音乐播放应用的注册信息中查找到音乐播放应用的标识和下载服务的标识之后,若音乐播放应用未启动,则用户终端系统先启动音乐播放应用,再启动音乐播放应用的下载服务。
再如,以第一应用和第二应用具有数据查询功能1为例,类似地,该数据查询功能1被预置在同一SDK中,而第一应用和第二应用使用了该SDK。第一应用可向用户终端系统发送用于启动第二应用的数据查询功能1的操作指令。用户终端系统接收该操作指令之后,先启动第二应用,再启动第二应用的数据查询功能1。
类似地,由于SDK的制作者可以预测或者获知当前有哪些应用会使用该SDK,其可以将这些使用该SDK的应用的标识携带在预设的操作指令中,而SDK预设的数据查询功能1的数据查询功能标识是SDK预设好的,故当一个使用该SDK的应用在系统中运行时,该应用就会向系统发送SDK预置的操作指令,以尝试启动预设在该操作指令中的应用标识对应的应用,以及该应用的数据查询功能1,而不论该预设在操作指令中的应用标识对应的应用在系统中是否安装。若恰好预置在操作指令中的应用标识所对应的应用在系统中已被安装,则可能会被系统根据该操作指令启动。
具体地,第一应用在系统中安装时,因为该SDK预置了数据查询功能1,用户终端系统会在第一应用的注册信息中记录第一应用的标识、数据查询功能1的标识。同理,第二应用安装时,用户终端系统会在第二应用的注册信息中记录第二应用的标识、数据查询功能1的标识。其中,第一应用的注册信息和第二应用的注册信息中均有同样的数据查询功能1的标识。根据该第一应用的标识,系统可确定出其对应的第一应用。根据该第二应用
的标识,系统可确定出其对应的第二应用。根据该数据查询功能1的标识,系统可确定出数据查询功能1。在第一应用启动之后,第一应用向用户终端系统发送操作指令,该操作指令包括第二应用的标识、数据查询功能1的标识和需要查询的数据,该操作指令用于指示用户终端系统启动第二应用的数据查询功能1,并将查询结果反馈至第一应用。用户终端接收操作指令之后,在第二应用的注册信息中查找第二应用的标识以及数据查询功能1的标识。由于第一应用的注册信息和第二应用的注册信息中记录了相同的数据查询功能1的标识。因此,用户终端系统在第二应用的注册信息中可查找到第二应用的标识和数据查询功能1的标识。用户终端系统在第二应用的注册信息中查找到第二应用的标识和数据查询功能1的标识之后,若第二应用未启动,则用户终端系统先启动第二应用,再启动第二应用的数据查询功能1。
当然若第一应用和第二应用不具有同一个SDK的数据查询功能,第一应用也可以通过启动第二应用的数据查询功能的方式触发启动第二应用。例如,第一应用可向用户终端系统发送用于启动第二应用的数据查询功能的操作指令。用户终端系统接收该操作指令之后,先启动第二应用,再启动第二应用的数据查询功能。具体地,第二应用可在安装时在用户终端系统进行注册,用户终端系统会在注册信息中记录第二应用的标识和第二应用的数据查询功能标识。根据该查询功能标识,用户终端系统可确定第二应用提供的查询功能。第一应用可向用户终端系统发送操作指令,该操作指令携带第二应用的标识和第二应用的查询功能标识和需要查询的数据(如查询联系人),该操作指令用于指示用户终端系统启动第二应用的查询功能,并将查询结果反馈至第一应用(如向第一应用反馈查询到的联系人)。用户终端系统接收到该操作指令之后,在注册信息中查找第二应用的标识和查询功能标识。用户终端系统在第二应用的注册信息中查找到第二应用的标识和查询功能的标识之后,若第二应用未启动,则用户终端系统先启动第二应用,再启动第二应用的查询功能。这种方式也可称为第一应用以启动数据查询功能的方式启动第二应用。这种方式需要第一应用的开发者与第二应用的开发者协商得到第二应用的数据查询功能的标识。
举例来说,第一应用为即时通讯应用,第二应用为联系人应用。即时通讯应用需要知道联系人应用中有哪些联系人注册了该即时通讯应用的账号。因此,即时通讯应用需要从联系人应用中获取联系人电话号码,并将联系人号码发送至即时通讯应用的服务器查询是否存在联系人号码对应的该即时通讯应用的账号。因此,该即时通讯应用可向用户终端系统发送操作指令,该操作指令携带联系人应用的标识和数据查询功能标识以及需要查询的数据(即需要查询联系人号码)。用户终端系统接收到该操作指令之后,在联系人应用的注册信息中查找联系人应用的标识和数据查询功能标识。用户终端系统在联系人应用的注册信息中查找到联系人应用的标识和数据查询功能标识之后,若联系人应用未启动,则用户终端系统先启动联系人应用,再启动联系人应用的数据查询功能,以查询联系人应用中的联系人号码,并向即时通讯应用返回查询到的联系人号码。
又如,以第一应用和第二应用具有广播信息1为例,类似地,该广播信息1被预置在同一SDK中,而第一应用和第二应用使用了该SDK。类似地,由于SDK的制作者可以预测或者获知当前有哪些应用会使用该SDK,其可以将这些使用该SDK的应用的标识携带在预设的操作指令中,而SDK预设的广播信息1是SDK预设好的,故当一个使用该SDK
的应用在系统中运行时,该应用就会向系统发送SDK预置的操作指令,以尝试启动预设在该操作指令中的应用标识对应的应用,以及向该应用发送广播信息1,而不论该预设在操作指令中的应用标识对应的应用在系统中是否安装。若恰好预置在操作指令中的应用标识所对应的应用在系统中已被安装,则可能会被系统根据该操作指令启动。具体地,第一应用和第二应用安装时,会在用户终端系统会系统订阅广播信息1。在第一应用启动之后,第一应用向用户终端系统发送操作指令,该操作指令包括广播信息1。用户终端接收操作指令之后,若第二应用未启动,则用户终端系统先启动第二应用,再向第二应用发送广播信息1。
当然若第一应用和第二应用不具有同一个SDK的广播信息,第一应用也可以通过向第二应用发送广播信息的方式触发启动第二应用。例如,第一应用、第二应用在用户终端系统订阅需要接收的广播信息。例如,第一应用和第二应用均在用户终端系统订阅需要接收广播信息1。第一应用启动之后,向用户终端系统发送操作指令,该操作指令携带广播信息1,用户终端系统接收操作指令之后,若第二应用未启动,则用户终端系统先启动第二应用,再向第二应用发送广播信息1。
第一应用为即时通讯应用,第二应用为新闻应用。即时通讯应用和新闻应用在用户终端系统订阅了“启动完成”的广播消息。如果即时通讯应用启动完成,就会向用户终端系统发送广播信息“启动完成”。用户终端系统接收到该广播信息之后,若检测到新闻应用未启动,则用户终端系统先启动新闻应用,再向新闻应用发送广播信息“启动完成”。
除此之外,系统还可通过发送广播信息的方式启动第二应用。应用可在系统订阅系统广播信息。系统启动之后,就生成系统广播信息,并向订阅广播信息的应用发送系统广播信息。若订阅系统广播信息的应用未启动,则先启动该应用,再向该应用发送该系统广播信息。
然而在实际应用中,第二应用可能被恶意启动。例如,第一应用和第二应用可能是同一家公司的应用,由于是同一家公司的应用,第一应用启动之后,经常会通过以上几种方式中的一种启动第二应用,并使第二应用执行一些用户不能看见的恶意操作。并且启动过多的应用也会导致用户终端的运行速度变慢。因此,需要对恶意启动的应用进行控制。在现有的实际应用中,需要用户提前手动设置应用是否允许被启动,这种方式并不智能。
为此本申请实施例提供了一种应用启动的控制方法及用户终端,不需要用户提前手动设置应用是否允许被启动,能够智能地对应用的启动进行控制,对恶意应用和不需要使用的应用的启动进行拦截。
以下对本申请所提供的应用启动的控制方法及用户终端进行详细地介绍。
请参见图1,图1是本申请实施例提供的一种应用启动的控制方法。如图1所示,该应用启动的控制方法包括如下101~104部分,其中:
101、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
具体地,由用户终端系统接收第一应用发送的操作指令。用户终端系统是指用户终端的操作系统。例如,该用户终端系统可以是安卓系统或IOS系统等。
可选的,目标操作可以为启动第二应用的目标界面,或目标操作可以为启动第二应用的目标服务,或目标操作可以为启动第二应用的目标数据查询功能,或目标操作可以为向第二应用发送目标广播信息,或者目标操作还可以是其他需要先启动第二应用才能执行的操作,本申请实施例不做限定。其中,目标界面可以为第二应用的任一界面,目标服务可以为第二应用的任一服务,目标数据查询功能可以为第二应用的任一数据查询功能,目标广播信息可以为第二应用订阅的任一广播信息。
若目标操作为启动第二应用的目标界面,则该操作指令可携带第二应用的标识和目标界面的标识。若目标操作为启动第二应用的目标服务,则操作指令可携带第二应用的标识和目标服务的标识。若目标操作为启动第二应用的目标数据查询功能,则操作指令可携带第二应用的标识和目标数据查询功能的标识。若目标操作为向第二应用发送目标广播信息,则操作指令还携带需要向第二应用发送的目标广播信息。
其中,第一应用可以为用户终端的应用,或第一应用可以为其他终端的应用,本申请实施例不做限定。
102、用户终端判断操作指令中是否携带预设信息。
本申请实施例中,用户终端接收操作指令之后,判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。具体地,该预设信息为开发第一应用所使用的SDK包括的信息。第一应用使用SDK可以理解为第一应用具有SDK的功能。
通常为了便于启动多个应用,多个应用具有相同的SDK功能。其中一个应用启动之后,通过启动其他应用的SDK功能,就可触发启动其他应用。例如,第一应用和第二应用具有相同的SDK功能。第一应用启动之后,向用户终端系统发送操作指令,该操作指令用于启动第二应用的界面1,该界面1为SDK中的界面,则用户终端系统先启动第二应用,再启动第二应用的界面1。再如,第一应用启动之后,向用户终端系统发送操作指令,该操作指令用于启动第二应用的服务1,该服务为SDK中的服务,则用户终端系统先启动第二应用,再启动第二应用的服务1。再如,第一应用启动之后,向用户终端系统发送操作指令,该操作指令用于启动第二应用的数据查询功能1,该数据查询功能1为SDK中的数据查询功能,则用户终端系统先启动第二应用,再启动第二应用的数据查询功能1。再如,第一应用启动之后,向用户终端系统发送操作指令,该操作指令用于向第二应用的广播信息1,该广播信息1为SDK中的广播信息,则用户终端系统先启动第二应用,再向第二应用发送广播信息1。
一般被启动的应用是用户不想启动的应用,属于恶意启动应用。因此,可对该类方式启动的第二应用进行拦截,即不启动第二应用。
举例来说,一个SDK对应一个公共信息,在同一个SDK中的界面标识、服务标识、查询功能标识和广播信息标识具有公共信息。例如,SDK1中包括界面1的标识、界面2的标识、服务1的标识、服务2的标识、数据查询功能1的标识、数据查询功能2的标识、广播信息1的标识和广播信息2的标识。界面1的标识为“aaa界面1”,界面2的标识为“aaa界面2”。服务1的标识为“aaa服务1”,服务2的标识为“aaa服务2”。数据查询功能1的标识为“aaa数据查询功能1”,数据查询功能2的标识的标识为“aaa数据查询功能
2”。广播信息1的标识为“aaa广播信息1”,广播信息2的标识为“aaa广播信息2”。因此,公共信息为“aaa”。
因此,若第一应用具有SDK1的功能,SDK1包括公共信息“aaa”,则可设置预设信息为“aaa”。例如,用户终端系统接收第一应用发送操作指令,该操作指令携带第二应用的标识和界面1的标识。界面1的标识为“aaa界面1”。用户终端系统识别到操作指令中包括“aaa”,因此用户终端系统不启动第二应用。
103、若操作指令携带预设信息,则用户终端禁止启动第二应用。
104、若操作指令不携带预设信息,则用户终端根据操作指令对第二应用进行启动控制。
可见,通过实施图1所描述的方法,可根据操作指令智能地识别是否启动第二应用,而不用用户提前去应用配置列表中设置允许启动的应用。因此,通过实施图1所描述的方法,增加了应用启动控制的智能性。
可选的,用户终端根据操作指令对第二应用进行启动控制的具体实施方式可以为:用户终端根据操作指令,获取第一信息;用户终端根据第一信息对第二应用进行启动控制。其中,第一信息包括第一应用的运行状态,或第一信息包括第二应用的权限信息,或第一信息包括第二应用的小工具的状态。
其中,第一应用的运行状态可以为前台运行或后台运行。
小工具(widget)又称小组件,是指可以直接放在桌面上提供功能的应用。小工具的状态包括处于激活状态和未处于激活状态。放于桌面的小工具为处于激活状态的小工具,未放于桌面的小工具为未处于激活状态的小工具。例如,激活的小工具可以为放置于桌面的天气预报和日历等。
通过实施该实施方式能够更进一步判断是否为恶意启动应用,因此能够更准确地对恶意启动的应用进行拦截。
如图2所示,图2是本申请实施例提供的另一种应用启动的控制方法。如图2所示,该应用启动的控制方法包括如下201~207部分,其中:
201、用户终端接收第一应用发送的操作指令。
操作指令用于指示用户终端进行目标操作,目标操作为需要启动第二应用以完成的操作。
202、用户终端判断操作指令中是否携带预设信息。
预设信息为第一应用所使用的SDK包括的信息。
203、若操作指令携带预设信息,则用户终端禁止启动第二应用。
其中,201~203部分的具体实现原理与图1中102~103的具体实现原理相同,可参见102~103对应的描述,在此不赘述。
204、若操作指令不携带预设信息,并且该目标操作为启动第二应用的目标界面,则获取第一应用的运行状态。
205、若第一应用的运行状态为后台运行,则用户终端禁止启动第二应用。
206、若第一应用的运行状态为前台运行,则用户终端启动第二应用。
其中,204为用户终端根据操作指令,获取第一信息的具体实施方式。205和206为用户终端根据第一信息对第二应用进行启动控制的具体实施方式。
通常若第一应用为前台应用,则恶意启动的第二应用的可能性较小。因此,当第一应用的运行状态为前台运行时,可启动第二应用。
可选的,用户终端启动第二应用之后,获取目标界面的尺寸;若目标界面的尺寸小于预设尺寸,则关闭第二应用。
目标界面过小,则用户不能看见或者注意不到第二应用具体的操作,第二应用可能进行恶意操作。因此,只在目标界面的尺寸大于预设尺寸时,才继续运行第二应用,有效地避免了恶意启动应用。
如图3所示,图3是本申请实施例提供的另一种应用启动的控制方法。如图2所示,该应用启动的控制方法包括如下301~309部分,其中:
301、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
302、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
303、若操作指令携带预设信息,则用户终端禁止启动第二应用。
其中,301~303部分的具体实现原理与图1中102~103的具体实现原理相同,可参见102~103对应的描述,在此不赘述。
304、若操作指令不携带预设信息,并且该目标操作为启动第二应用的目标界面,则获取第一应用的运行状态。
305、若第一应用的运行状态为后台运行,则用户终端禁止启动第二应用。
本申请实施例中,用户终端获取第一应用的运行状态之后,若第一应用的运行状态为后台运行,则用户终端禁止启动第二应用。
306、若第一应用的运行状态为前台运行,用户终端获取目标界面的界面信息。
本申请实施例中,用户终端获取第一应用的运行状态之后,若第一应用的运行状态为前台运行,用户终端获取目标界面的界面信息。
307、若界面信息指示目标界面为非透明界面,则用户终端启动第二应用。
本申请实施例中,用户终端获取目标界面的界面信息之后,若界面信息指示目标界面为非透明界面,则用户终端启动第二应用。
308、若界面信息指示目标界面为透明界面,则用户终端禁止启动第二应用。
本申请实施例中,用户终端获取目标界面的界面信息之后,若界面信息指示目标界面为透明界面,则用户终端不启动第二应用。
其中,304部分为用户终端根据操作指令,获取第一信息的具体实施方式。305~308部分为用户终端根据第一信息对第二应用进行启动控制的具体实施方式。
若目标界面为透明界面,则用户不能看见第二应用具体的操作,第二应用可能进行恶意操作。因此,只在目标界面为非透明界面时,才启动第二应用,有效地避免了恶意启动
应用。
可选的,用户终端启动第二应用之后,获取目标界面的尺寸;若目标界面的尺寸小于预设尺寸,则关闭第二应用。
目标界面过小,则用户不能看见或者注意不到第二应用具体的操作,第二应用可能进行恶意操作。因此,只在目标界面的尺寸大于预设尺寸时,才继续运行第二应用,有效地避免了恶意启动应用。
如图4所示,图4是本申请实施例提供的另一种应用启动的控制方法。如图4所示,该应用启动的控制方法包括如下401~406部分,其中:
401、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
402、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
403、若操作指令携带预设信息,则用户终端禁止启动第二应用。
其中,401~403部分的具体实现原理与图1中102~103部分的具体实现原理相同,可参见102~103部分对应的描述,在此不赘述。
404、若操作指令不携带预设信息,并且目标操作为启动第二应用的目标服务,则获取第二应用的权限信息。
405、若根据权限信息确定第二应用具有预设权限,则启动第二应用。
406、若根据权限信息确定第二应用不具有预设权限,则禁止启动第二应用。
其中,404为用户终端根据操作指令,获取第一信息的具体实施方式。405为用户终端根据第一信息对第二应用进行启动控制的具体实施方式。
本申请实施例中,用户终端获取第二应用的权限信息之后,若根据权限信息确定第二应用具有预设权限,则启动第二应用。其中,第二应用的权限信息用于指示第二应用具有的权限。
例如,预设权限可以为通知使用权限等。通知使用权限是指可以监听当前系统的通知的变化的权限。因此,具有通知使用权的应用为权限很高的应用。权限很高的应用为信任的应用,启动权限很高的应用之后不会执行恶意操作,因此该应用不是恶意启动,可以启动该应用。
其中,406部分为可选的。若根据权限信息确定第二应用不具有预设权限,用户终端还可根据其他信息进行判断是否启动第二应用。
如图5所示,图5是本申请实施例提供的另一种应用启动的控制方法。如图5所示,该应用启动的控制方法包括如下501~508部分,其中:
501、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
502、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
503、若操作指令携带预设信息,则用户终端禁止启动第二应用。
其中,501~503部分的具体实现原理与图1中102~103部分的具体实现原理相同,可参见102~103部分对应的描述,在此不赘述。
504、若操作指令不携带预设信息,并且该目标操作为启动第二应用的目标服务,则获取第一应用的运行状态。
505、若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用。
506、若第一应用的运行状态为后台运行,并且第二应用的小工具未处于激活状态,则禁止启动第二应用。
其中,识别到第一应用的运行状态为后台运行之后,可获取第二应用的小工具的状态,进而判断第二应用的小工具的状态是否为激活状态。若第二应用的小工具处于激活状态,则启动第二应用。否则,不启动第二应用。
通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。
其中,上述506为可选的步骤,若第一应用的运行状态为后台运行,并且第二应用的小工具未处于激活状态,用户终端还可根据其他信息继续确定是否启动第二应用。
507、若第一应用的运行状态为前台运行,并且第二应用的小工具处于激活状态或第二应用的应用类型为第一预设类型,则用户终端启动第二应用。
508、若第一应用的运行状态为前台运行,并且第二应用的应用类型不为第一预设类型,并且第二应用的小工具未处于激活状态,则用户终端禁止启动第二应用。
例如,第一预设类型可以包括支付类应用、语音引擎类应用、分享类应用中的任何一种或多种。通常,支付类应用、语音引擎类应用、分享类应用是用户经常使用的应用。并且第一应用并不是隐藏在后台的恶意应用,因此,操作指令用于启动第二应用的服务,并且第一应用为前台应用时,可将支付类应用、语音引擎类应用、分享类应用启动。
其中,获取第一应用的运行状态之后,识别到第一应用的运行状态为前台运行,进而可判断第二应用的小工具是否处于激活状态,或判断第二应用的应用类型是否为第一预设类型。
其中,可先判断第二应用的小工具是否处于激活状态,若第二应用的小工具处于激活状态,则启动第二应用;若第二应用的小工具处于未激活状态,再判断第二应用的应用类型是否为第一预设类型。若第二应用的应用类型为第一预设类型,则启动第二应用。若第二应用的应用类型不为第一预设类型,则禁止启动第二应用。
或者,可先判断第二应用的应用类型是否为第一预设类型,若第二应用的应用类型为第一预设类型,则启动第二应用。若第二应用的应用类型不为第一预设类型,再判断第二应用的小工具是否处于激活状态。若第二应用的小工具处于激活状态,则启动第二应用。若第二应用的小工具处于未激活状态,则禁止启动第二应用。
其中,上述508为可选的步骤,若第一应用的运行状态为前台运行,并且第二应用的应用类型不为第一预设类型,并且第二应用的小工具处于未激活状态,用户终端还可根据
其他信息继续确定是否启动第二应用。
如图6所示,图6是本申请实施例提供的另一种应用启动的控制方法。如图6所示,该应用启动的控制方法包括如下601~612部分,其中:
601、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
602、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
603、若操作指令携带预设信息,则用户终端禁止启动第二应用。
其中,601~603部分的具体实现原理与图1中102~103部分的具体实现原理相同,可参见102~103部分对应的描述,在此不赘述。
604、若操作指令不携带预设信息,并且该目标操作为启动第二应用的目标服务,则用户终端根据权限信息确定第二应用是否具有预设权限。
605、若根据权限信息确定第二应用具有预设权限,则用户终端启动第二应用。
其中,605部分的具体实现原理与图4中405部分的具体实现原理相同,可参见405部分对应的描述,在此不赘述。
606、若根据权限信息确定第二应用不具有预设权限,则获取第一应用的运行状态。
607、若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用。
608、若第一应用的运行状态为后台运行,并且第二应用的小工具处于未激活状态,则禁止启动第二应用。
609、若第一应用的运行状态为前台运行,并且第二应用的小工具处于激活状态或第二应用的应用类型为第一预设类型,则用户终端启动第二应用。
610、若第一应用的运行状态为前台运行,并且第二应用的应用类型不为第一预设类型,并且第二应用的小工具处于未激活状态,则用户终端禁止启动第二应用。
其中,607~610部分的具体实现原理与图5中505~508部分的具体实现原理相同,可参见505~508部分对应的描述,在此不赘述。
其中,本申请实施例对用户终端根据权限信息确定第二应用是否具有预设权限,以及获取第一应用的运行状态的执行顺序不做限定。
例如,若操作指令不携带预设信息,并且该目标操作为启动第二应用的目标服务,可先获取第一应用的运行状态。若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用。若第一应用的运行状态为前台运行,并且第二应用的应用类型为第一预设类型或第二应用的小工具处于激活状态,则启动第二应用。若第一应用的运行状态为后台运行,并且第二应用的小工具处于未激活状态,则根据权限信息确定第二应用是否具有预设权限。若根据权限信息确定第二应用具有预设权限,则启动第二应用。若根据权限信息确定第二应用不具有预设权限,则禁止启动第二应用。若第一应用的运行状态为前台运行,并且第二应用的应用类型不为第一预设类型,并且第二应用的小工具处
于未激活状态,则根据权限信息确定第二应用是否具有预设权限。若根据权限信息确定第二应用具有预设权限,则启动第二应用。若根据权限信息确定第二应用不具有预设权限,则禁止启动第二应用。
可见,通过实施图6所描述的方法,能够准确地对恶意启动的应用进行拦截。
如图7所示,图7是本申请实施例提供的另一种应用启动的控制方法。如图7所示,该应用启动的控制方法包括如下701~708部分,其中:
701、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
702、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
703、若操作指令携带预设信息,则用户终端禁止启动第二应用。
其中,701~703部分的具体实现原理与图1中102~103部分的具体实现原理相同,可参见102~103部分对应的描述,在此不赘述。
704、若操作指令不携带预设信息,并且该目标操作为启动第二应用的目标数据查询功能,获取第一应用的运行状态。
705、若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用。
706、若第一应用的运行状态为后台运行,并且第二应用的小工具处于未激活状态,则禁止启动第二应用。
707、若第一应用的运行状态为前台运行,并且第二应用的小工具处于激活状态或第二应用的应用类型为第二预设类型,则用户终端启动第二应用。
708、若第一应用的运行状态为前台运行,并且第二应用的应用类型不为第二预设类型,并且第二应用的小工具处于未激活状态,则用户终端禁止启动第二应用。
例如,第二预设类型可以包括分享类应用。通常,分享类应用是用户经常使用的应用。并且第一应用并不是隐藏在后台的恶意应用,因此,操作指令用于启动第二应用的数据查询功能,并且第一应用为前台应用时,可将分享类应用启动。并且通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。可见,通过实施该实施方式能够智能地控制第二应用的启动。
其中,获取第一应用的运行状态之后,识别到第一应用的运行状态为前台运行,进而可判断第二应用的小工具是否处于激活状态,或判断第二应用的应用类型是否为第二预设类型。
其中,可先判断第二应用的小工具是否处于激活状态,若第二应用的小工具处于激活状态,则启动第二应用;若第二应用的小工具处于未激活状态,再判断第二应用的应用类型是否为第二预设类型。若第二应用的应用类型为第二预设类型,则启动第二应用。若第二应用的应用类型不为第二预设类型,则禁止启动第二应用。
或者,可先判断第二应用的应用类型是否为第二预设类型,若第二应用的应用类型为
第二预设类型,则启动第二应用。若第二应用的应用类型不为第二预设类型,再判断第二应用的小工具是否处于激活状态。若第二应用的小工具处于激活状态,则启动第二应用。若第二应用的小工具处于未激活状态,则禁止启动第二应用。
其中,上述706为可选的步骤,若第一应用的运行状态为后台运行,并且第二应用的小工具未处于激活状态,用户终端还可根据其他信息继续确定是否启动第二应用。
其中,上述708为可选的步骤,若第一应用的运行状态为前台运行,并且第二应用的应用类型不为第二预设类型,并且第二应用的小工具处于未激活状态,用户终端还可根据其他信息确定是否启动第二应用。
可见,通过实施图7所描述的方法,能够准确地对恶意启动的应用进行拦截。
如图8所示,图8是本申请实施例提供的另一种应用启动的控制方法。如图8所示,该应用启动的控制方法包括如下801~806部分,其中:
801、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
802、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
803、若操作指令携带预设信息,则用户终端禁止启动第二应用。
其中,801~803部分的具体实现原理与图1中102~103部分的具体实现原理相同,可参见102~103部分对应的描述,在此不赘述。
804、若操作指令不携带预设信息,并且该目标操作为向第二应用发送目标广播信息,则用户终端获取第二应用的小工具的状态。
805、若第二应用的小工具处于激活状态,则用户终端启动第二应用。
806、若第二应用的小工具未处于激活状态,则用户终端禁止启动第二应用。
通常启动激活的小工具不是恶意启动,因此,可启动小工具处于激活状态的第二应用。
如图9所示,图9是本申请实施例提供的另一种应用启动的控制方法。如图9所示,该应用启动的控制方法包括如下901~908部分,其中:
901、用户终端启动用户终端的系统。
902、用户终端生成系统广播信息。
其中,系统广播信息用于发送至第三应用。第三应用是用户终端上的订阅了系统广播信息的应用。
具体地,用户终端启动用户终端的系统之后,触发生成系统广播信息。
903、若第三应用的小工具处于激活状态,或第三应用的应用类型为第三预设类型,则用户终端启动第三应用。
具体地,用户终端成系统广播信息之后,确定第三应用的小工具是否处于激活状态,或第三应用的应用类型是否为第三预设类型。
其中,第三预设类型可以为盲人类型应用等。由于盲人不方面操作手机,通常盲人类
型应用都会由系统广播启动。因此,在系统广播启动盲人类型应用时,需要将盲人类型应用启动。
904、若第三应用的小工具处于未激活状态,并且第三应用的应用类型不为第三预设类型,则用户终端禁止启动第三应用。
在905部分执行之前,可执行901~904部分。
905、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
906、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
907、若操作指令携带预设信息,则用户终端禁止启动第二应用。
908、若操作指令不携带预设信息,则用户终端根据操作指令对第二应用进行启动控制。
其中,905~908部分的具体实现原理与图1中101~104部分的具体实现原理相同,可参见101~104部分对应的描述,在此不赘述。
可见,通过实施该实施方式,能够准确地对系统广播信息触发的应用恶意启动进行拦截。
如图10所示,图10是本申请实施例提供的另一种应用启动的控制方法。如图10所示,该应用启动的控制方法包括如下1001~1009部分,其中:
1001、用户终端启动用户终端的系统。
1002、用户终端生成系统广播信息。
其中,系统广播信息用于发送至第三应用。第三应用是用户终端上的订阅了系统广播信息的应用。
具体地,用户终端启动用户终端的系统之后,触发生成系统广播信息。
1003、若第三应用的小工具处于激活状态,或第三应用的应用类型为第三预设类型,则用户终端启动第三应用。
具体地,用户终端成系统广播信息之后,确定第三应用的小工具是否处于激活状态,或第三应用的应用类型是否为第三预设类型。
其中,第三预设类型可以为盲人类型应用等。由于盲人不方面操作手机,通常盲人类型应用都会由系统广播启动。因此,在系统广播启动盲人类型应用时,需要将盲人类型应用启动。
1004、若第三应用的小工具处于未激活状态,并且第三应用的应用类型不为第三预设类型,则用户终端禁止启动第三应用。
可见,通过实施图10所描述的方法,能够准确地对系统广播信息触发的应用恶意启动进行拦截。
如图11所示,图11是本申请实施例提供的另一种应用启动的控制方法。如图11所
示,该应用启动的控制方法包括如下1101~1109部分,其中:
1101、用户终端启动用户终端的系统。
1102、用户终端生成系统广播信息。
1103、若第三应用的小工具处于激活状态,或第三应用的应用类型为第三预设类型,则用户终端启动第三应用。
1104、若第三应用的小工具处于未激活状态,并且第三应用的应用类型不为第三预设类型,则用户终端禁止启动第三应用。
在1105部分执行之前,可执行1101~1104部分。其中,1101~1104部分的具体实现原理与图9中901~904部分的具体实现原理相同,可参见901~904部分对应的描述,在此不赘述。
1105、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。
1106、用户终端判断操作指令中是否携带预设信息。
其中,该预设信息为第一应用所使用的SDK包括的信息。
1107、若操作指令携带预设信息,则用户终端禁止启动第二应用。
1108、若操作指令不携带预设信息,则用户终端根据操作指令对第二应用进行启动控制。
其中,1105~1108部分的具体实现原理与图1中101~104部分的具体实现原理相同,可参见101~104部分对应的描述,在此不赘述。
1109、若检测到与蓝牙设备蓝牙连接成功,用户终端检测具有蓝牙媒体浏览服务的第四应用。
在实际应用中,应用在安装时,会在用户终端系统注册该应用的所有服务。若应用具有蓝牙媒体浏览服务,也会在系统注册。
例如,蓝牙设备为车载设备,应用a具有蓝牙媒体浏览服务。用户终端检测到与车载设备建立蓝牙连接之后,会启动应用a,以便车载设备能够浏览应用a中的信息。例如,应用a为通讯录,这样车载设备能够浏览通讯录中的联系人信息。
然而在实际应用中,通常很多恶意应用为了启动,也会在系统注册蓝牙媒体浏览服务。因此,通过执行1109和1110,可对恶意应用的启动进行智能地拦截。
1110、若第四应用未启动,则用户终端禁止启动第四应用。
其中,1101~1104部分也可以是可选部分。1109和1110部分可在1105~1108部分之前或之后执行。
如图12所示,图12是本申请实施例提供的另一种应用启动的控制方法。如图12所示,该应用启动的控制方法包括如下1201~1202部分,其中:
1201、若检测到与蓝牙设备蓝牙连接成功,用户终端检测具有蓝牙媒体浏览服务的第四应用。
1202、若第四应用未启动,则用户终端禁止启动第四应用。
该实施方式的具体实现,可参见上述1109和1110对应的描述,再次不赘述。
如图13所示,图13是本申请实施例提供的另一种应用启动的控制方法。如图13所示,该应用启动的控制方法包括如下1301~1303部分,其中:
1301、用户终端接收第一应用发送的操作指令。
其中,该操作指令用于指示用户终端进行目标操作,该目标操作为需要启动第二应用以完成的操作。其中,第一应用为用户终端的应用。
具体地,由用户终端系统接收第一应用发送的操作指令。用户终端系统是指用户终端的操作系统。例如,该用户终端系统可以是安卓系统或IOS系统等。
可选的,目标操作可以为启动第二应用的目标界面,或目标操作可以为启动第二应用的目标服务,或目标操作可以为启动第二应用的目标数据查询功能,或目标操作可以为向第二应用发送目标广播信息,或者目标操作还可以是其他需要先启动第二应用才能执行的操作,本申请实施例不做限定。其中,目标界面可以为第二应用的任一界面,目标服务可以为第二应用的任一服务,目标数据查询功能可以为第二应用的任一数据查询功能,目标广播信息可以为第二应用订阅的任一广播信息。
若目标操作为启动第二应用的目标界面,则该操作指令可携带第二应用的标识和目标界面的标识。若目标操作为启动第二应用的目标服务,则操作指令可携带第二应用的标识和目标服务的标识。若目标操作为启动第二应用的目标数据查询功能,则操作指令可携带第二应用的标识和目标数据查询功能的标识。若目标操作为向第二应用发送目标广播信息,则操作指令还携带需要向第二应用发送的目标广播信息。
1302、用户终端根据操作指令,获取第一信息。
可选的,用户终端根据操作指令,获取第一信息的具体实施方式可以为:若目标操作为启动第二应用的目标界面,或目标操作为启动第二应用的目标服务,或目标操作为启动第二应用的目标数据查询功能,或目标操作为向第二应用发送目标广播信息,则用户终端获取第一应用的运行状态信息和第二应用的特征信息。
其中,该第一信息包括第一应用的运行状态和第二应用的特征信息。
其中,第一应用的运行状态可以为前台运行或后台运行。
可选的,第二应用的特征信息包括第二应用的安装包名称是否包括预设关键词、第二应用是否具有指纹权限、第二应用是否为权限信任应用、第二应用是否为高频使用应用、第二应用是否具有拍照权限、第二应用是否具有网络连接权限中的至少一种。
其中,该预设关键词可以为安全性高应用的安装包名称或经常使用的应用的安装包名称等,如预设关键词可以为支付应用的安装包名。第二应用是否具有指纹权限是指第二应用的某些操作是否需要指纹进行验证。第二应用是否为高频使用应用是指第二应用在预设时间段内的使用次数是否超过预设次数,或者在预设时间段内的使用时长超过预设时长。
1303、用户终端根据第一信息对第二应用进行启动控制。
可见,通过实施图13所描述的方法,可根据第一信息智能地识别是否启动第二应用,而不用用户提前去应用配置列表中设置允许启动的应用。因此,通过实施图13所描述的方法,增加了应用启动控制的智能性。
可选的,用户终端接收操作指令之后,还可检测第二应用是否为预设应用;若第二应用为预设应用,则启动第二应用;若第二应用不为预设应用,则执行1302部分。其中,预设应用可以为系统默认设置的广大用户经常使用的应用,例如可以为支付应用或即时通讯应用。
如图14所示,图14是本申请实施例提供的另一种应用启动的控制方法。如图14所示,该应用启动的控制方法包括如下1401~1408部分,其中:
1401、用户终端接收第一应用发送的操作指令。
操作指令用于指示用户终端进行目标操作,目标操作为需要启动第二应用以完成的操作。
1402、用户终端根据操作指令,获取第一信息。
其中,该第一信息包括第一应用的运行状态和第二应用的特征信息。
其中,1401~1402部分的具体实现原理与图12中1201~1202部分的具体实现原理相同,可参见1201~1202部分对应的描述,在此不赘述。
1403、用户终端根据第二应用的特征信息确定第一权重值。
例如,如下表1所示,第二应用的特征信息包括第二应用的安装包名称包括预设关键词,第二应用具有指纹权限、第二应用为权限信任应用、第二应用为高频使用应用、第二应用具有拍照权限、第二应用具有网络连接权限。若第二应用的安装包名称包括预设关键词,则得到第一权重值为20,否则第一权重值为0。第二应用具有指纹权限,得到第一权重值为10。第二应用为权限信任应用,得到第一权重值为20。第二应用为高频使用应用,得到第一权重值为20。第二应用具有拍照权限,得到第一权重值为5。第二应用具有网络连接权限,得到第一权重值为5。其中,若第二应用的安装包名称包括预设关键词,则第二应用为恶意应用的可能性较低。因此可将第二应用的安装包名称包括预设关键词时赋予较高的权重值。同理,若第二应用为权限信任应用或第二应用为高频使用应用,则第二应用为恶意应用的可能性较低。因此可将第二应用为权限信任应用或第二应用为高频使用应用时赋予较高的权重值。
表1
1404、若运行状态信息为前台运行,则用户终端根据操作指令的类型确定第二权重值。
1405、若第一权重值与第二权重值之和大于预设阈值,则用户终端启动第二应用。
1406、若运行状态信息为后台运行,则获取第二应用的应用类型。
第一应用的应用类型为硬件服务类应用或非硬件服务类应用。例如,硬件服务类应用可以包括蓝牙类应用、WiFi类应用、传感器应用等。
1407、用户终端根据第一应用的应用类型和操作指令的类型确定第三权重值。
1408、若第一权重值与第三权重值之和大于预设阈值,则用户终端启动第二应用。
例如,如下表2,若操作指令为用于启动第二应用的服务的操作指令,在用户终端的系统获取第一应用的运行状态之后,若运行状态为前台运行,则直接根据操作指令和第一应用的运行状态确定第二权重值为10。若运行状态为后台运行,则还需要获取第一应用的应用类型,根据操作指令、第一应用的运行状态和第一应用的应用类型确定第三权重值。若第一应用的应用类型为非硬件服务类应用,则确定第三权重值为5。
表2
通常,硬件服务类应用拉起恶意应用的情况较少,因此,当第一应用运行状态为后台运行时,还可进一步根据第一应用的应用类型来确定对应的权重值。这样有利于使权重值更加准确。
可见,通过实施图14所描述的方法,可以准确地对恶意启动的应用进行拦截。
请参阅图15,为本发明实施例提供的一种用户终端的结构示意图。本实施例中所描述的用户终端,包括:接收模块1501和处理模块1502。其中:
接收模块1501,用于接收第一应用发送的操作指令,操作指令用于指示用户终端进行目标操作,目标操作为需要启动第二应用以完成的操作;处理模块1502,用于判断操作指令中是否携带预设信息,预设信息为第一应用所使用的软件开发工具包SDK包括的信息;处理模块1502,还用于若处理模块1502判断操作指令携带预设信息,则禁止启动第二应用;处理模块1502,还用于若处理模块1502判断操作指令不携带预设信息,则根据操作
指令对第二应用进行启动控制。
可选的,处理模块1502根据操作指令对第二应用进行启动控制的具体方式为:根据操作指令,获取第一信息,第一信息包括第一应用的运行状态,或第一信息包括第二应用的权限信息,或第一信息包括第一应用的应用类型,或第一信息包括第二应用的小工具的状态;根据第一信息对第二应用进行启动控制。
可选的,目标操作为启动第二应用的目标界面,第一信息包括第一应用的运行状态,处理模块1502根据第一信息对第二应用进行启动控制的具体方式为:若第一应用的运行状态为后台运行,则禁止启动第二应用;若第一应用的运行状态为前台运行,则启动第二应用。
可选的,目标操作为启动第二应用的目标界面,第一信息包括第一应用的运行状态,处理模块1502根据第一信息对第二应用进行启动控制的具体方式为:若第一应用的运行状态为后台运行,则禁止启动第二应用;若第一应用的运行状态为前台运行,获取目标界面的界面信息;若界面信息指示目标界面为非透明界面,则启动第二应用;若界面信息指示目标界面为透明界面,则禁止启动第二应用。
可选的,处理模块1502,还用于在启动第二应用之后,获取目标界面的尺寸;处理模块1502,还用于若目标界面的尺寸小于预设尺寸,则关闭第二应用。
可选的,目标操作为启动第二应用的目标服务,第一信息包括第二应用的权限信息,处理模块1502根据第一信息对第二应用进行启动控制的具体方式为:若根据权限信息确定第二应用具有预设权限,则启动第二应用。
可选的,目标操作为启动第二应用的目标服务,第一信息为第一应用的运行状态,处理模块1502根据第一信息对第二应用进行启动控制的具体方式为:若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用;若第一应用的运行状态为后台运行,并且第二应用的小工具处于未激活状态,则禁止启动第二应用;若第一应用的运行状态为前台运行,并且第二应用的小工具处于激活状态或第二应用的应用类型为第一预设类型,则启动第二应用。若第二应用的应用类型不为第一预设类型,并且第二应用的小工具处于未激活状态,则禁止启动第二应用。
可选的,处理模块1502根据操作指令,获取第一信息的具体方式为:若目标操作为启动第二应用的目标服务,并且根据权限信息确定第二应用不具有预设权限,则获取第一应用的运行状态。
可选的,第一预设类型包括支付类应用、语音引擎类应用、分享类应用中的至少一种。
可选的,目标操作为启动第二应用的目标数据查询功能,第一信息为第一应用的运行状态,处理模块1502根据第一信息对第二应用进行启动控制的具体方式为:若第一应用的运行状态为后台运行,并且第二应用的小工具处于激活状态,则启动第二应用;若第一应用的运行状态为后台运行,并且第二应用的小工具处于未激活状态,则禁止启动第二应用;若第一应用的运行状态为前台运行,并且第二应用的小工具处于激活状态或第二应用的应用类型为第二预设类型,则启动第二应用;若第二应用的应用类型不为第二预设类型,并且第二应用的小工具处于未激活状态,则禁止启动第二应用。
可选的,第二预设类型为分享类应用。
可选的,目标操作为向第二应用发送目标广播信息,第一信息为第一信息为第二应用的小工具的状态,处理模块1502根据第一信息对第二应用进行启动控制的具体方式为:若第二应用的小工具处于激活状态,则启动第二应用;若第二应用的小工具未处于激活状态,则禁止启动第二应用。
可选的,用户终端还包括:启动模块,其中:启动模块,用于在接收第一应用发送的操作指令之前,启动用户终端的系统;处理模块1502,还用于生成系统广播信息,系统广播信息用于发送至第三应用;处理模块1502,还用于若第三应用的小工具处于激活状态,或第三应用的应用类型为第三预设类型,则启动第三应用;处理模块1502,还用于若第三应用的小工具处于未激活状态,并且第三应用的应用类型不为第三预设类型,则禁止启动第三应用。
可选的,第三预设类型可以为盲人类应用。
可选的,若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;若第四应用未启动,则禁止启动第四应用。
请参阅图16,为本发明实施例提供的一种用户终端的结构示意图。本实施例中所描述的用户终端,包括:启动模块1601和处理模块1602。其中:
启动模块1601,还用于在接收第一应用发送的操作指令之前,启动用户终端的系统;处理模块1602,用于生成系统广播信息,系统广播信息用于发送至第三应用;处理模块1602,还用于若第三应用的小工具处于激活状态,或第三应用的应用类型为第三预设类型,则启动第三应用;处理模块1602,还用于若第三应用的小工具处于未激活状态,并且第三应用的应用类型不为第三预设类型,则禁止启动第三应用。
可选的,第三预设类型可以为盲人类应用。
请参阅图17,为本发明实施例提供的一种用户终端的结构示意图。本实施例中所描述的用户终端,包括:检测模块1701和控制模块1702。其中:
检测模块1701,用于若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;控制模块1702,用于若所述第四应用未启动,则禁止启动所述第四应用。
请参阅图18,为本发明实施例提供的一种用户终端的结构示意图。本实施例中所描述的用户终端,包括:接收模块1801和处理模块1802。其中:
接收模块1801,用于接收第一应用发送的操作指令,操作指令用于指示用户终端进行目标操作,目标操作为需要启动第二应用以完成的操作;处理模块1802,用于根据操作指令,获取第一信息,第一信息包括第一应用的运行状态和第二应用的特征信息;处理模块1802,还用于根据第一信息对第二应用进行启动控制。
可选的,处理模块1802根据第一信息对第二应用进行启动控制的方式具体为:根据第二应用的特征信息确定第一权重值;若运行状态信息为前台运行,则根据操作指令的类型确定第二权重值;若第一权重值与第二权重值之和大于预设阈值,则启动第二应用。
可选的,处理模块1802,还用于若运行状态信息为后台运行,则获取第二应用的应用
类型,第一应用的应用类型为硬件服务类应用或非硬件服务类应用;处理模块1802,还用于根据第一应用的应用类型和操作指令的类型确定第三权重值;处理模块1802,还用于若第一权重值与第三权重值之和大于预设阈值,则启动第二应用。
可选的,第二应用的特征信息包括第二应用的安装包名称是否包括预设关键词、第二应用是否具有指纹权限、第二应用是否为权限信任应用、第二应用是否为高频使用应用、第二应用是否具有拍照权限、第二应用是否具有网络连接权限中的至少一种。
可选的,处理模块1802,还用于在接收操作指令之后,检测第二应用是否为预设应用;处理模块1802,还用于若处理模块1802检测到第二应用为预设应用,则启动第二应用;处理模块1802,还用于若处理模块1802检测到第二应用不为预设应用,则触发处理模块1802根据操作指令,获取第一信息的。
请参阅图19,为本发明实施例提供的另一种终端的结构示意图。本实施例中所描述的终端,包括:射频(Radio Frequency,RF)电路110、存储器120、其他输入设备130、显示屏140、传感器150、输入/输出子系统170、处理器1120、以及电源190等部件。本领域技术人员可以理解,图19中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。本领域技术人员可以理解显示屏140属于用户界面(UI,User Interface),且终端可以包括比图示或者更少的用户界面。
下面结合图19对终端的各个构成部件进行具体的介绍:
射频电路110可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1120处理;另外,将设计上行的数据发送给基站。通常,射频电路包括但不限于天线、至少一个放大器、收发信机、耦合器、LNA(Low Noise Amplifier,低噪声放大器)、双工器等。此外,射频电路110还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全球移动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA(Code Division Multiple Access,码分多址)、WCDMA(Wideband Code Division Multiple Access,宽带码分多址)、LTE(Long Term Evolution,长期演进)、电子邮件、SMS(Short Messaging Service,短消息服务)等。
存储器120可用于存储软件程序以及模块,处理器1120通过运行存储在存储器120的软件程序以及模块,从而执行终端1的各种功能应用以及数据处理。存储器120可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图象播放功能等)等;存储数据区可存储根据终端的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器120可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
其他输入设备130可用于接收输入的数字或字符信息,以及产生与终端的用户设置以及功能控制有关的键信号输入。具体地,其他输入设备130可包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆、光鼠(光鼠是不显示可
视输出的触摸敏感表面,或者是由触摸屏形成的触摸敏感表面的延伸)等中的一种或多种。其他输入设备130与输入/输出子系统170的其他输入设备控制器171相连接,在其他设备输入控制器171的控制下与处理器1120进行信号交互。
显示屏140可用于显示由用户输入的信息或提供给用户的信息以及终端的各种菜单,还可以接受用户输入。具体的显示屏140可包括显示面板141,以及触控面板142。其中显示面板141可以采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板141。触控面板142,也称为触摸屏、触敏屏等,可收集用户在其上或附近的接触或者非接触操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板142上或在触控面板142附近的操作,也可以包括体感操作;该操作包括单点控制操作、多点控制操作等操作类型。),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板142可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位、姿势,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成处理器能够处理的信息,再送给处理器1120,并能接收处理器1120发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板142,也可以采用未来发展的任何技术实现触控面板142。进一步的,触控面板142可覆盖显示面板141,用户可以根据显示面板141显示的内容(该显示内容包括但不限于,软键盘、虚拟鼠标、虚拟按键、图标等等),在显示面板141上覆盖的触控面板142上或者附近进行操作,触控面板142检测到在其上或附近的操作后,通过输入/输出子系统170传送给处理器1120以确定用户输入,随后处理器1120根据用户输入通过输入/输出子系统170在显示面板141上提供相应的视觉输出。虽然在图4中,触控面板142与显示面板141是作为两个独立的部件来实现终端的输入和输入功能,但是在某些实施例中,可以将触控面板142与显示面板141集成而实现终端的输入和输出功能。
终端还可包括至少一种传感器150,比如光传感器、速度传感器、GPS传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板141的亮度,接近传感器可在终端移动到耳边时,关闭显示面板141和/或背光。作为速度传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别终端姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于终端还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
输入/输出子系统170用来控制输入输出的外部设备,可以包括其他设备输入控制器171、传感器控制器172、显示控制器173。可选的,一个或多个其他输入控制设备控制器171从其他输入设备130接收信号和/或者向其他输入设备130发送信号,其他输入设备130可以包括物理按钮(按压按钮、摇臂按钮等)、拨号盘、滑动开关、操纵杆、点击滚轮、光鼠(光鼠是不显示可视输出的触摸敏感表面,或者是由触摸屏形成的触摸敏感表面的延伸)。值得说明的是,其他输入控制设备控制器171可以与任一个或者多个上述设备连接。所述输入/输出子系统170中的显示控制器173从显示屏140接收信号和/或者向显示屏140发送
信号。显示屏140检测到用户输入后,显示控制器173将检测到的用户输入转换为与显示在显示屏140上的用户界面对象的交互,即实现人机交互。传感器控制器172可以从一个或者多个传感器150接收信号和/或者向一个或者多个传感器150发送信号。
处理器1120是终端的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器120内的软件程序和/或模块,以及调用存储在存储器120内的数据,执行终端的各种功能和处理数据,从而对终端进行整体监控。可选的,处理器1120可包括一个或多个处理单元;优选的,处理器1120可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1120中。
终端还包括给各个部件供电的电源190(比如电池),优选的,电源可以通过电源管理系统与处理器1120逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗等功能。
尽管未示出,终端还可以包括摄像头、蓝牙模块等,在此不再赘述。
具体的,上述处理器1120可以调用上述存储器120存储的程序指令,实现如本发明实施例所示的方法。
所述计算机可读存储介质可以是前述任一实施例所述的终端的内部存储单元,例如终端的硬盘或内存。所述计算机可读存储介质也可以是所述终端的外部存储设备,例如所述终端上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述计算机可读存储介质还可以既包括所述终端的内部存储单元也包括外部存储设备。所述计算机可读存储介质用于存储所述计算机程序以及所述终端所需的其他程序和数据。所述计算机可读存储介质还可以用于暂时地存储已经输出或者将要输出的数据。
需要说明的是,该包含指令的计算机程序产品的具体实现过程可参见第一实施例和第二实施例中所描述的方法,在此不再赘述。
基于同一发明构思,本发明实施例中提供的终端解决问题的原理与本发明方法实施例相似,因此该终端的实施可以参见方法的实施,为简洁描述,在这里不再赘述。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,上述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,上述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
Claims (49)
- 一种应用启动的控制方法,应用于用户终端,其特征在于,所述方法包括:接收第一应用发送的操作指令,所述操作指令用于指示所述用户终端进行目标操作,所述目标操作为需要启动第二应用以完成的操作;判断所述操作指令中是否携带预设信息,所述预设信息为所述第一应用所使用的软件开发工具包SDK包括的信息;若所述操作指令携带所述预设信息,则禁止启动所述第二应用;若所述操作指令不携带所述预设信息,则根据所述操作指令对所述第二应用进行启动控制。
- 根据权利要求1所述的方法,其特征在于,所述根据所述操作指令对所述第二应用进行启动控制,包括:根据所述操作指令,获取第一信息,所述第一信息包括所述第一应用的运行状态,或所述第一信息包括所述第二应用的权限信息,或所述第一信息包括所述第二应用的小工具的状态;根据所述第一信息对所述第二应用进行启动控制。
- 根据权利要求2所述的方法,其特征在于,所述目标操作为启动所述第二应用的目标界面,所述第一信息包括第一应用的运行状态,所述根据所述第一信息对所述第二应用进行启动控制,包括:若所述第一应用的运行状态为后台运行,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,则启动所述第二应用。
- 根据权利要求2所述的方法,其特征在于,所述目标操作为启动所述第二应用的目标界面,所述第一信息包括第一应用的运行状态,所述根据所述第一信息对所述第二应用进行启动控制,包括:若所述第一应用的运行状态为后台运行,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,获取所述目标界面的界面信息;若所述界面信息指示所述目标界面为非透明界面,则启动所述第二应用;若所述界面信息指示所述目标界面为透明界面,则禁止启动所述第二应用。
- 根据权利要求3或4所述的方法,其特征在于,所述启动所述第二应用之后,所述方法还包括:获取所述目标界面的尺寸;若所述目标界面的尺寸小于预设尺寸,则关闭所述第二应用。
- 根据权利要求2所述的方法,其特征在于,所述目标操作为启动所述第二应用的目 标服务,所述第一信息包括第二应用的权限信息,所述根据所述第一信息对所述第二应用进行启动控制,包括:若根据所述权限信息确定所述第二应用具有预设权限,则启动所述第二应用。
- 根据权利要求2所述的方法,其特征在于,所述目标操作为启动所述第二应用的目标服务,所述第一信息为所述第一应用的运行状态,所述根据所述第一信息对所述第二应用进行启动控制,包括:若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于激活状态,则启动所述第二应用;若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,并且所述第二应用的小工具处于激活状态或所述第二应用的应用类型为第一预设类型,则启动所述第二应用;若所述第二应用的应用类型不为第一预设类型,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用。
- 根据权利要求7所述的方法,其特征在于,根据所述操作指令,获取第一信息,包括:若目标操作为启动所述第二应用的目标服务,并且根据所述权限信息确定所述第二应用不具有预设权限,则获取所述第一应用的运行状态。
- 根据权利要求7或8所述的方法,其特征在于,所述第一预设类型包括支付类应用、语音引擎类应用、分享类应用中的至少一种。
- 根据权利要求2所述的方法,其特征在于,所述目标操作为启动所述第二应用的目标数据查询功能,所述第一信息为所述第一应用的运行状态,所述根据所述第一信息对所述第二应用进行启动控制,包括:若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于激活状态,则启动所述第二应用;若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,并且所述第二应用的小工具处于激活状态或所述第二应用的应用类型为第二预设类型,则启动所述第二应用;若所述第二应用的应用类型不为第二预设类型,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用。
- 根据权利要求10所述的方法,其特征在于,所述第二预设类型为分享类应用。
- 根据权利要求2所述的方法,其特征在于,所述目标操作为向所述第二应用发送目标广播信息,所述第一信息为所述第二应用的小工具的状态,所述根据所述第一信息对所述第二应用进行启动控制,包括:若所述第二应用的小工具处于激活状态,则启动所述第二应用;若所述第二应用的小工具未处于激活状态,则禁止启动所述第二应用。
- 根据权利要求1~12任意一项所述的方法,其特征在于,接收第一应用发送的操作指令之前,所述方法还包括:启动所述用户终端的系统;生成系统广播信息,所述系统广播信息用于发送至第三应用;若所述第三应用的小工具处于激活状态,或所述第三应用的应用类型为第三预设类型,则启动所述第三应用;若所述第三应用的小工具处于未激活状态,并且所述第三应用的应用类型不为所述第三预设类型,则禁止启动所述第三应用。
- 根据权利要求13所述的方法,其特征在于,所述第三预设类型为盲人类应用。
- 根据权利要求1~14任意一项所述的方法,其特征在于,所述方法还包括:若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;若所述第四应用未启动,则禁止启动所述第四应用。
- 一种应用启动的控制方法,应用于用户终端,其特征在于,所述方法包括:启动所述用户终端的系统;生成系统广播信息,所述系统广播信息用于发送至第三应用;若第三应用的小工具处于激活状态,或所述第三应用的应用类型为第三预设类型,则启动所述第三应用;若第三应用的小工具处于未激活状态,并且所述第三应用的应用类型不为所述第三预设类型,则禁止启动所述第三应用。
- 根据权利要求16所述的方法,其特征在于,所述第三预设类型为盲人类应用。
- 一种应用启动的控制方法,应用于用户终端,其特征在于,所述方法包括:若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;若所述第四应用未启动,则禁止启动所述第四应用。
- 一种应用启动的控制方法,应用于用户终端,其特征在于,所述方法包括:接收第一应用发送的操作指令,所述操作指令用于指示所述用户终端进行目标操作,所述目标操作为需要启动第二应用以完成的操作;根据所述操作指令,获取第一信息,所述第一信息包括所述第一应用的运行状态和所述第二应用的特征信息;根据所述第一信息对所述第二应用进行启动控制。
- 根据权利要求19所述的方法,其特征在于,根据所述第一信息对所述第二应用进行启动控制,包括:根据所述第二应用的特征信息确定第一权重值;若所述运行状态信息为前台运行,则根据所述操作指令的类型确定第二权重值;若所述第一权重值与所述第二权重值之和大于预设阈值,则启动所述第二应用。
- 根据权利要求20所述的方法,其特征在于,所述方法还包括:若所述运行状态信息为后台运行,则获取第二应用的应用类型,所述第一应用的应用类型为硬件服务类应用或非硬件服务类应用;根据所述第一应用的应用类型和所述操作指令的类型确定第三权重值;若所述第一权重值与所述第三权重值之和大于预设阈值,则启动所述第二应用。
- 根据权利要求19~21任意一项所述的方法,其特征在于,所述第二应用的特征信息包括所述第二应用的安装包名称是否包括预设关键词、所述第二应用是否具有指纹权限、所述第二应用是否为权限信任应用、所述第二应用是否为高频使用应用、所述第二应用是否具有拍照权限、所述第二应用是否具有网络连接权限中的至少一种。
- 根据权利要求19~22任意一项所述的方法,其特征在于,所述接收操作指令之后,根据所述操作指令,获取第一信息之前,所述方法还包括:检测所述第二应用是否为预设应用;若所述第二应用为预设应用,则启动所述第二应用;若所述第二应用不为所述预设应用,则执行所述根据所述操作指令,获取第一信息的步骤。
- 一种用户终端,其特征在于,所述用户终端包括:接收模块,用于接收第一应用发送的操作指令,所述操作指令用于指示所述用户终端进行目标操作,所述目标操作为需要启动第二应用以完成的操作;处理模块,用于判断所述操作指令中是否携带预设信息,所述预设信息为所述第一应用所使用的软件开发工具包SDK包括的信息;所述处理模块,还用于若所述处理模块判断所述操作指令携带所述预设信息,则禁止启动所述第二应用;所述处理模块,还用于若所述处理模块判断所述操作指令不携带所述预设信息,则根据所述操作指令对所述第二应用进行启动控制。
- 根据权利要求24所述的用户终端,其特征在于,所述处理模块根据所述操作指令对所述第二应用进行启动控制的具体方式为:根据所述操作指令,获取第一信息,所述第一信息包括所述第一应用的运行状态,或所述第一信息包括所述第二应用的权限信息,或所述第一信息包括所述第二应用的小工具的状态;根据所述第一信息对所述第二应用进行启动控制。
- 根据权利要求25所述的用户终端,其特征在于,所述目标操作为启动所述第二应用的目标界面,所述第一信息包括第一应用的运行状态,所述处理模块所述根据所述第一信息对所述第二应用进行启动控制的具体方式为:若所述第一应用的运行状态为后台运行,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,则启动所述第二应用。
- 根据权利要求25所述的用户终端,其特征在于,所述目标操作为启动所述第二应用的目标界面,所述第一信息包括第一应用的运行状态,所述处理模块所述根据所述第一信息对所述第二应用进行启动控制的具体方式为:若所述第一应用的运行状态为后台运行,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,获取所述目标界面的界面信息;若所述界面信息指示所述目标界面为非透明界面,则启动所述第二应用;若所述界面信息指示所述目标界面为透明界面,则禁止启动所述第二应用。
- 根据权利要求26或27所述的用户终端,其特征在于,所述处理模块,还用于在启动所述第二应用之后,获取所述目标界面的尺寸;所述处理模块,还用于若所述目标界面的尺寸小于预设尺寸,则关闭所述第二应用。
- 根据权利要求25所述的用户终端,其特征在于,所述目标操作为启动所述第二应用的目标服务,所述第一信息包括第二应用的权限信息,所述处理模块所述根据所述第一信息对所述第二应用进行启动控制的具体方式为:若根据所述权限信息确定所述第二应用具有预设权限,则启动所述第二应用。
- 根据权利要求25所述的用户终端,其特征在于,所述目标操作为启动所述第二应用的目标服务,所述第一信息为所述第一应用的运行状态,所述处理模块所述根据所述第一信息对所述第二应用进行启动控制的具体方式为:若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于激活状态,则启动所述第二应用;若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,并且所述第二应用的小工具处于激活状态或 所述第二应用的应用类型为第一预设类型,则启动所述第二应用;若所述第二应用的应用类型不为第一预设类型,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用。
- 根据权利要求30所述的用户终端,其特征在于,所述处理模块根据所述操作指令,获取第一信息的具体方式为:若目标操作为启动所述第二应用的目标服务,并且根据所述权限信息确定所述第二应用不具有预设权限,则获取所述第一应用的运行状态。
- 根据权利要求30或31所述的用户终端,其特征在于,所述第一预设类型包括支付类应用、语音引擎类应用、分享类应用中的至少一种。
- 根据权利要求25所述的用户终端,其特征在于,所述目标操作为启动所述第二应用的目标数据查询功能,所述第一信息为所述第一应用的运行状态,所述处理模块所述根据所述第一信息对所述第二应用进行启动控制的具体方式为:若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于激活状态,则启动所述第二应用;若所述第一应用的运行状态为后台运行,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用;若所述第一应用的运行状态为前台运行,并且所述第二应用的小工具处于激活状态或所述第二应用的应用类型为第二预设类型,则启动所述第二应用;若所述第二应用的应用类型不为第二预设类型,并且所述第二应用的小工具处于未激活状态,则禁止启动所述第二应用。
- 根据权利要求33所述的用户终端,其特征在于,所述第二预设类型为分享类应用。
- 根据权利要求25所述的用户终端,其特征在于,所述目标操作为向所述第二应用发送目标广播信息,所述第一信息为所述第二应用的小工具的状态,所述处理模块所述根据所述第一信息对所述第二应用进行启动控制的具体方式为:若所述第二应用的小工具处于激活状态,则启动所述第二应用;若所述第二应用的小工具未处于激活状态,则禁止启动所述第二应用。
- 根据权利要求24~35任意一项所述的用户终端,其特征在于,所述用户终端还包括:启动模块,其中:所述启动模块,用于在接收第一应用发送的操作指令之前,启动所述用户终端的系统;所述处理模块,还用于生成系统广播信息,所述系统广播信息用于发送至第三应用;所述处理模块,还用于若所述第三应用的小工具处于激活状态,或所述第三应用的应用类型为第三预设类型,则启动所述第三应用;所述处理模块,还用于若所述第三应用的小工具处于未激活状态,并且所述第三应用的应用类型不为第三预设类型,则禁止启动所述第三应用。
- 根据权利要求36所述的方法,其特征在于,所述第三预设类型为盲人类应用。
- 根据权利要求24~37任意一项所述的方法,其特征在于,所述处理模块,还用于若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;所述处理模块,还用于若所述第四应用未启动,则禁止启动所述第四应用。
- 一种用户终端,其特征在于,所述用户终端包括:所述启动模块,还用于在接收第一应用发送的操作指令之前,启动所述用户终端的系统;处理模块,用于生成系统广播信息,所述系统广播信息用于发送至第三应用;所述处理模块,还用于若所述第三应用的小工具处于激活状态,或所述第三应用的应用类型为第三预设类型,则启动所述第三应用;所述处理模块,还用于若所述第三应用的小工具处于未激活状态,并且所述第三应用的应用类型不为第三预设类型,则禁止启动所述第三应用。
- 根据权利要求39所述的用户终端,其特征在于,所述第三预设类型为盲人类应用。
- 一种用户终端,其特征在于,所述用户终端包括:检测模块,用于若检测到与蓝牙设备蓝牙连接成功,检测具有蓝牙媒体浏览服务的第四应用;控制模块,用于若所述第四应用未启动,则禁止启动所述第四应用。
- 一种用户终端,其特征在于,所述用户终端包括:接收模块,用于接收第一应用发送的操作指令,所述操作指令用于指示所述用户终端进行目标操作,所述目标操作为需要启动第二应用以完成的操作;处理模块,用于根据所述操作指令,获取第一信息,所述第一信息包括所述第一应用的运行状态和所述第二应用的特征信息;所述处理模块,还用于根据所述第一信息对所述第二应用进行启动控制。
- 根据权利要求42所述的用户终端,其特征在于,所述处理模块根据所述第一信息对所述第二应用进行启动控制的方式具体为:根据所述第二应用的特征信息确定第一权重值;若所述运行状态信息为前台运行,则根据所述操作指令的类型确定第二权重值;若所述第一权重值与所述第二权重值之和大于预设阈值,则启动所述第二应用。
- 根据权利要求43所述的用户终端,其特征在于,所述处理模块,还用于若所述运行状态信息为后台运行,则获取第二应用的应用类型,所述第一应用的应用类型为硬件服务类应用或非硬件服务类应用;所述处理模块,还用于根据所述第一应用的应用类型和所述操作指令的类型确定第三权重值;所述处理模块,还用于若所述第一权重值与所述第三权重值之和大于预设阈值,则启动所述第二应用。
- 根据权利要求42~44任意一项所述的用户终端,其特征在于,所述第二应用的特征信息包括所述第二应用的安装包名称是否包括预设关键词、所述第二应用是否具有指纹权限、所述第二应用是否为权限信任应用、所述第二应用是否为高频使用应用、所述第二应用是否具有拍照权限、所述第二应用是否具有网络连接权限中的至少一种。
- 根据权利要求42~45任意一项所述的用户终端,其特征在于,所述处理模块,还用于在接收所述操作指令之后,检测所述第二应用是否为预设应用;所述处理模块,还用于若所述处理模块检测到所述第二应用为预设应用,则启动所述第二应用;所述处理模块,还用于若所述处理模块检测到所述第二应用不为所述预设应用,则触发所述处理模块根据所述操作指令,获取第一信息的。
- 一种用户终端,其特征在于,所述用户终端包括:存储器,用于存储一个或多个程序;处理器,用于执行所述存储器中的程序,以使得所述终端执行如权利要求1~23任意一项所述的方法。
- 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序包括程序指令,当其在计算机上运行时,所述程序指令当被处理器执行时使所述计算机执行如权利要求1-23任一项所述的方法。
- 一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如权利要求1-23任一项所述的方法。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/106099 WO2019071581A1 (zh) | 2017-10-13 | 2017-10-13 | 一种应用启动的控制方法及用户终端 |
CN202410518551.0A CN118467119A (zh) | 2017-10-13 | 2017-10-13 | 一种应用启动的控制方法及用户终端 |
CN201780094840.0A CN111095211B (zh) | 2017-10-13 | 2017-10-13 | 一种应用启动的控制方法及用户终端 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/106099 WO2019071581A1 (zh) | 2017-10-13 | 2017-10-13 | 一种应用启动的控制方法及用户终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019071581A1 true WO2019071581A1 (zh) | 2019-04-18 |
Family
ID=66101202
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/106099 WO2019071581A1 (zh) | 2017-10-13 | 2017-10-13 | 一种应用启动的控制方法及用户终端 |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN118467119A (zh) |
WO (1) | WO2019071581A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625811A (zh) * | 2020-05-29 | 2020-09-04 | 数网金融有限公司 | 数据授权方法及装置 |
CN114554388B (zh) * | 2020-11-25 | 2024-11-01 | 日立江森自控空调有限公司 | 家用电器系统控制方法及家用电器系统 |
CN113064641B (zh) * | 2021-03-15 | 2023-12-22 | 无锡小天鹅电器有限公司 | 电控设备的预设平台的启动方法及系统、终端和电控设备 |
CN114003913B (zh) * | 2021-12-28 | 2022-05-06 | 支付宝(杭州)信息技术有限公司 | 应用程序的运行控制方法和装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105025350A (zh) * | 2015-07-09 | 2015-11-04 | 广东欧珀移动通信有限公司 | 一种播放终端控制方法及播放终端 |
CN105975306A (zh) * | 2016-04-29 | 2016-09-28 | 北京天宇朗通通信设备股份有限公司 | 电子设备的应用程序启动管理方法和装置 |
CN106126327A (zh) * | 2016-06-22 | 2016-11-16 | 广东欧珀移动通信有限公司 | 一种应用程序启动的控制方法及控制装置 |
CN106502807A (zh) * | 2016-11-01 | 2017-03-15 | Tcl集团股份有限公司 | 一种应用弹出框的显示控制方法及系统 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8990942B2 (en) * | 2013-02-18 | 2015-03-24 | Wipro Limited | Methods and systems for API-level intrusion detection |
US9372785B2 (en) * | 2013-03-07 | 2016-06-21 | Microsoft Technology Licensing, Llc | Identifying implicit assumptions associated with a software product |
CN103561006B (zh) * | 2013-10-24 | 2017-05-10 | 北京奇虎科技有限公司 | 基于安卓系统的应用认证方法和装置及应用认证服务器 |
CN105812562B (zh) * | 2016-03-09 | 2019-09-06 | Oppo广东移动通信有限公司 | 应用于移动终端的蓝牙控制方法及装置 |
CN106022110B (zh) * | 2016-05-18 | 2019-04-09 | Oppo广东移动通信有限公司 | 识别推送平台应用的方法及装置 |
CN106127030A (zh) * | 2016-06-22 | 2016-11-16 | 广东欧珀移动通信有限公司 | 一种界面控制方法和装置 |
CN106529312B (zh) * | 2016-10-25 | 2019-08-06 | Oppo广东移动通信有限公司 | 一种移动终端的权限控制方法、装置及移动终端 |
CN106708501B (zh) * | 2016-10-25 | 2019-08-20 | 腾讯科技(深圳)有限公司 | 活动监控方法及装置 |
-
2017
- 2017-10-13 CN CN202410518551.0A patent/CN118467119A/zh active Pending
- 2017-10-13 CN CN201780094840.0A patent/CN111095211B/zh active Active
- 2017-10-13 WO PCT/CN2017/106099 patent/WO2019071581A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105025350A (zh) * | 2015-07-09 | 2015-11-04 | 广东欧珀移动通信有限公司 | 一种播放终端控制方法及播放终端 |
CN105975306A (zh) * | 2016-04-29 | 2016-09-28 | 北京天宇朗通通信设备股份有限公司 | 电子设备的应用程序启动管理方法和装置 |
CN106126327A (zh) * | 2016-06-22 | 2016-11-16 | 广东欧珀移动通信有限公司 | 一种应用程序启动的控制方法及控制装置 |
CN106502807A (zh) * | 2016-11-01 | 2017-03-15 | Tcl集团股份有限公司 | 一种应用弹出框的显示控制方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN111095211B (zh) | 2024-05-14 |
CN111095211A (zh) | 2020-05-01 |
CN118467119A (zh) | 2024-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106778175B (zh) | 一种界面锁定方法、装置和终端设备 | |
KR102182417B1 (ko) | 데이터 공유 방법 및 단말기 | |
KR20170132240A (ko) | 통신 메시지 전송 방법 및 디바이스 | |
WO2019218124A1 (zh) | 一种sim卡自动切换的方法和电子装置 | |
WO2017211205A1 (zh) | 一种白名单更新方法和装置 | |
CN111027030B (zh) | 权限设置方法及终端设备 | |
US20180035296A1 (en) | Screen unlocking method and apparatus, and storage medium | |
WO2018120905A1 (zh) | 终端中消息提示的方法和终端 | |
WO2017193496A1 (zh) | 应用数据的处理方法、装置和终端设备 | |
CN106713608B (zh) | 应用的功能状态修改方法、装置及终端 | |
WO2019071581A1 (zh) | 一种应用启动的控制方法及用户终端 | |
WO2018214748A1 (zh) | 应用界面的显示方法、装置、终端及存储介质 | |
JP7148045B2 (ja) | 認証ウィンドウ表示方法、端末、コンピュータ可読記憶媒体及びコンピュータプログラム | |
WO2018094631A1 (zh) | 数据处理的方法及其终端 | |
WO2015165390A1 (en) | Method, apparatus, and system for displaying message in mobile terminal | |
US10298590B2 (en) | Application-based service providing method, apparatus, and system | |
US11150913B2 (en) | Method, device, and terminal for accelerating startup of application | |
CN105975316A (zh) | 一种进程管理方法、装置及设备 | |
CN107104930A (zh) | 一种设置查看权限的方法、装置和系统 | |
WO2015062240A1 (zh) | 一种应用安装的方法、装置和设备 | |
CN106850957B (zh) | 应用通知管理的方法、装置及移动终端 | |
WO2019090702A1 (zh) | 一种终端的安全保护方法及装置 | |
CN106528231B (zh) | 一种启动应用程序的方法和装置 | |
WO2015062241A1 (zh) | 应用程序保护方法、装置和终端 | |
CN107277113B (zh) | 一种实现文件下载处理的方法及设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17928501 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17928501 Country of ref document: EP Kind code of ref document: A1 |