WO2023246715A1 - Procédé et appareil de commande de connexion réseau pour application cible, et dispositif électronique - Google Patents

Procédé et appareil de commande de connexion réseau pour application cible, et dispositif électronique Download PDF

Info

Publication number
WO2023246715A1
WO2023246715A1 PCT/CN2023/101144 CN2023101144W WO2023246715A1 WO 2023246715 A1 WO2023246715 A1 WO 2023246715A1 CN 2023101144 W CN2023101144 W CN 2023101144W WO 2023246715 A1 WO2023246715 A1 WO 2023246715A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
application
file
target file
network connection
Prior art date
Application number
PCT/CN2023/101144
Other languages
English (en)
Chinese (zh)
Inventor
朱远鹏
张成骏
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023246715A1 publication Critical patent/WO2023246715A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Definitions

  • This application belongs to the field of data processing technology, and specifically relates to a network connection control method, device and electronic equipment for a target application.
  • File viewing or editing applications can automatically allow users to view or edit files. Files are uploaded to the cloud, allowing users to easily view or edit files on multiple devices. However, users often process some highly confidential files on mobile terminals. When viewing or editing files in a file processing application, the application will automatically upload the files to the cloud, which may cause the leakage of confidential files and affect the user's safety. The user experience has a greater impact.
  • the purpose of the embodiments of this application is to provide a network connection control method, device and electronic device for a target application, which can solve the problem of automatic uploading of opened files by file processing applications in the existing technology, and the risk of file leakage, resulting in low file security.
  • the problem is to provide a network connection control method, device and electronic device for a target application, which can solve the problem of automatic uploading of opened files by file processing applications in the existing technology, and the risk of file leakage, resulting in low file security.
  • embodiments of the present application provide a network connection control method for a target application.
  • the method includes: receiving a first input to a target file, wherein the first input is used to open the target file; responding In the first input, if the application that processes the target file is a target application, perform network connection control on the target application.
  • inventions of the present application provide a network connection control device for a target application.
  • the device includes: a receiving module configured to receive a first input to a target file, wherein the first input is used to open a target file.
  • the target file a control module configured to, in response to the first input, perform network connection control on the target application when the application processing the target file is a target application.
  • inventions of the present application provide an electronic device.
  • the electronic device includes a processor and a memory.
  • the memory stores programs or instructions that can be run on the processor.
  • the programs or instructions are processed by the processor.
  • the processor is executed, the steps of the method described in the first aspect are implemented.
  • embodiments of the present application provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the steps of the method described in the first aspect are implemented. .
  • inventions of the present application provide a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the first aspect. the method described.
  • embodiments of the present application provide a computer program product, the program product is stored in a storage medium, and the program product is executed by at least one processor to implement the method as described in the first aspect.
  • embodiments of the present application provide an electronic device configured to perform the method described in the first aspect.
  • a first input to the target file is received, where the first input is used to open the target file; in response to the first input, when the application that processes the target file is a target application, the target application is Network connection control.
  • the target application is Network connection control.
  • receiving the user's request for the target file For viewing or editing operations, when it is detected that the target file needs to be viewed or edited through the target application, network connection control is performed on the target application to control the automatic upload of files by the target application to avoid the target file being uploaded without the user's permission.
  • the target file can be uploaded privately, which improves file security. This further solves the problem in the prior art that the file processing application automatically uploads the opened file, and there is a risk of file leakage, resulting in low file security.
  • Figure 1 is a schematic flowchart of a network connection control method for a target application according to an embodiment of the present application
  • Figure 2 is a schematic flowchart of a network connection control method for another target application in an embodiment of the present application
  • Figure 3 is a schematic framework diagram of a network connection control device according to a target application in an embodiment of the present application
  • Figure 4 is a schematic diagram of the frame structure of an electronic device according to an embodiment of the present application.
  • Figure 5 is a schematic diagram of the hardware structure of an electronic device according to an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the figures so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in orders other than those illustrated or described herein, and that "first,”"second,” etc. are distinguished Objects are usually of one type, and the number of objects is not limited. For example, the first object can be one or multiple. This In addition, “and/or” in the description and claims indicates at least one of the connected objects, and the character “/" generally indicates that the related objects are in an "or” relationship.
  • a network connection control method for a target application is proposed. As shown in Figure 1, the method may specifically include the following steps:
  • S102 receive the first input to the target file, where the first input is used to open the target file;
  • the method in this embodiment is applied to mobile terminals, which include but are not limited to smartphones, tablets, PCs, wearable electronic devices, microcomputers, etc. with multiple functions.
  • the terminal system of the mobile terminal includes but is not limited to Windows, iOS, Android and other systems. In this embodiment, there is no limitation on the terminal system of the mobile terminal.
  • the target file in this embodiment includes but is not limited to text, image, voice, video, etc., and the data format of the target file is not limited in this embodiment.
  • text target files include but are not limited to txt, Word, and PDF formats.
  • the target application can perform operations such as viewing or editing the target file.
  • the target application may also perform operations such as data transmission to the cloud, that is, the target application is an application that can perform cloud upload and cloud storage, for example, Cloud disk and network disk applications.
  • the target application's data transmission to the cloud includes but is not limited to uploading and storing target files to the cloud. Therefore, in this embodiment, if the application that processes the target file is a target application, it is necessary to control the network connection of the target application.
  • the first input from the user on the target file is received, where the first input includes but is not limited to operations such as sliding, clicking, and long pressing on the touchable screen of the mobile terminal.
  • the first input may also be based on the keys of the mobile terminal and the selection operation of the external device.
  • the specific operation method of the first input is not limited.
  • an application list corresponding to the target file is displayed on the graphical user interface of the mobile terminal.
  • the application list includes one or more applications that can open the target file, and then, based on the user's selection operation, Select the application that processes the target file.
  • a default application for opening the target file can also be set in advance, and after receiving the first input, the target file is directly opened through the default application.
  • a first PDF application is preset as a default application for files in PDF format.
  • the target application is opened through the first PDF application.
  • network connection control includes but is not limited to disconnecting the target application from the network. For example, disconnecting the target application from the network within the system framework of the mobile terminal.
  • the terminal system obtains the target application package name and disconnects it from the system framework layer.
  • Network requests of all application processes under the target application package name It should be noted that when the networking requests of all application processes under the target application package name are disconnected from the system framework layer, it will not affect the network connection and data transmission of the mobile terminal, that is, the application of other applications in the mobile terminal.
  • the networking requests of the process are not affected, and only the application process that opens the target file of the target file is disconnected.
  • the network connection control also includes encrypting the target file so that the target file uploaded to the external space by the target application cannot be recognized or opened, thereby completing the network connection control of the target application.
  • a first input to the target file is received, where the first input is used to open the target file; in response to the first input, when the application that processes the target file is the target application, Control network connections for target applications.
  • the user's viewing or editing operation on the target file is received.
  • network connection control is performed on the target application to control the automatic operation of the target application. Upload files to avoid uploading target files privately without the user's permission. files, improving file security. This further solves the problem in the prior art that the file processing application automatically uploads the opened file, and there is a risk of file leakage, resulting in low file security.
  • the application processing the target file in response to the first input, if the application processing the target file is the target application, perform network connection control on the target application, including but not limited to: when the application processing the target file is detected There is a networking request in the application process, or, if the application that processes the target file is in the preset application list, determine that the application that processes the target file is the target application; disconnect the target application from the Internet.
  • the application process that has the networking request is the target application.
  • the applications in the default application list are all based on historical usage or applications that users have tried to upload content to the cloud or other spaces.
  • the application that processes the target file is located in the preset application list, the application that processes the target file is determined to be the target application.
  • whether the application is a target application is determined based on the file transfer protocol supported by the application that processes the target file. For example, if the current file transfer protocol of the application that processes the target file is a preset file transfer protocol, such as HTTP protocol, determine the application that processes the target file as the target application.
  • a preset file transfer protocol such as HTTP protocol
  • the application that processes the target file is determined to be the target application, it means that when the target file is processed by the target application, there is a risk of uploading the target file privately. Therefore, in this article In the embodiment, the target application is disconnected from the Internet to prevent the target application from uploading the target file.
  • the target application will be disconnected from the network to accurately identify the target application with security risks and avoid the target application from privately uploading the target file without the user's permission. , improved file security.
  • disconnecting the target application includes but is not limited to: displaying prompt information, where the prompt information is used to indicate whether the target file is a private file; receiving a second input to the prompt information; responding In the second input, when it is determined that the target file is a private file, the target application is disconnected from the network.
  • a first pop-up window is displayed, and there is prompt information in the first pop-up window.
  • the prompt information is used to remind the user to confirm whether the target file is a private file.
  • receive the user's second input of the prompt information in the first pop-up window If the second input indicates that the target file is a private file, disconnect the target application from the network within the framework of the terminal system. Specifically, in the terminal system, the application package name of the target application is obtained, and then the network request of the application process of the target application is interrupted.
  • the target application will not be controlled over the Internet.
  • prompt information is displayed to prompt the user to confirm whether the target file is a private file, providing the user with a flexible processing method for the target file to meet the user's different usage needs of the target file.
  • the application that processes the target file in response to the first input, when the application that processes the target file is the target application, after performing network connection control on the target application, it also includes but is not limited to: performing target processing on the target file. Operation; wherein, the target operation includes at least one of the following: adding a watermark to the target file; encrypting the target file.
  • target operations are performed on the target file.
  • the watermark can be of the target file Information such as the opening time and the name of the package that starts the application.
  • the specific content of the watermark is not limited.
  • the target file may also be encrypted, and the encryption key for encrypting the target file is generated from information such as the encoding or package name of the target application, and the opening time of the target file.
  • the encryption keys of different target applications are different at different times, so that the source of the leaked target files can be traced.
  • target operations are performed on the target file, so that when the target file is leaked, the source of the leakage method and leakage time of the target file can be accurately traced.
  • the application that processes the target file in response to the first input, when the application that processes the target file is the target application, after performing network connection control on the target application, it also includes but is not limited to: after receiving the exit instruction When, delete the cache of the target application; restore the network connection control of the target application.
  • the user After the user completes the relevant operations on the target file, he gives an exit instruction to exit the application. After receiving the user's exit instruction for the target application, delete the local file cache of the target application to prevent the target application from performing local file backup in the local folder or local storage space of the target file. In addition, after the local file cache deletion of the target application is completed, the network connection of the target application is restored.
  • the network connection of the target application should be restored after the local file cache of the target application is deleted, so as to prevent the target application from uploading the backup file of the target file in the local file cache.
  • a second pop-up window is displayed on the graphical user interface of the mobile terminal, and the prompt information in the second pop-up window is used to prompt the local file cache of the target application.
  • the file cache has been deleted.
  • the prompt information in the second pop-up window may be "View traces have been cleared.”
  • the cache of the target application is deleted; and the network connection control of the target application is restored to avoid the situation where the target file is not allowed by the user. , privately upload the backup file of the target file, which improves file security.
  • FIG. 2 it is a schematic flowchart of another network connection control method for target applications in this embodiment.
  • the method may specifically include the following steps:
  • a first pop-up window is displayed in the graphical user interface, and the first pop-up window is used to display prompt information and can receive user input.
  • the prompt information of the first pop-up window is to confirm to the user whether the target file is a private file, and a selection control can be provided for receiving the user's input;
  • the terminal system obtains the application package name of the target application and disconnects the networking requests of all processes under the application package name from the terminal system framework layer.
  • the target application cannot connect to the Internet and cannot perform file upload operations such as cloud backup;
  • processing operations in this step are actual operations performed by the user based on actual experience, such as viewing and editing the file content of the target file, which will not be described in this embodiment.
  • a watermark is added to the target file based on information such as the opening time of the target file and the package name of the startup application.
  • the local file cache of the target application is deleted to avoid the local file cache of the target application. Back up files and upload them online later.
  • a second pop-up window is displayed on the graphical user interface, and the cleaning information in the second pop-up window is "View traces have been cleared.”
  • a first input to the target file is received, where the first input is used to open the target file; in response to the first input, when the application that processes the target file is a target application, the target application is networked Connection control.
  • the user's viewing or editing operation on the target file is received.
  • network connection control is performed on the target application to control the automatic operation of the target application. Uploading files avoids the target files from being uploaded privately without the user's permission, which improves file security. This further solves the problem in the prior art that the file processing application automatically uploads the opened file, and there is a risk of file leakage, resulting in low file security.
  • the execution subject may be the network connection control device of the target application.
  • the network connection control device of the target application executing the network connection control method of the target application is taken as an example to illustrate the network connection control device of the target application provided by the embodiment of the present application.
  • the device includes:
  • the receiving module 30 is configured to receive a first input to a target file, wherein the first input is used to open the target file;
  • the control module 32 is configured to respond to the first input and, if the application that processes the target file is a target application, perform network connection control on the target application.
  • control module 30 includes:
  • Determining sub-module configured to detect the existence of a networking request in the application process of the application that processes the target file, or when the application that processes the target file is located in the preset application list In this case, determine that the application that processes the target file is the target application;
  • the control sub-module is used to disconnect the target application from the network.
  • control submodule includes:
  • a display unit configured to display prompt information, wherein the prompt information is used to indicate whether the target file is a private file
  • a receiving unit configured to receive a second input to the prompt information
  • a control unit configured to, in response to the second input, disconnect the target application from the network when it is determined that the target file is a private file.
  • it also includes:
  • Execution module configured to perform a target operation on the target file after performing network connection control on the target application when the application processing the target file in response to the first input is a target application.
  • the target operation includes at least one of the following:
  • it also includes:
  • a processing module configured to, in response to the first input, when the application processing the target file is a target application, after performing network connection control on the target application, upon receiving an exit instruction, delete the The cache of the target application;
  • the control module is also used to restore network connection control of the target application.
  • a first input to the target file is received, where the first input is used to open the target file; in response to the first input, when the application that processes the target file is a target application, a network connection is made to the target application control.
  • the user's viewing or editing operation on the target file is received.
  • network connection control is performed on the target application to control the automatic operation of the target application. Uploading files avoids the target files from being uploaded privately without the user's permission, which improves file security. This further solves the problem of automatic uploading of opened files by file processing applications in the prior art. The risk of file leakage leads to low file security.
  • the file device in the embodiment of the present application may be an electronic device or a component in the electronic device, such as an integrated circuit or a chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the electronic device can be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, a mobile internet device (Mobile Internet Device, MID), or augmented reality (AR)/virtual reality (VR).
  • the network connection control of the target application in the embodiment of the present application may be a device with an operating system.
  • the operating system can be an Android operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
  • the network connection control of the target application provided by the embodiments of the present application can implement various processes implemented by the method embodiments of Figures 1 to 2. To avoid duplication, they will not be described again here.
  • this embodiment of the present application also provides an electronic device 400, including a processor 401 and a memory 402.
  • the memory 402 stores programs or instructions that can be run on the processor 401.
  • each step of the method embodiment of the network connection control method for the target application is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
  • FIG. 5 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
  • the electronic device 500 includes but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, input unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor 510, etc. part.
  • the electronic device 500 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 510 through a power management system, thereby managing charging, discharging, and function through the power management system. Consumption management and other functions.
  • the structure of the electronic device shown in Figure 5 does not constitute a limitation on the electronic device.
  • the electronic device may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be described again here. .
  • the user input unit 507 is used to receive a first input to the target file, wherein the first input is used to open the target file;
  • the processor 510 is configured to respond to the first input and, if the application that processes the target file is a target application, perform network connection control on the target application.
  • the network connection control of the target application is implemented to realize the automatic file upload control of the target application, which avoids the target file from being uploaded privately without the user's permission, and improves file security.
  • the processor 510 is configured to detect a networking request in the application process of the application that processes the target file, or when the application that processes the target file is located in a preset application list. Next, determine the application that processes the target file as the target application;
  • the processor 510 is configured to disconnect the target application from the network.
  • the target application is disconnected from the Internet to prevent the target application from uploading the target file.
  • the display unit 506 is used to display prompt information, wherein the prompt information is used to indicate whether the target file is a private file;
  • the user input unit 507 is used to receive the second input of the prompt information
  • the processor 510 is configured to, in response to the second input, disconnect the target application from the network if it is determined that the target file is a private file.
  • the user is prompted through prompt information to confirm whether the target file is a private file, providing the user with a flexible processing method of the target file to meet the user's different usage needs of the target file.
  • the processor 510 in response to the first input, in the case where the application processing the target file is a target application, after performing network connection control on the target application, performs network connection control on the target file.
  • the target file when the target file is processed by the target application, the target file is subjected to target operations, so that when the target file is leaked, the source of the target file can be accurately traced in the leakage manner and leakage time.
  • the processor 510 is configured to, in response to the first input, if the application processing the target file is a target application, perform network connection control on the target application, and receive an exit instruction. when, delete the cache of the target application;
  • Processor 510 configured to restore network connection control of the target application.
  • the input unit 504 may include a graphics processor (Graphics Processing Unit, GPU) 5041 and a microphone 5042.
  • the graphics processor 5041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 506 may include a display panel 5061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 507 includes a touch panel 5071 and at least one of other input devices 5072 . Touch panel 5071, also called touch screen.
  • the touch panel 5071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 5072 may include, but are not limited to, physical keyboards, function keys (such as Volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which I won’t go into details here.
  • Memory 509 may be used to store software programs as well as various data.
  • the memory 509 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 509 may include volatile memory or non-volatile memory, or memory 509 may include both volatile and non-volatile memory.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM) , SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DRRAM).
  • RAM Random Access Memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • synchronous dynamic random access memory Synchronous DRAM, SDRAM
  • Double data rate synchronous dynamic random access memory Double Data Rate SDRAM, DDRSDRAM
  • Enhanced SDRAM, ESDRAM synchronous link dynamic random access memory
  • Synch link DRAM synchronous link dynamic random access memory
  • SLDRAM direct memory bus random access memory
  • the processor 510 may include one or more processing units; optionally, the processor 510 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 510.
  • Embodiments of the present application also provide a readable storage medium on which a program or instructions are stored.
  • a program or instructions When the program or instructions are executed by a processor, each of the method embodiments of the network connection control method for the target application is implemented.
  • the process can achieve the same technical effect. To avoid repetition, it will not be described again here.
  • the processor is the processor in the electronic device described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement network connection control of the above target application.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-a-chip or system-on-chip, etc.
  • Embodiments of the present application provide a computer program product, the program product is stored in a storage medium, and the program product is executed by at least one processor to implement each process of the method embodiment of the network connection control method for the above target application, and can achieve the same technical effect, so to avoid repetition, we will not repeat them here.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, they can also be implemented by over hardware, but in many cases the former is the better implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , optical disk), including several instructions to cause a terminal (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of this application.

Abstract

La présente demande se rapporte au domaine technique du traitement de données et concerne un procédé et un appareil de commande de connexion réseau pour une application cible, ainsi qu'un dispositif électronique. Le procédé consiste à : recevoir une première entrée pour un fichier cible, la première entrée servant à ouvrir le fichier cible ; et en réponse à la première entrée, lorsqu'une application pour traiter le fichier cible est une application cible, effectuer une commande de connexion réseau sur l'application cible.
PCT/CN2023/101144 2022-06-24 2023-06-19 Procédé et appareil de commande de connexion réseau pour application cible, et dispositif électronique WO2023246715A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210727244.4 2022-06-24
CN202210727244.4A CN115277670A (zh) 2022-06-24 2022-06-24 目标应用的网络连接控制方法、装置和电子设备

Publications (1)

Publication Number Publication Date
WO2023246715A1 true WO2023246715A1 (fr) 2023-12-28

Family

ID=83761165

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/101144 WO2023246715A1 (fr) 2022-06-24 2023-06-19 Procédé et appareil de commande de connexion réseau pour application cible, et dispositif électronique

Country Status (2)

Country Link
CN (1) CN115277670A (fr)
WO (1) WO2023246715A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277670A (zh) * 2022-06-24 2022-11-01 维沃移动通信有限公司 目标应用的网络连接控制方法、装置和电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9948651B1 (en) * 2015-12-14 2018-04-17 Symantec Corporation Automatic shared personal image privacy level detection and management
US20200412697A1 (en) * 2019-06-26 2020-12-31 Microsoft Technology Licensing, Llc File upload control for client-side applications in proxy solutions
CN112449102A (zh) * 2019-09-03 2021-03-05 联发科技股份有限公司 隐私图像加密方法及装置
CN114580006A (zh) * 2020-11-30 2022-06-03 京东方科技集团股份有限公司 资源访问控制的方法、电子设备
CN115277670A (zh) * 2022-06-24 2022-11-01 维沃移动通信有限公司 目标应用的网络连接控制方法、装置和电子设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346137B (zh) * 2013-07-24 2019-05-14 腾讯科技(深圳)有限公司 一种应用联网的管理方法、系统和计算机可读存储介质
CN111753286A (zh) * 2020-06-16 2020-10-09 Oppo广东移动通信有限公司 终端设备监测方法、装置、终端设备及存储介质
CN112752316B (zh) * 2020-12-28 2023-12-19 维沃移动通信有限公司 电子设备联网控制方法、装置、电子设备和存储介质
CN216122668U (zh) * 2021-05-13 2022-03-22 广州视源电子科技股份有限公司 一种电子设备的远程展示系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9948651B1 (en) * 2015-12-14 2018-04-17 Symantec Corporation Automatic shared personal image privacy level detection and management
US20200412697A1 (en) * 2019-06-26 2020-12-31 Microsoft Technology Licensing, Llc File upload control for client-side applications in proxy solutions
CN112449102A (zh) * 2019-09-03 2021-03-05 联发科技股份有限公司 隐私图像加密方法及装置
CN114580006A (zh) * 2020-11-30 2022-06-03 京东方科技集团股份有限公司 资源访问控制的方法、电子设备
CN115277670A (zh) * 2022-06-24 2022-11-01 维沃移动通信有限公司 目标应用的网络连接控制方法、装置和电子设备

Also Published As

Publication number Publication date
CN115277670A (zh) 2022-11-01

Similar Documents

Publication Publication Date Title
US20160164854A1 (en) Secure content messaging
TWI515641B (zh) 變更桌面圖示的方法及系統
US9275206B2 (en) Managing sensitive information
WO2023246715A1 (fr) Procédé et appareil de commande de connexion réseau pour application cible, et dispositif électronique
WO2015096597A1 (fr) Procédé et dispositif de parcours d'un document par des dispositifs multiples
WO2023185817A1 (fr) Procédé et appareil de coopération multi-dispositif, et dispositif électronique et support
KR102037656B1 (ko) 데이터 파일들 보호
WO2024012416A1 (fr) Procédé et appareil d'affichage
CN107862035B (zh) 会议记录的网络读取方法、装置、智能平板和存储介质
WO2024041468A1 (fr) Procédé et appareil de traitement de fichiers, dispositif électronique et support de stockage
WO2023185701A1 (fr) Procédé et appareil d'affichage, dispositif électronique et support de stockage lisible
WO2024083018A1 (fr) Procédé et appareil de traitement d'informations et dispositif électronique
WO2024078552A1 (fr) Procédé et appareil de gestion d'applications d'arrière-plan, dispositif électronique et support
WO2023226842A1 (fr) Procédé et appareil d'affichage d'informations, dispositif électronique et support de stockage lisible
WO2024046266A1 (fr) Procédé et appareil de gestion de vidéo, dispositif électronique et support de stockage lisible
US9021389B1 (en) Systems and methods for end-user initiated data-loss-prevention content analysis
US9430625B1 (en) Method and system for voice match based data access authorization
WO2023241563A1 (fr) Procédé de traitement de données, et dispositif électronique
WO2024002072A1 (fr) Procédé et appareil de collecte d'informations, et dispositif électronique
WO2023236866A1 (fr) Procédé et appareil d'entrée, dispositif électronique et support de stockage lisible
WO2023213289A1 (fr) Procédé et appareil de gestion d'autorisation pour programme d'application
WO2023155745A1 (fr) Procédé et appareil d'affichage d'interface
WO2023198064A1 (fr) Procédé et appareil de démarrage de programme d'application, dispositif électronique et support de stockage
WO2023155874A1 (fr) Procédé et appareil de gestion d'icône d'application, et dispositif électronique
WO2023103901A1 (fr) Procédé et appareil de gestion d'application, et dispositif électronique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23826363

Country of ref document: EP

Kind code of ref document: A1