Nothing Special   »   [go: up one dir, main page]

CN107621977B - Application control method, terminal and computer readable storage medium - Google Patents

Application control method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN107621977B
CN107621977B CN201710899497.9A CN201710899497A CN107621977B CN 107621977 B CN107621977 B CN 107621977B CN 201710899497 A CN201710899497 A CN 201710899497A CN 107621977 B CN107621977 B CN 107621977B
Authority
CN
China
Prior art keywords
application
information
current
terminal
scene information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710899497.9A
Other languages
Chinese (zh)
Other versions
CN107621977A (en
Inventor
王建刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710899497.9A priority Critical patent/CN107621977B/en
Publication of CN107621977A publication Critical patent/CN107621977A/en
Application granted granted Critical
Publication of CN107621977B publication Critical patent/CN107621977B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses an application control method, which comprises the following steps: when a first application runs at the front end of a terminal, acquiring current scene information of the first application; the first application is an application which comprises identification information in the terminal; and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information. The embodiment of the invention also discloses a terminal and a computer readable storage medium, which are used for solving the problem of larger potential safety hazard of the control method aiming at the application in the prior art and improving the safety of the application.

Description

Application control method, terminal and computer readable storage medium
Technical Field
The present invention relates to the field of computers, and in particular, to a method for controlling an application, a terminal, and a computer-readable storage medium.
Background
With the rapid development of communication technology, the functions of mobile terminals are more and more powerful. At present, the mobile payment function of the mobile terminal has penetrated into the aspects of people's life, for example, shopping, network ordering, water and electricity fee payment and the like can be realized through mobile payment. However, the popularization of mobile payment brings convenience to people and also brings potential safety hazards, and the fund and information safety of users are seriously threatened. For example, after a person opens a payment application of a mobile terminal and successfully performs a transaction, the person usually presses a return key of the mobile terminal to directly quit a payment interface of the payment application. However, this way of exiting the payment interface is simply to switch the payment application from the front end to the back end of the mobile terminal to continue running without closing the payment application. Thus, once the mobile terminal is stolen, economic loss and leakage of payment information are inevitably caused to the user. Therefore, the existing control method aiming at the application has great potential safety hazard.
Disclosure of Invention
In view of the above, the present invention provides an application control method, a terminal and a computer-readable storage medium, so as to solve the problem of poor security of the application control method in the prior art and improve the security of the application.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an application control method, including:
when a first application runs at the front end of a terminal, acquiring current scene information of the first application; the first application is an application which comprises identification information in the terminal;
and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information.
Further, controlling the first application to be closed or to be run at the back end of the terminal based on the current scene information includes:
determining a current control strategy for the first application based on the current context information;
and controlling the first application to be closed or to be operated at the back end of the terminal based on the current control strategy.
Further, when the first application of the terminal runs at the front end of the terminal, before the current context information of the first application is acquired, the method further includes:
extracting characteristic information from historical scene information of the first application, and processing the characteristic information to obtain a behavior rule of the user using the first application;
and generating a control strategy corresponding to the historical scene information based on the behavior rule, and obtaining the corresponding relation between the historical scene information and the control strategy.
Further, determining a current control strategy for the first application based on the current context information includes:
and determining a current control strategy aiming at the first application according to the current scene and the corresponding relation between the historical scene information and the control strategy.
Further, based on the current scene information, controlling the first application to close includes:
detecting whether a current display interface of a terminal is a display interface of a first application;
if the current display interface of the terminal is not the display interface of the first application, judging whether the current scene information contains sensitive information of the first application;
and if the scene information contains sensitive information of the first application, controlling the first application to be closed.
Further, based on the current context information, after controlling the first application to run at the back end of the terminal, the method further includes:
setting the authority for forbidding the third-party application to read the notification information; wherein the third party application is an application other than the first application and a system application of the terminal; the notification type information is information which is sent to the first application by the server and is used for verifying the user of the first application;
and when the first application runs at the rear end of the terminal, prohibiting the third-party application from reading the notification information according to the authority.
In a second aspect, an embodiment of the present invention provides a terminal, where the terminal includes: a processor, a memory, and a communication bus;
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is used for executing the control program of the application stored in the memory so as to realize the following steps:
when a first application runs at the front end of a terminal, acquiring current scene information of the first application; the first application is an application which comprises identification information in the terminal;
and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information.
Further, based on the current context information, the processor is further configured to control the first application to close or execute at the back end of the terminal, so as to implement the following steps:
determining a current control strategy for the first application based on the current context information;
and controlling the first application to be closed or to be operated at the back end of the terminal based on the current control strategy.
Further, when the first application of the terminal runs at the front end of the terminal and before the current scene information of the first application is acquired, the processor is further configured to execute a control program of the application to implement the following steps:
extracting characteristic information from historical scene information of the first application, and processing the characteristic information to obtain a behavior rule of the user using the first application;
and generating a control strategy corresponding to the historical scene information based on the behavior rule, and obtaining the corresponding relation between the historical scene information and the control strategy.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium, where a control program of an application is stored, and the control program of the application, when executed by a processor, implements the steps of the control method of the first application as described above.
According to the application control method, the terminal and the computer readable storage medium provided by the embodiment of the invention, when the first application runs at the front end of the terminal, the current scene information of the first application is acquired; and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information. That is to say, the terminal in the embodiment of the present invention can flexibly control the first application to be closed or switch the first application from the front end of the terminal to the back end of the terminal to run according to the acquired current scene information of the first application on the terminal, so that not only the security of the first application on the terminal is improved, but also the intelligence degree of the terminal is improved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention;
fig. 2 is a diagram of a communication network system architecture according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a control method applied in the embodiment of the present invention;
FIG. 4 is a schematic interface diagram of an application according to an embodiment of the present invention;
FIG. 5 is a schematic interface diagram of another application of the embodiments of the present invention;
FIG. 6 is a schematic interface diagram of another application according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include mobile terminals such as a mobile phone, a tablet computer, a notebook computer, a palm top computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and fixed terminals such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: a Radio Frequency (RF) unit 101, a WiFi module 102, an audio output unit 103, an a/V (audio/video) input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access 2000(CDMA2000, Code Division Multiple Access 2000), Wideband Code Division Multiple Access (WCDMA, Wideband Code Division Multiple Access), Time Division Synchronous Code Division Multiple Access (TD-SCDMA, Time Division-Synchronous Code Division Multiple Access), Frequency Division duplex Long Term Evolution (FDD-LTE, Frequency Division duplex Long Term Evolution (TDD-LTE), and Time Division duplex Long Term Evolution (TDD-LTE).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to send and receive an electronic mailbox, browse a webpage, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processor (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a display unit, may collect a touch operation by a user (e.g., an operation of the user on the touch panel 1071 or near the touch panel 1071 using any suitable object or accessory such as a finger, a stylus, etc.) thereon or nearby, and drive a corresponding connection device according to a preset program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes User Equipment (UE) 201, Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) 202, Evolved Packet Core Network (EPC) 203, and IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include a Mobility Management Entity (MME) 2031, a Home Subscriber Server (HSS) 2032, other MMEs 2033, a Serving Gateway (SGW) 2034, a packet data network gateway (PGW, PDN gateway) 2035, and a Policy and Charging functions Entity (PCRF) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging shutdown policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IP Multimedia Subsystem (IMS), other IP services, and the like.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
It should be appreciated that reference throughout this specification to "an embodiment of the present invention" or "other embodiments of the present invention" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrase "in an embodiment of the invention" or "in other embodiments of the invention" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
The embodiment of the invention provides an application control method, which is applied to a terminal, wherein the functions realized by the method can be realized by calling a program code through a processor in the terminal, and the program code can be saved in a computer storage medium. In this embodiment, taking the terminal as a mobile phone as an example for explanation, referring to fig. 3, the method includes the following steps:
s301: when a first application runs at the front end of a terminal, acquiring current scene information of the first application;
here, the first application is an application in which the terminal includes identification information; the first application may be a payment-type secret-related application, an instant messaging-type secret-related application, or an office-type secret-related application. The identification information may be authentication information used to log in or open the first application, or may be authentication information used to perform a transaction through the first application. The first application and the identification information are not specifically limited in the embodiments of the present invention.
In an embodiment of the present invention, the current context information of the first application may include current transaction information and/or current verification information. The current transaction information may include a transaction amount, a transaction time, a transaction object, a payment method, and the like of the current transaction. The current authentication information may be the same information as the identification information, that is, the current authentication information may be authentication information used for logging in or opening the first application, or authentication information used for performing a transaction through the first application. Specifically, the authentication information may be preset biometric information of the user, such as a fingerprint, an iris, and a facial identity of the user; or preset password information such as numbers, letters, and combinations of numbers and letters; but also preset voice information, etc.
In practical application, after a user clicks a first application on a mobile phone, the first application is triggered to run at the front end of the mobile phone, and at the moment, a related interface of the first application is displayed on a display interface of the mobile phone. Further, when the first application runs at the front end of the mobile phone, the mobile phone can obtain the current scene information of the first application based on the information in the relevant interface of the first application displayed on the display interface.
In the specific implementation process, the payment-type secret-related application on the mobile phone is used by the user as an example. After clicking the payment type secret-related application on the mobile phone, the user triggers the payment type secret-related application to run at the front end of the mobile phone, and at the moment, an initial interface of the payment type secret-related application is displayed on the mobile phone. Further, the user touches a payment option in the initial interface to trigger the display interface to jump to the payment interface. At this time, information such as a payment code is displayed on the display interface of the mobile phone. After the payee obtains the payment code and confirms that the transaction is completed, the mobile phone can obtain the current scene information of the first application, namely the current transaction information. For example, as shown in fig. 4, in an actual application, in the process of purchasing an early point by using a payment-type privacy-related application on a mobile phone, the current transaction information on the current display interface 41 acquired by the mobile phone may include: a convenience store for each day of transaction objects, transaction time 2017-08-0108: 10, transaction amount of current transaction of 20 Yuan, a payment mode China construction bank and the like.
In the specific implementation process, the office-type confidential application on the mobile phone is used by the user as an example. The office-type confidential applications may include Office Automation (OA) applications, such as Word, Excel, PPT, and the like; mailbox applications and the like may also be included. After a user clicks office type secret-related application on the mobile phone, the office type secret-related application is triggered to run at the front end of the mobile phone. At this time, an initial interface of the office-type confidential application is displayed on the mobile phone. Here, the initial interface of the office-type confidential application may be a password input interface of the office automation application; or a login interface of the mailbox application. Further, the user inputs verification information on a password input interface or a login interface, wherein the verification information is used for triggering the office automation application to open a corresponding Word, Excel or PPT file; or triggering the mailbox application to successfully log in the mailbox setting interface. At this time, the verification information of the first application is displayed on the display interface of the mobile phone. The verification information can be password information preset for Word files, such as 123456; or preset password information for the Excel file, such as abc 123; and also authentication information set for the mailbox application, such as a fingerprint of the thumb of the right hand of the user, etc. At this time, the mobile phone may obtain authentication information of the office-type confidential application, such as the above password information or the authentication information.
S302: and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information.
Here, after the mobile phone acquires the current scene information of the first application, the first application can be automatically controlled to be closed or run at the back end of the mobile phone based on the current scene information.
In the specific implementation process, the example that the user uses the payment-type secret-related application on the mobile phone is still taken as an example. After the mobile phone obtains the current transaction information in S301, the mobile phone determines that the current transaction is successful, and then the payment-type privacy-related application on the mobile phone can be automatically controlled to be closed. Therefore, the risk that payment information is stolen or called in the payment type confidential application due to the fact that the user manually selects to switch the payment type confidential application from the front end of the mobile phone to the rear end of the mobile phone is avoided.
In the specific implementation process, the user still uses office-type confidential application on the mobile phone as an example. After the mobile phone obtains the verification information in S301, if the mobile phone does not receive a login/open instruction for the office-type confidential application within a preset time, the mobile phone controls the office-type confidential application to be closed. For example, referring to fig. 5, when a user wants to browse an encrypted Word file with a mobile phone in an office with many people, the file name is an important file, the file stores internal secret information, and only the user knows a password for opening the file, such as 123456. Then, in the case that the user clicks the Word file and inputs the password in the password input interface 52 of the display interface 51 of the mobile phone, the mobile phone can acquire the input information of the user. In fig. 5, the password input interface 52 further includes a determinable touch key, i.e., the determination 53 in fig. 5, if the user touches the determinable touch key, the mobile phone generates a determination instruction for the touch operation, and in response to the determination instruction, tries to open the Word file based on the password input by the user in the password input interface. The password input interface 52 further includes a touch button capable of canceling, that is, cancel 54 in fig. 5, and if the user touches the touch button after inputting the password, the terminal clears the password that has been input in the password input interface. However, another colleague finds the user at this time, the user drops the mobile phone on the desktop when leaving the workstation, and the input password for the file is displayed on the current display interface of the mobile phone. And then, the mobile phone judges that the confirmed login instruction is not received within 1 minute after the password information input by the user is received, and then the mobile phone automatically closes the password input interface of the Word file. Therefore, the problem that identification information of the first application is stolen by others and irreparable loss is caused under the condition that a user inputs correct verification information but does not perform the next operation can be avoided.
Correspondingly, if the mobile phone receives a login/opening instruction aiming at the office-type confidential application within the preset time, the mobile phone responds to the login/opening instruction and logs in a mailbox/opens a Word file. And then, if the mobile phone does not receive an operation instruction aiming at the office type confidential application within another preset time, controlling the office type confidential application to run at the rear end of the mobile phone. Therefore, the confidential information in the office type confidential application can be prevented from being stolen by others, and meanwhile, the identification information in the office type confidential application can be quickly opened when a user needs to continue using the office type confidential application.
As can be seen from the above, in the embodiment of the present invention, when the first application runs at the front end of the terminal, the current scene information of the first application is obtained; and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information. That is to say, the terminal in the embodiment of the present invention can flexibly control the first application to be closed or switch the first application from the front end of the terminal to the back end of the terminal to run according to the acquired current scene information of the first application on the terminal. Therefore, the safety of the first application on the terminal is improved, and the intelligent degree of the terminal is also improved.
Based on the foregoing embodiment, in another embodiment of the present invention, the foregoing S302 may include: determining a current control strategy for the first application based on the current context information; and controlling the first application to be closed or to be operated at the back end of the terminal based on the current control strategy.
Here, the mobile phone may determine the current control policy for the first application only according to the current context information after acquiring the current context information. For example, when the first application runs at the front end of the mobile phone, the mobile phone captures interface information, identifies a payment success interface therein, and acquires current scene information included in the payment success interface. The current scene information here may be the same as the current scene information described in S301 described above. The handset then determines a current control policy for the first application based on the current context information. For example, the current control policy is to immediately close the first application, or to close the first application after waiting for a preset time, or to switch the first application from the front end of the mobile phone to the back end of the mobile phone for running.
Of course, after the current context information of the first application is acquired, the control method provided in the embodiment of the present invention may also perform real-time control on the first application in combination with the current context information and the historical context information of the first application. Specifically, based on the foregoing embodiment, in other embodiments of the present invention, the foregoing S301 may include:
the method comprises the steps that firstly, feature information is extracted from historical scene information of a first application, and the feature information is processed to obtain a behavior rule of a user using the first application;
here, the history scenario information may include history transaction information and/or history verification information of the first application. The historical transaction information may include transaction amount, transaction time, transaction object, payment method, etc. of the historical transaction. Moreover, the historical transaction information may further include a record of the transaction of the first application with the same transaction object. The historical authentication information may be the same information as the identification information in S301, that is, the historical authentication information may be authentication information used to log in or open the first application, or may be authentication information used when a transaction is performed by the first application. Furthermore, the history authentication information may further include record information of all authentication information that the first application has used. Specifically, the authentication information may be preset biometric information of the user, such as a fingerprint, an iris, and a facial identity of the user; or preset password information such as numbers, letters, and combinations of numbers and letters; but also preset voice information, etc. The characteristic information may be the historical transaction information, the historical verification information, or a combination of the historical transaction information and the historical verification information.
Further, the mobile phone can extract feature information from the historical scene information, and process the feature information to obtain a behavior rule of the user using the first application.
In the specific implementation process, the description is given by taking an example that the user uses the payment-type security-related application on the mobile phone, and the feature information extracted from the historical scene information by the mobile phone includes the transaction time, the transaction object and the transaction amount. The method includes the steps that feature information of the mobile phone is extracted according to historical scene information of a first time period 2017-07-01 (saturday) to 2017-08-31 (thursday), and payment transactions of 10-20 yuan exist between a payment secret-related application of the mobile phone and a convenience store of a transaction object every day in the first time period, wherein the first time period is from 8:00 to 8:30 in Monday to Friday every week. Meanwhile, in the first time period, 50 yuan of payment transaction exists between the payment type secret-related application of the mobile phone and the transaction object passenger station at 12:00 am on saturday every week. Further, the mobile phone processes the feature information to obtain the following behavior rules of the user using the payment-type confidential application: between 8:00 and 8:30 every monday and friday morning, the payment-type confidential application generates 10-20 yuan payment transactions with each day convenience store. At 12:00 pm on saturday, a 50 dollar payment transaction was generated between the payment-type security application and the passenger station.
And secondly, generating a control strategy corresponding to the historical scene information based on the behavior rule, and obtaining the corresponding relation between the historical scene information and the control strategy.
After acquiring a behavior rule of a user using a first application in the first step, the mobile phone can generate a control strategy corresponding to historical scene information based on the behavior rule. In this embodiment, based on the rule one, the generating of the first control policy corresponding to the first historical scene information may be: the mobile phone generates a first control strategy corresponding to a first historical scene, such as that a user opens a payment application on the mobile phone between 8:00 and 8:30 on Monday and Friday morning and performs 10-20 yuan payment transaction in a convenience store each day, based on the rule I, wherein the first control strategy is used for controlling the payment application to be closed after 8: 30. Based on the rule two, the generating of the second control strategy corresponding to the second historical scenario information may be: and generating a second control strategy corresponding to a second historical scene, such as that the user opens the payment application on the mobile phone at 12:00 pm on saturday and carries out 50-yuan payment transaction with the passenger station by the mobile phone based on the second rule, wherein the second control strategy is used for controlling the payment application to be closed immediately after the payment transaction is finished. Further, after the mobile phone obtains the first control strategy and the second control strategy, the mobile phone can further obtain a first corresponding relation between the first historical scene information and the first control strategy; and a second correspondence between the second historical context information and the second control strategy.
Accordingly, the above S302 may include: and determining a current control strategy aiming at the first application according to the current scene and the corresponding relation between the historical scene information and the control strategy.
Here, assume that the current scenario is: the cell phone opens a payment-like application on tuesday morning at 8:15 and makes a 10 dollar payment transaction with each day of the convenience store. Then, the mobile phone determines that the current scene belongs to a first historical scene according to the current scene and the corresponding relation between the historical scene information and the control strategy; and then the mobile phone determines the current control strategy aiming at the first application as a first control strategy according to the first corresponding relation. And then, the mobile phone controls the payment application to run at the back end of the terminal based on the first control strategy, and closes the payment application in 8:30 minutes. In this way, after the user performs the 10-yuan payment transaction, the payment application can be quickly opened to continue the payment transaction; meanwhile, the mobile phone automatically controls the payment-type confidential application relation in 8:30 minutes based on the behavior rule of the user using the payment-type application, so that the payment-type application is ensured to be closed in time when the user does not need to perform payment transaction with the transaction object, and the property safety of the user is ensured.
As another example, at Saturday noon, the user wants to use a payment-type application to purchase passenger tickets from Western-Ann to Yangan, a 50 dollar trip fee. The user opens the payment application on the mobile phone, an initial interface of the payment secret-related application is displayed on the mobile phone, and further, the user touches a payment option in the initial interface to trigger the display interface to jump to the payment interface. At this time, information such as a payment code is displayed on the display interface of the mobile phone. For example, as shown in fig. 6, after the payee obtains the payment code and confirms that the transaction is completed, the mobile phone may obtain the current context information of the first application, that is, the current transaction information from the payment success interface 61. For example, the current scene information includes: the trading object passenger station has the trading time of 2017-09-0212: 00 and the trading amount of 50 Yuan. Then, the mobile phone determines that the current scene belongs to a second historical scene according to the current scene and the corresponding relation between the historical scene information and the control strategy; and then determining the current control strategy aiming at the first application as a second control strategy according to the second corresponding relation. Then, the mobile phone controls the payment application to be closed based on the second control strategy. Therefore, the user transaction can be determined to be finished after the user carries out payment transaction with the passenger station; for example, after the user successfully purchases 50 yuan of travel tickets by using the payment application at 12:00 pm on saturday, the mobile phone determines that the user does not use the payment application any more for ticket purchase transaction based on the behavior rule of the user using the payment application, and immediately and automatically closes the payment application to ensure the safety of the account.
Based on the foregoing embodiment, in another embodiment of the present invention, the controlling of closing the first application based on the current context information in S302 may include:
firstly, detecting whether a current display interface of a terminal is a display interface of a first application;
here, the display interface of the first application includes identification information including at least one of: a login name, a password, and an authentication code. Further, the mobile phone detects interface information in a current display interface of the mobile phone, and identifies whether the display interface is a display interface of the first application according to the interface information.
Secondly, if the current display interface of the terminal is not the display interface of the first application, judging whether the current scene information contains the identification information of the first application;
here, if the mobile phone detects that the current display interface is not the display interface of the first application, for example, the display interface of the mobile phone is a news browsing interface, and the display interface does not belong to the display interface of the first application. Then, the mobile phone further determines whether the acquired current context information includes identification information of the first application, such as a login name, a password, and an authentication code. It should be noted that the current scene information is interface information of an interface displayed by the mobile phone before the current news browsing interface is displayed.
And finally, if the scene information contains the identification information of the first application, controlling the first application to be closed.
Here, if the mobile phone determines that the scene information includes the identification information of the first application. For example, the scene information includes a login name and a password. Then the handset controls the first application to close immediately.
In practical application, when a user intends to log in a first application, such as a payment-type security-related application, for payment operation, the user inputs a login name and a password in a login interface, but the user does not click a login key at the moment. At this point, a friend consults the user for a specialized vocabulary. Then, the user opens the browser to search the professional vocabulary, and because the login name and the password are stored in the login interface of the payment-type confidential application at the moment, great potential safety hazard is brought to the account safety of the user. When the current display interface is determined not to be the display interface of the first application and the acquired scene information is determined to contain the identification information of the first application, the mobile phone immediately controls the first application to be closed. Therefore, the leakage of the identification information can be avoided, and further the loss brought to the user is avoided.
Based on the foregoing embodiment, in another embodiment of the present invention, after the foregoing S302, the method may further include: setting the authority for forbidding the third-party application to read the notification information; wherein the third party application is an application other than the first application and a system application of the terminal; the notification type information is information which is sent to the first application by the server and is used for verifying the user of the first application; and when the first application runs at the rear end of the terminal, prohibiting the third-party application from reading the notification information according to the authority.
Here, the above system applications may include a clock application, a calculator application, a music player application, etc. on a mobile phone; after the mobile phone controls the first application to run at the back end of the terminal based on the current scene information, in order to avoid that the notification type information aiming at the first application is stolen by the third party application, the embodiment of the invention is provided with the permission for forbidding the third party application to read the notification type information. Therefore, the risk of the first application when the first application runs at the rear end of the mobile phone can be reduced, and the safety of the first application is improved.
Based on the foregoing method embodiment, this embodiment provides a terminal, which may be applied to the information selecting method provided in the embodiment corresponding to fig. 3, and referring to fig. 7, the terminal 70 includes: a memory 71 (corresponding to the memory 109 in fig. 1), a processor 72 (corresponding to the memory 110 in fig. 1), and a computer program stored in the memory 71 and executable on the processor 72, wherein the memory 71 and the processor 72 are connected by a communication bus 73, and the processor 72 executes the computer program to implement the following steps: when a first application runs at the front end of a terminal, acquiring current scene information of the first application; the first application is an application which comprises identification information in the terminal;
and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information.
Further, the processor may further implement the following steps when executing the program: determining a current control strategy for the first application based on the current context information;
and controlling the first application to be closed or to be operated at the back end of the terminal based on the current control strategy.
Further, the processor may further implement the following steps when executing the program: extracting characteristic information from historical scene information of the first application, and processing the characteristic information to obtain a behavior rule of the user using the first application;
and generating a control strategy corresponding to the historical scene information based on the behavior rule, and obtaining the corresponding relation between the historical scene information and the control strategy.
Further, the processor may further implement the following steps when executing the program: and determining a current control strategy aiming at the first application according to the current scene and the corresponding relation between the historical scene information and the control strategy.
Further, the processor may further implement the following steps when executing the program: detecting whether a current display interface of a terminal is a display interface of a first application;
if the current display interface of the terminal is not the display interface of the first application, judging whether the current scene information contains the identification information of the first application;
and if the scene information contains the identification information of the first application, controlling the first application to be closed.
Further, the processor may further implement the following steps when executing the program: setting the authority for forbidding the third-party application to read the notification information; wherein the third party application is an application other than the first application and a system application of the terminal; the notification type information is information which is sent to the first application by the server and is used for verifying the user of the first application;
and when the first application runs at the rear end of the terminal, prohibiting the third-party application from reading the notification information according to the authority.
In practical applications, the Processor may be implemented by a Central Processing Unit (CPU), a GPU, a microprocessor Unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
Here, it should be noted that: the description of the terminal embodiment is similar to the description of the method, and has the same beneficial effects as the method embodiment, and therefore, the description is omitted. For technical details that are not disclosed in the terminal embodiment of the present invention, those skilled in the art should refer to the description of the method embodiment of the present invention for understanding, and therefore, the detailed description is omitted here. As can be seen from the above, the terminal in the embodiment of the present invention can flexibly control the first application to be closed or switch the first application from the front end of the terminal to the back end of the terminal to run according to the acquired current scene information of the first application on the terminal, so that not only the security of the first application on the terminal is improved, but also the intelligence degree of the terminal is improved.
Based on the foregoing method embodiments, the present embodiment provides a computer-readable storage medium, which can be applied to a mobile terminal in one or more embodiments, where the computer-readable storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the following steps: when a first application runs at the front end of a terminal, acquiring current scene information of the first application; the first application is an application which comprises identification information in the terminal;
and controlling the first application to be closed or to run at the back end of the terminal based on the current scene information.
Further, the processor may further implement the following steps when executing the program: determining a current control strategy for the first application based on the current context information;
and controlling the first application to be closed or to be operated at the back end of the terminal based on the current control strategy.
Further, the processor may further implement the following steps when executing the program: extracting characteristic information from historical scene information of the first application, and processing the characteristic information to obtain a behavior rule of the user using the first application;
and generating a control strategy corresponding to the historical scene information based on the behavior rule, and obtaining the corresponding relation between the historical scene information and the control strategy.
Further, the processor may further implement the following steps when executing the program: and determining a current control strategy aiming at the first application according to the current scene and the corresponding relation between the historical scene information and the control strategy.
Further, the processor may further implement the following steps when executing the program: detecting whether a current display interface of a terminal is a display interface of a first application;
if the current display interface of the terminal is not the display interface of the first application, judging whether the current scene information contains the identification information of the first application;
and if the scene information contains the identification information of the first application, controlling the first application to be closed.
Further, the processor may further implement the following steps when executing the program: setting the authority for forbidding the third-party application to read the notification information; wherein the third party application is an application other than the first application and a system application of the terminal; the notification type information is information which is sent to the first application by the server and is used for verifying the user of the first application;
and when the first application runs at the rear end of the terminal, prohibiting the third-party application from reading the notification information according to the authority.
The computer-readable storage medium may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a magnetic Random Access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); and may be various electronic devices such as mobile phones, computers, tablet devices, personal digital assistants, etc., including one or any combination of the above-mentioned memories.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (8)

1. A method for controlling an application, the method comprising:
when a first application runs at the front end of a terminal, acquiring current scene information of the first application; the first application is an application which comprises identification information in the terminal; the current scene information comprises current transaction information and/or current verification information;
determining a current control strategy aiming at the first application based on the current scene information, and controlling the first application to be closed or run at the back end of the terminal based on the current control strategy, wherein the current control strategy comprises the following steps: if the current scene information is the current transaction information and the current transaction is successful, controlling the first application to be closed; if the current scene information is the current verification information and a login/opening instruction for the first application is not received within a first preset time, controlling the first application to be closed; and if the current scene information is the current verification information, the first application is logged in, and an operation instruction for the first application is not received within a second preset time, controlling the first application to run at the rear end of the terminal.
2. The method according to claim 1, wherein before the obtaining of the current context information of the first application when the first application is running at the front end of the terminal, further comprising:
extracting characteristic information from the historical scene information of the first application, and processing the characteristic information to obtain a behavior rule of a user using the first application;
and generating a control strategy corresponding to the historical scene information based on the behavior rule, and obtaining the corresponding relation between the historical scene information and the control strategy.
3. The method of claim 2, wherein determining the current control policy for the first application based on the current context information comprises:
and determining a current control strategy aiming at the first application according to the current scene information and the corresponding relation between the historical scene information and the control strategy.
4. The method of claim 1, wherein the determining a current control policy for the first application based on the current context information, and controlling the first application to close based on the current control policy comprises:
detecting whether a current display interface of the terminal is a display interface of the first application;
if the current display interface of the terminal is not the display interface of the first application, judging whether the current scene information contains the identification information of the first application;
and if the current scene information contains the identification information of the first application, controlling the first application to be closed.
5. The method of claim 1, wherein the determining a current control policy for the first application based on the current context information, and controlling the first application to run at a backend of a terminal based on the current control policy further comprises:
setting the authority for forbidding the third-party application to read the notification information; wherein the third party application is an application other than the first application and a system application of the terminal; the notification type information is information which is sent to the first application by a server and is used for verifying a user of the first application;
and when the first application runs at the rear end of the terminal, prohibiting the third-party application from reading the notification type information according to the authority.
6. A terminal, characterized in that the terminal comprises a processor, a memory and a communication bus;
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is configured to execute a control program of an application stored in the memory to implement the steps of: when a first application runs at the front end of a terminal, acquiring current scene information of the first application; the first application is an application which comprises identification information in the terminal; the current scene information comprises current transaction information and/or current verification information;
determining a current control strategy aiming at the first application based on the current scene information, and controlling the first application to be closed or run at the back end of the terminal based on the current control strategy, wherein the current control strategy comprises the following steps: if the current scene information is the current transaction information and the current transaction is successful, controlling the first application to be closed; if the current scene information is the current verification information and a login/opening instruction for the first application is not received within a first preset time, controlling the first application to be closed; and if the current scene information is the current verification information, the first application is logged in, and an operation instruction for the first application is not received within a second preset time, controlling the first application to run at the rear end of the terminal.
7. The terminal according to claim 6, wherein before the first application is run at the front end of the terminal and the current context information of the first application is obtained, the processor is further configured to execute the control program of the application to implement the following steps:
extracting characteristic information from the historical scene information of the first application, and processing the characteristic information to obtain a behavior rule of a user using the first application;
and generating a control strategy corresponding to the historical scene information based on the behavior rule, and obtaining the corresponding relation between the historical scene information and the control strategy.
8. A computer-readable storage medium, characterized in that the computer-readable medium stores a control program of an application, which when executed by a processor implements the steps of the control method of an application according to any one of claims 1 to 5.
CN201710899497.9A 2017-09-28 2017-09-28 Application control method, terminal and computer readable storage medium Active CN107621977B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710899497.9A CN107621977B (en) 2017-09-28 2017-09-28 Application control method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710899497.9A CN107621977B (en) 2017-09-28 2017-09-28 Application control method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107621977A CN107621977A (en) 2018-01-23
CN107621977B true CN107621977B (en) 2021-06-18

Family

ID=61091099

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710899497.9A Active CN107621977B (en) 2017-09-28 2017-09-28 Application control method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107621977B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113627932B (en) * 2021-08-11 2024-02-27 中国银行股份有限公司 Method and device for controlling waiting time of terminal application account in network-free state

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727705A (en) * 2008-10-23 2010-06-09 中兴通讯股份有限公司 Method for closing and opening electronic payment application
CN104156223A (en) * 2013-05-13 2014-11-19 腾讯科技(深圳)有限公司 Application program control method and device for mobile terminal
CN104702785A (en) * 2015-03-09 2015-06-10 深圳市中兴移动通信有限公司 Method for enhancing individual account security of mobile terminal and mobile terminal therefor
CN104778587A (en) * 2015-03-18 2015-07-15 广东欧珀移动通信有限公司 Safety payment method and device
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal
CN106201600A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 Application program for mobile terminal progress control method and operating system
CN106295324A (en) * 2016-07-29 2017-01-04 宇龙计算机通信科技(深圳)有限公司 The control method of application program, control device and terminal
CN106503555A (en) * 2016-10-21 2017-03-15 维沃移动通信有限公司 A kind of method for ensureing safety of payment and mobile terminal
CN106506815A (en) * 2016-10-19 2017-03-15 北京奇虎科技有限公司 A kind of application enables method and relevant device
CN106572261A (en) * 2016-12-29 2017-04-19 宁波亿拍客网络科技有限公司 Method for quickly operating equipment in locked state
CN106612504A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Method and device for running terminal in trusted environment
CN106708558A (en) * 2016-10-31 2017-05-24 腾讯科技(深圳)有限公司 Method and device for closing application program
CN106778212A (en) * 2016-12-26 2017-05-31 努比亚技术有限公司 A kind of mobile terminal and control method
CN107102878A (en) * 2017-04-27 2017-08-29 努比亚技术有限公司 One kind application startup method, mobile terminal and computer-readable recording medium
CN107103468A (en) * 2017-06-28 2017-08-29 广东欧珀移动通信有限公司 Network risks detection method, mobile terminal and computer-readable recording medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9811721B2 (en) * 2014-08-15 2017-11-07 Apple Inc. Three-dimensional hand tracking using depth sequences
CN105988827B (en) * 2015-01-29 2019-07-05 阿里巴巴集团控股有限公司 A kind of method and device that application is freezed, thaws
CN105844470A (en) * 2016-03-31 2016-08-10 北京小米移动软件有限公司 Payment method and device

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727705A (en) * 2008-10-23 2010-06-09 中兴通讯股份有限公司 Method for closing and opening electronic payment application
CN104156223A (en) * 2013-05-13 2014-11-19 腾讯科技(深圳)有限公司 Application program control method and device for mobile terminal
CN104702785A (en) * 2015-03-09 2015-06-10 深圳市中兴移动通信有限公司 Method for enhancing individual account security of mobile terminal and mobile terminal therefor
CN104778587A (en) * 2015-03-18 2015-07-15 广东欧珀移动通信有限公司 Safety payment method and device
CN106612504A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Method and device for running terminal in trusted environment
CN105873028A (en) * 2016-03-28 2016-08-17 宇龙计算机通信科技(深圳)有限公司 Terminal control method, terminal control device, and terminal
CN106201600A (en) * 2016-06-30 2016-12-07 北京奇虎科技有限公司 Application program for mobile terminal progress control method and operating system
CN106295324A (en) * 2016-07-29 2017-01-04 宇龙计算机通信科技(深圳)有限公司 The control method of application program, control device and terminal
CN106506815A (en) * 2016-10-19 2017-03-15 北京奇虎科技有限公司 A kind of application enables method and relevant device
CN106503555A (en) * 2016-10-21 2017-03-15 维沃移动通信有限公司 A kind of method for ensureing safety of payment and mobile terminal
CN106708558A (en) * 2016-10-31 2017-05-24 腾讯科技(深圳)有限公司 Method and device for closing application program
CN106778212A (en) * 2016-12-26 2017-05-31 努比亚技术有限公司 A kind of mobile terminal and control method
CN106572261A (en) * 2016-12-29 2017-04-19 宁波亿拍客网络科技有限公司 Method for quickly operating equipment in locked state
CN107102878A (en) * 2017-04-27 2017-08-29 努比亚技术有限公司 One kind application startup method, mobile terminal and computer-readable recording medium
CN107103468A (en) * 2017-06-28 2017-08-29 广东欧珀移动通信有限公司 Network risks detection method, mobile terminal and computer-readable recording medium

Also Published As

Publication number Publication date
CN107621977A (en) 2018-01-23

Similar Documents

Publication Publication Date Title
CN106778175B (en) Interface locking method and device and terminal equipment
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN109086582B (en) Fingerprint authentication method, terminal and computer readable storage medium
CN110062106B (en) Calling method of application program, mobile terminal and storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN111125770A (en) Privacy protection method and electronic equipment
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN110213765A (en) APN information acquisition methods, terminal, server and storage medium
CN111427709B (en) Application program splitting control method, device and computer readable storage medium
CN107622213A (en) A kind of data access method, terminal and computer-readable recording medium
CN107330314A (en) Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic
CN108182582B (en) Payment method, terminal and computer readable storage medium
CN107621977B (en) Application control method, terminal and computer readable storage medium
CN109711195B (en) Control method and device for 3D icon display, mobile terminal and storage medium
CN108876387B (en) Payment verification method, payment verification equipment and computer-readable storage medium
CN107172076B (en) Security verification method, mobile terminal and server side
CN107330319B (en) Interaction control method, equipment and computer readable storage medium
CN109711850A (en) A kind of safe payment method, equipment and computer readable storage medium
CN110197370B (en) Two-dimensional code generation and payment method, terminal equipment and storage medium
CN109151175B (en) Mobile terminal safety control method, mobile terminal and computer storage medium
CN109299593B (en) Bracelet unlocking method, intelligent bracelet and readable storage medium
CN108446046B (en) Touch screen control method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant