[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106250724A - A kind of application control method, device and mobile device - Google Patents

A kind of application control method, device and mobile device Download PDF

Info

Publication number
CN106250724A
CN106250724A CN201610589202.3A CN201610589202A CN106250724A CN 106250724 A CN106250724 A CN 106250724A CN 201610589202 A CN201610589202 A CN 201610589202A CN 106250724 A CN106250724 A CN 106250724A
Authority
CN
China
Prior art keywords
user
application
specified application
case
rigorous model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610589202.3A
Other languages
Chinese (zh)
Inventor
申茂情
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Wireless Technology Co Ltd
Priority to CN201610589202.3A priority Critical patent/CN106250724A/en
Publication of CN106250724A publication Critical patent/CN106250724A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The application relates to a kind of application control method, device and mobile device.Wherein, application control method includes: in the case of specified application is triggered, and points out user's input validation information;Receive the checking information of user's input;The checking information received is verified;The startup of described specified application is controlled according to the result.The proof procedure that the embodiment of the present invention needs user to carry out complexity when specified application is triggered could really be opened, improve the user's vigilant degree when opening sensitive applications, effectively prevent sensitive applications unconsciously opened by user and opened in the case of user is unwitting by third-party application, thus improve the security performance of mobile device, decrease the economic loss of user, and effectively prevent the leakage of individual privacy information.

Description

A kind of application control method, device and mobile device
Technical field
The present invention relates to the communications field, particularly relate to a kind of application control method, device and mobile device.
Background technology
Currently, Intelligent mobile equipment has been used widely, such as smart mobile phone, panel computer etc..These Intelligent slidings Dynamic equipment the most all carries Internet enabled so that people can be set by intelligent mobile in the environment of any accessible network For surfing the Net easily.
Bring many convenient while, Intelligent mobile equipment brings some and asks also to some user groups Topic.Such as, usual the old men do not use function of surfing the Net, but they the most unconsciously open due to false touch or some other reason Flow switch, 4G switch, short message sending read the options such as authority, add the dangerous software of some third parties and can not know user Stealthily opening sensitive function in the case of feelings, therefore these users not surfed the Net are often by some direct or indirect economy Loss, and suffer privacy leakage.
Although current Intelligent mobile equipment also can provide secure alarm, but these secure alarms are all with prompting frame Mode or the mode repeatedly reminded to alert user because friendly problem, tend to be ignored content by user and Click directly on and determine.Additionally, current Intelligent mobile equipment cannot stop automatic script, use and roll and the mode of click, even if It not user's manual operation, can automatically ignore alert box yet.
Visible, current Intelligent mobile equipment, for there is the problem that safety is low from the point of view of some user groups, is easily given These users cause economic loss, and make them face the risk of privacy leakage.
Summary of the invention
It is an object of the invention to provide a kind of application control method, device and mobile device, improve mobile device Security performance, reduce user economic loss, prevent privacy leakage.
For achieving the above object, the present invention proposes a kind of application control method, including:
In the case of specified application is triggered, point out user's input validation information;
Receive the checking information of user's input;
The checking information received is verified;
The startup of described specified application is controlled according to the result.
Further, said method also can have the characteristics that, described according to the result control described appointment application journey The startup of sequence, including:
In the case of the checking information received is correct, it is allowed to described specified application starts.
Further, said method also can have the characteristics that, described according to the result control described appointment application journey The startup of sequence, including:
In the case of the checking information errors received, forbid that described specified application starts.
Further, said method also can have the characteristics that, described prompting user's input validation information, including:
Judging whether current rigorous model is opened, described rigorous model refers to the mould starting needs checking of specified application Formula;
In the case of current rigorous model is opened, point out user's input validation information.
Further, said method also can have the characteristics that, also includes:
Arranging rigorous model by authentication mode to be turned on and off, described rigorous model refers to opening of specified application The dynamic pattern needing checking.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
For achieving the above object, the invention allows for a kind of application program controlling device, including:
Reminding module, in the case of specified application is triggered, points out user's input validation information;
Receiver module, for receiving the checking information of user's input;
Authentication module, verifies for the checking information receiving described receiver module;
Control module, controls the startup of described specified application for the result according to described authentication module.
Further, said apparatus also can have the characteristics that, described control module includes:
Allow unit, in the case of the checking information received is correct, it is allowed to described specified application starts.
Further, said apparatus also can have the characteristics that, described control module includes:
Forbid unit, in the case of the checking information errors received, forbid that described specified application starts.
Further, said apparatus also can have the characteristics that, described reminding module includes:
Judging unit, is used for judging whether current rigorous model is opened, described rigorous model refers to opening of specified application The dynamic pattern needing checking;
Tip element, in the case of judging that current rigorous model is opened at described judging unit, prompting user is defeated Enter checking information.
Further, said apparatus also can have the characteristics that, also includes:
Arranging module, be turned on and off for arranging rigorous model by authentication mode, described rigorous model refers to That determines application program starts the pattern needing checking.
The application program controlling device of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
For achieving the above object, the invention allows for a kind of mobile device, including the application journey described in aforementioned any one Sequence controls device.
Further, above-mentioned mobile device also can have the characteristics that, described mobile device is smart mobile phone or flat board electricity Brain.
The mobile device of the embodiment of the present invention includes application program controlling device, needs when specified application is triggered The proof procedure wanting user to carry out complexity could really be opened, and improves the user's vigilant journey when opening sensitive applications Degree, effectively prevent sensitive applications and is unconsciously opened and by third-party application in the case of user is unwitting by user Open, thus improve the security performance of mobile device, decrease the economic loss of user, and effectively prevent individual privacy letter The leakage of breath.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by embodiment required use attached Figure is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to obtain the attached of other according to these accompanying drawings Figure.
Fig. 1 is the flow chart of application control method in the embodiment of the present invention one.
Fig. 2 is the flow chart of application control method in the embodiment of the present invention two.
Fig. 3 is the flow chart of application control method in the embodiment of the present invention three.
Fig. 4 is the flow chart of application control method in the embodiment of the present invention four.
Fig. 5 is the structured flowchart of application program controlling device in the embodiment of the present invention.
Fig. 6 is the structured flowchart of mobile device in the embodiment of the present invention.
A kind of structural representation of the mobile device 600 that Fig. 7 is provided by the embodiment of the present invention.
Detailed description of the invention
Being described principle and the feature of the present invention below in conjunction with accompanying drawing, illustrated embodiment is served only for explaining the present invention, It is not intended to limit the scope of the present invention.For those of ordinary skill in the art, in the premise not paying creative work Under, all embodiments obtained according to present invention spirit, broadly fall into protection scope of the present invention.
Embodiment one
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 1 is the flow chart of application control method in the embodiment of the present invention one.As it is shown in figure 1, in the present embodiment, should May include steps of with control method:
Step S101, in the case of specified application is triggered, points out user's input validation information;
Here specified application refers to the application program of sensitive function, such as turn-on flow rate switch, 4G switch, Short message sending reads authority, contact person reads authority etc..
In actual applications, the application of the embodiment of the present invention can be implanted at the interface of the application program relating to sensitive function The program of control method, so, when these sensitive functions opened by needs, application program control according to embodiments of the present invention Method processed, it is necessary to user is verified by input validation information, is only verified, just allows to open these sensitive merits Can, if checking not over, forbid opening these sensitive functions.
Step S102, receives the checking information of user's input;
In actual applications, the checking information of different complexity can be set according to the sensitivity of application program, sensitive Degree is the highest, and corresponding checking information is the most complicated, so that user more payes attention to.
Such as, for sensitivity than relatively low application program, a relatively simple checking information can be set, and Can only verify once.And for the higher application program of sensitivity, relative complex several checking information can be set, And may require that checking repeatedly.
Step S103, verifies the checking information received;
The checking information received namely the checking information of user's input.
Step S104, controls the startup of specified application according to the result.
The result has two kinds of possibilities, and the checking information that a kind of user of being inputs is correct, then be verified, and another kind is The checking information errors of user's input, checking is not passed through.Only being verified, just allowing to start specified application, if tested Demonstrate,prove not over, No starting specified application.
By the embodiment of the present invention it can be seen that user is touching sensitivity function (the application journey that these functions relate to Sequence is arranged to specified application) time, it is necessary to could really be opened by the complex operations of prompting.This can promote user couple Function to be opened contemplates, it is impossible to ignore the warning of prompting easily, so that user is opening these sensitive functions Enhance your vigilance during the application program related to, really open for the wish of oneself or remain turned-off these application programs.
For the operation of automatic script (referring to some third-party application), owing to these automatic scripts cannot complete the present invention in fact Execute the verification step in example, therefore prevent automatic script to open the application program relating to sensitive function voluntarily.
By above measure, the embodiment of the present invention greatly reduces sensitive function by unconscious (the such as user's false touch of user Switch) probability, but also avoid sensitive function and opened voluntarily by third party application such that it is able to improve mobile The security performance of equipment, reduces the economic loss of user, and effectively prevents the leakage of individual privacy information.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
Embodiment two
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 2 is the flow chart of application control method in the embodiment of the present invention two.As in figure 2 it is shown, in the present embodiment, should May include steps of with control method:
Step S201, in the case of specified application is triggered, points out user's input validation information;
Step S202, receives the checking information of user's input;
Step S203, verifies the checking information received;
Step S204, it is judged that the checking information received is the most correct, if checking information is correct, explanation is verified, Then perform step S205, if checking information errors, illustrate that checking is not passed through, perform step S206;
Step S205, it is allowed to specified application starts, terminates;
When user have input correct checking information, on the one hand can illustrate that the identity of user is legal, on the other hand exist Largely user the most clearly will open is what application program in explanation, and open this application program and be in order at use The actual wishes at family.Therefore, in such a case, it is possible to allow specified application to start.
Step S206, forbids that specified application starts, and terminates.
When the checking information errors of user's input, illustrate that the identity of user may be illegal, in this case, forbid Specified application starts, and to avoid user to open specified application startup because of false touch unconsciously, prevents user from meeting with By economic loss and the risk of privacy leakage.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
Embodiment three
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 3 is the flow chart of application control method in the embodiment of the present invention three.As it is shown on figure 3, in the present embodiment, should May include steps of with control method:
Step S301, it is intended that application program is triggered;
Step S302, it is judged that whether current rigorous model is opened, and wherein, rigorous model refers to the startup of specified application Need the pattern of checking, if rigorous model is opened, perform step S303, otherwise terminate;
Herein, the pattern of checking is needed to be referred to as rigorous model starting of specified application.
In actual applications, the switch of rigorous model can be set in a mobile device, in the situation that rigorous model is opened Under, opening specified application needs to verify, in the case of rigorous model is closed, opens specified application and need not Verify, the now application of mobile device and mobile device are not provided with the application control method of the embodiment of the present invention Program the same, be not affected.
Such setting is different to Intelligent mobile equipment specific requirement in use based on different user colony. For old people user, they are owing to need not use sensitive function or not knowing that how to operate without opening sensitivity Function, to prevent them from being revealed by economic loss or privacy due to the unlatching of sensitive function.And for other customer group For body, such as working clan, they need to use the sensitive functions such as such as online continually, and know that these are quick with will also recognize that Which sense function can bring affect, and how by arranging the personal information of corresponding authority protection oneself and reducing campus network Deng.These users need to open quickly sensitive function, and the process increasing user's checking seems for these users on the contrary The most convenient.
The user of mobile device can select to open rigorous model according to self needs, improve the safety of mobile device Can, or select to close rigorous model, to simplify the unlatching operation of relevant application program.So take into full account different user group The different demands of body, make different user colony can experience good experience.
Step S303, points out user's input validation information;
Step S304, receives the checking information of user's input;
Step S305, verifies the checking information received;
Step S306, controls the startup of specified application according to the result, terminates.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.Further, The application control method of the embodiment of the present invention, by arranging the switch of rigorous model, can protective seletion rigorous model While the user opened avoids suffering economic loss and privacy leakage, the user also making selection rigorous model close remains able to Experience and operate easily, thus meet the different needs of different user colony, improve the use body of different user colony Test.
Embodiment four
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 4 is the flow chart of application control method in the embodiment of the present invention four.As shown in Figure 4, in the present embodiment, should May include steps of with control method:
Step S401, arranges rigorous model by authentication mode and opens, and wherein, rigorous model refers to specified application Start need checking pattern;
Although arranging the switch of rigorous model in a mobile device, make mobile device user can according to self need choosing Select and be turned on and off rigorous model and solve different user colony difference in terms of the application program unlatching relating to sensitive function Demand, but, iff by need not being simply provided and being just turned on and off rigorous model of checking, arise that needs The user that rigorous model is opened does not has, because imprudence closes rigorous model, the effect of being effectively protected.Therefore, it is necessary to In the case of family is very clear and definite, being turned on and off of rigorous model could be set.
By authentication mode arrange rigorous model open can make user have enough understanding in the case of, selection Unlatching arranges rigorous model, so that rigorous model is really opened in the case of user needs, in order to suitable user Play a protective role.
Wherein, the concrete mode of authentication mode can use any feasible verification mode.
Step S402, in the case of specified application is triggered, points out user's input validation information;
Step S403, receives the checking information of user's input;
Step S404, verifies the checking information received;
Step S405, controls the startup of specified application according to the result.
In other embodiments of the present invention, the flow process of application control method can also comprise the steps: to pass through body Part verification mode arranges rigorous model and closes.After rigorous model is set off, when sensitive application program is triggered Directly initiate, without again through the control process of step S402 to step S405.
The step being arranged rigorous model closedown by authentication mode can be performed after step S405, it is also possible to Perform before step S402.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.Further, The application control method of the embodiment of the present invention, arranges being turned on and off of rigorous model by authentication mode, it is ensured that User consciousness enough clearly in the case of select being turned on and off of rigorous model, prevent rigorous model from arbitrarily being closed and to User causes damage, thus further increases the security performance of mobile device.
In order to realize each step and method in aforementioned applications control method embodiment, the embodiment of the present invention additionally provides Application program controlling device embodiment.
Fig. 5 is the structured flowchart of application program controlling device in the embodiment of the present invention.As it is shown in figure 5, in the present embodiment, should Reminding module 510, receiver module 520, authentication module 530 and control module 540 can be included with presetting apparatus 500.Carry Show that module 510, receiver module 520, authentication module 530 and control module 540 can be sequentially connected.
Wherein, reminding module 510 is in the case of specified application is triggered, and prompting user's input validation is believed Breath.Receiver module 520 is for receiving the checking information of user's input.Authentication module 530 is for receiving receiver module 520 Checking information is verified.Control module 540 controls opening of specified application for the result according to authentication module 530 Dynamic.
In embodiments of the present invention, control module 540 can include allowing unit.Allow unit for testing of receiving In the case of card information is correct, it is allowed to specified application starts.
In embodiments of the present invention, control module 540 can include forbidding unit.Forbid that unit is for testing of receiving In the case of card information errors, forbid that specified application starts.
In embodiments of the present invention, reminding module 510 can include judging unit and Tip element.Judging unit is used for sentencing Whether disconnected current rigorous model is opened, and wherein, rigorous model refers to the pattern starting needs checking of specified application.Prompting is single User's input validation information, in the case of judging that current rigorous model is opened at judging unit, is pointed out by unit.
In embodiments of the present invention, application program controlling device 500 can also include arranging module.Module is set for leading to Crossing authentication mode to arrange rigorous model and be turned on and off, described rigorous model refers to that the startup of specified application needs checking Pattern.
Owing to the application program controlling device in the present embodiment is able to carry out the application described in present invention Control method, the part that the present embodiment does not describes in detail, refer to application program controlling in present invention The related description of embodiment of the method.
The application program controlling device of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
The embodiment of the present invention also proposed a kind of mobile device.
Fig. 6 is the structured flowchart of mobile device in the embodiment of the present invention.As shown in Figure 6, in the embodiment of the present invention, move and set Standby 600 can include application program controlling device 500.Wherein, application program controlling device 500 can be the aforementioned enforcement of the present invention Any one application program controlling device in example.
Wherein, mobile device can be mobile phone, panel computer etc..
Refer to Fig. 7, a kind of structural representation of its mobile device 600 provided by the embodiment of the present invention.Such as Fig. 7 institute Showing, mobile device 600 can include following one or more assembly: processes assembly 602, memorizer 604, and power supply module 606 is many Media component 608, audio-frequency assembly 610, the interface 612 of input/output (I/O), sensor cluster 614, and communications component 616。
Processing assembly 602 and generally control the integrated operation of mobile device 600, such as with display, call, data are led to The operation that letter, camera operation and record operation are associated.Process assembly 602 and can include that one or more processor 620 is held Row instruction, to complete all or part of step of aforesaid application control method, specifically includes: at specified application quilt In the case of triggering, point out user's input validation information;Receive the checking information of user's input;The checking information received is entered Row checking;The startup of described specified application is controlled according to the result.Additionally, process assembly 602 can include one or Multiple modules, it is simple to process between assembly 602 and other assemblies is mutual.Such as, process assembly 602 and can include multimedia mould Block, with facilitate multimedia groupware 608 and process between assembly 602 mutual.
Memorizer 604 is configured to store various types of data to support the operation in mobile device 600.These data Example include any application program for operating on the mobile device 600 or the instruction of method, contact data, telephone directory Data, message, picture, video etc..Memorizer 604 can by any kind of volatibility or non-volatile memory device or it Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable Except programmable read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, soon Flash memory, disk or CD.
The various assemblies that power supply module 606 is mobile device 600 provide electric power.Power supply module 606 can include power supply pipe Reason system, one or more power supplys, and other generate, manage and distribute, with for mobile device 600, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 608 is included between described mobile device 600 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch Sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or slide The border of action, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, Multimedia groupware 608 includes a front-facing camera and/or post-positioned pick-up head.When mobile device 600 is in operator scheme, as clapped When taking the photograph pattern or video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each preposition Photographic head and post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 610 is configured to output and/or input audio signal.Such as, audio-frequency assembly 610 includes a Mike Wind (MIC), when mobile device 600 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike It is configured to receive external audio signal.The audio signal received can be further stored at memorizer 604 or via logical Letter assembly 616 sends.In certain embodiments, audio-frequency assembly 610 also includes a speaker, is used for exporting audio signal.
I/O interface 612 provides interface for processing between assembly 602 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock Set button.
Sensor cluster 614 includes one or more sensor, for providing the state of various aspects for mobile device 600 Assessment.Such as, what sensor cluster 614 can detect mobile device 600 opens/closed mode, the relative localization of assembly, example Such as display that described assembly is mobile device 600 and keypad, sensor cluster 614 can also detect mobile device 600 or The position change of 600 1 assemblies of mobile device, the presence or absence that user contacts with mobile device 600, mobile device 600 Orientation or acceleration/deceleration and the variations in temperature of mobile device 600.Sensor cluster 614 can include proximity transducer, is configured It is used for when there is no any physical contact object near detecting.Sensor cluster 614 can also include optical sensor, Such as CMOS or ccd image sensor, it is used for using in imaging applications.In certain embodiments, this sensor cluster 614 also may be used To include acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 616 is configured to facilitate the communication of wired or wireless mode between mobile device 600 and other equipment. Mobile device 600 can access wireless network based on communication standard, such as WiFi, 2G, 3G or 4G or combinations thereof.At one In exemplary embodiment, communications component 616 receives the broadcast singal or wide from external broadcasting management system via broadcast channel Broadcast relevant information.In one exemplary embodiment, described communications component 616 also includes near-field communication (NFC) module, to promote Junction service.Such as, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, mobile device 600 can be by one or more application specific integrated circuits (ASIC), number Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
The mobile device of the embodiment of the present invention, including application program controlling device, needs when specified application is triggered The proof procedure wanting user to carry out complexity could really be opened, and improves the user's vigilant journey when opening sensitive applications Degree, effectively prevent sensitive applications and is unconsciously opened and by third-party application in the case of user is unwitting by user Open, thus improve the security performance of mobile device, decrease the economic loss of user, and effectively prevent individual privacy letter The leakage of breath.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the system of foregoing description, The specific works process of device and module, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method are permissible Realize by another way.Such as, device embodiment described above is only schematically, such as, and described module Dividing, be only a kind of logic function and divide, actual can have other dividing mode, such as, multiple modules or group when realizing Part can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown Or the coupling each other discussed or direct-coupling or communication connection can be indirect by some interfaces, device or module Coupling or communication connection, can be electrical, machinery or other form.
The described module illustrated as separating component can be or may not be physically separate, shows as module The parts shown can be or may not be physical module, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of module therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional module in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that modules is individually physically present, it is also possible to two or more modules are integrated in a unit.Above-mentioned integrated list Unit both can realize to use the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit and realizes.
The above-mentioned integrated unit realized with the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions with so that a computer Device (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the present invention each The part steps of method described in embodiment.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (Read- OnlyMemory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various can To store the medium of program code.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (12)

1. an application control method, it is characterised in that including:
In the case of specified application is triggered, point out user's input validation information;
Receive the checking information of user's input;
The checking information received is verified;
The startup of described specified application is controlled according to the result.
Application control method the most according to claim 1, it is characterised in that described according to the result control The startup of specified application, including:
In the case of the checking information received is correct, it is allowed to described specified application starts.
Application control method the most according to claim 1, it is characterised in that described according to the result control The startup of specified application, including:
In the case of the checking information errors received, forbid that described specified application starts.
Application control method the most according to claim 1, it is characterised in that described prompting user's input validation is believed Breath, including:
Judging whether current rigorous model is opened, described rigorous model refers to the pattern starting needs checking of specified application;
In the case of current rigorous model is opened, point out user's input validation information.
Application control method the most according to claim 1, it is characterised in that also include:
Arranging rigorous model by authentication mode to be turned on and off, described rigorous model refers to that the startup of specified application needs Pattern to be verified.
6. an application program controlling device, it is characterised in that including:
Reminding module, in the case of specified application is triggered, points out user's input validation information;
Receiver module, for receiving the checking information of user's input;
Authentication module, verifies for the checking information receiving described receiver module;
Control module, controls the startup of described specified application for the result according to described authentication module.
Application program controlling device the most according to claim 6, it is characterised in that described control module includes:
Allow unit, in the case of the checking information received is correct, it is allowed to described specified application starts.
Application program controlling device the most according to claim 6, it is characterised in that described control module includes:
Forbid unit, in the case of the checking information errors received, forbid that described specified application starts.
Application program controlling device the most according to claim 6, it is characterised in that described reminding module includes:
Judging unit, is used for judging whether current rigorous model is opened, and described rigorous model refers to that the startup of specified application needs Pattern to be verified;
Tip element, in the case of judging that current rigorous model is opened at described judging unit, prompting user's input is tested Card information.
Application program controlling device the most according to claim 6, it is characterised in that also include:
Arranging module, be turned on and off for arranging rigorous model by authentication mode, described rigorous model is specified should The pattern of checking is needed with starting of program.
11. 1 kinds of mobile devices, it is characterised in that include the application program controlling device described in any one of claim 6 to 10.
12. mobile devices according to claim 11, it is characterised in that described mobile device is mobile phone or panel computer.
CN201610589202.3A 2016-07-25 2016-07-25 A kind of application control method, device and mobile device Pending CN106250724A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610589202.3A CN106250724A (en) 2016-07-25 2016-07-25 A kind of application control method, device and mobile device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610589202.3A CN106250724A (en) 2016-07-25 2016-07-25 A kind of application control method, device and mobile device

Publications (1)

Publication Number Publication Date
CN106250724A true CN106250724A (en) 2016-12-21

Family

ID=57604520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610589202.3A Pending CN106250724A (en) 2016-07-25 2016-07-25 A kind of application control method, device and mobile device

Country Status (1)

Country Link
CN (1) CN106250724A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991307A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Using time slot scrambling and device
CN107169337A (en) * 2017-06-27 2017-09-15 上海传英信息技术有限公司 management method, device and terminal
CN110716679A (en) * 2019-10-08 2020-01-21 珠海格力电器股份有限公司 Application management method, storage medium and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN104200170A (en) * 2014-04-15 2014-12-10 中兴通讯股份有限公司 Privacy protection method of electronic equipment and electronic equipment
CN104268454A (en) * 2014-09-28 2015-01-07 酷派软件技术(深圳)有限公司 Management method and device of application program of terminal
CN104520866A (en) * 2014-03-31 2015-04-15 华为技术有限公司 Privacy protection method and terminal equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103377332A (en) * 2012-04-26 2013-10-30 腾讯科技(深圳)有限公司 Application program accessing method and device
CN104520866A (en) * 2014-03-31 2015-04-15 华为技术有限公司 Privacy protection method and terminal equipment
CN104200170A (en) * 2014-04-15 2014-12-10 中兴通讯股份有限公司 Privacy protection method of electronic equipment and electronic equipment
CN104268454A (en) * 2014-09-28 2015-01-07 酷派软件技术(深圳)有限公司 Management method and device of application program of terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991307A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Using time slot scrambling and device
CN107169337A (en) * 2017-06-27 2017-09-15 上海传英信息技术有限公司 management method, device and terminal
CN110716679A (en) * 2019-10-08 2020-01-21 珠海格力电器股份有限公司 Application management method, storage medium and electronic device

Similar Documents

Publication Publication Date Title
US10129044B2 (en) Method and apparatus for controlling smart device
CN104765552B (en) Right management method and device
CN105354489B (en) Permission giving method and device
CN105491229B (en) The method and apparatus of remote control mobile terminal
CN104216742B (en) Brush machine control method and device based on password
CN110400405B (en) Method, device and medium for controlling access control
CN105550568B (en) The method and device of mobile terminal data protection
CN106095220B (en) Notification message reminding method and device
CN105677214A (en) Application management method and apparatus
CN105678133A (en) Terminal unlocking method and device
EP3226128B1 (en) Method and device for online payment
CN106446653A (en) Application authority management method and device and electronic equipment
CN106471513B (en) Authority control method and device
CN106250724A (en) A kind of application control method, device and mobile device
CN106462698A (en) Authority control method and authority control device
CN106611112A (en) Application program safe processing method, device and equipment
CN106570381B (en) Fingerprint unlocking method and device
CN106462696A (en) Authority controlling method and device
CN105808995A (en) Password prompting method and device and terminal
CN106201738A (en) System broadcasts call method and device
CN105955635A (en) Interface display method and device
CN104243476A (en) Account protection method and device
CN105554297A (en) Information reminding method and apparatus and terminal
CN106714173A (en) Reminding method and device for network security
WO2021164314A1 (en) Notification prompting method, server, and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161221