CN106250724A - A kind of application control method, device and mobile device - Google Patents
A kind of application control method, device and mobile device Download PDFInfo
- Publication number
- CN106250724A CN106250724A CN201610589202.3A CN201610589202A CN106250724A CN 106250724 A CN106250724 A CN 106250724A CN 201610589202 A CN201610589202 A CN 201610589202A CN 106250724 A CN106250724 A CN 106250724A
- Authority
- CN
- China
- Prior art keywords
- user
- application
- specified application
- case
- rigorous model
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 230000001960 triggered effect Effects 0.000 claims abstract description 21
- 238000010200 validation analysis Methods 0.000 claims abstract description 17
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims description 10
- 230000007423 decrease Effects 0.000 abstract description 10
- ZRHANBBTXQZFSP-UHFFFAOYSA-M potassium;4-amino-3,5,6-trichloropyridine-2-carboxylate Chemical compound [K+].NC1=C(Cl)C(Cl)=NC(C([O-])=O)=C1Cl ZRHANBBTXQZFSP-UHFFFAOYSA-M 0.000 abstract description 10
- 230000006870 function Effects 0.000 description 21
- 230000008569 process Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 6
- 230000035945 sensitivity Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000013515 script Methods 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000000712 assembly Effects 0.000 description 3
- 238000000429 assembly Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001681 protective effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 208000003443 Unconsciousness Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 239000012092 media component Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1015—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
Abstract
The application relates to a kind of application control method, device and mobile device.Wherein, application control method includes: in the case of specified application is triggered, and points out user's input validation information;Receive the checking information of user's input;The checking information received is verified;The startup of described specified application is controlled according to the result.The proof procedure that the embodiment of the present invention needs user to carry out complexity when specified application is triggered could really be opened, improve the user's vigilant degree when opening sensitive applications, effectively prevent sensitive applications unconsciously opened by user and opened in the case of user is unwitting by third-party application, thus improve the security performance of mobile device, decrease the economic loss of user, and effectively prevent the leakage of individual privacy information.
Description
Technical field
The present invention relates to the communications field, particularly relate to a kind of application control method, device and mobile device.
Background technology
Currently, Intelligent mobile equipment has been used widely, such as smart mobile phone, panel computer etc..These Intelligent slidings
Dynamic equipment the most all carries Internet enabled so that people can be set by intelligent mobile in the environment of any accessible network
For surfing the Net easily.
Bring many convenient while, Intelligent mobile equipment brings some and asks also to some user groups
Topic.Such as, usual the old men do not use function of surfing the Net, but they the most unconsciously open due to false touch or some other reason
Flow switch, 4G switch, short message sending read the options such as authority, add the dangerous software of some third parties and can not know user
Stealthily opening sensitive function in the case of feelings, therefore these users not surfed the Net are often by some direct or indirect economy
Loss, and suffer privacy leakage.
Although current Intelligent mobile equipment also can provide secure alarm, but these secure alarms are all with prompting frame
Mode or the mode repeatedly reminded to alert user because friendly problem, tend to be ignored content by user and
Click directly on and determine.Additionally, current Intelligent mobile equipment cannot stop automatic script, use and roll and the mode of click, even if
It not user's manual operation, can automatically ignore alert box yet.
Visible, current Intelligent mobile equipment, for there is the problem that safety is low from the point of view of some user groups, is easily given
These users cause economic loss, and make them face the risk of privacy leakage.
Summary of the invention
It is an object of the invention to provide a kind of application control method, device and mobile device, improve mobile device
Security performance, reduce user economic loss, prevent privacy leakage.
For achieving the above object, the present invention proposes a kind of application control method, including:
In the case of specified application is triggered, point out user's input validation information;
Receive the checking information of user's input;
The checking information received is verified;
The startup of described specified application is controlled according to the result.
Further, said method also can have the characteristics that, described according to the result control described appointment application journey
The startup of sequence, including:
In the case of the checking information received is correct, it is allowed to described specified application starts.
Further, said method also can have the characteristics that, described according to the result control described appointment application journey
The startup of sequence, including:
In the case of the checking information errors received, forbid that described specified application starts.
Further, said method also can have the characteristics that, described prompting user's input validation information, including:
Judging whether current rigorous model is opened, described rigorous model refers to the mould starting needs checking of specified application
Formula;
In the case of current rigorous model is opened, point out user's input validation information.
Further, said method also can have the characteristics that, also includes:
Arranging rigorous model by authentication mode to be turned on and off, described rigorous model refers to opening of specified application
The dynamic pattern needing checking.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered
Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick
Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves
The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
For achieving the above object, the invention allows for a kind of application program controlling device, including:
Reminding module, in the case of specified application is triggered, points out user's input validation information;
Receiver module, for receiving the checking information of user's input;
Authentication module, verifies for the checking information receiving described receiver module;
Control module, controls the startup of described specified application for the result according to described authentication module.
Further, said apparatus also can have the characteristics that, described control module includes:
Allow unit, in the case of the checking information received is correct, it is allowed to described specified application starts.
Further, said apparatus also can have the characteristics that, described control module includes:
Forbid unit, in the case of the checking information errors received, forbid that described specified application starts.
Further, said apparatus also can have the characteristics that, described reminding module includes:
Judging unit, is used for judging whether current rigorous model is opened, described rigorous model refers to opening of specified application
The dynamic pattern needing checking;
Tip element, in the case of judging that current rigorous model is opened at described judging unit, prompting user is defeated
Enter checking information.
Further, said apparatus also can have the characteristics that, also includes:
Arranging module, be turned on and off for arranging rigorous model by authentication mode, described rigorous model refers to
That determines application program starts the pattern needing checking.
The application program controlling device of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered
Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick
Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves
The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
For achieving the above object, the invention allows for a kind of mobile device, including the application journey described in aforementioned any one
Sequence controls device.
Further, above-mentioned mobile device also can have the characteristics that, described mobile device is smart mobile phone or flat board electricity
Brain.
The mobile device of the embodiment of the present invention includes application program controlling device, needs when specified application is triggered
The proof procedure wanting user to carry out complexity could really be opened, and improves the user's vigilant journey when opening sensitive applications
Degree, effectively prevent sensitive applications and is unconsciously opened and by third-party application in the case of user is unwitting by user
Open, thus improve the security performance of mobile device, decrease the economic loss of user, and effectively prevent individual privacy letter
The leakage of breath.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by embodiment required use attached
Figure is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area
From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to obtain the attached of other according to these accompanying drawings
Figure.
Fig. 1 is the flow chart of application control method in the embodiment of the present invention one.
Fig. 2 is the flow chart of application control method in the embodiment of the present invention two.
Fig. 3 is the flow chart of application control method in the embodiment of the present invention three.
Fig. 4 is the flow chart of application control method in the embodiment of the present invention four.
Fig. 5 is the structured flowchart of application program controlling device in the embodiment of the present invention.
Fig. 6 is the structured flowchart of mobile device in the embodiment of the present invention.
A kind of structural representation of the mobile device 600 that Fig. 7 is provided by the embodiment of the present invention.
Detailed description of the invention
Being described principle and the feature of the present invention below in conjunction with accompanying drawing, illustrated embodiment is served only for explaining the present invention,
It is not intended to limit the scope of the present invention.For those of ordinary skill in the art, in the premise not paying creative work
Under, all embodiments obtained according to present invention spirit, broadly fall into protection scope of the present invention.
Embodiment one
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 1 is the flow chart of application control method in the embodiment of the present invention one.As it is shown in figure 1, in the present embodiment, should
May include steps of with control method:
Step S101, in the case of specified application is triggered, points out user's input validation information;
Here specified application refers to the application program of sensitive function, such as turn-on flow rate switch, 4G switch,
Short message sending reads authority, contact person reads authority etc..
In actual applications, the application of the embodiment of the present invention can be implanted at the interface of the application program relating to sensitive function
The program of control method, so, when these sensitive functions opened by needs, application program control according to embodiments of the present invention
Method processed, it is necessary to user is verified by input validation information, is only verified, just allows to open these sensitive merits
Can, if checking not over, forbid opening these sensitive functions.
Step S102, receives the checking information of user's input;
In actual applications, the checking information of different complexity can be set according to the sensitivity of application program, sensitive
Degree is the highest, and corresponding checking information is the most complicated, so that user more payes attention to.
Such as, for sensitivity than relatively low application program, a relatively simple checking information can be set, and
Can only verify once.And for the higher application program of sensitivity, relative complex several checking information can be set,
And may require that checking repeatedly.
Step S103, verifies the checking information received;
The checking information received namely the checking information of user's input.
Step S104, controls the startup of specified application according to the result.
The result has two kinds of possibilities, and the checking information that a kind of user of being inputs is correct, then be verified, and another kind is
The checking information errors of user's input, checking is not passed through.Only being verified, just allowing to start specified application, if tested
Demonstrate,prove not over, No starting specified application.
By the embodiment of the present invention it can be seen that user is touching sensitivity function (the application journey that these functions relate to
Sequence is arranged to specified application) time, it is necessary to could really be opened by the complex operations of prompting.This can promote user couple
Function to be opened contemplates, it is impossible to ignore the warning of prompting easily, so that user is opening these sensitive functions
Enhance your vigilance during the application program related to, really open for the wish of oneself or remain turned-off these application programs.
For the operation of automatic script (referring to some third-party application), owing to these automatic scripts cannot complete the present invention in fact
Execute the verification step in example, therefore prevent automatic script to open the application program relating to sensitive function voluntarily.
By above measure, the embodiment of the present invention greatly reduces sensitive function by unconscious (the such as user's false touch of user
Switch) probability, but also avoid sensitive function and opened voluntarily by third party application such that it is able to improve mobile
The security performance of equipment, reduces the economic loss of user, and effectively prevents the leakage of individual privacy information.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered
Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick
Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves
The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
Embodiment two
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 2 is the flow chart of application control method in the embodiment of the present invention two.As in figure 2 it is shown, in the present embodiment, should
May include steps of with control method:
Step S201, in the case of specified application is triggered, points out user's input validation information;
Step S202, receives the checking information of user's input;
Step S203, verifies the checking information received;
Step S204, it is judged that the checking information received is the most correct, if checking information is correct, explanation is verified,
Then perform step S205, if checking information errors, illustrate that checking is not passed through, perform step S206;
Step S205, it is allowed to specified application starts, terminates;
When user have input correct checking information, on the one hand can illustrate that the identity of user is legal, on the other hand exist
Largely user the most clearly will open is what application program in explanation, and open this application program and be in order at use
The actual wishes at family.Therefore, in such a case, it is possible to allow specified application to start.
Step S206, forbids that specified application starts, and terminates.
When the checking information errors of user's input, illustrate that the identity of user may be illegal, in this case, forbid
Specified application starts, and to avoid user to open specified application startup because of false touch unconsciously, prevents user from meeting with
By economic loss and the risk of privacy leakage.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered
Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick
Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves
The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
Embodiment three
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 3 is the flow chart of application control method in the embodiment of the present invention three.As it is shown on figure 3, in the present embodiment, should
May include steps of with control method:
Step S301, it is intended that application program is triggered;
Step S302, it is judged that whether current rigorous model is opened, and wherein, rigorous model refers to the startup of specified application
Need the pattern of checking, if rigorous model is opened, perform step S303, otherwise terminate;
Herein, the pattern of checking is needed to be referred to as rigorous model starting of specified application.
In actual applications, the switch of rigorous model can be set in a mobile device, in the situation that rigorous model is opened
Under, opening specified application needs to verify, in the case of rigorous model is closed, opens specified application and need not
Verify, the now application of mobile device and mobile device are not provided with the application control method of the embodiment of the present invention
Program the same, be not affected.
Such setting is different to Intelligent mobile equipment specific requirement in use based on different user colony.
For old people user, they are owing to need not use sensitive function or not knowing that how to operate without opening sensitivity
Function, to prevent them from being revealed by economic loss or privacy due to the unlatching of sensitive function.And for other customer group
For body, such as working clan, they need to use the sensitive functions such as such as online continually, and know that these are quick with will also recognize that
Which sense function can bring affect, and how by arranging the personal information of corresponding authority protection oneself and reducing campus network
Deng.These users need to open quickly sensitive function, and the process increasing user's checking seems for these users on the contrary
The most convenient.
The user of mobile device can select to open rigorous model according to self needs, improve the safety of mobile device
Can, or select to close rigorous model, to simplify the unlatching operation of relevant application program.So take into full account different user group
The different demands of body, make different user colony can experience good experience.
Step S303, points out user's input validation information;
Step S304, receives the checking information of user's input;
Step S305, verifies the checking information received;
Step S306, controls the startup of specified application according to the result, terminates.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered
Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick
Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves
The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.Further,
The application control method of the embodiment of the present invention, by arranging the switch of rigorous model, can protective seletion rigorous model
While the user opened avoids suffering economic loss and privacy leakage, the user also making selection rigorous model close remains able to
Experience and operate easily, thus meet the different needs of different user colony, improve the use body of different user colony
Test.
Embodiment four
Application control method in the present embodiment can apply to mobile device, such as mobile phone, panel computer etc..
Fig. 4 is the flow chart of application control method in the embodiment of the present invention four.As shown in Figure 4, in the present embodiment, should
May include steps of with control method:
Step S401, arranges rigorous model by authentication mode and opens, and wherein, rigorous model refers to specified application
Start need checking pattern;
Although arranging the switch of rigorous model in a mobile device, make mobile device user can according to self need choosing
Select and be turned on and off rigorous model and solve different user colony difference in terms of the application program unlatching relating to sensitive function
Demand, but, iff by need not being simply provided and being just turned on and off rigorous model of checking, arise that needs
The user that rigorous model is opened does not has, because imprudence closes rigorous model, the effect of being effectively protected.Therefore, it is necessary to
In the case of family is very clear and definite, being turned on and off of rigorous model could be set.
By authentication mode arrange rigorous model open can make user have enough understanding in the case of, selection
Unlatching arranges rigorous model, so that rigorous model is really opened in the case of user needs, in order to suitable user
Play a protective role.
Wherein, the concrete mode of authentication mode can use any feasible verification mode.
Step S402, in the case of specified application is triggered, points out user's input validation information;
Step S403, receives the checking information of user's input;
Step S404, verifies the checking information received;
Step S405, controls the startup of specified application according to the result.
In other embodiments of the present invention, the flow process of application control method can also comprise the steps: to pass through body
Part verification mode arranges rigorous model and closes.After rigorous model is set off, when sensitive application program is triggered
Directly initiate, without again through the control process of step S402 to step S405.
The step being arranged rigorous model closedown by authentication mode can be performed after step S405, it is also possible to
Perform before step S402.
The application control method of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered
Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick
Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves
The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.Further,
The application control method of the embodiment of the present invention, arranges being turned on and off of rigorous model by authentication mode, it is ensured that
User consciousness enough clearly in the case of select being turned on and off of rigorous model, prevent rigorous model from arbitrarily being closed and to
User causes damage, thus further increases the security performance of mobile device.
In order to realize each step and method in aforementioned applications control method embodiment, the embodiment of the present invention additionally provides
Application program controlling device embodiment.
Fig. 5 is the structured flowchart of application program controlling device in the embodiment of the present invention.As it is shown in figure 5, in the present embodiment, should
Reminding module 510, receiver module 520, authentication module 530 and control module 540 can be included with presetting apparatus 500.Carry
Show that module 510, receiver module 520, authentication module 530 and control module 540 can be sequentially connected.
Wherein, reminding module 510 is in the case of specified application is triggered, and prompting user's input validation is believed
Breath.Receiver module 520 is for receiving the checking information of user's input.Authentication module 530 is for receiving receiver module 520
Checking information is verified.Control module 540 controls opening of specified application for the result according to authentication module 530
Dynamic.
In embodiments of the present invention, control module 540 can include allowing unit.Allow unit for testing of receiving
In the case of card information is correct, it is allowed to specified application starts.
In embodiments of the present invention, control module 540 can include forbidding unit.Forbid that unit is for testing of receiving
In the case of card information errors, forbid that specified application starts.
In embodiments of the present invention, reminding module 510 can include judging unit and Tip element.Judging unit is used for sentencing
Whether disconnected current rigorous model is opened, and wherein, rigorous model refers to the pattern starting needs checking of specified application.Prompting is single
User's input validation information, in the case of judging that current rigorous model is opened at judging unit, is pointed out by unit.
In embodiments of the present invention, application program controlling device 500 can also include arranging module.Module is set for leading to
Crossing authentication mode to arrange rigorous model and be turned on and off, described rigorous model refers to that the startup of specified application needs checking
Pattern.
Owing to the application program controlling device in the present embodiment is able to carry out the application described in present invention
Control method, the part that the present embodiment does not describes in detail, refer to application program controlling in present invention
The related description of embodiment of the method.
The application program controlling device of the embodiment of the present invention, needs user to carry out complexity when specified application is triggered
Proof procedure could really open, improve the user's vigilant degree when opening sensitive applications, effectively prevent quick
Sense application program is unconsciously opened by user and is opened in the case of user is unwitting by third-party application, thus improves
The security performance of mobile device, decreases the economic loss of user, and effectively prevent the leakage of individual privacy information.
The embodiment of the present invention also proposed a kind of mobile device.
Fig. 6 is the structured flowchart of mobile device in the embodiment of the present invention.As shown in Figure 6, in the embodiment of the present invention, move and set
Standby 600 can include application program controlling device 500.Wherein, application program controlling device 500 can be the aforementioned enforcement of the present invention
Any one application program controlling device in example.
Wherein, mobile device can be mobile phone, panel computer etc..
Refer to Fig. 7, a kind of structural representation of its mobile device 600 provided by the embodiment of the present invention.Such as Fig. 7 institute
Showing, mobile device 600 can include following one or more assembly: processes assembly 602, memorizer 604, and power supply module 606 is many
Media component 608, audio-frequency assembly 610, the interface 612 of input/output (I/O), sensor cluster 614, and communications component
616。
Processing assembly 602 and generally control the integrated operation of mobile device 600, such as with display, call, data are led to
The operation that letter, camera operation and record operation are associated.Process assembly 602 and can include that one or more processor 620 is held
Row instruction, to complete all or part of step of aforesaid application control method, specifically includes: at specified application quilt
In the case of triggering, point out user's input validation information;Receive the checking information of user's input;The checking information received is entered
Row checking;The startup of described specified application is controlled according to the result.Additionally, process assembly 602 can include one or
Multiple modules, it is simple to process between assembly 602 and other assemblies is mutual.Such as, process assembly 602 and can include multimedia mould
Block, with facilitate multimedia groupware 608 and process between assembly 602 mutual.
Memorizer 604 is configured to store various types of data to support the operation in mobile device 600.These data
Example include any application program for operating on the mobile device 600 or the instruction of method, contact data, telephone directory
Data, message, picture, video etc..Memorizer 604 can by any kind of volatibility or non-volatile memory device or it
Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable
Except programmable read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, soon
Flash memory, disk or CD.
The various assemblies that power supply module 606 is mobile device 600 provide electric power.Power supply module 606 can include power supply pipe
Reason system, one or more power supplys, and other generate, manage and distribute, with for mobile device 600, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 608 is included between described mobile device 600 and user.
In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface
Plate, screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch
Sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or slide
The border of action, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments,
Multimedia groupware 608 includes a front-facing camera and/or post-positioned pick-up head.When mobile device 600 is in operator scheme, as clapped
When taking the photograph pattern or video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each preposition
Photographic head and post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 610 is configured to output and/or input audio signal.Such as, audio-frequency assembly 610 includes a Mike
Wind (MIC), when mobile device 600 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike
It is configured to receive external audio signal.The audio signal received can be further stored at memorizer 604 or via logical
Letter assembly 616 sends.In certain embodiments, audio-frequency assembly 610 also includes a speaker, is used for exporting audio signal.
I/O interface 612 provides interface for processing between assembly 602 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock
Set button.
Sensor cluster 614 includes one or more sensor, for providing the state of various aspects for mobile device 600
Assessment.Such as, what sensor cluster 614 can detect mobile device 600 opens/closed mode, the relative localization of assembly, example
Such as display that described assembly is mobile device 600 and keypad, sensor cluster 614 can also detect mobile device 600 or
The position change of 600 1 assemblies of mobile device, the presence or absence that user contacts with mobile device 600, mobile device 600
Orientation or acceleration/deceleration and the variations in temperature of mobile device 600.Sensor cluster 614 can include proximity transducer, is configured
It is used for when there is no any physical contact object near detecting.Sensor cluster 614 can also include optical sensor,
Such as CMOS or ccd image sensor, it is used for using in imaging applications.In certain embodiments, this sensor cluster 614 also may be used
To include acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 616 is configured to facilitate the communication of wired or wireless mode between mobile device 600 and other equipment.
Mobile device 600 can access wireless network based on communication standard, such as WiFi, 2G, 3G or 4G or combinations thereof.At one
In exemplary embodiment, communications component 616 receives the broadcast singal or wide from external broadcasting management system via broadcast channel
Broadcast relevant information.In one exemplary embodiment, described communications component 616 also includes near-field communication (NFC) module, to promote
Junction service.Such as, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband
(UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, mobile device 600 can be by one or more application specific integrated circuits (ASIC), number
Word signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
The mobile device of the embodiment of the present invention, including application program controlling device, needs when specified application is triggered
The proof procedure wanting user to carry out complexity could really be opened, and improves the user's vigilant journey when opening sensitive applications
Degree, effectively prevent sensitive applications and is unconsciously opened and by third-party application in the case of user is unwitting by user
Open, thus improve the security performance of mobile device, decrease the economic loss of user, and effectively prevent individual privacy letter
The leakage of breath.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the system of foregoing description,
The specific works process of device and module, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method are permissible
Realize by another way.Such as, device embodiment described above is only schematically, such as, and described module
Dividing, be only a kind of logic function and divide, actual can have other dividing mode, such as, multiple modules or group when realizing
Part can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown
Or the coupling each other discussed or direct-coupling or communication connection can be indirect by some interfaces, device or module
Coupling or communication connection, can be electrical, machinery or other form.
The described module illustrated as separating component can be or may not be physically separate, shows as module
The parts shown can be or may not be physical module, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of module therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme
's.
It addition, each functional module in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that modules is individually physically present, it is also possible to two or more modules are integrated in a unit.Above-mentioned integrated list
Unit both can realize to use the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit and realizes.
The above-mentioned integrated unit realized with the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions with so that a computer
Device (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the present invention each
The part steps of method described in embodiment.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (Read-
OnlyMemory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various can
To store the medium of program code.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (12)
1. an application control method, it is characterised in that including:
In the case of specified application is triggered, point out user's input validation information;
Receive the checking information of user's input;
The checking information received is verified;
The startup of described specified application is controlled according to the result.
Application control method the most according to claim 1, it is characterised in that described according to the result control
The startup of specified application, including:
In the case of the checking information received is correct, it is allowed to described specified application starts.
Application control method the most according to claim 1, it is characterised in that described according to the result control
The startup of specified application, including:
In the case of the checking information errors received, forbid that described specified application starts.
Application control method the most according to claim 1, it is characterised in that described prompting user's input validation is believed
Breath, including:
Judging whether current rigorous model is opened, described rigorous model refers to the pattern starting needs checking of specified application;
In the case of current rigorous model is opened, point out user's input validation information.
Application control method the most according to claim 1, it is characterised in that also include:
Arranging rigorous model by authentication mode to be turned on and off, described rigorous model refers to that the startup of specified application needs
Pattern to be verified.
6. an application program controlling device, it is characterised in that including:
Reminding module, in the case of specified application is triggered, points out user's input validation information;
Receiver module, for receiving the checking information of user's input;
Authentication module, verifies for the checking information receiving described receiver module;
Control module, controls the startup of described specified application for the result according to described authentication module.
Application program controlling device the most according to claim 6, it is characterised in that described control module includes:
Allow unit, in the case of the checking information received is correct, it is allowed to described specified application starts.
Application program controlling device the most according to claim 6, it is characterised in that described control module includes:
Forbid unit, in the case of the checking information errors received, forbid that described specified application starts.
Application program controlling device the most according to claim 6, it is characterised in that described reminding module includes:
Judging unit, is used for judging whether current rigorous model is opened, and described rigorous model refers to that the startup of specified application needs
Pattern to be verified;
Tip element, in the case of judging that current rigorous model is opened at described judging unit, prompting user's input is tested
Card information.
Application program controlling device the most according to claim 6, it is characterised in that also include:
Arranging module, be turned on and off for arranging rigorous model by authentication mode, described rigorous model is specified should
The pattern of checking is needed with starting of program.
11. 1 kinds of mobile devices, it is characterised in that include the application program controlling device described in any one of claim 6 to 10.
12. mobile devices according to claim 11, it is characterised in that described mobile device is mobile phone or panel computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610589202.3A CN106250724A (en) | 2016-07-25 | 2016-07-25 | A kind of application control method, device and mobile device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610589202.3A CN106250724A (en) | 2016-07-25 | 2016-07-25 | A kind of application control method, device and mobile device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106250724A true CN106250724A (en) | 2016-12-21 |
Family
ID=57604520
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610589202.3A Pending CN106250724A (en) | 2016-07-25 | 2016-07-25 | A kind of application control method, device and mobile device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106250724A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991307A (en) * | 2017-04-10 | 2017-07-28 | 四川阵风科技有限公司 | Using time slot scrambling and device |
CN107169337A (en) * | 2017-06-27 | 2017-09-15 | 上海传英信息技术有限公司 | management method, device and terminal |
CN110716679A (en) * | 2019-10-08 | 2020-01-21 | 珠海格力电器股份有限公司 | Application management method, storage medium and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN104200170A (en) * | 2014-04-15 | 2014-12-10 | 中兴通讯股份有限公司 | Privacy protection method of electronic equipment and electronic equipment |
CN104268454A (en) * | 2014-09-28 | 2015-01-07 | 酷派软件技术(深圳)有限公司 | Management method and device of application program of terminal |
CN104520866A (en) * | 2014-03-31 | 2015-04-15 | 华为技术有限公司 | Privacy protection method and terminal equipment |
-
2016
- 2016-07-25 CN CN201610589202.3A patent/CN106250724A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN104520866A (en) * | 2014-03-31 | 2015-04-15 | 华为技术有限公司 | Privacy protection method and terminal equipment |
CN104200170A (en) * | 2014-04-15 | 2014-12-10 | 中兴通讯股份有限公司 | Privacy protection method of electronic equipment and electronic equipment |
CN104268454A (en) * | 2014-09-28 | 2015-01-07 | 酷派软件技术(深圳)有限公司 | Management method and device of application program of terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991307A (en) * | 2017-04-10 | 2017-07-28 | 四川阵风科技有限公司 | Using time slot scrambling and device |
CN107169337A (en) * | 2017-06-27 | 2017-09-15 | 上海传英信息技术有限公司 | management method, device and terminal |
CN110716679A (en) * | 2019-10-08 | 2020-01-21 | 珠海格力电器股份有限公司 | Application management method, storage medium and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10129044B2 (en) | Method and apparatus for controlling smart device | |
CN104765552B (en) | Right management method and device | |
CN105354489B (en) | Permission giving method and device | |
CN105491229B (en) | The method and apparatus of remote control mobile terminal | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN110400405B (en) | Method, device and medium for controlling access control | |
CN105550568B (en) | The method and device of mobile terminal data protection | |
CN106095220B (en) | Notification message reminding method and device | |
CN105677214A (en) | Application management method and apparatus | |
CN105678133A (en) | Terminal unlocking method and device | |
EP3226128B1 (en) | Method and device for online payment | |
CN106446653A (en) | Application authority management method and device and electronic equipment | |
CN106471513B (en) | Authority control method and device | |
CN106250724A (en) | A kind of application control method, device and mobile device | |
CN106462698A (en) | Authority control method and authority control device | |
CN106611112A (en) | Application program safe processing method, device and equipment | |
CN106570381B (en) | Fingerprint unlocking method and device | |
CN106462696A (en) | Authority controlling method and device | |
CN105808995A (en) | Password prompting method and device and terminal | |
CN106201738A (en) | System broadcasts call method and device | |
CN105955635A (en) | Interface display method and device | |
CN104243476A (en) | Account protection method and device | |
CN105554297A (en) | Information reminding method and apparatus and terminal | |
CN106714173A (en) | Reminding method and device for network security | |
WO2021164314A1 (en) | Notification prompting method, server, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161221 |