CN106295274A - A kind of application control method and device - Google Patents
A kind of application control method and device Download PDFInfo
- Publication number
- CN106295274A CN106295274A CN201610604647.4A CN201610604647A CN106295274A CN 106295274 A CN106295274 A CN 106295274A CN 201610604647 A CN201610604647 A CN 201610604647A CN 106295274 A CN106295274 A CN 106295274A
- Authority
- CN
- China
- Prior art keywords
- destination application
- authentication information
- application
- icons
- desktop icons
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention discloses a kind of application control method and device, method therein comprises determining that destination application to be controlled;Show the selection interface of the selective desktop icons whether deleting described destination application;When the first selection operation for described selection interface being detected, by invalid for application program launching entrance corresponding for the desktop icons of described destination application, and the desktop icons of described destination application are associated with the application program launching entrance of the hidden icons of described destination application, wherein, described first select operation for indicating the selection operation of the desktop icons not deleting described destination application.The embodiment of the invention also discloses corresponding application program controlling device.The technical scheme that the embodiment of the present invention provides can promote the data safety in the safety of the application program that terminal is installed, and then protection terminal.
Description
Technical field
The present invention relates to field of terminal, be specifically related to a kind of application control method and device.
Background technology
The appearance of smart mobile phone, the life for people brings many facilities.Smart mobile phone function powerful, cause it this
Body also exists huge potential safety hazard.The private informations such as contact person, note, picture library and payment class application in mobile phone are easy to
Stolen by others.Therefore, the privacy application in protection mobile device and privacy application data are not stolen and just seem the heaviest
Want.
In prior art, currently the mode in mobile device terminal encryption has a lot, but great majority use at lock
Screen interface pattern or the mode of password encrypt mobile device, and also sub-fraction is adopted as the mode of applied cryptography encryption and encrypts shifting
Dynamic equipment.It is disadvantageously, the two ways safety that in prior art, mobile device terminal is encrypted is the lowest.Such as screen locking is close
After code or pattern are learnt by other people, the private data of mobile device will thoroughly be revealed.
Summary of the invention
Embodiments provide a kind of application control method and device, to promoting the application journey that terminal is installed
The safety of sequence, the data safety in protection terminal.
Embodiment of the present invention first aspect provides a kind of application control method, including:
Determine destination application to be controlled;
Show the selection interface of the selective desktop icons whether deleting described destination application;
When the first selection operation for described selection interface being detected, by the desktop icons of described destination application
Corresponding application program launching entrance is invalid, and by the desktop icons of described destination application and described destination application
The application program launching entrance association of hidden icons, wherein, described first selects operation not delete described target for instruction should
Operate with the selection of the desktop icons of program.
In conjunction with first aspect, in the implementation that some are possible, described display is selective whether delete described target should
After the selection interface of the desktop icons of program, described method also includes:
When the second selection operation for described selection interface being detected, by the desktop icons of described destination application
Deleting, wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application to operate.
In conjunction with first aspect, in the implementation that some are possible, the described desktop icons by described destination application
After associating with the application program launching entrance of the hidden icons of described destination application, described method also includes:
Obtain the selection operation of the desktop icons for described destination application;
In preset time period, detect whether to receive user authentication information;
If receiving described user authentication information, then detect described user authentication information whether with the authentication information that prestores
Join;
If described user authentication information is mated with the authentication information that prestores, then by the desk-top picture with described destination application
The application program launching entrance of the hidden icons of the described destination application of mark association, starts described destination application.
In conjunction with first aspect, in the implementation that some are possible, the described desktop icons by described destination application
After deletion, described method also includes:
Obtain user authentication information;
Detect whether described authentication information mates with the authentication information that prestores;
If described user authentication information is mated with the authentication information that prestores, then show hiding of at least one hide application program
Icon, wherein, the hidden icons of at least one hide application program described includes the hidden icons of described destination application;
Obtain the selection operation of the hidden icons for described destination application, and by described destination application
The application program launching entrance of hidden icons, starts described destination application.
In conjunction with first aspect, in the implementation that some are possible, described in detect whether to receive user authentication information it
After, described method also includes:
If being not received by user authentication information in described preset time period, then generate hint instructions, wherein, described in carry
Show that instruction is for pointing out destination application described in user not successfully started up.
In conjunction with first aspect, in the implementation that some are possible, the described authentication information of described detection whether with the mirror that prestores
After power information matches, described method also includes:
If described user authentication information is not mated with the authentication information that prestores, then generating hint instructions, wherein, described prompting refers to
Order is used for pointing out destination application described in user not successfully started up.
Embodiment of the present invention second aspect provides a kind of application program controlling device, described application program controlling device bag
Include:
Determine unit, for determining destination application to be controlled;
Display unit, for showing the selection interface of the selective desktop icons whether deleting described destination application;
Associative cell, for when detecting the first selection operation for described selection interface, by described intended application
The application program launching entrance that the desktop icons of program are corresponding is invalid, and by the desktop icons of described destination application with described
The application program launching entrance association of the hidden icons of destination application, wherein, described first selects operation for instruction not
Delete the selection operation of the desktop icons of described destination application.In conjunction with second aspect, in the implementation that some are possible,
Described device also includes:
Delete unit, show the selective desktop icons whether deleting described destination application at described display unit
After selecting interface, for when the second selection operation for described selection interface being detected, by described destination application
Desktop icons delete, wherein, described second selects operation for indicating the desktop icons deleting described destination application
Select operation.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
First acquiring unit, at described associative cell by the desktop icons of described destination application and described intended application
After the application program launching entrance association of the hidden icons of program, for obtaining the desk-top picture for described destination application
Target selects operation;
First detector unit, in preset time period, detects whether to receive user authentication information;
Described first detector unit, if being additionally operable to the detection of described detector unit to receive user authentication information, detection is described
Whether user authentication information mates with the authentication information that prestores;
First start unit, if detecting described user authentication information and the authentication information that prestores in described first detector unit
During coupling, for the hidden icons of described destination application by associating with the desktop icons of described destination application
Application program launching entrance, starts described destination application.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
Second acquisition unit, after the desktop icons of described destination application are deleted by described deletion unit, is used for
Obtain user authentication information;
Second detector unit, is used for detecting whether described authentication information mates with the authentication information that prestores;
Described display unit, if described second detector unit detects described authentication information and mates with the authentication information that prestores,
It is additionally operable to show the hidden icons of at least one hide application program, wherein, hiding of at least one hide application program described
Icon includes the hidden icons of described destination application;
Second start unit, for obtaining the selection operation of the hidden icons for described destination application, and passes through
The application program launching entrance of the hidden icons of described destination application, starts described destination application.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
First Tip element, after described first detector unit detects whether to receive user authentication information, if for
When being not received by user authentication information in described preset time period, it is used for generating hint instructions, wherein, described hint instructions
For pointing out destination application described in user not successfully started up.
In conjunction with second aspect, in the implementation that some are possible, described device also includes:
In described second detector unit, second Tip element, detects whether described authentication information mates with the authentication information that prestores
Afterwards, if not mating with the authentication information that prestores for described authentication information, then hint instructions, wherein, described hint instructions are generated
For pointing out destination application described in user not successfully started up.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing
Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application
When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application
Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application
Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal
Safety.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to
These accompanying drawings obtain other accompanying drawing.
Fig. 1 is the schematic flow sheet of a kind of application control method that first embodiment of the invention provides;
Fig. 2 is the schematic flow sheet of a kind of application control method that second embodiment of the invention provides;
Fig. 3 is the schematic flow sheet of a kind of application control method that third embodiment of the invention provides;
Fig. 4 is the structural representation of a kind of application program controlling device that fourth embodiment of the invention provides;
Fig. 5 is the structural representation of a kind of application program controlling device that fifth embodiment of the invention provides.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention
Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention, it is clear that described embodiment is this
Bright a part of embodiment rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not having
Have and make the every other embodiment obtained under creative work premise, broadly fall into the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", " the 3rd ", "
Four " it is etc. for distinguishing different object rather than for describing particular order.Additionally, " including " and " having " and they appoint
What deformation, it is intended that cover non-exclusive comprising.Such as contain series of steps or the process of unit, method, system, product
Product or equipment are not limited to step or the unit listed, but the most also include step or the unit do not listed, or
The most also include other steps intrinsic for these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can be wrapped in conjunction with the embodiments
It is contained at least one embodiment of the present invention.It is identical that each position in the description occurs that this phrase might not each mean
Embodiment, be not and the independent of other embodiments mutual exclusion or alternative embodiment.Those skilled in the art explicitly and
Implicitly being understood by, embodiment described herein can combine with other embodiments.
Refer to the flow process signal that Fig. 1, Fig. 1 are a kind of application control methods that first embodiment of the invention provides
Figure, the described application control method of the embodiment of the present invention can be applied and can wear in such as smart mobile phone, panel computer, intelligence
Wear in the terminals such as equipment, specifically can be realized by the processor of these terminals.As it is shown in figure 1, the application in the embodiment of the present invention
Control method comprises the following steps:
S101, terminal determine destination application to be controlled.
Specifically, terminal determines the destination application needing to hide, and adds described destination application to being used for
Application or the terminal of hide application program arrange interface, wherein, described hiding destination application can by user according to
Service condition selects to determine, can automatically determine according to the purposes of application program or attribute, terminal, such as, work as application program
For paying class application, such as Alipay, palm bank etc., then it is described to be controlled that terminal automatically determines this type of application program
Destination application.
The selection interface of the selective desktop icons whether deleting described destination application of S102, terminal demonstration.
Specifically, terminal determines the destination application needing to hide, and adds described destination application to being used for
After the application of hide application program or terminal arrange interface, terminal demonstration human-computer interaction interface, described human-computer interaction interface is used
In choosing whether to delete the desktop icons of described destination application for user.
S103, detect for described selection interface first selection operation time, by the table of described destination application
The application program launching entrance that face icon is corresponding is invalid, terminal by the desktop icons of described destination application and described target
The application program launching entrance association of the hidden icons of application program, wherein, described first selects operation not delete for instruction
The selection operation of the desktop icons of described destination application.
Specifically, if user selects not delete the desktop icons of described destination application, then terminal should by described target
The application program launching entrance corresponding with the desktop icons of program is invalid, i.e. the desktop icons of destination application are a kind of pseudo-figure
Mark, is only used for reminding terminal described in user to be mounted with this destination application, but this destination application is hidden, only
The desktop icons of destination application described in touch-control can not start described destination application.Need to perform follow-up operation,
The hidden icons of the described destination application associated with the desktop icons of described destination application can be opened further
Application program launching entrance, and then open described destination application.
As the optional embodiment of one, the selective desk-top picture whether deleting described destination application of described display
Target selects after interface, and described terminal can also carry out following operation:
When the second selection operation for described selection interface being detected, by the desktop icons of described destination application
Deleting, wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application to operate.
Specifically, if user is in the human-computer interaction interface of terminal demonstration, select to delete the table of described destination application
Face icon, the desktop icons of the most described destination application are deleted, but during this situation, described destination application is not
Have unloaded, but be hidden, need to perform follow-up operation, just can open hiding of described destination application further
The application program launching entrance of icon, and then open described destination application.
As the optional embodiment of one, the described desktop icons by described destination application and described intended application
After the application program launching entrance association of the hidden icons of program, described terminal can also carry out following operation:
Obtain the selection operation of the desktop icons for described destination application;
In preset time period, detect whether to receive user authentication information;
If receiving described user authentication information, then detect described user authentication information whether with the authentication information that prestores
Join;
If described user authentication information is mated with the authentication information that prestores, then by the desk-top picture with described destination application
The application program launching entrance of the hidden icons of the described destination application of mark association, starts described destination application.
Specifically, after destination application is hidden, if user selects not delete the desk-top picture of described destination application
Mark, then when user needs to start described destination application, needs to select the described intended application of display on terminal desktop
The desktop icons of program, then, terminal demonstration inputs the authentication interface of authentication information, (such as 5s in Preset Time for user
In), user inputs authentication information, wherein, described authentication information can include but not limited to following at least one: numerical ciphers believe
Breath, pattern encrypted message, finger print information, facial information and iris information etc..If terminal is in described Preset Time, do not obtain
Get the user authentication information of user's input, i.e. user and input the time time-out of authentication information, then terminal can generate prompting and refer to
Order, wherein, described hint instructions is used for pointing out destination application described in user not successfully started up, or terminal camouflage prompting
" described destination application is not installed ".After user inputs authentication information in Preset Time, the use of terminal detection user's input
Whether family authentication information mates with the authentication information that prestores, if user authentication information is mated with the authentication information that prestores, then proves user
For validated user, then terminal then extracts the described destination application that associates with the desktop icons of described destination application
The application program launching entrance of hidden icons, and entered by the application program launching of the hidden icons of described destination application
Mouthful, start described destination application.But, if user authentication information is not mated with the authentication information that prestores, illustrate that this user is
Disabled user, there is the stolen risk of data in described terminal, then terminal then generates hint instructions, and wherein, described hint instructions is used
Do not successfully started up in destination application described in prompting user, or terminal camouflage is pointed out, and " described destination application is not pacified
Dress ".
As the optional embodiment of one, described by after the desktop icons deletion of described destination application, described
Terminal can also carry out following operation:
Obtain user authentication information;
Detect whether described authentication information mates with the authentication information that prestores;
If described user authentication information is mated with the authentication information that prestores, then show hiding of at least one hide application program
Icon, wherein, the hidden icons of at least one hide application program described includes the hidden icons of described destination application;
Obtain the selection operation of the hidden icons for described destination application, and by described destination application
The application program launching entrance of hidden icons, starts described destination application.
Specifically, after destination application is hidden, if user selects to delete the desktop icons of described destination application,
So when user needs to start described destination application, triggering terminal display is needed to input the authentication of authentication information for user
Interface, user inputs authentication information, wherein, described authentication information can include but not limited to following at least one: numerical ciphers
Information, pattern encrypted message, finger print information, facial information and iris information etc..User is after input authentication information, and terminal is examined
Whether the user authentication information surveying user's input mates with the authentication information that prestores, if user authentication information and the authentication information that prestores
Join, then prove that user is validated user, then terminal can show to be performed hides at least one hide application program operated
Hidden icons, wherein, the hidden icons of at least one hide application program described include user need start intended application
The hidden icons of program, terminal obtains user's selection operation for the hidden icons of destination application, and terminal is transferred described
The application program launching entrance of the hidden icons of destination application, and answering by the hidden icons of described destination application
Start entrance by program, start described destination application.But, if user authentication information is not mated with the authentication information that prestores,
Illustrating that this user is disabled user, there is the stolen risk of data in described terminal, then terminal then generates hint instructions, wherein, institute
State hint instructions for pointing out destination application described in user not successfully started up, or terminal camouflage prompting " described target
Application program is not installed ".
As the optional embodiment of one, described in detect whether to receive user authentication information after, described terminal is also
Can perform following operation:
If being not received by user authentication information in described preset time period, then generate hint instructions, wherein, described in carry
Show that instruction is for pointing out destination application described in user not successfully started up.
As the optional embodiment of one, whether the described authentication information of described detection mates it with the authentication information that prestores
After, described terminal can also carry out following operation:
If described user authentication information is not mated with the authentication information that prestores, then generating hint instructions, wherein, described prompting refers to
Order is used for pointing out destination application described in user not successfully started up.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing
Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application
When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application
Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application
Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal
Safety.
Refer to the flow process signal that Fig. 2, Fig. 2 are a kind of application control methods that second embodiment of the invention provides
Figure, the described application control method of the embodiment of the present invention can be applied and can wear in such as smart mobile phone, panel computer, intelligence
Wear in the terminals such as equipment, specifically can be realized by the processor of these terminals.As in figure 2 it is shown, the application in the embodiment of the present invention
Control method comprises the following steps:
S201, terminal determine destination application to be controlled.
The selection interface of the selective desktop icons whether deleting described destination application of S202, terminal demonstration.
S203, detect for described selection interface first selection operation time, terminal is by described destination application
Application program launching entrance corresponding to desktop icons invalid, and by the desktop icons of described destination application and described target
The application program launching entrance association of the hidden icons of application program, wherein, described first selects operation not delete for instruction
The selection operation of the desktop icons of described destination application.
S204, terminal obtain the selection operation of the desktop icons for described destination application.
S205, in preset time period, terminal detects whether to receive user authentication information.
Wherein, if in preset time period, terminal detection receives user authentication information, then perform step S206, no
Then, step S208 is performed.
If the described user authentication information of S206, then terminal detect described user authentication information whether with the authentication information that prestores
Coupling.
Wherein, if terminal detects described user authentication information and mates with the authentication information that prestores, then perform step S207, no
Then, step S208 is performed.
If the described user authentication information of S207 is mated with the authentication information that prestores, terminal then by with described intended application journey
The application program launching entrance of the hidden icons of the described destination application of the desktop icons association of sequence, starting described target should
Use program.
S208, terminal then generate hint instructions, and wherein, described hint instructions is used for pointing out destination application described in user
Do not successfully started up.
Wherein, the specific implementation of S201-S208 refer to the description of correlation step in first embodiment of the invention.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing
Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application
When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application
Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application
Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal
Safety.
Refer to the flow process signal that Fig. 3, Fig. 3 are a kind of application control methods that third embodiment of the invention provides
Figure, the described application control method of the embodiment of the present invention can be applied and can wear in such as smart mobile phone, panel computer, intelligence
Wear in the terminals such as equipment, specifically can be realized by the processor of these terminals.As it is shown on figure 3, the application in the embodiment of the present invention
Control method comprises the following steps:
S301, terminal determine destination application to be controlled.
The selection interface of the selective desktop icons whether deleting described destination application of S302, terminal demonstration.
S303, detect for described selection interface second selection operation time, terminal is by described destination application
Desktop icons delete, wherein, described second selects operation for indicating the desktop icons deleting described destination application
Select operation.
S304, terminal obtain user authentication information.
S305, terminal detect whether described authentication information mates with the authentication information that prestores.
Wherein, if terminal detects described authentication information and mates with the authentication information that prestores, then perform step S306 to S307, no
Then, step S308 is performed.
If the described user authentication information of S306 is mated with the authentication information that prestores, at least one hiden application journey of terminal demonstration
The hidden icons of sequence, wherein, the hidden icons of at least one hide application program described includes the hidden of described destination application
Hide icon;
S307, terminal obtain the selection operation of the hidden icons for described destination application, and by described target
The application program launching entrance of the hidden icons of application program, starts described destination application.
If the described user authentication information of S308 is not mated with the authentication information that prestores, terminal then generates hint instructions, wherein,
Described hint instructions is used for pointing out destination application described in user not successfully started up.
Wherein, the specific implementation of S301-S308 refer to the description of correlation step in first embodiment of the invention.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing
Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application
When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application
Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application
Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal
Safety.
Being apparatus of the present invention embodiment below, apparatus of the present invention embodiment is used for performing the inventive method embodiment one to three
The method realized, for convenience of description, illustrate only the part relevant to the embodiment of the present invention, and concrete ins and outs do not disclose
, refer to the embodiment of the present invention one to embodiment three.
Refer to the structural representation that Fig. 4, Fig. 4 are a kind of application program controlling devices that fourth embodiment of the invention provides
Figure, as shown in Figure 4, the application program controlling device in the embodiment of the present invention includes with lower unit:
Determine unit 401, for determining destination application to be controlled;
Display unit 402, for showing selection circle of the selective desktop icons whether deleting described destination application
Face;
Associative cell 403, for when the first selection operation for described selection interface being detected, answering described target
The application program launching entrance corresponding with the desktop icons of program is invalid, and by the desktop icons of described destination application and institute
Stating the application program launching entrance association of the hidden icons of destination application, wherein, described first selects operation to be used for indicating
Do not delete the selection operation of the desktop icons of described destination application.As the optional embodiment of one, described application journey
Sequence controls device and can further include:
Delete unit 404, show the selective desktop whether deleting described destination application at described display unit 402
After the selection interface of icon, for when the second selection operation for described selection interface being detected, described target being answered
Deleting with the desktop icons of program, wherein, described second selects operation for indicating the desktop deleting described destination application
The selection operation of icon.
As the optional embodiment of one, described device also includes:
First acquiring unit 405, at described associative cell 403 by the desktop icons of described destination application and described mesh
After the application program launching entrance association of the hidden icons of mark application program, for obtaining for described destination application
The selection operation of desktop icons;
First detector unit 406, in preset time period, detects whether to receive user authentication information;
Described first detector unit 406, if being additionally operable to the detection of described detector unit to receive user authentication information, detects institute
State whether user authentication information mates with the authentication information that prestores;
First start unit 407, if detecting described user authentication information and the mirror that prestores in described first detector unit 406
During power information matches, hiding for the described destination application by associating with the desktop icons of described destination application
The application program launching entrance of icon, starts described destination application.
As the optional embodiment of one, described device also includes:
The desktop icons of described destination application are deleted it at described deletion unit 404 by second acquisition unit 408
After, it is used for obtaining user authentication information;
Second detector unit 409, is used for detecting whether described authentication information mates with the authentication information that prestores;
Described display unit 402, if described second detector unit 409 detects described authentication information and the authentication information that prestores
Coupling, is additionally operable to show the hidden icons of at least one hide application program, wherein, at least one hide application program described
Hidden icons includes the hidden icons of described destination application;
Second start unit 410, for obtaining the selection operation of the hidden icons for described destination application, and leads to
Cross the application program launching entrance of the hidden icons of described destination application, start described destination application.
As the optional embodiment of one, described device also includes:
First Tip element 411, after described first detector unit 406 detects whether to receive user authentication information,
If during for being not received by user authentication information in described preset time period, be used for generating hint instructions, wherein, described in carry
Show that instruction is for pointing out destination application described in user not successfully started up.
As the optional embodiment of one, described device also includes:
In described second detector unit 409, second Tip element 412, detects whether described authentication information is believed with the authentication that prestores
After breath coupling, if not mating with the authentication information that prestores for described authentication information, then generate hint instructions, wherein, described in carry
Show that instruction is for pointing out destination application described in user not successfully started up.
Concrete, the implementing of above-mentioned unit refers to retouching of correlation step in Fig. 1 to Fig. 3 correspondence embodiment
State, be not repeated herein.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing
Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application
When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application
Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application
Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal
Safety.
Refer to the structural representation that Fig. 5, Fig. 5 are a kind of application program controlling devices that fifth embodiment of the invention provides
Figure.As it is shown in figure 5, the application program controlling device in the embodiment of the present invention includes: at least one processor 501, such as CPU,
At least one receptor 503, at least one memorizer 504, at least one transmitter 505, at least one communication bus 502.Its
In, communication bus 502 is for realizing the connection communication between these assemblies.Wherein, the receptor of device in the embodiment of the present invention
503 and transmitter 505 can be wired transmission port, it is also possible to for wireless device, such as, include antenna assembly, for and other
Node device carries out the communication of signaling or data.Memorizer 504 can be high-speed RAM memorizer, it is also possible to be non-volatile depositing
Reservoir (non-volatile memory), for example, at least one disk memory.Memorizer 504 optionally can also is that at least
One storage device being located remotely from aforementioned processor 501.Memorizer 504 stores batch processing code, and described processor
501 can pass through communication bus 502, call the function that in memorizer 504, the code of storage is correlated with execution.
Described processor 501, for determining destination application to be controlled;Show selective whether to delete described target
The selection interface of the desktop icons of application program;When the first selection operation for described selection interface being detected, by described
The application program launching entrance that the desktop icons of destination application are corresponding is invalid, and by the desk-top picture of described destination application
Mark associates with the application program launching entrance of the hidden icons of described destination application, and wherein, described first selects operation to use
The selection operation of the desktop icons of described destination application is not deleted in instruction.
As the optional embodiment of one, described processor 501, it is being used for showing selective whether to delete described target
After the selection interface of the desktop icons of application program, it is also possible to for the second selection for described selection interface being detected
During operation, being deleted by the desktop icons of described destination application, wherein, described second selects operation to be used for indicating deletion described
The selection operation of the desktop icons of destination application.
As the optional embodiment of one, described processor 501, for by the desk-top picture of described destination application
After mark associates with the application program launching entrance of the hidden icons of described destination application, it is also possible to for obtaining for institute
State the selection operation of the desktop icons of destination application;In preset time period, detect whether to receive user authentication information;
If receiving described user authentication information, then detect whether described user authentication information mates with the authentication information that prestores;If it is described
User authentication information is mated with the authentication information that prestores, then by the described mesh associated with the desktop icons of described destination application
The application program launching entrance of the hidden icons of mark application program, starts described destination application.
As the optional embodiment of one, described processor 501, for by the desk-top picture of described destination application
After mark is deleted, it is also possible to be used for obtaining user authentication information;Detect whether described authentication information mates with the authentication information that prestores;
If described user authentication information is mated with the authentication information that prestores, show the hidden icons of at least one hide application program, wherein,
The hidden icons of at least one hide application program described includes the hidden icons of described destination application;Obtain for described
The selection operation of the hidden icons of destination application, and opened by the application program of the hidden icons of described destination application
Dynamic entrance, starts described destination application.
As the optional embodiment of one, described processor 501, for detecting whether receive user authentication information
Afterwards, it is also possible to if for being not received by user authentication information in described preset time period, then generate hint instructions, its
In, described hint instructions is used for pointing out destination application described in user not successfully started up.
As the optional embodiment of one, described processor 501, be used for detecting described authentication information whether with prestore
After authentication information coupling, it is also possible to if not mating with the authentication information that prestores for described user authentication information, then generate prompting
Instruction, wherein, described hint instructions is used for pointing out destination application described in user not successfully started up.
Concrete, the implementing of above-mentioned unit refers to retouching of correlation step in Fig. 1 to Fig. 3 correspondence embodiment
State, be not repeated herein.
It can be seen that in embodiment of the present invention technical scheme, terminal determines destination application to be controlled, and display is for choosing
Select the selection interface of the desktop icons whether deleting described destination application, detecting for not deleting described intended application
When the selection of the desktop icons of program operates, by application program launching entrance corresponding for the desktop icons of described destination application
Invalid, and by the application program launching of the desktop icons of described destination application Yu the hidden icons of described destination application
Entrance associates.It is prevented from, by implementing the embodiment of the present invention, the application program that disabled user opens a terminal, and then promotes terminal
Safety.
The embodiment of the present invention also provides for a kind of computer-readable storage medium, and wherein, this computer-readable storage medium can store journey
Sequence, this program includes the part of the monitoring method of any service processes described in said method embodiment or full when performing
Portion's step.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should know
Knowing, embodiment described in this description belongs to preferred embodiment, involved action and the unit not necessarily present invention
Necessary.
The sequence of steps of the method for the embodiment of the present invention can be adjusted according to actual needs, merges or delete.This
The unit of the terminal of bright embodiment can carry out integrating according to actual needs, Further Division or delete.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way
Realize.Such as, device embodiment described above is schematic, the division of the most described unit, for a kind of logic function
Divide, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into
Another system, or some features can ignore, or do not perform.Another point, shown or discussed coupling each other or
Direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection, can be electricity
Property or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme
's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list
Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit
Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part that in other words prior art contributed or this technical scheme completely or partially can be with the form of software product
Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer
Equipment (can be for personal computer, server or the network equipment etc.) perform the whole of method described in each embodiment of the present invention or
Part steps.And aforesaid storage medium includes: USB flash disk, read only memory (ROM, Read-Only Memory), random access memory are deposited
Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various can store program code
Medium.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
Completing instructing relevant hardware by program, this program can be stored in a computer-readable recording medium, storage
Medium may include that flash disk, read only memory (English: Read-Only Memory, ROM), random access device (English be called for short:
RAM), disk or CD etc. literary composition: Random Access Memory, is called for short:.
A kind of application control method provided the embodiment of the present invention above and device are described in detail, this
Applying specific case in literary composition to be set forth principle and the embodiment of the present invention, the explanation of above example is only intended to
Help to understand method and the core concept thereof of the present invention;Simultaneously for one of ordinary skill in the art, according to the think of of the present invention
Thinking, the most all will change, in sum, it is right that this specification content should not be construed as
The restriction of the present invention.
Claims (12)
1. an application control method, it is characterised in that including:
Determine destination application to be controlled;
Show the selection interface of the selective desktop icons whether deleting described destination application;
When the first selection operation for described selection interface being detected, the desktop icons of described destination application are corresponding
Application program launching entrance invalid, and hiding the desktop icons of described destination application and described destination application
The application program launching entrance association of icon, wherein, described first selects operation not delete described intended application journey for instruction
The selection operation of the desktop icons of sequence.
2. the method for claim 1, it is characterised in that whether described display is selective deletes described destination application
Desktop icons selection interface after, described method also includes:
When the second selection operation for described selection interface being detected, the desktop icons of described destination application are deleted
Removing, wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application to operate.
3. the method for claim 1, it is characterised in that described by the desktop icons of described destination application with described
After the application program launching entrance association of the hidden icons of destination application, described method also includes:
Obtain the selection operation of the desktop icons for described destination application;
In preset time period, detect whether to receive user authentication information;
If receiving described user authentication information, then detect whether described user authentication information mates with the authentication information that prestores;
If described user authentication information is mated with the authentication information that prestores, then closed by the desktop icons with described destination application
The application program launching entrance of the hidden icons of the described destination application of connection, starts described destination application.
4. method as claimed in claim 2, it is characterised in that the described desktop icons by described destination application delete it
After, described method also includes:
Obtain user authentication information;
Detect whether described authentication information mates with the authentication information that prestores;
If described authentication information mates with the authentication information that prestores, then show the hidden icons of at least one hide application program, its
In, the hidden icons of at least one hide application program described includes the hidden icons of described destination application;
Obtain the selection operation of the hidden icons for described destination application, and hiding by described destination application
The application program launching entrance of icon, starts described destination application.
5. method as claimed in claim 3, it is characterised in that described in detect whether to receive user authentication information after, institute
Method of stating also includes:
If being not received by user authentication information in described preset time period, then generating hint instructions, wherein, described prompting refers to
Order is used for pointing out destination application described in user not successfully started up.
6. method as claimed in claim 4, it is characterised in that the described authentication information of described detection whether with the authentication information that prestores
After coupling, described method also includes:
If described authentication information does not mates with the authentication information that prestores, then generating hint instructions, wherein, described hint instructions is used for carrying
Show that destination application described in user is not successfully started up.
7. an application program controlling device, it is characterised in that described device includes:
Determine unit, for determining destination application to be controlled;
Display unit, for showing the selection interface of the selective desktop icons whether deleting described destination application;
Associative cell, for when detecting the first selection operation for described selection interface, by described destination application
Application program launching entrance corresponding to desktop icons invalid, and by the desktop icons of described destination application and described target
The application program launching entrance association of the hidden icons of application program, wherein, described first selects operation not delete for instruction
The selection operation of the desktop icons of described destination application.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Delete unit, show the selection of the selective desktop icons whether deleting described destination application at described display unit
After interface, for when the second selection operation for described selection interface being detected, by the table of described destination application
Face icon is deleted, and wherein, described second selects operation for indicating the selection of the desktop icons deleting described destination application
Operation.
9. device as claimed in claim 7, it is characterised in that described device also includes:
First acquiring unit, at described associative cell by the desktop icons of described destination application and described destination application
Hidden icons the association of application program launching entrance after, for obtaining the desktop icons for described destination application
Select operation;
First detector unit, in preset time period, detects whether to receive user authentication information;
Described first detector unit, if being additionally operable to the detection of described detector unit to receive user authentication information, detects described user
Whether authentication information mates with the authentication information that prestores;
First start unit, mates with the authentication information that prestores if described user authentication information being detected in described first detector unit
Time, for the application of the hidden icons of the described destination application by associating with the desktop icons of described destination application
Program starts entrance, starts described destination application.
10. device as claimed in claim 8, it is characterised in that described device also includes:
Second acquisition unit, after the desktop icons of described destination application are deleted by described deletion unit, is used for obtaining
User authentication information;
Second detector unit, is used for detecting whether described authentication information mates with the authentication information that prestores;
Described display unit, if described second detector unit detects described authentication information and mates with the authentication information that prestores, also uses
In the hidden icons of at least one hide application program of display, wherein, the hidden icons of at least one hide application program described
Hidden icons including described destination application;
Second start unit, for obtaining the selection operation of the hidden icons for described destination application, and by described
The application program launching entrance of the hidden icons of destination application, starts described destination application.
11. devices as claimed in claim 9, it is characterised in that described device also includes:
First Tip element, after described first detector unit detects whether to receive user authentication information, if in institute
When being not received by user authentication information in stating preset time period, being used for generating hint instructions, wherein, described hint instructions is used for
Destination application described in prompting user is not successfully started up.
12. devices as claimed in claim 10, it is characterised in that described device also includes:
In described second detector unit, second Tip element, detects whether described authentication information mates it with the authentication information that prestores
After, if not mating with the authentication information that prestores for described authentication information, then generate hint instructions, wherein, described hint instructions is used
Do not successfully started up in destination application described in prompting user.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610604647.4A CN106295274B (en) | 2016-07-27 | 2016-07-27 | Application program control method and device |
PCT/CN2016/097050 WO2018018692A1 (en) | 2016-07-27 | 2016-08-27 | Application control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610604647.4A CN106295274B (en) | 2016-07-27 | 2016-07-27 | Application program control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106295274A true CN106295274A (en) | 2017-01-04 |
CN106295274B CN106295274B (en) | 2020-03-17 |
Family
ID=57662745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610604647.4A Expired - Fee Related CN106295274B (en) | 2016-07-27 | 2016-07-27 | Application program control method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106295274B (en) |
WO (1) | WO2018018692A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223579A1 (en) * | 2009-03-02 | 2010-09-02 | Schwartz Gerry M | Iphone application disguiser |
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN103616986A (en) * | 2013-11-30 | 2014-03-05 | 广东欧珀移动通信有限公司 | Method and system for displaying and hiding application icons and mobile terminal |
CN105045514A (en) * | 2015-08-27 | 2015-11-11 | 广东欧珀移动通信有限公司 | Application process management method and terminal |
CN105677214A (en) * | 2015-12-30 | 2016-06-15 | 小米科技有限责任公司 | Application management method and apparatus |
CN105740670A (en) * | 2016-01-28 | 2016-07-06 | 百度在线网络技术(北京)有限公司 | Application encryption method and device, and application startup method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101859229A (en) * | 2010-06-22 | 2010-10-13 | 宇龙计算机通信科技(深圳)有限公司 | Icon hiding method, device and touch screen terminal |
CN103984885B (en) * | 2014-05-30 | 2017-05-17 | 广东欧珀移动通信有限公司 | Application program hiding method applied to touch screen terminal and touch screen terminal |
-
2016
- 2016-07-27 CN CN201610604647.4A patent/CN106295274B/en not_active Expired - Fee Related
- 2016-08-27 WO PCT/CN2016/097050 patent/WO2018018692A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223579A1 (en) * | 2009-03-02 | 2010-09-02 | Schwartz Gerry M | Iphone application disguiser |
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN103616986A (en) * | 2013-11-30 | 2014-03-05 | 广东欧珀移动通信有限公司 | Method and system for displaying and hiding application icons and mobile terminal |
CN105045514A (en) * | 2015-08-27 | 2015-11-11 | 广东欧珀移动通信有限公司 | Application process management method and terminal |
CN105677214A (en) * | 2015-12-30 | 2016-06-15 | 小米科技有限责任公司 | Application management method and apparatus |
CN105740670A (en) * | 2016-01-28 | 2016-07-06 | 百度在线网络技术(北京)有限公司 | Application encryption method and device, and application startup method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2018018692A1 (en) | 2018-02-01 |
CN106295274B (en) | 2020-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2024073464A (en) | User interface for transfer account | |
CN104049806B (en) | A kind of touch control terminal and its control method and system | |
CN103902862A (en) | Mobile device management method and device and mobile device | |
CN105760737A (en) | Control method for applications and terminal | |
CN104866752B (en) | A kind of application guard method and user terminal | |
CN107038357A (en) | User authority control method and mobile terminal | |
CN104679387A (en) | Privacy information protection method and terminal | |
CN108235767B (en) | Payment application isolation method and device and terminal | |
CN103164264A (en) | Application program manager and application program management method and access method | |
CN106815509B (en) | Multimedia file protection method and device and electronic equipment | |
CN104572175A (en) | Method and device for rapidly starting non-privacy type applications | |
CN106959754A (en) | Method for controlling mobile terminal and mobile terminal | |
CN107422976A (en) | Control method, device, storage medium and mobile terminal based on blank screen gesture | |
CN106529235A (en) | Unlocking method and terminal | |
CN107729765A (en) | Management method, device, storage medium and the electronic equipment of multi-medium data | |
CN107256353A (en) | Possesses the display methods of privacy protection function | |
WO2017008415A1 (en) | Apparatus and method for launching mobile applications from a lock screen | |
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN112948843B (en) | Encryption method, encryption device, electronic equipment and medium | |
CN107633174A (en) | A kind of user inputs management method and device, terminal | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN104392158A (en) | Mobile terminal unlocking method and mobile terminal | |
WO2022247866A1 (en) | Application icon management method and apparatus, and electronic device | |
CN106295274A (en) | A kind of application control method and device | |
CN112100672A (en) | Application program unloading method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200317 Termination date: 20210727 |