CN106295274B - Application program control method and device - Google Patents
Application program control method and device Download PDFInfo
- Publication number
- CN106295274B CN106295274B CN201610604647.4A CN201610604647A CN106295274B CN 106295274 B CN106295274 B CN 106295274B CN 201610604647 A CN201610604647 A CN 201610604647A CN 106295274 B CN106295274 B CN 106295274B
- Authority
- CN
- China
- Prior art keywords
- application program
- target application
- authentication information
- icon
- hidden
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention discloses an application program control method and device, wherein the method comprises the following steps: determining a target application program to be controlled; displaying a selection interface for selecting whether to delete the desktop icon of the target application program; when first selection operation aiming at the selection interface is detected, invalidating an application program starting entrance corresponding to a desktop icon of the target application program, and associating the desktop icon of the target application program with an application program starting entrance of a hidden icon of the target application program, wherein the first selection operation is used for indicating selection operation of not deleting the desktop icon of the target application program. The embodiment of the invention also discloses a corresponding application program control device. The technical scheme provided by the embodiment of the invention can improve the safety of the application program installed in the terminal, thereby protecting the data safety in the terminal.
Description
Technical Field
The invention relates to the field of terminals, in particular to an application program control method and device.
Background
The smart phone brings convenience to the life of people. The intelligent mobile phone has strong functions, so that huge potential safety hazards exist in the intelligent mobile phone. Private information such as contact persons, short messages, a gallery, payment applications and the like in the mobile phone can be easily stolen by others. Therefore, it is important to protect the privacy applications and privacy application data in the mobile device from being stolen.
In the prior art, a plurality of encryption modes are currently used for a mobile device terminal, but most of the encryption modes adopt a mode of locking a screen interface pattern or a password to encrypt the mobile device, and a small part of the encryption modes adopt a mode of applying the password to encrypt the mobile device. The disadvantage is that the security of the two modes of encryption of the mobile device terminal in the prior art is very low. For example, after the screen locking password or pattern is known by others, the private data of the mobile device can be completely divulged.
Disclosure of Invention
The embodiment of the invention provides an application program control method and device, aiming at improving the safety of an application program installed in a terminal and protecting the data safety in the terminal.
A first aspect of an embodiment of the present invention provides an application program control method, including:
determining a target application program to be controlled;
displaying a selection interface for selecting whether to delete the desktop icon of the target application program;
when first selection operation aiming at the selection interface is detected, invalidating an application program starting entrance corresponding to a desktop icon of the target application program, and associating the desktop icon of the target application program with an application program starting entrance of a hidden icon of the target application program, wherein the first selection operation is used for indicating selection operation of not deleting the desktop icon of the target application program.
With reference to the first aspect, in some possible implementations, after the displaying a selection interface for selecting whether to delete a desktop icon of the target application, the method further includes:
and deleting the desktop icon of the target application program when a second selection operation aiming at the selection interface is detected, wherein the second selection operation is used for indicating the selection operation of deleting the desktop icon of the target application program.
With reference to the first aspect, in some possible implementations, after associating the desktop icon of the target application with the application launch portal of the hidden icon of the target application, the method further includes:
acquiring selection operation of a desktop icon for the target application program;
detecting whether user authentication information is received or not within a preset time period;
if the user authentication information is received, detecting whether the user authentication information is matched with prestored authentication information;
and if the user authentication information is matched with the pre-stored authentication information, starting the target application program through an application program starting inlet of the hidden icon of the target application program associated with the desktop icon of the target application program.
With reference to the first aspect, in some possible implementations, after the deleting the desktop icon of the target application, the method further includes:
acquiring user authentication information;
detecting whether the authentication information is matched with prestored authentication information or not;
if the user authentication information is matched with the pre-stored authentication information, displaying a hidden icon of at least one hidden application program, wherein the hidden icon of the at least one hidden application program comprises a hidden icon of the target application program;
and acquiring the selection operation of the hidden icon aiming at the target application program, and starting the target application program through the application program starting inlet of the hidden icon of the target application program.
With reference to the first aspect, in some possible implementations, after detecting whether user authentication information is received, the method further includes:
and if the user authentication information is not received within the preset time period, generating a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not successfully started.
With reference to the first aspect, in some possible implementation manners, after detecting whether the authentication information matches pre-stored authentication information, the method further includes:
and if the user authentication information is not matched with the pre-stored authentication information, generating a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not successfully started.
A second aspect of an embodiment of the present invention provides an application control apparatus, including:
the determining unit is used for determining a target application program to be controlled;
the display unit is used for displaying a selection interface for selecting whether to delete the desktop icon of the target application program;
and the association unit is used for invalidating an application program starting entry corresponding to the desktop icon of the target application program and associating the desktop icon of the target application program with an application program starting entry of a hidden icon of the target application program when a first selection operation for the selection interface is detected, wherein the first selection operation is used for indicating a selection operation of not deleting the desktop icon of the target application program. With reference to the second aspect, in some possible implementations, the apparatus further includes:
the deleting unit is used for deleting the desktop icon of the target application program when a second selection operation aiming at the selection interface is detected after the display unit displays a selection interface for selecting whether to delete the desktop icon of the target application program, wherein the second selection operation is used for indicating the selection operation of deleting the desktop icon of the target application program.
With reference to the second aspect, in some possible implementations, the apparatus further includes:
the first acquisition unit is used for acquiring the selection operation of the desktop icon of the target application program after the association unit associates the desktop icon of the target application program with the application program starting entrance of the hidden icon of the target application program;
the first detection unit is used for detecting whether user authentication information is received or not within a preset time period;
the first detection unit is further used for detecting whether the user authentication information is matched with prestored authentication information or not if the detection unit detects that the user authentication information is received;
and the first starting unit is used for starting the target application program through an application program starting inlet of the hidden icon of the target application program associated with the desktop icon of the target application program when the first detection unit detects that the user authentication information is matched with the pre-stored authentication information.
With reference to the second aspect, in some possible implementations, the apparatus further includes:
the second acquisition unit is used for acquiring the user authentication information after the deletion unit deletes the desktop icon of the target application program;
the second detection unit is used for detecting whether the authentication information is matched with prestored authentication information or not;
the display unit is further configured to display a hidden icon of at least one hidden application program if the second detection unit detects that the authentication information matches pre-stored authentication information, where the hidden icon of the at least one hidden application program includes a hidden icon of the target application program;
and the second starting unit is used for acquiring the selection operation of the hidden icon of the target application program and starting the target application program through the application program starting inlet of the hidden icon of the target application program.
With reference to the second aspect, in some possible implementations, the apparatus further includes:
and the first prompting unit is used for generating a prompting instruction if the user authentication information is not received in the preset time period after the first detection unit detects whether the user authentication information is received, wherein the prompting instruction is used for prompting the user that the target application program is not successfully started.
With reference to the second aspect, in some possible implementations, the apparatus further includes:
and the second prompting unit is used for generating a prompting instruction if the authentication information is not matched with the pre-stored authentication information after the second detection unit detects whether the authentication information is matched with the pre-stored authentication information, wherein the prompting instruction is used for prompting a user that the target application program is not successfully started.
It can be seen that, in the technical solution of the embodiment of the present invention, a terminal determines a target application to be controlled, displays a selection interface for selecting whether to delete a desktop icon of the target application, and when a selection operation for a desktop icon that does not delete the target application is detected, invalidates an application start entry corresponding to the desktop icon of the target application, and associates the desktop icon of the target application with an application start entry of a hidden icon of the target application. By implementing the embodiment of the invention, the illegal user can be prevented from opening the application program of the terminal, and the safety of the terminal is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating an application control method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating an application control method according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating an application control method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an application control device according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an application control device according to a fifth embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, and in the above-described drawings, are used for distinguishing between different objects and not for describing a particular order. Furthermore, "include" and "have" and any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a flowchart illustrating an application control method according to a first embodiment of the present invention, where the application control method according to the first embodiment of the present invention may be applied to terminals such as smart phones, tablet computers, smart wearable devices, and the like, and may be specifically implemented by processors of the terminals. As shown in fig. 1, the application control method in the embodiment of the present invention includes the following steps:
s101, the terminal determines a target application program to be controlled.
Specifically, the terminal determines a target application program to be hidden, and adds the target application program to an application or a terminal setting interface for hiding the application program, where the hidden target application program may be determined by a user according to a use condition, and the terminal may automatically determine according to a use or an attribute of the application program, for example, when the application program is a payment-type application, such as a payment treasure, a palmtop bank, or the like, the terminal automatically determines that such an application program is the target application program to be controlled.
S102, the terminal displays a selection interface for selecting whether to delete the desktop icon of the target application program.
Specifically, the terminal determines a target application program to be hidden, and after the target application program is added to an application for hiding the application program or a terminal setting interface, the terminal displays a human-computer interaction interface, wherein the human-computer interaction interface is used for a user to select whether to delete a desktop icon of the target application program.
S103, when a first selection operation for the selection interface is detected, invalidating an application program starting entrance corresponding to the desktop icon of the target application program, and associating the desktop icon of the target application program with the application program starting entrance of the hidden icon of the target application program by the terminal, wherein the first selection operation is used for indicating a selection operation of not deleting the desktop icon of the target application program.
Specifically, if the user selects not to delete the desktop icon of the target application, the terminal invalidates the application start entry corresponding to the desktop icon of the target application, that is, the desktop icon of the target application is a pseudo icon and is only used for reminding the user that the terminal installs the target application, but the target application is hidden, and the target application cannot be started only by touching the desktop icon of the target application. Subsequent operations need to be executed, an application program starting inlet of the hidden icon of the target application program, which is associated with the desktop icon of the target application program, can be further opened, and then the target application program is opened.
As an optional implementation manner, after displaying a selection interface for selecting whether to delete the desktop icon of the target application, the terminal may further perform the following operations:
and deleting the desktop icon of the target application program when a second selection operation aiming at the selection interface is detected, wherein the second selection operation is used for indicating the selection operation of deleting the desktop icon of the target application program.
Specifically, if the user selects to delete the desktop icon of the target application program in the human-computer interaction interface displayed by the terminal, the desktop icon of the target application program is deleted, but in this case, the target application program is not uninstalled but hidden, and subsequent operations need to be performed to further open the application program starting entry of the hidden icon of the target application program, so as to open the target application program.
As an optional implementation manner, after associating the desktop icon of the target application with the application start entry of the hidden icon of the target application, the terminal may further perform the following operations:
acquiring selection operation of a desktop icon for the target application program;
detecting whether user authentication information is received or not within a preset time period;
if the user authentication information is received, detecting whether the user authentication information is matched with prestored authentication information;
and if the user authentication information is matched with the pre-stored authentication information, starting the target application program through an application program starting inlet of the hidden icon of the target application program associated with the desktop icon of the target application program.
Specifically, after the target application is hidden, if the user chooses not to delete the desktop icon of the target application, when the user needs to start the target application, the user needs to select the desktop icon of the target application displayed on the terminal desktop, and then the terminal displays an authentication interface for the user to input authentication information, and the user inputs the authentication information within a preset time (for example, within 5 s), where the authentication information may include, but is not limited to, at least one of the following: digital password information, pattern password information, fingerprint information, face information, iris information, and the like. If the terminal does not acquire the user authentication information input by the user within the preset time, that is, the time for the user to input the authentication information is overtime, the terminal generates a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not successfully started or the terminal pretends to prompt that the target application program is not installed. After a user inputs authentication information within preset time, a terminal detects whether the user authentication information input by the user is matched with prestored authentication information, if the user authentication information is matched with the prestored authentication information, the user is proved to be a legal user, and then the terminal extracts an application program starting inlet of a hidden icon of the target application program associated with a desktop icon of the target application program and starts the target application program through the application program starting inlet of the hidden icon of the target application program. However, if the user authentication information is not matched with the pre-stored authentication information, it indicates that the user is an illegal user, and the terminal has a risk of data theft, the terminal generates a prompt instruction, where the prompt instruction is used to prompt the user that the target application program is not successfully started, or the terminal pretends to prompt that the target application program is not installed.
As an optional implementation manner, after deleting the desktop icon of the target application, the terminal may further perform the following operations:
acquiring user authentication information;
detecting whether the authentication information is matched with prestored authentication information or not;
if the user authentication information is matched with the pre-stored authentication information, displaying a hidden icon of at least one hidden application program, wherein the hidden icon of the at least one hidden application program comprises a hidden icon of the target application program;
and acquiring the selection operation of the hidden icon aiming at the target application program, and starting the target application program through the application program starting inlet of the hidden icon of the target application program.
Specifically, after the target application program is hidden, if the user selects to delete the desktop icon of the target application program, when the user needs to start the target application program, the user needs to trigger the terminal to display an authentication interface for the user to input authentication information, and the user inputs the authentication information, where the authentication information may include, but is not limited to, at least one of the following: digital password information, pattern password information, fingerprint information, face information, iris information, and the like. After a user inputs authentication information, a terminal detects whether the user authentication information input by the user is matched with prestored authentication information, if the user authentication information is matched with the prestored authentication information, the user is proved to be a legal user, the terminal displays a hidden icon of at least one hidden application program which is executed with hidden operation, wherein the hidden icon of the at least one hidden application program comprises a hidden icon of a target application program which needs to be started by the user, the terminal obtains the selection operation of the user aiming at the hidden icon of the target application program, the terminal calls an application program starting inlet of the hidden icon of the target application program, and the target application program is started through the application program starting inlet of the hidden icon of the target application program. However, if the user authentication information is not matched with the pre-stored authentication information, it indicates that the user is an illegal user, and the terminal has a risk of data theft, the terminal generates a prompt instruction, where the prompt instruction is used to prompt the user that the target application program is not successfully started, or the terminal pretends to prompt that the target application program is not installed.
As an optional implementation manner, after detecting whether the user authentication information is received, the terminal may further perform the following operations:
and if the user authentication information is not received within the preset time period, generating a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not successfully started.
As an optional implementation manner, after detecting whether the authentication information matches with pre-stored authentication information, the terminal may further perform the following operations:
and if the user authentication information is not matched with the pre-stored authentication information, generating a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not successfully started.
It can be seen that, in the technical solution of the embodiment of the present invention, a terminal determines a target application to be controlled, displays a selection interface for selecting whether to delete a desktop icon of the target application, and when a selection operation for a desktop icon that does not delete the target application is detected, invalidates an application start entry corresponding to the desktop icon of the target application, and associates the desktop icon of the target application with an application start entry of a hidden icon of the target application. By implementing the embodiment of the invention, the illegal user can be prevented from opening the application program of the terminal, and the safety of the terminal is further improved.
Referring to fig. 2, fig. 2 is a flowchart illustrating an application control method according to a second embodiment of the present invention, where the application control method according to the second embodiment of the present invention may be applied to terminals such as smart phones, tablet computers, smart wearable devices, and the like, and may be specifically implemented by processors of the terminals. As shown in fig. 2, the application control method in the embodiment of the present invention includes the following steps:
s201, the terminal determines a target application program to be controlled.
S202, the terminal displays a selection interface for selecting whether to delete the desktop icon of the target application program.
S203, when a first selection operation aiming at the selection interface is detected, the terminal invalidates an application program starting entrance corresponding to the desktop icon of the target application program, and associates the desktop icon of the target application program with the application program starting entrance of the hidden icon of the target application program, wherein the first selection operation is used for indicating the selection operation of not deleting the desktop icon of the target application program.
And S204, the terminal acquires the selection operation of the desktop icon aiming at the target application program.
S205, in a preset time period, the terminal detects whether the user authentication information is received.
If the terminal detects that the user authentication information is received within the preset time period, step S206 is executed, otherwise, step S208 is executed.
S206, if the user authentication information exists, the terminal detects whether the user authentication information is matched with pre-stored authentication information.
If the terminal detects that the user authentication information is matched with the pre-stored authentication information, step S207 is executed, otherwise, step S208 is executed.
And S207, if the user authentication information is matched with the pre-stored authentication information, the terminal starts the target application program through an application program starting inlet of the hidden icon of the target application program, which is associated with the desktop icon of the target application program.
And S208, the terminal generates a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not started successfully.
Please refer to the description of the relevant steps in the first embodiment of the present invention for the specific implementation of S201-S208.
It can be seen that, in the technical solution of the embodiment of the present invention, a terminal determines a target application to be controlled, displays a selection interface for selecting whether to delete a desktop icon of the target application, and when a selection operation for a desktop icon that does not delete the target application is detected, invalidates an application start entry corresponding to the desktop icon of the target application, and associates the desktop icon of the target application with an application start entry of a hidden icon of the target application. By implementing the embodiment of the invention, the illegal user can be prevented from opening the application program of the terminal, and the safety of the terminal is further improved.
Referring to fig. 3, fig. 3 is a flowchart illustrating an application control method according to a third embodiment of the present invention, where the application control method according to the third embodiment of the present invention may be applied to terminals such as smart phones, tablet computers, smart wearable devices, and the like, and may be specifically implemented by processors of the terminals. As shown in fig. 3, the application control method in the embodiment of the present invention includes the following steps:
s301, the terminal determines a target application program to be controlled.
S302, the terminal displays a selection interface for selecting whether to delete the desktop icon of the target application program.
And S303, when a second selection operation aiming at the selection interface is detected, the terminal deletes the desktop icon of the target application program, wherein the second selection operation is used for indicating the selection operation of deleting the desktop icon of the target application program.
S304, the terminal acquires the user authentication information.
S305, the terminal detects whether the authentication information is matched with the pre-stored authentication information.
If the terminal detects that the authentication information is matched with the pre-stored authentication information, the steps S306 to S307 are executed, otherwise, the step S308 is executed.
S306, if the user authentication information is matched with pre-stored authentication information, the terminal displays a hidden icon of at least one hidden application program, wherein the hidden icon of the at least one hidden application program comprises a hidden icon of the target application program;
s307, the terminal obtains the selection operation of the hidden icon aiming at the target application program, and starts the target application program through the application program starting inlet of the hidden icon of the target application program.
And S308, if the user authentication information is not matched with the pre-stored authentication information, the terminal generates a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not started successfully.
Please refer to the description of the relevant steps in the first embodiment of the present invention for the specific implementation of S301-S308.
It can be seen that, in the technical solution of the embodiment of the present invention, a terminal determines a target application to be controlled, displays a selection interface for selecting whether to delete a desktop icon of the target application, and when a selection operation for a desktop icon that does not delete the target application is detected, invalidates an application start entry corresponding to the desktop icon of the target application, and associates the desktop icon of the target application with an application start entry of a hidden icon of the target application. By implementing the embodiment of the invention, the illegal user can be prevented from opening the application program of the terminal, and the safety of the terminal is further improved.
For convenience of description, only the relevant parts of the embodiments of the present invention are shown, and specific technical details are not disclosed, please refer to the first to third embodiments of the present invention.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an application control device according to a fourth embodiment of the present invention, and as shown in fig. 4, the application control device according to the embodiment of the present invention includes the following units:
a determining unit 401, configured to determine a target application to be controlled;
a display unit 402, configured to display a selection interface for selecting whether to delete a desktop icon of the target application;
an associating unit 403, configured to, when a first selection operation for the selection interface is detected, invalidate an application start entry corresponding to a desktop icon of the target application, and associate the desktop icon of the target application with an application start entry of a hidden icon of the target application, where the first selection operation is used to indicate a selection operation that does not delete the desktop icon of the target application. As an optional implementation manner, the application control device may further include:
a deleting unit 404, configured to delete the desktop icon of the target application when a second selection operation for the selection interface is detected after the display unit 402 displays a selection interface for selecting whether to delete the desktop icon of the target application, where the second selection operation is used to indicate a selection operation for deleting the desktop icon of the target application.
As an optional implementation, the apparatus further comprises:
a first obtaining unit 405, configured to obtain a selection operation for the desktop icon of the target application after the associating unit 403 associates the desktop icon of the target application with the application start entry of the hidden icon of the target application;
a first detecting unit 406, configured to detect whether user authentication information is received within a preset time period;
the first detecting unit 406 is further configured to detect whether the user authentication information matches pre-stored authentication information if the detecting unit detects that the user authentication information is received;
a first starting unit 407, configured to start the target application program through an application program starting entry of the hidden icon of the target application program associated with the desktop icon of the target application program when the first detecting unit 406 detects that the user authentication information matches pre-stored authentication information.
As an optional implementation, the apparatus further comprises:
a second obtaining unit 408, configured to obtain user authentication information after the deleting unit 404 deletes the desktop icon of the target application;
a second detecting unit 409, configured to detect whether the authentication information matches pre-stored authentication information;
the display unit 402, if the second detection unit 409 detects that the authentication information matches with pre-stored authentication information, is further configured to display a hidden icon of at least one hidden application program, where the hidden icon of the at least one hidden application program includes a hidden icon of the target application program;
a second starting unit 410, configured to acquire a selection operation for a hidden icon of the target application, and start the target application through an application starting entry of the hidden icon of the target application.
As an optional implementation, the apparatus further comprises:
the first prompting unit 411, after the first detecting unit 406 detects whether the user authentication information is received, is configured to generate a prompting instruction if the user authentication information is not received within the preset time period, where the prompting instruction is used to prompt the user that the target application program is not successfully started.
As an optional implementation, the apparatus further comprises:
a second prompting unit 412, configured to generate a prompting instruction if the authentication information is not matched with pre-stored authentication information after the second detecting unit 409 detects whether the authentication information is matched with the pre-stored authentication information, where the prompting instruction is used to prompt the user that the target application program is not successfully started.
Specifically, the specific implementation of each unit may refer to the description of the relevant steps in the embodiments corresponding to fig. 1 to fig. 3, which is not described herein again.
It can be seen that, in the technical solution of the embodiment of the present invention, a terminal determines a target application to be controlled, displays a selection interface for selecting whether to delete a desktop icon of the target application, and when a selection operation for a desktop icon that does not delete the target application is detected, invalidates an application start entry corresponding to the desktop icon of the target application, and associates the desktop icon of the target application with an application start entry of a hidden icon of the target application. By implementing the embodiment of the invention, the illegal user can be prevented from opening the application program of the terminal, and the safety of the terminal is further improved.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an application control device according to a fifth embodiment of the present invention. As shown in fig. 5, the application control apparatus in the embodiment of the present invention includes: at least one processor 501, e.g. a CPU, at least one receiver 503, at least one memory 504, at least one transmitter 505, at least one communication bus 502. Wherein a communication bus 502 is used to enable connective communication between these components. The receiver 503 and the transmitter 505 of the apparatus in the embodiment of the present invention may be wired transmission ports, or may also be wireless devices, for example, including an antenna apparatus, for performing signaling or data communication with other node devices. The memory 504 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 504 may optionally be at least one storage device located remotely from the processor 501. A set of program codes is stored in the memory 504 and the processor 501 can invoke the codes stored in the memory 504 to perform related functions through the communication bus 502.
The processor 501 is configured to determine a target application to be controlled; displaying a selection interface for selecting whether to delete the desktop icon of the target application program; when first selection operation aiming at the selection interface is detected, invalidating an application program starting entrance corresponding to a desktop icon of the target application program, and associating the desktop icon of the target application program with an application program starting entrance of a hidden icon of the target application program, wherein the first selection operation is used for indicating selection operation of not deleting the desktop icon of the target application program.
As an optional implementation manner, after the selection interface configured to display whether to delete the desktop icon of the target application, the processor 501 may be further configured to delete the desktop icon of the target application when a second selection operation for the selection interface is detected, where the second selection operation is used to indicate a selection operation for deleting the desktop icon of the target application.
As an optional implementation manner, the processor 501, after associating the desktop icon of the target application with the application start entry of the hidden icon of the target application, may be further configured to obtain a selection operation for the desktop icon of the target application; detecting whether user authentication information is received or not within a preset time period; if the user authentication information is received, detecting whether the user authentication information is matched with prestored authentication information; and if the user authentication information is matched with the pre-stored authentication information, starting the target application program through an application program starting inlet of the hidden icon of the target application program associated with the desktop icon of the target application program.
As an optional implementation manner, the processor 501, after being configured to delete the desktop icon of the target application, may be further configured to obtain user authentication information; detecting whether the authentication information is matched with prestored authentication information or not; if the user authentication information is matched with the pre-stored authentication information, displaying a hidden icon of at least one hidden application program, wherein the hidden icon of the at least one hidden application program comprises a hidden icon of the target application program; and acquiring the selection operation of the hidden icon aiming at the target application program, and starting the target application program through the application program starting inlet of the hidden icon of the target application program.
As an optional implementation manner, after the processor 501 is configured to detect whether user authentication information is received, and if the user authentication information is not received within the preset time period, generate a prompt instruction, where the prompt instruction is used to prompt the user that the target application program is not successfully started.
As an optional implementation manner, after detecting whether the authentication information matches with pre-stored authentication information, the processor 501 may further be configured to generate a prompt instruction if the user authentication information does not match with pre-stored authentication information, where the prompt instruction is used to prompt the user that the target application program is not successfully started.
Specifically, the specific implementation of each unit may refer to the description of the relevant steps in the embodiments corresponding to fig. 1 to fig. 3, which is not described herein again.
It can be seen that, in the technical solution of the embodiment of the present invention, a terminal determines a target application to be controlled, displays a selection interface for selecting whether to delete a desktop icon of the target application, and when a selection operation for a desktop icon that does not delete the target application is detected, invalidates an application start entry corresponding to the desktop icon of the target application, and associates the desktop icon of the target application with an application start entry of a hidden icon of the target application. By implementing the embodiment of the invention, the illegal user can be prevented from opening the application program of the terminal, and the safety of the terminal is further improved.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium may store a program, and when the program is executed, the program includes some or all of the steps of any one of the service process monitoring methods described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and elements referred to are not necessarily required to practice the invention.
The order of the steps of the method of the embodiments of the present invention may be adjusted, combined, or deleted according to actual needs. The units of the terminal of the embodiment of the invention can be integrated, further divided or deleted according to actual needs.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are illustrative, and for example, the division of the units is a logical division, and in actual implementation, there may be other divisions, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description is directed to an application control method and apparatus provided in the embodiments of the present invention, and the principles and embodiments of the present invention are described herein using specific examples, which are merely used to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (10)
1. An application control method, comprising:
according to the application or the attribute of the application, the terminal automatically determines a target application to be controlled;
displaying a selection interface for selecting whether to delete the desktop icon of the target application program;
when a first selection operation aiming at the selection interface is detected, invalidating an application program starting entry corresponding to a desktop icon of the target application program, and associating the desktop icon of the target application program with an application program starting entry of a hidden icon of the target application program, wherein the first selection operation is used for indicating a selection operation of not deleting the desktop icon of the target application program, the application program starting entry corresponding to the desktop icon of the target application program is invalid, and after associating the desktop icon of the target application program with the application program starting entry of the hidden icon of the target application program, the desktop icon of the target application program is a pseudo icon which is only used for reminding a user that the target application program is installed in the terminal, but the target application program is hidden, and the target application program cannot be started only by touching the desktop icon of the target application program, the method comprises the steps that subsequent operations need to be executed, an application program starting inlet of a hidden icon of the target application program, which is associated with a desktop icon of the target application program, can be further opened, and then the target application program is opened;
and deleting the desktop icon of the target application program when a second selection operation aiming at the selection interface is detected, wherein the second selection operation is used for indicating the selection operation of deleting the desktop icon of the target application program.
2. The method of claim 1, wherein after associating the desktop icon of the target application with the application launch portal of the hidden icon of the target application, the method further comprises:
acquiring selection operation of a desktop icon for the target application program;
detecting whether user authentication information is received or not within a preset time period;
if the user authentication information is received, detecting whether the user authentication information is matched with prestored authentication information;
and if the user authentication information is matched with the pre-stored authentication information, starting the target application program through an application program starting inlet of the hidden icon of the target application program associated with the desktop icon of the target application program.
3. The method of claim 1, wherein after the deleting the desktop icon of the target application, the method further comprises:
acquiring user authentication information;
detecting whether the authentication information is matched with prestored authentication information or not;
if the authentication information is matched with the pre-stored authentication information, displaying a hidden icon of at least one hidden application program, wherein the hidden icon of the at least one hidden application program comprises a hidden icon of the target application program;
and acquiring the selection operation of the hidden icon aiming at the target application program, and starting the target application program through the application program starting inlet of the hidden icon of the target application program.
4. The method of claim 2, wherein after said detecting whether user authentication information is received, the method further comprises:
and if the user authentication information is not received within the preset time period, generating a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not successfully started.
5. The method of claim 3, wherein after detecting whether the authentication information matches pre-stored authentication information, the method further comprises:
and if the authentication information is not matched with the pre-stored authentication information, generating a prompt instruction, wherein the prompt instruction is used for prompting the user that the target application program is not successfully started.
6. An application control apparatus, comprising:
the determining unit is used for automatically determining a target application program to be controlled according to the application program or the attribute;
the display unit is used for displaying a selection interface for selecting whether to delete the desktop icon of the target application program;
an associating unit, configured to, when a first selection operation for the selection interface is detected, invalidate an application start entry corresponding to a desktop icon of the target application, and associate the desktop icon of the target application with an application start entry of a hidden icon of the target application, where the first selection operation is used to indicate a selection operation that does not delete the desktop icon of the target application, where the application start entry corresponding to the desktop icon of the target application is invalid, and after associating the desktop icon of the target application with the application start entry of the hidden icon of the target application, the desktop icon of the target application is a pseudo icon, and is only used to remind a user terminal that the target application is installed, but the target application is hidden, only the desktop icon of the target application program is touched to not start the target application program, and subsequent operations are required to be executed, so that an application program starting inlet of a hidden icon of the target application program, which is associated with the desktop icon of the target application program, can be further opened, and the target application program is further opened;
the deleting unit is used for deleting the desktop icon of the target application program when a second selection operation aiming at the selection interface is detected after the display unit displays a selection interface for selecting whether to delete the desktop icon of the target application program, wherein the second selection operation is used for indicating the selection operation of deleting the desktop icon of the target application program.
7. The apparatus of claim 6, wherein the apparatus further comprises:
the first acquisition unit is used for acquiring the selection operation of the desktop icon of the target application program after the association unit associates the desktop icon of the target application program with the application program starting entrance of the hidden icon of the target application program;
the first detection unit is used for detecting whether user authentication information is received or not within a preset time period;
the first detection unit is further used for detecting whether the user authentication information is matched with prestored authentication information or not if the detection unit detects that the user authentication information is received;
and the first starting unit is used for starting the target application program through an application program starting inlet of the hidden icon of the target application program associated with the desktop icon of the target application program when the first detection unit detects that the user authentication information is matched with the pre-stored authentication information.
8. The apparatus of claim 6, wherein the apparatus further comprises:
the second acquisition unit is used for acquiring the user authentication information after the deletion unit deletes the desktop icon of the target application program;
the second detection unit is used for detecting whether the authentication information is matched with prestored authentication information or not;
the display unit is further configured to display a hidden icon of at least one hidden application program if the second detection unit detects that the authentication information matches pre-stored authentication information, where the hidden icon of the at least one hidden application program includes a hidden icon of the target application program;
and the second starting unit is used for acquiring the selection operation of the hidden icon of the target application program and starting the target application program through the application program starting inlet of the hidden icon of the target application program.
9. The apparatus of claim 7, wherein the apparatus further comprises:
and the first prompting unit is used for generating a prompting instruction if the user authentication information is not received in the preset time period after the first detection unit detects whether the user authentication information is received, wherein the prompting instruction is used for prompting the user that the target application program is not successfully started.
10. The apparatus of claim 8, wherein the apparatus further comprises:
and the second prompting unit is used for generating a prompting instruction if the authentication information is not matched with the pre-stored authentication information after the second detection unit detects whether the authentication information is matched with the pre-stored authentication information, wherein the prompting instruction is used for prompting a user that the target application program is not successfully started.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610604647.4A CN106295274B (en) | 2016-07-27 | 2016-07-27 | Application program control method and device |
PCT/CN2016/097050 WO2018018692A1 (en) | 2016-07-27 | 2016-08-27 | Application control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610604647.4A CN106295274B (en) | 2016-07-27 | 2016-07-27 | Application program control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106295274A CN106295274A (en) | 2017-01-04 |
CN106295274B true CN106295274B (en) | 2020-03-17 |
Family
ID=57662745
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610604647.4A Expired - Fee Related CN106295274B (en) | 2016-07-27 | 2016-07-27 | Application program control method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106295274B (en) |
WO (1) | WO2018018692A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN103616986A (en) * | 2013-11-30 | 2014-03-05 | 广东欧珀移动通信有限公司 | Method and system for displaying and hiding application icons and mobile terminal |
CN105045514A (en) * | 2015-08-27 | 2015-11-11 | 广东欧珀移动通信有限公司 | Application process management method and terminal |
CN105677214A (en) * | 2015-12-30 | 2016-06-15 | 小米科技有限责任公司 | Application management method and apparatus |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223579A1 (en) * | 2009-03-02 | 2010-09-02 | Schwartz Gerry M | Iphone application disguiser |
CN101859229A (en) * | 2010-06-22 | 2010-10-13 | 宇龙计算机通信科技(深圳)有限公司 | Icon hiding method, device and touch screen terminal |
CN103984885B (en) * | 2014-05-30 | 2017-05-17 | 广东欧珀移动通信有限公司 | Application program hiding method applied to touch screen terminal and touch screen terminal |
CN105740670B (en) * | 2016-01-28 | 2019-01-22 | 百度在线网络技术(北京)有限公司 | Using encryption, starting method and apparatus |
-
2016
- 2016-07-27 CN CN201610604647.4A patent/CN106295274B/en not_active Expired - Fee Related
- 2016-08-27 WO PCT/CN2016/097050 patent/WO2018018692A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103377332A (en) * | 2012-04-26 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Application program accessing method and device |
CN103616986A (en) * | 2013-11-30 | 2014-03-05 | 广东欧珀移动通信有限公司 | Method and system for displaying and hiding application icons and mobile terminal |
CN105045514A (en) * | 2015-08-27 | 2015-11-11 | 广东欧珀移动通信有限公司 | Application process management method and terminal |
CN105677214A (en) * | 2015-12-30 | 2016-06-15 | 小米科技有限责任公司 | Application management method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106295274A (en) | 2017-01-04 |
WO2018018692A1 (en) | 2018-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10846425B2 (en) | Data protection based on user input during device boot-up, user login, and device shut-down states | |
CN104978109B (en) | A kind of Application Program Interface display methods and terminal | |
US9734352B2 (en) | Data protection based on user and gesture recognition | |
CN105930145B (en) | Information hiding method and mobile terminal | |
CN106921799A (en) | A kind of mobile terminal safety means of defence and mobile terminal | |
WO2014029356A1 (en) | Method and mobile terminal for enhancing the security of a mobile terminal | |
CN103617382A (en) | Privacy protection method and device | |
CN106681717B (en) | Terminal application program management method and device and electronic equipment | |
WO2016192165A1 (en) | Data encryption method and apparatus | |
US9996682B2 (en) | Detecting and preventing illicit use of device | |
CN106815509B (en) | Multimedia file protection method and device and electronic equipment | |
CN104021358A (en) | Anti-theft control method and device for mobile terminal | |
CN105930726B (en) | A kind of processing method and user terminal of malicious operation behavior | |
CN104091119A (en) | Mobile terminal as well as protection method and protection system of data in mobile terminal | |
US10169611B2 (en) | Dynamic application hiding | |
WO2016145849A1 (en) | Short message security management method, device and terminal | |
KR20140093556A (en) | Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof | |
CN107085694B (en) | Information display processing method and device | |
TW201826158A (en) | Method, Device and Terminal for Displaying Data | |
CN106295274B (en) | Application program control method and device | |
US20140059669A1 (en) | Method and mobile terminal for enhancing the security of a mobile terminal | |
CN113282364A (en) | Display method, display device and electronic equipment | |
WO2015188728A1 (en) | Mobile payment security protection method, apparatus and cloud server | |
CN113238691B (en) | Application icon management method and device and electronic equipment | |
CN105488392B (en) | A kind of system and method that camouflage peripheral hardware is defendd to carry out malicious attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200317 Termination date: 20210727 |
|
CF01 | Termination of patent right due to non-payment of annual fee |