CN106293912B - Method and terminal for freezing application program - Google Patents

Method and terminal for freezing application program Download PDF

Info

Publication number
CN106293912B
CN106293912B CN201610616877.2A CN201610616877A CN106293912B CN 106293912 B CN106293912 B CN 106293912B CN 201610616877 A CN201610616877 A CN 201610616877A CN 106293912 B CN106293912 B CN 106293912B
Authority
CN
China
Prior art keywords
application program
terminal
trusted
identifier
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610616877.2A
Other languages
Chinese (zh)
Other versions
CN106293912A (en
Inventor
胡巧华
许凯丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610616877.2A priority Critical patent/CN106293912B/en
Publication of CN106293912A publication Critical patent/CN106293912A/en
Application granted granted Critical
Publication of CN106293912B publication Critical patent/CN106293912B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a method and a terminal for freezing an application program. The method comprises the following steps: when the detection terminal is connected with a network through the Wi-Fi, judging whether the Wi-Fi is a trusted Wi-Fi; and when the Wi-Fi is the untrusted Wi-Fi, freezing the application program with the security level larger than a preset threshold value. Therefore, by implementing the technical scheme provided by the invention, the application program related to the private information can be frozen when the Wi-Fi currently connected is determined to be the untrusted Wi-Fi, so that the information security of the user is ensured.

Description

Method and terminal for freezing application program
Technical Field
The invention relates to the field of terminals, in particular to a method for freezing an application program and a terminal.
Background
In recent years, with the development and popularization of terminals (such as smart phones, tablet computers, and the like), terminals have become an indispensable part of people's daily life. In order to meet the work and life entertainment requirements of the user, the user installs various applications in the terminal, such as social, communication, payment or video applications, which may include private information of the user.
Moreover, in order to facilitate work and life of people, public Wireless Fidelity (Wi-Fi) exists in more and more occasions at present, but the public Wi-Fi also has more and more information security problems. There is a possibility that personal information may be stolen while Wi-Fi is connected, so that personal property security and personal private information are threatened.
Disclosure of Invention
The embodiment of the invention provides a method and a terminal for freezing an application program, which can freeze the application program related to private information when the Wi-Fi currently connected is determined to be untrusted, so that the information security of a user is ensured.
The first aspect of the embodiment of the invention discloses a method for freezing an application program, which comprises the following steps:
when the detection terminal is connected with a network through the Wi-Fi, judging whether the Wi-Fi is a trusted Wi-Fi;
and when the Wi-Fi is the untrusted Wi-Fi, freezing the application program with the security level larger than a preset threshold value.
With reference to the first aspect of the present invention, in a first possible implementation manner of the first aspect of the present invention, the determining whether the Wi-Fi is a trusted Wi-Fi includes:
matching the identification of the Wi-Fi with the identification in a target list, wherein the identification stored in the target list is the identification of trusted Wi-Fi;
and determining whether the Wi-Fi is trusted Wi-Fi according to the matching result.
With reference to the first possible implementation manner of the first aspect of the present invention, in a second possible implementation manner of the first aspect of the present invention, before the matching the identifier of the Wi-Fi with the identifier in the target list, the method further includes:
acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises a connected Wi-Fi identifier and connection times;
presenting the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi;
and determining a target list according to the trusted Wi-Fi mark selected by the user.
With reference to the second possible implementation manner of the first aspect of the present invention, in an additional third possible implementation manner of the first aspect of the present invention, before freezing the application program with the security level greater than the preset threshold, the method further includes:
displaying the application programs with the use frequency more than the preset times on a screen for a user to select;
and setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
With reference to the first aspect of the present invention to the third possible implementation manner of the first aspect of the present invention, in a fourth possible implementation manner of the first aspect of the present invention, after the freezing the application program whose security level is greater than the preset threshold, the method further includes:
and when the Wi-Fi connection of the terminal is detected to be disconnected, unfreezing the application program of which the security level is greater than a preset threshold value.
A second aspect of the present invention discloses a terminal, including:
the judgment unit is used for judging whether the Wi-Fi is a trusted Wi-Fi or not when the detection terminal is in network connection through the Wi-Fi;
and the freezing unit is used for freezing the application program with the security level larger than a preset threshold when the Wi-Fi is the untrusted Wi-Fi.
With reference to the second aspect of the present invention, in a first possible implementation manner of the second aspect of the present invention, the judging unit includes a matching subunit and a determining subunit:
the matching unit is used for matching the identification of the Wi-Fi with the identification in a target list, wherein the identification stored in the target list is the identification of trusted Wi-Fi;
the determining unit is used for determining whether the Wi-Fi is the trusted Wi-Fi according to the matching result.
With reference to the first possible implementation manner of the second aspect of the present invention, in a second possible implementation manner of the second aspect of the present invention, the terminal further includes an obtaining unit, a display unit, and a determining unit;
the acquisition unit is used for acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises the identification and connection times of the connected Wi-Fi;
the display unit is used for displaying the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi;
the determining unit is used for determining a target list according to the identification of the trusted Wi-Fi selected by the user.
With reference to the second possible implementation manner of the second aspect of the present invention, in a third possible implementation manner of the second aspect of the present invention, the terminal further includes a setting unit;
the display unit is used for displaying the application programs with the use frequency more than the preset times on a screen for a user to select;
the setting unit is used for setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
With reference to the second aspect of the present invention to the third possible implementation manner of the second aspect of the present invention, in a fourth possible implementation manner of the second aspect of the present invention, the terminal further includes a thawing unit:
the unfreezing unit is used for unfreezing the application program with the security level larger than a preset threshold value when the Wi-Fi connection of the terminal is detected to be disconnected
It can be seen that in the scheme of the embodiment of the invention, when the detection terminal performs network connection through the Wi-Fi, whether the Wi-Fi is a trusted Wi-Fi is judged; and when the Wi-Fi is the untrusted Wi-Fi, freezing the application program with the security level larger than a preset threshold value. Therefore, by implementing the technical scheme provided by the invention, the application program related to the private information can be frozen when the Wi-Fi currently connected is determined to be the untrusted Wi-Fi, so that the information security of the user is ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for freezing an application according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating another method for freezing an application according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of another terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an entity apparatus of a terminal according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method and a terminal for freezing an application program, which can freeze the application program in a non-use state in a preset scene, so that the user experience is improved.
In order to make the technical solutions of the present invention better understood by those skilled in the art, the technical solutions in the embodiments of the present invention will be clearly described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The appearances of the phrases "first," "second," and "third," or the like, in the specification, claims, and figures are not necessarily all referring to the particular order in which they are presented. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In one embodiment of the invention, a method of freezing an application is disclosed, the method comprising: when the detection terminal is connected with a network through the Wi-Fi, judging whether the Wi-Fi is a trusted Wi-Fi; and when the Wi-Fi is the untrusted Wi-Fi, freezing the application program with the security level larger than a preset threshold value.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for freezing an application according to an embodiment of the present invention. As shown in fig. 1, a method for freezing an application according to an embodiment of the present invention includes the following steps:
s101, when the detection terminal is connected with the network through the Wi-Fi, whether the Wi-Fi is a trusted Wi-Fi is judged.
It should be noted that the main execution body of the method is a terminal, and for example, the main execution body may be an electronic device supporting wireless fidelity internet access, such as a smart phone, a tablet computer, an intelligent wearable device, and a computer.
Wherein, it is understood that the determining whether the Wi-Fi is a trusted Wi-Fi includes: matching the identification of the Wi-Fi with the identification in a target list, wherein the identification stored in the target list is the identification of trusted Wi-Fi; and determining whether the Wi-Fi is trusted Wi-Fi according to the matching result.
Wherein, it can be understood that when the identification of the Wi-Fi matches the identification in the target list, the Wi-Fi is a trusted Wi-Fi.
It can be understood that the target list may be stored in the terminal by default or may be set by the user.
Optionally, the determining the target list specifically may include: acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises a connected Wi-Fi identifier and connection times; presenting the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi; and determining a target list according to the trusted Wi-Fi mark selected by the user.
Optionally, determining the target list may further include: acquiring the current position of the terminal, and displaying the Wi-Fi identifier connected with the terminal at the position on a screen for a user to select the trusted Wi-Fi identifier; and determining a target list according to the trusted Wi-Fi mark selected by the user.
S102, when the Wi-Fi is not trusted, freezing the application program with the security level larger than a preset threshold value.
Wherein, it can be understood that, when the Wi-Fi is an untrusted Wi-Fi, the method further comprises: prompting a user whether to disconnect the Wi-Fi connection.
The prompt can be one or a combination of a vibration prompt, a voice prompt, a signal lamp prompt and a ring tone prompt.
The specific process of determining the application program with the security level greater than the preset threshold includes: displaying the application programs with the use frequency more than the preset times on a screen for a user to select; and setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
Optionally, the specific process of determining that the security level is greater than the preset threshold may further include: classifying the application programs APP of the users, and setting the office application, the application containing the payment function and the contact list application as the application programs with the security level larger than the preset threshold value.
The office applications may include, for example, mailbox applications, document applications, and the like.
The freezing process of the application program specifically includes isolating system resources occupied by the application program, isolating the application program in a system frame, and sending a freezing signal to a process group of the application program, so that the target application is frozen.
Optionally, the freezing the target application may specifically be: moving the target application to a quarantine box; wherein the isolation box is used for hiding preset types of components of the target application program so as to prevent the target application program from starting.
Wherein, it can be understood that, after the freezing of the application program with the security level greater than the preset threshold, the method further includes: and when the Wi-Fi connection of the terminal is detected to be disconnected, unfreezing the application program of which the security level is greater than a preset threshold value.
It can be seen that in the scheme of the embodiment of the invention, when the detection terminal performs network connection through the Wi-Fi, whether the Wi-Fi is a trusted Wi-Fi is judged; and when the Wi-Fi is the untrusted Wi-Fi, freezing the application program with the security level larger than a preset threshold value. Therefore, by implementing the technical scheme provided by the invention, the application program in the non-use state in the preset scene can be frozen, so that the user experience is improved.
Referring to fig. 2, fig. 2 is a flowchart illustrating another method for freezing an application according to another embodiment of the present invention. As shown in fig. 2, another method for freezing an application according to another embodiment of the present invention may include the following steps, where it is to be noted that an execution subject of the method is a terminal, which may be, for example, a smart phone, a tablet computer, a smart wearable device, a computer, or an electronic device supporting wireless fidelity internet access.
S201, when the detection terminal is connected with a network through the Wi-Fi, matching the identification of the Wi-Fi with the identification in the target list.
It should be noted that the Wi-Fi identifier may be the name of Wi-Fi.
It is to be appreciated that matching the Wi-Fi identification to an identification in a target list includes: and traversing a target list to determine whether the Wi-Fi mark exists, wherein if the Wi-Fi mark exists, the matching is successful, and otherwise, the matching is failed.
Wherein the identifier stored in the target list is an identifier of a trusted Wi-Fi.
It can be understood that the target list may be stored in the terminal by default or may be set by the user.
Optionally, the determining the target list specifically may include: acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises a connected Wi-Fi identifier and connection times; presenting the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi; and determining a target list according to the trusted Wi-Fi mark selected by the user.
Optionally, determining the target list may further include: acquiring the current position of the terminal, and displaying the Wi-Fi identifier connected with the terminal at the position on a screen for a user to select the trusted Wi-Fi identifier; and determining a target list according to the trusted Wi-Fi mark selected by the user.
S202, determining whether the Wi-Fi is the trusted Wi-Fi according to the matching result.
Wherein, it can be understood that when the identification of the Wi-Fi matches the identification in the target list, the Wi-Fi is confirmed as trusted Wi-Fi.
S203, when the Wi-Fi is the untrusted Wi-Fi, displaying the application program with the use frequency greater than the preset times on a screen for the user to select.
The preset times can be stored in the terminal or set by the user.
For example, the number of times may be 5, 6, 7, 8, 10, or other times.
And S204, setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
The specific process of determining the application program with the security level greater than the preset threshold includes: displaying the application programs with the use frequency more than the preset times on a screen for a user to select; and setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
Optionally, the specific process of determining that the security level is greater than the preset threshold may further include: classifying the application programs APP of the users, and setting the office application, the application containing the payment function and the contact list application as the application programs with the security level larger than the preset threshold value.
The office applications may include, for example, mailbox applications, document applications, and the like.
S205, freezing the application program with the security level larger than the preset threshold value.
The freezing process of the application program specifically includes isolating system resources occupied by the application program, isolating the application program in a system frame, and sending a freezing signal to a process group of the application program, so that the target application is frozen.
Optionally, the freezing the target application may specifically be: moving the target application to a quarantine box; wherein the isolation box is used for hiding preset types of components of the target application program so as to prevent the target application program from starting.
S206, when the Wi-Fi connection of the terminal is detected to be disconnected, the application program with the security level larger than the preset threshold value is unfrozen.
Wherein, it can be understood that the terminal can detect the Wi-Fi connection state in real time.
Wherein, the unfreezing the application program specifically comprises: and sending a unfreezing signal to the process group corresponding to the application program, and distributing system resources to the unfreezing application program.
The technical scheme provided by the embodiment of the invention can freeze the application program in a non-use state in a preset scene, thereby improving the user experience.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 3, an embodiment of the present invention provides a terminal 300, where the terminal may be an electronic device supporting wireless fidelity internet access, such as a smart phone, a tablet computer, and a smart wearable device. The terminal 300 includes a judging unit 301 and a freezing unit 302.
The determining unit 301 is configured to determine whether the Wi-Fi is a trusted Wi-Fi when the detecting terminal performs network connection through the Wi-Fi.
Wherein, it is understood that the determining whether the Wi-Fi is a trusted Wi-Fi includes: matching the identification of the Wi-Fi with the identification in a target list, wherein the identification stored in the target list is the identification of trusted Wi-Fi; and determining whether the Wi-Fi is trusted Wi-Fi according to the matching result.
Wherein, it can be understood that when the identification of the Wi-Fi matches the identification in the target list, the Wi-Fi is a trusted Wi-Fi.
It can be understood that the target list may be stored in the terminal by default or may be set by the user.
Optionally, the determining the target list specifically may include: acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises a connected Wi-Fi identifier and connection times; presenting the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi; and determining a target list according to the trusted Wi-Fi mark selected by the user.
Optionally, determining the target list may further include: acquiring the current position of the terminal, and displaying the Wi-Fi identifier connected with the terminal at the position on a screen for a user to select the trusted Wi-Fi identifier; and determining a target list according to the trusted Wi-Fi mark selected by the user.
A freezing unit 302, configured to freeze an application program with a security level greater than a preset threshold when the Wi-Fi is an untrusted Wi-Fi.
Wherein, it can be understood that, when the Wi-Fi is an untrusted Wi-Fi, the method further comprises: prompting a user whether to disconnect the Wi-Fi connection.
The prompt can be one or a combination of a vibration prompt, a voice prompt, a signal lamp prompt and a ring tone prompt.
The specific process of determining the application program with the security level greater than the preset threshold includes: displaying the application programs with the use frequency more than the preset times on a screen for a user to select; and setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
Optionally, the specific process of determining that the security level is greater than the preset threshold may further include: classifying the application programs APP of the users, and setting the office application, the application containing the payment function and the contact list application as the application programs with the security level larger than the preset threshold value.
The office applications may include, for example, mailbox applications, document applications, and the like.
The freezing process of the application program specifically includes isolating system resources occupied by the application program, isolating the application program in a system frame, and sending a freezing signal to a process group of the application program, so that the target application is frozen.
Optionally, the freezing the target application may specifically be: moving the target application to a quarantine box; wherein the isolation box is used for hiding preset types of components of the target application program so as to prevent the target application program from starting.
The identifying unit 301 and the determining unit 302 may be configured to execute the methods described in steps S101 and S102 in embodiment 1, and specific description refers to the description of the method in embodiment 1, and is not repeated here.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 4, an embodiment of the present invention provides a terminal 400, where the terminal 400 may be an electronic device supporting wireless fidelity internet access, such as a smart phone, a tablet computer, and an intelligent wearable device. The terminal 400 includes a judgment unit 401, a freezing unit 402, a matching unit 403, a determination unit 404, an acquisition unit 405, a display unit 406, a setting unit 407, and a thawing unit 408.
A matching unit 403, configured to match the identifier of the Wi-Fi with an identifier in the target list when the detection terminal performs network connection through Wi-Fi. Wherein the identifier stored in the target list is an identifier of a trusted Wi-Fi.
A determining unit 404, configured to determine whether the Wi-Fi is a trusted Wi-Fi according to a result of the matching.
The determining unit 401 is configured to determine whether the Wi-Fi is a trusted Wi-Fi when the detecting terminal performs network connection through the Wi-Fi.
It should be noted that the process of target list acquisition includes: an obtaining unit 405, configured to obtain a Wi-Fi connection record stored in the terminal, where the connection record includes an identifier of a connected Wi-Fi and connection times. And the display unit 406 is used for presenting the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that the user can select the identifier of the trusted Wi-Fi. The determining unit 404 is further configured to determine a target list according to the identifier of the trusted Wi-Fi selected by the user. Specifically, the judgment unit 401 includes a matching sub-unit 4011 and a determination sub-unit 4012: the matching sub-unit 4011 is configured to match the identifier of the Wi-Fi with an identifier in a target list, where the identifier stored in the target list is an identifier of a trusted Wi-Fi; the determining sub-unit 4012 is configured to determine whether the Wi-Fi is a trusted Wi-Fi according to a matching result.
The display unit 406 is configured to display an application program with a usage frequency greater than a preset number of times on a screen for a user to select when the Wi-Fi is an untrusted Wi-Fi;
the setting unit 407 is configured to set the application selected by the user as the application with the security level greater than the preset threshold.
A freezing unit 402, configured to freeze an application program with a security level greater than a preset threshold when the Wi-Fi is an untrusted Wi-Fi.
A unfreezing unit 408, configured to unfreeze the application program with the security level greater than the preset threshold when it is detected that the Wi-Fi connection of the terminal is disconnected.
The determining unit 401, the freezing unit 402, the matching unit 403, the determining unit 404, the obtaining unit 405, the displaying unit 406, the setting unit 407, and the thawing unit 408 may be configured to execute the methods described in steps S201 to S206 in embodiment 2, and details of the method described in embodiment 2 are described in detail, and are not repeated herein.
Referring to fig. 5, in another embodiment of the present invention, a terminal is provided. The terminal 500 includes hardware such as a CPU501, a memory 502, a bus 503, and a display 504. The terminal 500 may be an electronic device supporting wireless fidelity internet access, such as a smart phone, a tablet computer, and an intelligent wearable device.
The CPU501 executes a program pre-stored in the memory 502, and the execution process specifically includes:
when the detection terminal is connected with a network through the Wi-Fi, judging whether the Wi-Fi is a trusted Wi-Fi;
and when the Wi-Fi is the untrusted Wi-Fi, freezing the application program with the security level larger than a preset threshold value.
Optionally, the determining whether the Wi-Fi is a trusted Wi-Fi includes:
matching the identification of the Wi-Fi with the identification in a target list, wherein the identification stored in the target list is the identification of trusted Wi-Fi;
and determining whether the Wi-Fi is trusted Wi-Fi according to the matching result.
Optionally, before matching the identifier of the Wi-Fi with the identifier in the target list, the executing process further includes:
acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises a connected Wi-Fi identifier and connection times;
presenting the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi;
and determining a target list according to the trusted Wi-Fi mark selected by the user.
Optionally, before freezing the application program with the security level greater than the preset threshold, the executing process further includes:
displaying the application programs with the use frequency more than the preset times on a screen for a user to select;
and setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
Optionally, the freezing the target application program, and the executing process further includes:
and when the Wi-Fi connection of the terminal is detected to be disconnected, unfreezing the application program of which the security level is greater than a preset threshold value.
It can be seen that in the scheme of the embodiment of the invention, when the detection terminal performs network connection through the Wi-Fi, whether the Wi-Fi is a trusted Wi-Fi is judged; and when the Wi-Fi is the untrusted Wi-Fi, freezing the application program with the security level larger than a preset threshold value. Therefore, by implementing the technical scheme provided by the invention, the application program related to the private information can be frozen when the Wi-Fi currently connected is determined to be the untrusted Wi-Fi, so that the information security of the user is ensured.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method of freezing an application, the method comprising:
when the detection terminal is connected with a network through the Wi-Fi, judging whether the Wi-Fi is a trusted Wi-Fi;
when the Wi-Fi is an untrusted Wi-Fi, freezing an application program with a security level greater than a preset threshold, where the freezing the target application program may be: moving the target application to a quarantine box; wherein the isolation box is used for hiding preset types of components of the target application program so as to prevent the target application program from starting.
2. The method of claim 1, wherein the determining whether the Wi-Fi is trusted Wi-Fi comprises:
matching the identification of the Wi-Fi with the identification in a target list, wherein the identification stored in the target list is the identification of trusted Wi-Fi;
and determining whether the Wi-Fi is trusted Wi-Fi according to the matching result.
3. The method of claim 2, wherein prior to matching the Wi-Fi identifier with an identifier in a target list, the method further comprises:
acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises a connected Wi-Fi identifier and connection times;
presenting the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi;
and determining a target list according to the trusted Wi-Fi mark selected by the user.
4. The method of claim 3, wherein before freezing the application with the security level greater than the preset threshold, the method further comprises:
displaying the application programs with the use frequency more than the preset times on a screen for a user to select;
and setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
5. The method according to any one of claims 1 to 4, wherein after freezing the application program with the security level greater than the preset threshold, the method further comprises:
and when the Wi-Fi connection of the terminal is detected to be disconnected, unfreezing the application program of which the security level is greater than a preset threshold value.
6. A terminal, characterized in that the terminal comprises:
the judgment unit is used for judging whether the Wi-Fi is a trusted Wi-Fi or not when the detection terminal is in network connection through the Wi-Fi;
a freezing unit, configured to freeze, when the Wi-Fi is an untrusted Wi-Fi, an application program whose security level is greater than a preset threshold, where the freezing of the target application program may be: moving the target application to a quarantine box; wherein the isolation box is used for hiding preset types of components of the target application program so as to prevent the target application program from starting.
7. The terminal according to claim 6, wherein the judging unit comprises a matching subunit and a determining subunit:
the matching subunit is configured to match the identifier of the Wi-Fi with an identifier in a target list, where the identifier stored in the target list is an identifier of a trusted Wi-Fi;
the determining subunit is configured to determine whether the Wi-Fi is a trusted Wi-Fi according to a result of the matching.
8. The terminal according to claim 7, wherein the terminal further comprises an acquisition unit, a display unit, and a determination unit;
the acquisition unit is used for acquiring a Wi-Fi connection record stored in the terminal, wherein the connection record comprises the identification and connection times of the connected Wi-Fi;
the display unit is used for displaying the identifier of the Wi-Fi with the connection times larger than the preset times on a screen so that a user can select the identifier of the trusted Wi-Fi;
the determining unit is used for determining a target list according to the identification of the trusted Wi-Fi selected by the user.
9. The terminal according to claim 8, characterized in that the terminal further comprises a setting unit;
the display unit is used for displaying the application programs with the use frequency more than the preset times on a screen for a user to select;
the setting unit is used for setting the application program selected by the user as the application program with the security level larger than the preset threshold value.
10. The terminal according to any of claims 6 to 9, characterized in that the terminal further comprises a thawing unit:
the unfreezing unit is used for unfreezing the application program with the security level larger than a preset threshold value when the Wi-Fi connection of the terminal is detected to be disconnected.
CN201610616877.2A 2016-07-29 2016-07-29 Method and terminal for freezing application program Active CN106293912B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610616877.2A CN106293912B (en) 2016-07-29 2016-07-29 Method and terminal for freezing application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610616877.2A CN106293912B (en) 2016-07-29 2016-07-29 Method and terminal for freezing application program

Publications (2)

Publication Number Publication Date
CN106293912A CN106293912A (en) 2017-01-04
CN106293912B true CN106293912B (en) 2020-02-21

Family

ID=57663382

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610616877.2A Active CN106293912B (en) 2016-07-29 2016-07-29 Method and terminal for freezing application program

Country Status (1)

Country Link
CN (1) CN106293912B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107807832A (en) * 2017-11-14 2018-03-16 广东欧珀移动通信有限公司 Background application method for cleaning, device, storage medium and electronic equipment
CN109993525B (en) * 2017-12-29 2022-06-10 Oppo广东移动通信有限公司 Application program processing method and device, electronic equipment and computer readable storage medium
CN109587325B (en) * 2018-11-01 2021-01-15 Oppo(重庆)智能科技有限公司 Application operation control method and device, storage medium and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103744681A (en) * 2014-01-16 2014-04-23 广州市久邦数码科技有限公司 Method and system for freezing/thawing procedures
CN104102451A (en) * 2014-06-23 2014-10-15 联想(北京)有限公司 Information processing method and electronic equipment
CN104317608A (en) * 2014-09-30 2015-01-28 北京金山安全软件有限公司 Management method and device for pre-installed application program in mobile terminal and client
CN104463569A (en) * 2014-11-11 2015-03-25 北京奇虎科技有限公司 Secure connection payment method and device
CN104639522A (en) * 2013-11-15 2015-05-20 华为终端有限公司 Network access control method and device
CN104883294A (en) * 2015-05-28 2015-09-02 魅族科技(中国)有限公司 Data transmission control method and device
CN105468426A (en) * 2016-01-05 2016-04-06 珠海市魅族科技有限公司 Application freezing method and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104066088A (en) * 2014-06-06 2014-09-24 Tcl通讯(宁波)有限公司 Wireless internet access strategy method, system and definition method for mobile terminal
CN105184155B (en) * 2015-09-18 2018-07-27 广东欧珀移动通信有限公司 Application program display control method and device in terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104639522A (en) * 2013-11-15 2015-05-20 华为终端有限公司 Network access control method and device
CN103744681A (en) * 2014-01-16 2014-04-23 广州市久邦数码科技有限公司 Method and system for freezing/thawing procedures
CN104102451A (en) * 2014-06-23 2014-10-15 联想(北京)有限公司 Information processing method and electronic equipment
CN104317608A (en) * 2014-09-30 2015-01-28 北京金山安全软件有限公司 Management method and device for pre-installed application program in mobile terminal and client
CN104463569A (en) * 2014-11-11 2015-03-25 北京奇虎科技有限公司 Secure connection payment method and device
CN104883294A (en) * 2015-05-28 2015-09-02 魅族科技(中国)有限公司 Data transmission control method and device
CN105468426A (en) * 2016-01-05 2016-04-06 珠海市魅族科技有限公司 Application freezing method and terminal

Also Published As

Publication number Publication date
CN106293912A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN107643977B (en) Anti-addiction method and related product
CN106155789B (en) Application freezing method and mobile terminal
CN104346569B (en) Method and device for identifying malicious advertisements in mobile terminal and mobile terminal
CN106022101B (en) application management method and terminal
CN106227585B (en) Application program starting method, device and equipment
CN105426761B (en) A kind of recognition methods of illegal application and mobile terminal
CN104601683B (en) A kind of file download management method and mobile terminal and communication system
CN106293912B (en) Method and terminal for freezing application program
CN103793657A (en) System and method used for hiding application on mobile terminal
CN106550089B (en) Verification code processing method, client and user terminal
CN110740088B (en) Method, device, terminal and medium for recommending and adding social resources
CN106339894B (en) Screen-locked magazine pushing method, screen-locked magazine playing method and related equipment
CN106296266B (en) A kind of advertising pictures playback method and mobile terminal
CN108096838B (en) Gift package receiving method, device, server, mobile terminal and storage medium
CN105005489B (en) A kind of the starting method and terminal device of terminal device
WO2016202277A1 (en) Message sending method and mobile terminal
CN106332000B (en) Terminal position information acquisition method and device
CN110602311B (en) Message display method and related product
CN108241515B (en) Application shortcut establishing method and terminal
CN103581977B (en) Data connection and disconnection processing method, mobile terminal and base station
US20120260339A1 (en) Imposter Prediction Using Historical Interaction Patterns
WO2018152978A1 (en) Method and device for prompting change of account-bound telephone number and computer storage medium
CN108650702A (en) A kind of processing method and user terminal of broadcast message
CN106980661B (en) Method and device for cleaning data files in mobile terminal and electronic equipment
WO2019041198A1 (en) Method and apparatus for detecting downloading quantity increase terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant