CN106485137A - Application control method, application program controlling device and terminal - Google Patents

Application control method, application program controlling device and terminal Download PDF

Info

Publication number
CN106485137A
CN106485137A CN201510532323.XA CN201510532323A CN106485137A CN 106485137 A CN106485137 A CN 106485137A CN 201510532323 A CN201510532323 A CN 201510532323A CN 106485137 A CN106485137 A CN 106485137A
Authority
CN
China
Prior art keywords
application program
privacy
user
space
prescribed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510532323.XA
Other languages
Chinese (zh)
Other versions
CN106485137B (en
Inventor
程力行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510532323.XA priority Critical patent/CN106485137B/en
Publication of CN106485137A publication Critical patent/CN106485137A/en
Application granted granted Critical
Publication of CN106485137B publication Critical patent/CN106485137B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention proposes a kind of application control method, a kind of application program controlling device and a kind of terminal, and wherein, the application control method includes:The control command to prescribed privacy application program is received in active user space;Judge that whether the active user space is the privacy user's space in the plurality of user's space;When the judged result is for being, it is allowed to the prescribed privacy application program is controlled, otherwise, forbids being controlled the prescribed privacy application program.By technical scheme, prescribed privacy application program can be set, and only just allowing to be controlled prescribed privacy application program under privacy user's space state, so as to confidentiality and the privacy of application program is improved, and then improving Consumer's Experience.

Description

Application control method, application program controlling device and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of application control method, A kind of application program controlling device and a kind of terminal.
Background technology
At present, the application program for including private data in terminal (as mobile phone) is easy to suffer him Stealing for people is read, and then cause leakage such as wechat, footpath between fields footpath between fields etc. of private information, and cause the user is very big Inconvenience.
Therefore, confidentiality and the security of application program how is improved, becomes skill urgently to be resolved hurrily at present Art problem.
Content of the invention
The present invention is based on the problems referred to above, it is proposed that a kind of new technical scheme, can arrange and only exist Just prescribed privacy application program can be controlled under privacy user's space state, so as to be lifted The confidentiality of application program and privacy, and then improve Consumer's Experience.
In view of this, first aspect of the present invention it is proposed a kind of application control method, is used for Terminal with multiple user's spaces, including:Receive to prescribed privacy application in active user space The control command of program;Judge whether the active user space is hidden in the plurality of user's space Private user's space;When the judged result is for being, it is allowed to which the prescribed privacy application program is carried out Control, otherwise, forbids being controlled the prescribed privacy application program.
In the technical scheme, prescribed privacy application program refers to just can be right under privacy user's space Its application program being controlled, when the control command to prescribed privacy application program is received, such as Note etc. is checked, then may determine that whether active user space is the privacy user in multiple user's spaces Space, rather than short message content is directly displayed, only when judged result is for being, just can be to predetermined Privacy application program is controlled, and also just explanation can check note, otherwise, forbid to prescribed privacy Application program is controlled.By technique scheme, prescribed privacy application program can be set, and And only just allow to be controlled prescribed privacy application program under privacy user's space state is in, So as to confidentiality and the privacy of application program is improved, and then improve Consumer's Experience.
In technique scheme, it is preferable that also include:The prescribed privacy application program includes: Application program in the privacy user's space;And/or in the PD of the terminal Application program with privacy mark, wherein, the PD is that the permission in the terminal is described many The public domain that individual user's space conducts interviews.
In the technical scheme, prescribed privacy application program includes but is not limited to:Empty positioned at privacy user Interior application program, and/or the application journey with privacy mark in the PD of terminal Sequence.Wherein, PD is the public domain for allowing multiple user's spaces to conduct interviews in terminal, also Illustrating both can be by the application program with private data to be moved in privacy user's space to enter which Row protection, it is also possible to which the application program with private data being directly pointed in the PD of terminal sets Put privacy mark to protect which, in this way, user can be according to the demand of oneself to secret number According to application program be configured, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:Receive in active user space described Before control command to prescribed privacy application program, also include:According to the setting command for receiving, For the arbitrary application program in the PD, the privacy mark is set.
In the technical scheme, can be according to the setting command for receiving to the arbitrary application in PD Program arrange privacy mark, the privacy be designated sightless, for making system distinguish the application program Whether it is privacy program, determines whether that intelligence controls the application program in privacy user's space. By technique scheme, active user space rapidly can be switched according to privacy mark, facilitate Arbitrary application program is controlled, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:According to the cancellation encryption order for receiving, Delete the privacy mark of arbitrary application program.
In the technical scheme, the privacy mark of application program can be deleted, so that user can be Any user space is controlled to application program, is easy to the actual demand according to user to arbitrary application Program is controlled, while, it is to avoid to the maloperation of the application program of privacy mark need not be arranged Phenomenon, improve Consumer's Experience.
In technique scheme, it is preferable that also include:When switching to from the privacy user's space When in other domestic consumer spaces beyond the privacy user's space in the plurality of user's space, Whether application program of the detection in running status is the prescribed privacy application program;Work as testing result During for being, terminating the process of the application program in running status, otherwise, continuing to run with described Application program in running status.
In the technical scheme, when terminal is switched to other domestic consumers from privacy user's space by user During space, the application journey that can only be controlled with privacy mark can be closed in privacy user's space Sequence.For example, if having detected prescribed privacy application program in running status, terminate in the fortune The process of the application program of row state, prevents the private data of prescribed privacy application program in domestic consumer Space is leaked, meanwhile, if without prescribed privacy application journey in the application program of running status Sequence, then continue to keep its running status, in this way, both having improved the confidentiality of prescribed privacy application program And privacy, other application programs are also ensured in normal operating condition, using with optimal use Experience.
A kind of a second aspect of the present invention, it is proposed that application program controlling device, including:Receive single Unit, receives the control command to prescribed privacy application program in active user space;Judging unit, Judge that whether the active user space is the privacy user's space in the plurality of user's space;Process Unit, when the judged result is for being, it is allowed to which the prescribed privacy application program is controlled, Otherwise, forbid being controlled the prescribed privacy application program.
In the technical scheme, prescribed privacy application program refers to just can be right under privacy user's space Its application program being controlled, when the control command to prescribed privacy application program is received, such as Note etc. is checked, then may determine that whether active user space is the privacy user in multiple user's spaces Space, rather than short message content is directly displayed, only when judged result is for being, just can be to predetermined Privacy application program is controlled, and also just explanation can check note, otherwise, forbid to prescribed privacy Application program is controlled.By technique scheme, prescribed privacy application program can be set, and And only just allow to be controlled prescribed privacy application program under privacy user's space state is in, So as to confidentiality and the privacy of application program is improved, and then improve Consumer's Experience.
In technique scheme, it is preferable that also include:The prescribed privacy application program includes: Application program in the privacy user's space;And/or in the PD of the terminal Application program with privacy mark, wherein, the PD is that the permission in the terminal is described many The public domain that individual user's space conducts interviews.
In the technical scheme, prescribed privacy application program includes but is not limited to:Empty positioned at privacy user Interior application program, and/or the application journey with privacy mark in the PD of terminal Sequence.Wherein, PD is the public domain for allowing multiple user's spaces to conduct interviews in terminal, also Illustrating both can be by the application program with private data to be moved in privacy user's space to enter which Row protection, it is also possible to which the application program with private data being directly pointed in the PD of terminal sets Put privacy mark to protect which, in this way, user can be according to the demand of oneself to secret number According to application program be configured, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:Arranging unit, uses currently described Before receiving the control command to prescribed privacy application program in the space of family, according to the setting life for receiving Order, is that the arbitrary application program in the PD arranges the privacy mark.
In the technical scheme, can be according to the setting command for receiving to the arbitrary application in PD Program arrange privacy mark, the privacy be designated sightless, for making system distinguish the application program Whether it is privacy program, determines whether that intelligence controls the application program in privacy user's space. By technique scheme, active user space rapidly can be switched according to privacy mark, facilitate Arbitrary application program is controlled, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:Unit is deleted, according to the cancellation for receiving Encryption order, deletes the privacy mark of arbitrary application program.
In the technical scheme, the privacy mark of application program can be deleted, so that user can be Any user space is controlled to application program, is easy to the actual demand according to user to arbitrary application Program is controlled, while, it is to avoid to the maloperation of the application program of privacy mark need not be arranged Phenomenon, improve Consumer's Experience.
In technique scheme, it is preferable that also include:Detector unit, when from the privacy user Space switches to other domestic consumers beyond the privacy user's space in the plurality of user's space When in space, detect whether the application program in running status is the prescribed privacy application program, Wherein, when the test results is yes, terminate the process of the application program in running status, no Then, the application program in running status is continued to run with.
In the technical scheme, when terminal is switched to other domestic consumers from privacy user's space by user During space, the application journey that can only be controlled with privacy mark can be closed in privacy user's space Sequence.For example, if having detected prescribed privacy application program in running status, terminate in the fortune The process of the application program of row state, prevents the private data of prescribed privacy application program in domestic consumer Space is leaked, meanwhile, if without prescribed privacy application journey in the application program of running status Sequence, then continue to keep its running status, in this way, both having improved the confidentiality of prescribed privacy application program And privacy, other application programs are also ensured in normal operating condition, using with optimal use Experience.
A kind of a third aspect of the present invention, it is proposed that terminal, with multiple user's spaces and above-mentioned technology Application program controlling device any one of scheme, therefore, the terminal has and above-mentioned technical side Application program controlling device identical technique effect any one of case, will not be described here.
By above technical scheme, prescribed privacy application program can be set, and only in hidden Just allow to be controlled prescribed privacy application program under the spatiality of private family, so as to improve application The confidentiality of program and privacy, and then improve Consumer's Experience.
Description of the drawings
Fig. 1 shows that the flow process of application control method according to an embodiment of the invention is illustrated Figure;
Fig. 2 shows the structural representation of application program controlling device according to an embodiment of the invention Figure;
Fig. 3 shows the structure chart of terminal according to an embodiment of the invention;
Fig. 4 shows the application program in privacy user's space according to an embodiment of the invention Schematic diagram;
Fig. 5 shows the signal of control prescribed privacy application program according to an embodiment of the invention Figure.
Specific embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, with reference to attached Figure and specific embodiment are further described in detail to the present invention.It should be noted that not In the case of conflict, the feature in embodiments herein and embodiment can be mutually combined.
A lot of details are elaborated in the following description in order to fully understand the present invention, but, The present invention can also be different from other modes described here using other to implement, therefore, the present invention Protection domain do not limited by following public specific embodiment.
Fig. 1 shows that the flow process of application control method according to an embodiment of the invention is illustrated Figure.
As shown in figure 1, application control method according to an embodiment of the invention, including:
Step 102, receives the control command to prescribed privacy application program in active user space;
Step 104, judges that whether the active user space is the privacy in the plurality of user's space User's space;
Step 106, when the judged result is for being, it is allowed to which the prescribed privacy application program is entered Row control, otherwise, forbids being controlled the prescribed privacy application program.
In the technical scheme, prescribed privacy application program refers to just can be right under privacy user's space Its application program being controlled, when the control command to prescribed privacy application program is received, such as Note etc. is checked, then may determine that whether active user space is the privacy user in multiple user's spaces Space, rather than short message content is directly displayed, only when judged result is for being, just can be to predetermined Privacy application program is controlled, and also just explanation can check note, otherwise, forbid to prescribed privacy Application program is controlled.By technique scheme, prescribed privacy application program can be set, and And only just allow to be controlled prescribed privacy application program under privacy user's space state is in, So as to confidentiality and the privacy of application program is improved, and then improve Consumer's Experience.
In technique scheme, it is preferable that also include:The prescribed privacy application program includes: Application program in the privacy user's space;And/or in the PD of the terminal Application program with privacy mark, wherein, the PD is that the permission in the terminal is described many The public domain that individual user's space conducts interviews.
In the technical scheme, prescribed privacy application program includes but is not limited to:Empty positioned at privacy user Interior application program, and/or the application journey with privacy mark in the PD of terminal Sequence.Wherein, PD is the public domain for allowing multiple user's spaces to conduct interviews in terminal, also Illustrating both can be by the application program with private data to be moved in privacy user's space to enter which Row protection, it is also possible to which the application program with private data being directly pointed in the PD of terminal sets Put privacy mark to protect which, in this way, user can be according to the demand of oneself to secret number According to application program be configured, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:Before step 102, also include:According to The setting command for receiving, is that the arbitrary application program in the PD arranges the privacy mark.
In the technical scheme, can be according to the setting command for receiving to the arbitrary application in PD Program arrange privacy mark, the privacy be designated sightless, for making system distinguish the application program Whether it is privacy program, determines whether that intelligence controls the application program in privacy user's space. By technique scheme, active user space rapidly can be switched according to privacy mark, facilitate Arbitrary application program is controlled, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:According to the cancellation encryption order for receiving, Delete the privacy mark of arbitrary application program.
In the technical scheme, the privacy mark of application program can be deleted, so that user can be Any user space is controlled to application program, is easy to the actual demand according to user to arbitrary application Program is controlled, while, it is to avoid to the maloperation of the application program of privacy mark need not be arranged Phenomenon, improve Consumer's Experience.
In technique scheme, it is preferable that also include:When switching to from the privacy user's space When in other domestic consumer spaces beyond the privacy user's space in the plurality of user's space, Whether application program of the detection in running status is the prescribed privacy application program;Work as testing result During for being, terminating the process of the application program in running status, otherwise, continuing to run with described Application program in running status.
In the technical scheme, when terminal is switched to other domestic consumers from privacy user's space by user During space, the application journey that can only be controlled with privacy mark can be closed in privacy user's space Sequence.For example, if having detected prescribed privacy application program in running status, terminate in the fortune The process of the application program of row state, prevents the private data of prescribed privacy application program in domestic consumer Space is leaked, meanwhile, if without prescribed privacy application journey in the application program of running status Sequence, then continue to keep its running status, in this way, both having improved the confidentiality of prescribed privacy application program And privacy, other application programs are also ensured in normal operating condition, using with optimal use Experience.
Fig. 2 shows the structural representation of application program controlling device according to an embodiment of the invention Figure.
As shown in Fig. 2 application program controlling device 200 according to an embodiment of the invention, bag Include:Receiving unit 202, receives the control to prescribed privacy application program in active user space and orders Order;Judging unit 204, judges that whether the active user space is in the plurality of user's space Privacy user's space;Processing unit 206, when the judged result is for being, it is allowed to described predetermined Privacy application program is controlled, and otherwise, forbids being controlled the prescribed privacy application program.
In the technical scheme, prescribed privacy application program refers to just can be right under privacy user's space Its application program being controlled, when the control command to prescribed privacy application program is received, such as Note etc. is checked, then may determine that whether active user space is the privacy user in multiple user's spaces Space, rather than short message content is directly displayed, only when judged result is for being, just can be to predetermined Privacy application program is controlled, and also just explanation can check note, otherwise, forbid to prescribed privacy Application program is controlled.By technique scheme, prescribed privacy application program can be set, and And only just allow to be controlled prescribed privacy application program under privacy user's space state is in, So as to confidentiality and the privacy of application program is improved, and then improve Consumer's Experience.
In technique scheme, it is preferable that also include:The prescribed privacy application program includes: Application program in the privacy user's space;And/or in the PD of the terminal Application program with privacy mark, wherein, the PD is that the permission in the terminal is described many The public domain that individual user's space conducts interviews.
In the technical scheme, prescribed privacy application program includes but is not limited to:Empty positioned at privacy user Interior application program, and/or the application journey with privacy mark in the PD of terminal Sequence.Wherein, PD is the public domain for allowing multiple user's spaces to conduct interviews in terminal, also Illustrating both can be by the application program with private data to be moved in privacy user's space to enter which Row protection, it is also possible to which the application program with private data being directly pointed in the PD of terminal sets Put privacy mark to protect which, in this way, user can be according to the demand of oneself to secret number According to application program be configured, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:Arranging unit 208, described current Before receiving the control command to prescribed privacy application program in user's space, according to the setting for receiving Order, is that the arbitrary application program in the PD arranges the privacy mark.
In the technical scheme, can be according to the setting command for receiving to the arbitrary application in PD Program arrange privacy mark, the privacy be designated sightless, for making system distinguish the application program Whether it is privacy program, determines whether that intelligence controls the application program in privacy user's space. By technique scheme, active user space rapidly can be switched according to privacy mark, facilitate Arbitrary application program is controlled, so as to improve Consumer's Experience.
In technique scheme, it is preferable that also include:Unit 210 is deleted, according to received Cancel encryption order, delete the privacy mark of arbitrary application program.
In the technical scheme, the privacy mark of application program can be deleted, so that user can be Any user space is controlled to application program, is easy to the actual demand according to user to arbitrary application Program is controlled, while, it is to avoid to the maloperation of the application program of privacy mark need not be arranged Phenomenon, improve Consumer's Experience.
In technique scheme, it is preferable that also include:Detector unit 212, when from the privacy It is common that user's space switches to other beyond the privacy user's space in the plurality of user's space When in user's space, detect whether the application program in running status is the prescribed privacy application journey Sequence, wherein, when the test results is yes, terminates entering for the application program in running status Journey, otherwise, continues to run with the application program in running status.
In the technical scheme, when terminal is switched to other domestic consumers from privacy user's space by user During space, the application journey that can only be controlled with privacy mark can be closed in privacy user's space Sequence.For example, if having detected prescribed privacy application program in running status, terminate in the fortune The process of the application program of row state, prevents the private data of prescribed privacy application program in domestic consumer Space is leaked, meanwhile, if without prescribed privacy application journey in the application program of running status Sequence, then continue to keep its running status, in this way, both having improved the confidentiality of prescribed privacy application program And privacy, other application programs are also ensured in normal operating condition, using with optimal use Experience.
Fig. 3 shows the structure chart of terminal according to an embodiment of the invention.
As shown in figure 3, terminal according to an embodiment of the invention 300, empty with multiple users Between and application program controlling device 200 any one of technique scheme, therefore, the terminal 300 have and the 200 identical skill of application program controlling device any one of technique scheme Art effect, will not be described here.
Technical scheme is described with reference to Fig. 4 and Fig. 5.
Fig. 4 shows the application program in privacy user's space according to an embodiment of the invention Schematic diagram, Fig. 5 show according to an embodiment of the invention control prescribed privacy application program Schematic diagram.
As shown in figure 4, can be by the application journey containing private information such as QQ, contact person, Alipay Sequence is added in privacy user's space.Furthermore it is also possible to continue to add by newly adding secret program button Other application programs are to privacy user's space.
As shown in figure 5, when terminal is in privacy user's space, can carry out to prescribed privacy application program Control, if terminal is switched to behind domestic consumer space from privacy user's space, forbids to prescribed privacy Application program is controlled.In addition, packet management module can be being allowed to prescribed privacy application journey Packet transmission is carried out for prescribed privacy application program when sequence is controlled, and forbidding to predetermined hidden Private application program terminates as prescribed privacy application program and carries out packet transmission when being controlled.
In the present invention, term " first ", " second ", " the 3rd " are only used for the mesh for describing , and it is not intended that indicating or hint relative importance.For one of ordinary skill in the art Speech, can understand above-mentioned term concrete meaning in the present invention as the case may be.
Technical scheme is described in detail above in association with accompanying drawing, by the technical side of the present invention Case, can arrange prescribed privacy application program, and only in ability under privacy user's space state Allow to be controlled prescribed privacy application program, so as to improve confidentiality and the privacy of application program Property, and then improve Consumer's Experience.
The preferred embodiments of the present invention are the foregoing is only, the present invention is not limited to, for For those skilled in the art, the present invention can have various modifications and variations.All essences in the present invention Within god and principle, any modification, equivalent substitution and improvement that is made etc., should be included in the present invention Protection domain within.

Claims (11)

1. a kind of application control method, for the terminal with multiple user's spaces, its feature It is, including:
The control command to prescribed privacy application program is received in active user space;
Judge that whether the active user space is the privacy user's space in the plurality of user's space;
When the judged result is for being, it is allowed to which the prescribed privacy application program is controlled, no Then, forbid being controlled the prescribed privacy application program.
2. application control method according to claim 1, it is characterised in that described pre- Determining privacy application program includes:
Application program in the privacy user's space;And/or
The application program with privacy mark in the PD of the terminal, wherein, the public affairs Co-domain is the public domain that the plurality of user's space of permission in the terminal conducts interviews.
3. application control method according to claim 2, it is characterised in that described Before receiving the control command to prescribed privacy application program in active user space, also include:
According to the setting command for receiving, it is that the arbitrary application program setting in the PD is described hidden Private mark.
4. application control method according to claim 3, it is characterised in that also wrap Include:
According to the cancellation encryption order for receiving, the privacy mark of arbitrary application program is deleted Know.
5. application control method according to any one of claim 1 to 4, its feature It is, also includes:
It is empty when the privacy user in the plurality of user's space is switched to from the privacy user's space Between beyond other domestic consumer spaces in when, detect whether application program in running status is institute State prescribed privacy application program;
When the test results is yes, terminate the process of the application program in running status, no Then, the application program in running status is continued to run with.
6. a kind of application program controlling device, for the terminal with multiple user's spaces, its feature It is, including:
Receiving unit, receives the control command to prescribed privacy application program in active user space;
Judging unit, judges that whether the active user space is the privacy in the plurality of user's space User's space;
Processing unit, when the judged result is for being, it is allowed to which the prescribed privacy application program is entered Row control, otherwise, forbids being controlled the prescribed privacy application program.
7. application program controlling device according to claim 6, it is characterised in that described pre- Determining privacy application program includes:
Application program in the privacy user's space;And/or
The application program with privacy mark in the PD of the terminal, wherein, the public affairs Co-domain is the public domain that the plurality of user's space of permission in the terminal conducts interviews.
8. application program controlling device according to claim 7, it is characterised in that also wrap Include:
Arranging unit, in the control received in active user space to prescribed privacy application program Before order, according to the setting command for receiving, it is that the arbitrary application program in the PD is arranged The privacy mark.
9. application program controlling device according to claim 8, it is characterised in that also wrap Include:
Unit is deleted, according to the cancellation encryption order for receiving, deletes the institute of arbitrary application program State privacy mark.
10. the application program controlling device according to any one of claim 6 to 9, its feature It is, also includes:
Detector unit, described in switching in the plurality of user's space from the privacy user's space When in other domestic consumer spaces beyond privacy user's space, the application journey in running status is detected Whether sequence is the prescribed privacy application program, wherein, when the test results is yes, terminates the place In the process of the application program of running status, otherwise, the application in running status is continued to run with Program.
A kind of 11. terminals, with multiple user's spaces, it is characterised in that include such as claim 6 To the application program controlling device any one of 10.
CN201510532323.XA 2015-08-26 2015-08-26 Application program control method, application program control device and terminal Active CN106485137B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510532323.XA CN106485137B (en) 2015-08-26 2015-08-26 Application program control method, application program control device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510532323.XA CN106485137B (en) 2015-08-26 2015-08-26 Application program control method, application program control device and terminal

Publications (2)

Publication Number Publication Date
CN106485137A true CN106485137A (en) 2017-03-08
CN106485137B CN106485137B (en) 2020-02-07

Family

ID=58234339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510532323.XA Active CN106485137B (en) 2015-08-26 2015-08-26 Application program control method, application program control device and terminal

Country Status (1)

Country Link
CN (1) CN106485137B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040540A (en) * 2017-04-20 2017-08-11 北京奇虎科技有限公司 A kind of cloud private data display methods and device, server and mobile terminal
WO2019184617A1 (en) * 2018-03-29 2019-10-03 Oppo广东移动通信有限公司 Information sharing method and device, computer-readable storage medium and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546923A (en) * 2010-12-21 2012-07-04 Lg电子株式会社 Mobile terminal and method of managing information therein
CN103324893A (en) * 2013-05-31 2013-09-25 华为技术有限公司 Privacy protection method and device
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546923A (en) * 2010-12-21 2012-07-04 Lg电子株式会社 Mobile terminal and method of managing information therein
CN104008313A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Protecting method and device of privacy information
CN103324893A (en) * 2013-05-31 2013-09-25 华为技术有限公司 Privacy protection method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040540A (en) * 2017-04-20 2017-08-11 北京奇虎科技有限公司 A kind of cloud private data display methods and device, server and mobile terminal
CN107040540B (en) * 2017-04-20 2020-06-09 北京安云世纪科技有限公司 Cloud privacy data display method and device, server and mobile terminal
WO2019184617A1 (en) * 2018-03-29 2019-10-03 Oppo广东移动通信有限公司 Information sharing method and device, computer-readable storage medium and terminal

Also Published As

Publication number Publication date
CN106485137B (en) 2020-02-07

Similar Documents

Publication Publication Date Title
CN104008313B (en) The guard method of privacy information and device
CN104156657B (en) The data inputting method of terminal, the message input device of terminal and terminal
CN104463025B (en) System switching method, system switching device and terminal
CN105631275B (en) information display method, information display device and terminal
WO2016045192A1 (en) Notification processing method, notification processing device, and terminal
CN105320880B (en) The control method and device of terminal
CN104008345B (en) Guard method to the privacy of user data of application program and device
US20130055411A1 (en) Apparatus and method for controlling permissions in mobile terminal
CN104767713B (en) Account binding method, server and system
CN106211164A (en) Terminal network changing method, terminal network switching device and terminal
CN104158947A (en) Mobile phone privacy protecting system
CN107734176A (en) Loss guard method, terminal and the computer-readable recording medium of mobile terminal
CN105069333A (en) User domain access method, access system and terminal
CN104517071A (en) System processing method, system processing device and terminal
CN103400081B (en) Terminal and the display control method of user interface
CN104184738A (en) Information sharing method and information sharing device of terminal and terminal
CN105549786A (en) System switching method and device based on pressure touch control and terminal
CN104184900A (en) Data processing method, system and mobile terminal
CN102215229A (en) Terminal and method for controlling application program to access exterior of terminal
CN106231534A (en) Mobile terminal and the number of writing thereof and method of disannuling a call, device
CN106485137A (en) Application control method, application program controlling device and terminal
US20140148128A1 (en) Method and device for protecting privacy information
CN104486506B (en) System loads method, system loads device and terminal
CN104363326B (en) A kind of contact person's display methods, device and terminal
CN105447402A (en) Data processing method and data processing apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170809

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant