Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application program control method, device and mobile terminal

A mobile device and program startup technology, applied in the communication field, can solve the problems of privacy leakage, economic loss, and low security, and achieve the effect of improving security performance, reducing economic loss, and increasing vigilance

Inactive Publication Date: 2016-12-21
SHENZHEN TINNO WIRELESS TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, usually the elderly do not use the Internet access function, but they often unconsciously turn on the flow switch, 4G switch, text message sending and reading permission due to accidental touch or other reasons, and some third-party unsafe software will be in the user's knowledge. Therefore, these users who do not surf the Internet often suffer some direct or indirect economic losses, as well as suffer from privacy leaks.
[0004] Although the current smart mobile devices will also give security warnings, these security warnings are all in the form of prompt boxes or multiple reminders to warn users. Because of friendliness issues, users are often easy to ignore the content and directly click OK
In addition, current smart mobile devices cannot block automatic scripts, using scrolling and clicking methods, even if it is not manually operated by the user, the warning box can be automatically ignored
[0005] It can be seen that the current smart mobile devices have low security problems for some user groups, which can easily cause economic losses to these users and make them face the risk of privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program control method, device and mobile terminal
  • Application program control method, device and mobile terminal
  • Application program control method, device and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] The application program control method in this embodiment can be applied to mobile devices, such as mobile phones, tablet computers, and the like.

[0051] figure 1 It is a flow chart of the application control method in Embodiment 1 of the present invention. like figure 1 As shown, in this embodiment, the application program control method may include the following steps:

[0052] Step S101, prompting the user to input verification information when the specified application is triggered;

[0053] The designated application program here refers to the application program involving sensitive functions, such as turning on the traffic switch, 4G switch, text message sending and reading permission, contact reading permission, etc.

[0054] In practical applications, the program of the application program control method of the embodiment of the present invention can be implanted in the interface of the application program involving sensitive functions, so that when these s...

Embodiment 2

[0067] The application program control method in this embodiment can be applied to mobile devices, such as mobile phones, tablet computers, and the like.

[0068] figure 2 It is a flow chart of the application control method in the second embodiment of the present invention. like figure 2 As shown, in this embodiment, the application program control method may include the following steps:

[0069] Step S201, prompting the user to input verification information when the specified application is triggered;

[0070] Step S202, receiving verification information input by the user;

[0071] Step S203, verifying the received verification information;

[0072] Step S204, judging whether the received verification information is correct, if the verification information is correct, it means that the verification has passed, then execute step S205, if the verification information is wrong, it means that the verification has not passed, and execute step S206;

[0073] Step S205, al...

Embodiment 3

[0079] The application program control method in this embodiment can be applied to mobile devices, such as mobile phones, tablet computers, and the like.

[0080] image 3 It is a flow chart of the application control method in the third embodiment of the present invention. like image 3 As shown, in this embodiment, the application program control method may include the following steps:

[0081] Step S301, the specified application is triggered;

[0082] Step S302, judging whether the current strict mode is enabled, wherein the strict mode refers to a mode in which the startup of the specified application program needs to be verified, if the strict mode is enabled, execute step S303, otherwise end;

[0083] In this article, the mode in which the startup of the specified application needs to be authenticated is referred to as the strict mode.

[0084] In practical applications, you can set the strict mode switch in the mobile device. When the strict mode is enabled, authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to an application program control method, device and a mobile terminal. The application program control method comprises following steps: prompting a user to input verification information when a designated application program is triggered; receiving the verification information input by the user; verifying the received verification information; controlling the application program to start according to the verification result. The embodiment of the present invention requires the user to carry out complicated verification process when the designated application program is triggered, which improves the vigilance of the user when opening sensitive applications, effectively prevents the sensitive application from being opened unintentionally by the user and opened by a third party application without the user's knowledge, thereby improving the security of mobile devices, reducing the user's economic losses, and effectively preventing the disclosure of personal privacy information.

Description

technical field [0001] The present invention relates to the communication field, in particular to an application program control method, device and mobile equipment. Background technique [0002] Currently, smart mobile devices, such as smart phones and tablet computers, have been widely used. These smart mobile devices generally have an Internet access function, so that people can easily access the Internet through smart mobile devices in any environment where they can access the network. [0003] While bringing many conveniences to people, smart mobile devices have also brought some problems to some user groups. For example, usually the elderly do not use the Internet access function, but they often unconsciously turn on the flow switch, 4G switch, text message sending and reading permission due to accidental touch or other reasons, and some third-party unsafe software will be in the user's knowledge. Therefore, these users who do not surf the Internet often suffer some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/31
CPCG06F21/121G06F21/31G06F21/1015
Inventor 申茂情
Owner SHENZHEN TINNO WIRELESS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products