Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for shielding non-deletable application of mobile terminal

A mobile terminal, system application technology, applied in the direction of program loading/starting, data processing input/output process, telephone communication, etc., can solve problems such as affecting system stability, consuming user traffic, and illegally connecting to the network.

Active Publication Date: 2017-02-01
HUIZHOU TCL MOBILE COMM CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (3) Cannot be deleted by normal means
[0011] (1) Affect system stability, even cause crash
[0012] First of all, these pre-installed software are not installed on the mobile phone without the knowledge of consumers, which violates consumers’ right to know about the product to a certain extent; The stability test is easy to cause hidden dangers to the system stability, if it is small, it will affect the fluency of use, and if it is large, it may cause the system to crash (crash)
[0013] (2) Users are difficult to delete and illegally connect to the network
[0014] Generally, these pre-installed software are directly written to the bottom layer of the system, and ordinary users may not be able to uninstall and install other software of the same type. This approach directly violates the consumer's right to use the mobile phone.
And some pre-installed software is secretly connecting to the network, consuming the user's traffic
Except for a small number of malicious connections to the network for data exchange, many of them are performing automatic updates, but all of this is done without the user's knowledge, and it may not be discovered until the list of high phone bills at the end of the month comes out.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for shielding non-deletable application of mobile terminal
  • Method and system for shielding non-deletable application of mobile terminal
  • Method and system for shielding non-deletable application of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0054] see figure 1 , figure 1 It is a flow chart of a preferred embodiment of the method for shielding an application that cannot be deleted by a mobile terminal in the present invention.

[0055] Such as figure 1 As shown, a method for a mobile terminal to block an application that cannot be deleted provided in an embodiment of the present invention includes the following steps:

[0056] Step S100, when the mobile terminal detects that the application icon on the screen is in a long-press state, determine whether the application is an application that cannot be deleted.

[0057] In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of mobile terminals, and discloses a method and a system for shielding a non-deletable application of a mobile terminal. The method comprises the following steps: when the mobile terminal detects that an application icon on a screen is in a long-press state, judging whether an application is a non-deletable application or not; when the long-press application belongs to the non-deletable application, judging whether the non-deletable application belongs to a system application or not; when the non-deletable application does not belong to the system application but belongs to an application in a preset core application list, popping a prompt box on the screen to prompt a user whether to confirm shielding of the application or not, and if so, shielding the application and hiding the icon of the application on the screen. In the method, the prompt box is used for prompting the user whether to shield the non-deletable application in the mobile terminal or not, so that the user can disable certain unfavorite and less-usable applications of the mobile terminal, and the user can operate and process the applications conveniently.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a mobile phone screenshot method and system based on security prompts. Background technique [0002] With the rapid development of mobile terminals, there are more and more factory-built software (applications) in mobile terminals. Take the most commonly used mobile phones as mobile terminals. Mobile phone software is also called mobile phone pre-installed software. Applications or software that come with the factory or are pre-installed in consumers' mobile phones through third-party flashing channels, and cannot be deleted by consumers themselves. With the vigorous development of the smartphone market, the built-in software pre-installed in smartphones has gradually become the biggest threat to user experience. Moreover, the built-in software pre-installed in the smart phone takes up a lot of mobile phone memory, affects the running speed, and steals the mobil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445G06F3/0481G06F3/0488H04M1/725H04M1/72448
CPCG06F3/04817G06F3/0488G06F9/44594H04M1/72463G06F9/445H04M1/72448G06F3/0484
Inventor 孙继芃
Owner HUIZHOU TCL MOBILE COMM CO LTD