Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application program starting method, list configuring method, terminal and server

A technology of application program list and application program, applied in the direction of instruments, computer security devices, electrical digital data processing, etc., can solve the problems of normal operation impact, user inconvenience, cumbersome process, etc., to avoid misoperation, improve accuracy, The effect of the simplified process

Active Publication Date: 2013-12-04
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, when the application program is started, a box will pop up once to prompt whether to allow the above operations, and then it will pop up again to let the user decide whether to join the black and white list. The decision to leave it to the user requires the user to have a certain understanding of the application. Otherwise, it is easy to add malicious applications to the whitelist, resulting in loss of traffic charges or memory. Conversely, if common applications are added to the blacklist, it will also cause users to follow Inconvenience caused by the use of common applications, if the commonly used applications are added to the blacklist, it may also affect the normal operation of other applications. Therefore, the accuracy of the existing technology to determine malicious applications is low; 2. Two inquiries about the pop-up box The process will interfere with the normal operation of the mobile terminal, and the process is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program starting method, list configuring method, terminal and server
  • Application program starting method, list configuring method, terminal and server
  • Application program starting method, list configuring method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0056]figure 1 It is a flowchart of a method for starting an application program provided by an embodiment of the present invention. The executive subject of this embodiment is a terminal, and the terminal can be a fixed terminal such as a PC (Personal Computer, personal computer) or a mobile terminal, and the mobile terminal can be a smart phone, a tablet computer, an MP3 (Moving Picture Experts Group Audio Layer III, dynamic Image experts compress standard audio level 3), PDA (Personal Digital Assistant, personal digital assistant), etc. see figure 1 , the example includes:

[0057] 101. When the first application program of the terminal is started, search for the first application program in the malicious application program list ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application program starting method, a list configuring method, a terminal and a server, and belongs to the field of mobile terminals. The application program starting method includes when a first application program of the terminal is started, searching the first application program in a malicious application program list and a trusted application program list both issued by the server; when the first application program is in the malicious application program list, interrupting starting of the first application program; when the first application program is in the trusted application program list, continuing to execute starting of the first application program. The list configuring method includes determining malicious application programs and / or trusted application programs, generating the malicious application program list and / or the trusted application program list according to the determined malicious application programs and / or the trusted application programs, and sending the generated malicious application program list and / or the trusted application program list to the terminal. The process of inquiring by pop-up frames is simplified, and accuracy of determining of the malicious application programs is improved.

Description

technical field [0001] The invention relates to the field of mobile terminals, in particular to a method for starting an application program, a method for configuring a list, a terminal and a server. Background technique [0002] With the development of mobile terminals, multiple applications can be installed and run simultaneously on the same mobile terminal, and there may be malicious applications in the multiple applications. Malicious applications will self-start, network, occupy memory, and even conduct illegal Operations such as deduction of fees destroy the normal use of mobile terminals. In order to prevent malicious applications from interfering with the normal use of mobile terminals, the conventional method is to establish blacklists and whitelists on mobile terminals, and add malicious applications to the blacklist of mobile terminals. , and add trusted applications to the mobile terminal whitelist, the operations of the applications in the blacklist will be clos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51
Inventor 王庆郭浩然肖权浩袁宜霞宋家顺李朋涛詹勋昌林春优
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products