Application management method and terminal

An application management and terminal technology, applied in the electronic field, can solve the problems of stealing traffic, reducing the security of the terminal system, increasing the power consumption of the terminal, etc., and achieve the effect of improving security

Active Publication Date: 2019-12-06
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these applications are likely to frequently run secretly in the background, monitor user behavior, and even read user privacy information and steal traffic, etc. For example, the application obtains the notification reading permission of the system, so that the system It will directly trigger the application startup, which will not only greatly increase the power consumption of the terminal, but also reduce the security of the terminal system, seriously affecting the user experience of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application management method and terminal
  • Application management method and terminal
  • Application management method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055] The terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide an application management method and a terminal. The method comprises the steps that the terminal obtains a target application with a notification reading right of a system, wherein the system triggers the target application to be started when a new notification occurs; and the terminal obtains an application package name of the target application, judges whether the target application meets a preset condition or not according to the package name of the target application, and can disable the notification reading right of the target application when the target application meets the preset condition, so that the terminal system no longer trigger the target application to be started when the new notification occurs. Through the embodiments of the method and the terminal, application startup and a system monitoring behavior can be effectively limited, so that the system security is improved.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to an application management method and a terminal. Background technique [0002] With the rapid development of communication technology and mobile Internet technology, terminals such as smartphones and tablet computers have become very popular. Users can easily conduct activities such as making friends, entertaining, and working by installing various applications on the terminals. However, these applications are likely to frequently run secretly in the background, monitor user behavior, and even read user privacy information and steal traffic, etc. For example, the application obtains the notification reading permission of the system, so that the system It will directly trigger the start of the application, which will not only greatly increase the power consumption of the terminal, but also reduce the security of the terminal system, seriously affecting the user experie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51G06F21/55G06F1/329
CPCG06F1/329G06F21/51G06F21/552
Inventor 林志泳
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products