CN109144608B - Method and device for shielding function popup window of control application in application program - Google Patents
Method and device for shielding function popup window of control application in application program Download PDFInfo
- Publication number
- CN109144608B CN109144608B CN201810965657.XA CN201810965657A CN109144608B CN 109144608 B CN109144608 B CN 109144608B CN 201810965657 A CN201810965657 A CN 201810965657A CN 109144608 B CN109144608 B CN 109144608B
- Authority
- CN
- China
- Prior art keywords
- popup
- target function
- monitoring
- information
- control application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The application discloses a method and a device for shielding a function popup window of a control application in an application program, wherein the method comprises the following steps: when an application program runs, acquiring configured popup monitoring information, wherein the popup monitoring information indicates a target function popup to be monitored in a control application; in the process that the control application is called by the application program, triggering and monitoring the target function popup according to the popup monitoring information; and shielding the target function popup in the application program if the target function popup is triggered. According to the technical scheme, the target function popup window in the control application is shielded in the process that the control application is called by the application program according to the popup window monitoring information configured for the target function popup window, so that the function corresponding to the target function popup window cannot be used on the control application. And the control application or the shielding interface of the control application does not need to be modified, and the function popup shielding is more efficient and faster.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for shielding a function popup window of a control application in an application program.
Background
In the application program running on the terminal, it is inevitable that some application programs need to use the functions of other control applications, so that other control applications need to be called when the application program runs, for example, word documents are opened in mails, for example, word documents are opened in communication software, and the like.
However, when the application program calls the control application, some functions of the called control application are not expected to be used by the user, so that it is not expected that the function popup window corresponding to some functions of the control application does not pop up or the user cannot operate the function popup window when the user uses the control application. For example, for business security purposes, after the office software is called in the mail to open the encrypted document, when the user closes the document after modification, the office software pops up a saved function popup window. For the user, the user can save the encrypted document as an unencrypted document through the function popup window, so that the document loses the encryption function. In this case, it is only desirable for the party providing the encrypted document to have the user browse the encrypted document through the control application, and it is not desirable for the user to save the encrypted document as an unencrypted document through the function of the control application.
Therefore, in the process of calling the control application in the application program, for privacy or other reasons, it is necessary to limit the functions that can be used by the user in the control application, and the functions in the control application correspond to the corresponding function popup windows, so that the limit of the functions that can be used by the user in the control application is that the user cannot operate the function popup windows corresponding to the functions.
In the prior art, for such situations, developers of control applications need to be contacted, and request them to provide a shielding interface of function popup in the application control or request them to modify the control application, which is cumbersome and expensive for the developers of the control applications to request help.
Therefore, the problem of how to shield the function popup window of the control application in the process of calling the control application in the application program so as to limit the functions of the control application which can be used in the calling process of the application program is still to be solved.
Disclosure of Invention
In order to solve the problems in the related art, the application provides a method and a device for shielding a function popup window of a control application in an application program.
A method of masking a functionality popup of a control application in an application, comprising:
when an application program runs, acquiring configured popup monitoring information, wherein the popup monitoring information indicates a target function popup to be monitored in a control application;
in the process that the control application is called by the application program, triggering and monitoring the target function popup according to the popup monitoring information;
and shielding the target function popup in the application program if the target function popup is triggered.
An apparatus for masking a functionality popup of a control application in an application, comprising:
an acquisition module configured to perform: when an application program runs, acquiring configured popup monitoring information, wherein the popup monitoring information indicates a target function popup to be monitored in a control application;
a monitoring module configured to perform: in the process that the control application is called by the application program, triggering and monitoring the target function popup according to the popup monitoring information;
a shielding module configured to perform: and shielding the target function popup in the application program if the target function popup is triggered.
In one embodiment, the apparatus further comprises:
a configuration module configured to perform: and configuring popup monitoring information according to the configuration information of the function popup in the application control.
In an embodiment, the pop-up window monitoring information includes a monitoring start condition and pop-up window trigger information, and the monitoring module includes:
a monitoring start detection unit configured to perform: detecting the monitoring starting condition in the process that the control application is called by the application program;
a monitoring start unit configured to perform: if the detection reaches the detection starting condition, starting the monitoring of the target function popup;
a trigger detection unit configured to perform: and after the monitoring is started, carrying out triggering monitoring on the target function popup according to the popup triggering information.
In an embodiment, the popup monitoring information further includes a monitoring end condition, and after the monitoring of the function popup is started, the apparatus further includes:
a monitoring end condition detection module configured to perform: detecting the monitoring end condition;
a monitor stop module configured to perform: and if the monitoring end condition is detected to be reached, stopping monitoring the target function popup window.
In one embodiment, the shielding module includes:
a popup information acquisition unit configured to perform: if the target function popup is triggered, acquiring popup information corresponding to the triggered target function popup;
a close option acquisition unit configured to perform: acquiring a closing option of the target function popup from the popup information;
a closing unit configured to perform: and closing the target function popup window through the closing option.
In another embodiment, the shielding module further includes, in addition to the pop-up window information obtaining unit:
a selection option acquisition unit configured to perform: acquiring a selection option of the target function popup from the popup information;
a shielding unit configured to perform: and carrying out default selection on the target function popup window according to the selection option so as to shield the target function popup window.
An apparatus for masking a functionality popup of a control application in an application, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method described above.
A storage medium having stored thereon a computer program which, when executed by a processor, implements the method described above.
According to the technical scheme, the target function popup in the control application is shielded in the process that the control application is called by an application program according to the popup monitoring information configured for the target function popup, so that functions which can be used in the control application are limited. On the other hand, the control application does not need to be modified or a shielding interface of the target function popup in the control application is not needed to be provided, and the shielding of the target function popup is more efficiently and quickly realized.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a schematic illustration of an implementation environment according to the present application;
FIG. 2 is a block diagram illustrating a terminal 200 according to an example embodiment;
FIG. 3 is a flow diagram illustrating a method of masking a functionality popup of a control application in an application in accordance with an exemplary embodiment;
FIG. 4 is a flowchart of step S130 in the embodiment of FIG. 3;
FIG. 5 is a flowchart of steps subsequent to step S132 in the embodiment shown in FIG. 4;
FIG. 6 is an exemplary flowchart of step S150 in the embodiment of FIG. 3;
FIG. 7 is another exemplary flowchart of a step subsequent to step S151 in the embodiment shown in FIG. 6;
FIG. 8 is a block diagram illustrating an apparatus for masking a functionality popup of a control application in an application in accordance with an exemplary embodiment;
FIG. 9 is a block diagram illustrating an apparatus for masking a functionality popup of a control application in an application in accordance with another exemplary embodiment;
fig. 10 is a block diagram illustrating an apparatus for masking a function popup of a control application in an application according to another exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
FIG. 1 is a schematic illustration of an implementation environment according to the present application. The implementation environment includes: the terminal 200, and the application 101 and the control application 102 running on the terminal 200.
The terminal 200 may be a mobile phone, a tablet computer, a notebook computer, or other electronic devices that can be run by the application 101 and the control application 102, and is not limited in particular.
Fig. 2 is a block diagram illustrating a terminal 200 according to an example embodiment. The terminal 200 may be an electronic device such as a smart phone, a tablet computer, and a notebook computer.
Referring to fig. 2, the terminal 200 may include one or more of the following components: a processing component 202, a memory 204, a power component 206, a multimedia component 208, an audio component 210, a sensor component 214, and a communication component 216.
It should be noted that the terminal 200 is only an example adapted to the present invention, and should not be considered as providing any limitation to the scope of the present invention. The terminal 200 is also not to be construed as necessarily dependent upon or having one or more components of the exemplary terminal 200 shown in fig. 2.
The processing component 202 generally controls overall operation of the terminal 200, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations, among others. The processing components 202 may include one or more processors 218 to execute instructions to perform all or a portion of the steps of the methods described below. Further, the processing component 202 can include one or more modules that facilitate interaction between the processing component 202 and other components. For example, the processing component 202 can include a multimedia module to facilitate interaction between the multimedia component 208 and the processing component 202.
The memory 204 is configured to store various types of data to support operations at the terminal 200. Examples of such data include instructions for any application or method operating on terminal 200. The Memory 204 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. Also stored in memory 204 are one or more modules configured for execution by the one or more processors 218 to perform all or a portion of the steps of the method embodiments described below for masking functionality pops of control applications in an application program.
The power supply component 206 provides power to the various components of the terminal 200. The power components 206 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal 200.
The multimedia component 208 includes a screen providing an output interface between the terminal 200 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a touch panel. If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. The screen may further include an Organic Light Emitting Display (OLED for short).
The audio component 210 is configured to output and/or input audio signals. For example, the audio component 210 includes a Microphone (MIC) configured to receive external audio signals when the terminal 200 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 204 or transmitted via the communication component 216. In some embodiments, audio component 210 also includes a speaker for outputting audio signals.
The sensor assembly 214 includes one or more sensors for providing various aspects of status assessment for the terminal 200. For example, the sensor assembly 214 can detect an open/closed state of the terminal 200, the relative positioning of the components, the sensor assembly 214 can also detect a change in position of the terminal 200 or a component of the terminal 200, and a change in temperature of the terminal 200. In some embodiments, the sensor assembly 214 may also include a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 216 is configured to facilitate wired or wireless communication between the terminal 200 and other devices. The terminal 200 may access a WIreless network based on a communication standard, such as WiFi (WIreless-Fidelity). In an exemplary embodiment, the communication component 216 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the Communication component 216 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, Infrared Data Association (IrDA) technology, Ultra Wideband (UWB) technology, bluetooth technology, and other technologies.
In an exemplary embodiment, the terminal 200 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital signal processors, digital signal processing devices, programmable logic devices, field programmable gate arrays, controllers, microcontrollers, microprocessors or other electronic components for performing the methods described below.
FIG. 3 is a flow diagram illustrating a method of masking a functionality popup of a control application in an application in accordance with an exemplary embodiment. The method is used in a terminal 200 implementing the environment shown in fig. 1. As shown in fig. 3, the method may include the steps of:
step S110, when the application program runs, the configured popup monitoring information is obtained, and the popup monitoring information indicates a target function popup to be monitored in the control application.
The control application is an application that can be called by the application program, and may be another application program independent of the application program, such as a specific application software or a plug-in, or may be a sub-function program under the application program, which is not specifically limited herein.
The target function popup is a function popup corresponding to a function which needs to be limited in use in the control application in the process that the control application is called by the application program.
The popup monitoring information is configured according to an application program, a control application and a target function popup, wherein the popup monitoring information indicates a function popup (i.e., a target function popup) to be monitored. In a specific embodiment, the popup monitoring information further includes a monitoring start condition, popup trigger information, a monitoring end condition, and the like of the target function popup. Therefore, the monitoring of the target function popup can be started according to the configured popup monitoring information, whether the target function popup is triggered or not is monitored, whether the monitoring ending condition is met or not is monitored, and the like.
In an embodiment, before performing step S110, the method further includes:
and configuring popup monitoring information according to the configuration information of the function popup in the application control.
The configuration information of the function popup includes trigger information of the function popup and identification information of the function popup. And specifying the target function popup through the identification information of the function popup, and judging when the target function popup is triggered to be started through the trigger information of the function popup. Wherein the identification information of the function popup can be the title of the function popup or the content of the function popup, etc. For example, a function popup popped up when a word document is modified and the document is closed includes prompt information "whether to save the modification in x", a close option available for user operation, and selection options such as "yes", "no", "cancel" available for user selection, where the prompt information, the close option, and the selection options are contents of the function popup. And judging that the function popup is the appointed target function popup needing shielding according to the content of the function popup. Of course, the identification information of the function popup may also be other information related to the function popup, and is not limited specifically herein.
The trigger information of the popup can trigger the function popup to start, namely which operations of the user (corresponding to which functions in the control application are called in the background implementation) in the control application.
Before the configuration of the popup monitoring information, which function popups included in the control application are obtained from the configuration information of the control application, and the starting of the function popups is triggered when which functions are called in the control application, that is, the configuration information of the function popups is obtained from the configuration information of the control application.
Therefore, when the popup monitoring information is configured, the configuration information of the target function popup is obtained according to the designated function popup (namely the target function popup) needing to be shielded, so that the configuration of the popup monitoring information is carried out.
In the prior art, a method for shielding a function popup in a control application depends on obtaining a shielding interface of the function popup in the control application to shield the function popup, or modifying the control application to shield a target function popup, and according to the technical scheme, the function popup is directly shielded by configuring popup monitoring information, so that the method is efficient and rapid.
And step S130, in the process that the control application is called by the application program, triggering and monitoring the target function popup according to the popup monitoring information.
And in the running process of the application program, calling the control application through a corresponding service interface in the control application. It is worth to be noted that the technical scheme of the application is suitable for monitoring and shielding the target function popup window in the process that the control application is called by the application program.
In an embodiment, the pop-up window monitoring information includes a monitoring start condition and pop-up window trigger information, and in this embodiment, as shown in fig. 4, step S130 includes:
step S131, in the process that the control application is called by the application program, the detection of the monitoring starting condition is carried out.
Step S132, if the detection reaches the detection starting condition, the monitoring of the target function popup is started.
And step S133, after the monitoring is started, triggering and monitoring the target function popup according to the popup triggering information.
The monitoring starting condition refers to information for starting a popup of a monitoring target function in popup monitoring information. Such as when or under which circumstances the monitoring of the target function popup is to begin. In a specific embodiment, if monitoring of the target function control is started when the control application is started to be invoked in the application program, the monitoring start condition may be configured such that a service interface corresponding to the control application is invoked during the running process of the application program. For example, the monitoring code is configured before executing the code for calling the target function popup to monitor the target function popup, and the monitoring start condition may be configured to complete execution of the code before the monitoring code.
The popup trigger information includes conditions that can trigger target function popup in the control application, such as which functions are called to trigger target function popup in the control application. For example, if the control application is Microsoft word and the target function popup is a "save" function popup, then clicking a close command on the document by the user may pop up the "save" function popup (where the user clicks the close command on the document is implemented in the background to call the corresponding document close function), and then the popup trigger information may be configured to call the document close function. Of course, in specific embodiments, the condition that the target function popup is triggered is one or more. When the target function popup is triggered by a plurality of conditions, in configuration, the popup trigger information includes each condition for triggering the target function popup, and then in step S133, it is detected whether any one of the conditions included in the popup trigger information is reached, and if so, the target function popup is considered to be triggered.
In an embodiment, the pop-up window monitoring information further includes a monitoring end condition, as shown in fig. 5, after performing step S132, the method further includes:
in step S141, a monitoring end condition is detected.
And step S142, if the detection reaches the monitoring ending condition, stopping monitoring the target function popup.
The monitoring end condition may be configured according to different application scenarios, and may be that the popup information of the target function popup is not acquired within a specified time after the target function popup is triggered, for example, the monitoring end condition is configured to stop monitoring of the target function popup if the popup information of the target function popup is not acquired within 5 minutes after the monitoring is started, and the popup information of the target function popup is not acquired within 5 minutes after the monitoring is started. The monitoring end condition may also be that the control application is closed, and after monitoring is started, monitoring of the target function popup is stopped if it is detected that the control application is closed. Of course, the monitoring end condition may also be set to a function called in the control application, and is not specifically limited herein.
Step S150, if the target function popup is triggered, shielding the target function popup applied by the control in the application program.
The target function popup is shielded before the user operates the target function or before the target function popup appears in the display interface, so that the user cannot operate the target function popup, and the usable function of the control application in the calling process of the control application by the application program is limited.
According to the technical scheme, the target function popup in the control application is shielded in the process that the control application is called by the application program according to the popup monitoring information configured for the target function popup, so that functions which can be used by a user on the control application can be limited.
In addition, according to the technical scheme, a shielding interface is not required to be provided or the control application is not required to be modified, the target function popup is shielded by configuring popup monitoring information, and the method is efficient and rapid.
In one embodiment, as shown in fig. 6, step S150 includes:
step S151, if the target function popup is triggered, acquiring popup information corresponding to the triggered target function popup.
Step S152, obtaining the closing option of the target function popup from the popup information.
And step S153, closing the target function popup window through the closing option.
It is worth noting that the embodiment shown in fig. 6 is applicable to a scenario in which a close option exists in the target function popup.
The popup information corresponding to the target function popup includes the content of the target function popup, and as described above, the content of the target function popup includes the prompt information in the target function popup, the close option for closing the target function popup, and the selection option for selecting.
If the triggered target function popup is related to a closing option, the closing option of the target function popup can be obtained from the popup information, the target function popup is directly closed through the closing option, and therefore shielding of the target function popup is achieved, a user basically cannot feel that the target function popup appears on a display interface, and certainly cannot operate the target function popup.
In another embodiment, as shown in fig. 7, step S150 includes, in addition to step S151:
step S251, obtaining the selection option of the target function popup from the popup information.
Step S252, performing default selection on the target function popup according to the selection option to shield the target function popup.
Wherein the default selection is associated with the function to be restricted in the control application, i.e., the default selection corresponds to the inability to execute the function to be restricted in the control application. For example, if the control application is the above-mentioned Microsoft word, and the function to be limited is the "save" function, when the selection option in the target function popup window corresponding to the "save" function is operated, the default selection is "no" or "cancel".
And performing default selection on the target function popup according to the selection option of the target function control, thereby realizing the operation on the target function control before the user, realizing the shielding of the target function popup, and limiting the usable functions on the control application in the calling process of the control application by the application program. In a specific embodiment, the target function popup is processed before the user perceives that the target function popup appears on the display screen, so that the target function popup is shielded.
In some control applications, the closing option of the target function popup is shielded by the developer of the control application, so that the method according to the embodiment shown in fig. 6 cannot shield the target function popup, and according to the method of this embodiment, the target function popup can be processed regardless of whether the closing option exists in the target function popup, so that the shielding of the target function popup is realized, and the application range is wide.
The following is an embodiment of the apparatus of the present application, which may be used to execute an embodiment of a function popup window method for shielding a control application in an application program executed by the terminal 200 of the present application. For details that are not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the method for pop-up window function of shielding control application in an application program of the present application.
Fig. 8 is a block diagram illustrating a function popup device for shielding a control application in an application program, which may be used in the terminal 200 in the implementation environment shown in fig. 1, according to an exemplary embodiment, and performs all or part of the steps of any method shown in any method embodiment above. As shown in fig. 8, the apparatus includes, but is not limited to: an acquisition module 110, a monitoring module 130, and a shielding module 150.
An acquisition module 110 configured to perform: and when the application program runs, acquiring the configured popup window monitoring information, wherein the popup window monitoring information indicates a target function popup window to be monitored in the control application.
A monitoring module 130, connected to the obtaining module 110, configured to perform: and in the process that the control application is called by the application program, triggering and monitoring the target function popup according to the popup monitoring information.
A shielding module 150, connected to the monitoring module 130, configured to perform: and if the target function popup is triggered, shielding the target function popup applied by the control in the application program.
In one embodiment, as shown in fig. 9, the apparatus of this embodiment further comprises:
a configuration module 010 configured to perform: and configuring popup monitoring information according to the information of the function popup in the application control.
In one embodiment, the pop-up window monitoring information includes a monitoring start condition and pop-up window trigger information, and the monitoring module 130 includes:
a monitoring start detection unit configured to perform: and detecting a monitoring starting condition in the process that the control application is called by the application program.
A monitoring start unit configured to perform: and if the detection reaches the detection starting condition, starting the monitoring of the target function popup.
A trigger detection unit configured to perform: and after the monitoring is started, triggering and monitoring the target function popup according to the popup triggering information.
In an embodiment, the pop-up window monitoring information further includes a monitoring end condition, and the apparatus further includes:
a monitoring end condition detection module configured to perform: and detecting a monitoring end condition.
A monitor stop module configured to perform: and if the detection reaches the monitoring ending condition, stopping monitoring the target function popup window.
In one embodiment, the shielding module 150 includes:
a popup information acquisition unit configured to perform: and if the target function popup is triggered, acquiring popup information corresponding to the triggered target function popup.
A close option acquisition unit configured to perform: and acquiring the closing option of the target function popup from the popup information.
A closing unit configured to perform: and closing the target function popup by closing the option.
In another embodiment, the shielding module 150 includes, in addition to the pop-up window information acquiring unit:
a selection option acquisition unit configured to perform: and acquiring the selection options of the target function popup from the popup information.
A shielding unit configured to perform: and carrying out default selection on the target function popup according to the selection option so as to shield the target function popup.
The implementation process of the functions and actions of each module/unit in the device is specifically described in the implementation process of the corresponding step in the function popup window method for shielding a control application in an application program, and is not described herein again.
It is understood that these modules may be implemented in hardware, software, or a combination of both. When implemented in hardware, these modules may be implemented as one or more hardware modules, such as one or more application specific integrated circuits. When implemented in software, the modules may be implemented as one or more computer programs executing on one or more processors, such as the programs stored in memory 204 and executed by processor 218 of FIG. 2.
Optionally, the present application further provides an apparatus 1000 for shielding a function popup of a control application in an application program, where the apparatus for shielding a function popup of a control application in an application program may be used in the terminal 200 in the implementation environment shown in fig. 1, and all or part of the steps of the method for shielding a function popup of a control application in an application program shown in any method embodiment above are executed. As shown in fig. 10, the apparatus includes:
a processor 1001;
a memory 1002 for storing instructions executable by the processor 1001;
the processor 1001 is configured to execute the above method for shielding the function popup window of the control application in the application program, and the executable instruction may be the computer readable instruction 1002, and the processor 1001 may read the computer readable instruction from the memory 1002 through the communication bus/signal line 1003.
The specific manner in which the processor of the apparatus in this embodiment performs operations has been described in detail in the embodiment of the method for blocking a function popup of a control application in an application program, and will not be described in detail here.
In an exemplary embodiment, a storage medium is also provided that is a computer-readable storage medium, such as may be transitory and non-transitory computer-readable storage media, including instructions. The storage medium includes, for example, the memory 204 of instructions executable by the processor 218 of the terminal 200 to perform the above-described method of masking a functionality popup of a control application in an application program.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
Claims (8)
1. A method for shielding a function popup window of a control application in an application program is characterized by comprising the following steps:
when an application program runs, acquiring configured popup monitoring information, wherein the popup monitoring information indicates a target function popup to be monitored in a control application;
in the process that the control application is called by the application program, triggering and monitoring the target function popup according to the popup monitoring information;
if the target function popup is triggered, shielding the target function popup in the application program;
if the target function popup is triggered, shielding the target function popup in the application program, including:
if the target function popup is triggered, acquiring popup information corresponding to the triggered target function popup;
acquiring a closing option of the target function popup from the popup information, and closing the target function popup through the closing option; or, obtaining a selection option of the target function popup from the popup information, and performing default selection on the target function popup according to the selection option to shield the target function popup.
2. The method of claim 1, wherein before the application program runs and acquires the configured popup monitoring information, the method further comprises:
and configuring popup monitoring information according to the configuration information of the function popup in the control application.
3. The method according to claim 1, wherein the popup monitoring information includes monitoring start conditions and popup trigger information, and the triggering monitoring of the target function popup according to the popup monitoring information in the process that the control application is called by the application program includes:
detecting the monitoring starting condition in the process that the control application is called by the application program;
if the monitoring starting condition is met, starting monitoring the target function popup;
and after the monitoring is started, carrying out triggering monitoring on the target function popup according to the popup triggering information.
4. The method of claim 3, wherein the pop-window monitoring information further comprises a monitoring end condition, and wherein after the initiating of the monitoring of the target function pop-window, the method further comprises:
detecting the monitoring end condition;
and if the monitoring end condition is detected to be reached, stopping monitoring the target function popup window.
5. An apparatus for masking a function popup of a control application in an application program, comprising:
an acquisition module configured to perform: when an application program runs, acquiring configured popup monitoring information, wherein the popup monitoring information indicates a target function popup to be monitored in a control application;
a monitoring module configured to perform: in the process that the control application is called by the application program, triggering and monitoring the target function popup according to the popup monitoring information;
a shielding module configured to perform: if the target function popup is triggered, shielding the target function popup in the application program;
the shielding module is further configured to: if the target function popup is triggered, acquiring popup information corresponding to the triggered target function popup; acquiring a closing option of the target function popup from the popup information, and closing the target function popup through the closing option; or, obtaining a selection option of the target function popup from the popup information, and performing default selection on the target function popup according to the selection option to shield the target function popup.
6. The apparatus of claim 5, further comprising:
a configuration module configured to perform: and configuring popup monitoring information according to the information of the function popup in the control application.
7. An apparatus for masking a function popup of a control application in an application program, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of any of claims 1 to 4.
8. A storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the method of any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810965657.XA CN109144608B (en) | 2018-08-23 | 2018-08-23 | Method and device for shielding function popup window of control application in application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810965657.XA CN109144608B (en) | 2018-08-23 | 2018-08-23 | Method and device for shielding function popup window of control application in application program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109144608A CN109144608A (en) | 2019-01-04 |
CN109144608B true CN109144608B (en) | 2021-12-07 |
Family
ID=64791395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810965657.XA Active CN109144608B (en) | 2018-08-23 | 2018-08-23 | Method and device for shielding function popup window of control application in application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109144608B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113032264B (en) * | 2021-03-29 | 2024-09-06 | 杭州网易数之帆科技有限公司 | Page view control detection method and device |
CN117130695A (en) * | 2022-05-19 | 2023-11-28 | 华为技术有限公司 | Target information processing method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945341A (en) * | 2012-10-23 | 2013-02-27 | 北京奇虎科技有限公司 | Method and device for intercepting popup |
CN103019719A (en) * | 2012-12-14 | 2013-04-03 | 北京奇虎科技有限公司 | Device and method for intercepting pop-up window |
CN103259772A (en) * | 2012-02-20 | 2013-08-21 | 腾讯科技(深圳)有限公司 | Method and device of website address access control |
CN104252477A (en) * | 2013-06-27 | 2014-12-31 | 贝壳网际(北京)安全技术有限公司 | Method and device for controlling webpage pop-up window |
CN105701166A (en) * | 2015-12-30 | 2016-06-22 | 广东欧珀移动通信有限公司 | Advertisement blocking method and system |
CN107330054A (en) * | 2017-06-28 | 2017-11-07 | 赵宇航 | A kind of pop-up screen method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0203617D0 (en) * | 2002-02-15 | 2002-04-03 | Ibm | Application window closure in response to event in parent window |
CN105446776A (en) * | 2015-11-20 | 2016-03-30 | 北京金山安全软件有限公司 | Application program closing method and device and electronic equipment |
CN105653327A (en) * | 2015-12-29 | 2016-06-08 | 北京金山安全软件有限公司 | Window processing method and device |
-
2018
- 2018-08-23 CN CN201810965657.XA patent/CN109144608B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103259772A (en) * | 2012-02-20 | 2013-08-21 | 腾讯科技(深圳)有限公司 | Method and device of website address access control |
CN102945341A (en) * | 2012-10-23 | 2013-02-27 | 北京奇虎科技有限公司 | Method and device for intercepting popup |
CN103019719A (en) * | 2012-12-14 | 2013-04-03 | 北京奇虎科技有限公司 | Device and method for intercepting pop-up window |
CN104252477A (en) * | 2013-06-27 | 2014-12-31 | 贝壳网际(北京)安全技术有限公司 | Method and device for controlling webpage pop-up window |
CN105701166A (en) * | 2015-12-30 | 2016-06-22 | 广东欧珀移动通信有限公司 | Advertisement blocking method and system |
CN107330054A (en) * | 2017-06-28 | 2017-11-07 | 赵宇航 | A kind of pop-up screen method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109144608A (en) | 2019-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3165019B1 (en) | Method and apparatus of notifying of smishing | |
US11347893B2 (en) | Methodology to prevent screen capture of sensitive data in mobile apps | |
EP3168747B1 (en) | Method and device for monitoring a file in a system partition | |
EP3423983A1 (en) | User-controllable screen privacy software | |
CN106406956B (en) | Application program installation method and device | |
US10269347B2 (en) | Method for detecting voice and electronic device using the same | |
CN111240694B (en) | Application detection method, application detection device and storage medium | |
CN104281950A (en) | Method and device for improving electronic payment safety | |
CN105100074A (en) | Data operation processing method, device and terminal equipment | |
CN106775709B (en) | Prompt message display method and device | |
US20180018071A1 (en) | Managing inputs to a user interface with system latency | |
CN104572175A (en) | Method and device for rapidly starting non-privacy type applications | |
CN109144608B (en) | Method and device for shielding function popup window of control application in application program | |
CN108279835B (en) | Window display control method and device | |
KR102071530B1 (en) | Apparatas and method for proposing a response manual of occurring denial in an electronic device | |
CN110851057A (en) | Method and device for configuring configuration options of BIOS | |
US20170213369A1 (en) | Processing screen sensitive information | |
CN110046095A (en) | Based on the improved system integration method of testing process and device | |
CN105760796B (en) | Application security processing method and device | |
CN107861666B (en) | Desktop application installation method and device | |
CN106354595B (en) | Mobile terminal, hardware component state detection method and device | |
CN112083841B (en) | Information input method, device and storage medium | |
CN106709285B (en) | Display method and device of application lock interface | |
CN107728909B (en) | Information processing method and device | |
CN112306566A (en) | Data processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |