Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The term "and/or" herein is an association relationship describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The symbol "/" herein denotes a relationship in which the associated object is or, for example, a/B denotes a or B.
The terms "first" and "second," and the like, in the description and in the claims of the present invention are used for distinguishing between different objects and not for describing a particular order of the objects. For example, the first operating system and the second operating system, etc. are used to distinguish between different operating systems, rather than to describe a particular order of operating systems.
In the embodiments of the present invention, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the description of the embodiments of the present invention, unless otherwise specified, "a plurality" means two or more, for example, a plurality of operating systems means two or more operating systems, or the like.
Some terms/nouns referred to in the embodiments of the present invention will be explained first below.
Operating the system: the system software is used for managing hardware resources of the terminal equipment, controlling application running in the terminal equipment and providing an interactive operation interface for a user.
The application use state: and the state is used for indicating whether the terminal equipment can operate the application or not.
A disabled state: the state indicating that the terminal device cannot perform any operation on the application may correspond to, for example, that the application is not installed in the terminal device.
An enabling state: for indicating the state in which the terminal device can operate the application normally.
User data of the application: for indicating user data generated during the running of the application by the terminal device.
The embodiment of the invention provides a control method and terminal equipment, which can detect the input of a user; and closing the first application running in the background of the terminal equipment or setting the use state of the first application to be a forbidden state under the condition that the input of the user is detected to be the first input. Wherein the first input is any one of: and triggering the terminal equipment to run the input of the second application in the foreground of the terminal equipment and triggering the terminal equipment to execute the input of the preset operation through the second application. Through the scheme, because the application (i.e. the first application) running in the background of the terminal device may acquire data of the application (i.e. the second application) running in the foreground of the terminal device, for example, acquire a user name, user information, a password input by a user, and the like in the second application, when the terminal device detects that the user triggers the terminal device to run the second application in the foreground of the terminal device, or the terminal device detects that the user triggers the terminal device to execute some specific operations (for example, inputting the password and the like) through the second application, the terminal device may close the first application running in the background of the terminal device, or set the use state of the first application running in the background of the terminal device to a disabled state. Therefore, the first application can not acquire the data of the second application running in the foreground of the terminal device, namely the first application can not acquire the privacy information of the user from the second application, so that the privacy information of the user can be protected, and the safety performance of the terminal device can be improved.
The terminal device in the embodiment of the present invention may be a terminal device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
Optionally, the terminal device in the embodiment of the present invention may be a terminal device with one operating system, or may be a terminal device with multiple operating systems. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
The following describes a software environment to which the control method provided by the embodiment of the present invention is applied, by taking an android operating system as an example.
As shown in fig. 1, a schematic diagram of a possible display architecture based on an android operating system is provided in the embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are respectively: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application. The application framework layer includes a window manager service layer (window manager service), an interface layer (surface), an interface session layer (surface session), and an interface object layer (surface component).
The window management service layer is used for processing operations such as starting, adding and deleting of an interface window of the terminal equipment; the interface layer is used for displaying a window of an interface in the terminal equipment; the interface session layer plays a role of identification in the interface session; the interface object layer is used for indicating the client role in the interface session.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system. The system runtime layer also includes a surface flicker (sfl) layer and a display layer (display hard ware).
The interface combination layer is used for combining the content in the interface layer to form a complete interface; the display layer is used for indicating a display screen of the terminal equipment.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel. The inner core layer includes a frame buffer layer (frame buffer).
The frame buffer layer is used to connect system software and system hardware.
It should be noted that fig. 1 is a schematic diagram of a display architecture based on an operating system, for example, a terminal device includes an operating system. In a specific implementation, the terminal device may further include a plurality of operating systems, that is, the terminal device may include a display architecture of the plurality of operating systems, where each display architecture is similar to the display architecture described in fig. 1, and in order to avoid repetition, details are not repeated here.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the control method provided in the embodiment of the present invention based on the system architecture of the android operating system shown in fig. 1, so that the control method may operate based on the android operating system shown in fig. 1. Namely, the processor or the terminal device can implement the control method provided by the embodiment of the invention by running the software program in the android operating system.
The terminal equipment in the embodiment of the invention can be a mobile terminal or a non-mobile terminal. For example, the mobile terminal may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted terminal, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile terminal may be a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiment of the present invention is not particularly limited.
The execution main body of the control method provided by the embodiment of the present invention may be the terminal device, or may also be a functional module and/or a functional entity capable of implementing the control method in the terminal device, which may be specifically determined according to actual use requirements, and the embodiment of the present invention is not limited. The following takes a terminal device as an example to exemplarily explain a control method provided by the embodiment of the present invention.
In the embodiment of the present invention, when the terminal device runs a certain application (for example, the second application in the embodiment of the present invention) on a foreground (hereinafter, referred to as the foreground) of the terminal device, if another application (for example, the first application in the embodiment of the present invention) runs on a background (hereinafter, referred to as the background) of the terminal device, the applications may acquire data of the application running on the foreground, and thus privacy information of a user may be leaked. Therefore, when the terminal device detects that the user triggers the terminal device to run a certain application in the foreground of the terminal device, or the terminal device detects that the user triggers the terminal device to execute certain specific operations (such as inputting a password and account information) through the application, the terminal device can close the application running in the background, or set the use state of the application running in the background to a forbidden state, so that the applications cannot acquire data of the application running in the foreground, the privacy information of the user can be protected, and the safety performance of the terminal device can be improved.
The following describes an exemplary control method provided by an embodiment of the present invention with reference to the drawings.
As shown in fig. 2, an embodiment of the present invention provides a control method, which may include S201 and S202 described below.
S201, the terminal device detects the input of the user.
S202, under the condition that the input of the user is detected to be the first input, the terminal equipment closes the first application running in the background of the terminal equipment or sets the use state of the first application to be the forbidden state.
Wherein, the first input may be any one of the following items: and the user triggers the terminal equipment to run the input of the second application in the foreground of the terminal equipment, and the user triggers the terminal equipment to execute the input of the preset operation through the second application.
In the embodiment of the present invention, the terminal device may detect an input of a user, and when the terminal device detects the first input, the terminal device may perform a specific operation on the first application.
Specifically, in the embodiment of the present invention, when the terminal device detects that the user triggers the terminal device to run a certain application (i.e., the second application) in the foreground, the terminal device may close the first application; or, when the terminal device detects that the user triggers the terminal device to run the second application in the foreground, the terminal device may set the use state of the first application to the disabled state. When the terminal device detects that the user triggers the terminal device to execute the preset operation through the second application, the terminal device can close the first application; or, when the terminal device detects that the user triggers the terminal device to execute the preset operation through the second application, the terminal device may set the use state of the first application to a disabled state.
It can be understood that the terminal device running a certain application in the foreground may be used to indicate: the terminal device displays the interface of the application in the display screen of the terminal device, and the user can trigger the terminal device to execute the operation corresponding to the input of the user through the application through the input in the interface of the application. The above terminal device runs a certain application in the background to indicate: the process of the application runs in the operating system of the terminal device, but the interface of the application is not displayed in the display screen of the terminal device.
It should be noted that, in the embodiment of the present invention, setting, by the terminal device, the use state of the first application to the disabled state may be understood as: the terminal device closes the application process of the first application, and after the terminal device sets the use state of the first application to the disabled state, the terminal device cannot perform any operation on the first application, and cancels display of an identifier (such as an icon of the first application) indicating the first application in an interface of the terminal device, which is equivalent to that the first application is not installed in the terminal device. The closing of the first application by the terminal device may be understood as: and the terminal equipment closes the application process of the first application.
Optionally, in this embodiment of the present invention, the terminal device may periodically detect an input of the user.
Optionally, in the embodiment of the present invention, a period for detecting the input of the user by the terminal device may be a preset numerical value in the terminal device, and the period for detecting the input of the user by the terminal device may be preset in the terminal device by a manufacturer of the terminal device according to the performance of the terminal device. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Illustratively, the period in which the terminal device detects the user's input may be any possible duration, such as 1 second, 2 seconds, or 3 seconds.
Optionally, in this embodiment of the present invention, the first input may include two cases, which are a case one and a case two respectively. The following specifically illustrates these two cases (i.e., case one and case two) of the first input.
The first condition is as follows: the first input is input for triggering the terminal equipment to run the second application in the foreground of the terminal equipment by a user.
Optionally, the first case may include at least one of the following: the user triggers the terminal device to run the second application in the foreground through inputting the icon of the second application (namely, the user triggers the terminal device to display the interface of the second application in the display screen of the terminal device through inputting the icon of the second application); the terminal equipment runs the second application in the background, and the user triggers the terminal equipment to switch the second application from the background to the foreground.
It will be appreciated that in actual implementation, the above case may also include any other possible implementation. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Case two: the first input is input for triggering the terminal equipment to execute preset operation through the second application by the user.
It should be noted that, in case two, when the user triggers the terminal device to execute the preset operation through the second application, the application run in the foreground by the terminal device is the second application.
Optionally, in this embodiment of the present invention, the preset operation may be an operation preset in the terminal device. The preset operation can be preset in the terminal equipment according to the use requirements of possible users for a terminal equipment manufacturer, and can also provide a setting interface for the terminal equipment manufacturer, and the user is preset in the terminal equipment according to the use requirements of the user. The method and the device can be used according to actual use requirements, and the embodiment of the invention is not limited.
Optionally, in an embodiment of the present invention, the preset operation may include: logging in an account, entering a username, entering a password, sending a message, and planning a route, among other operations, may involve user privacy information. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Optionally, in the embodiment of the present invention, the first application may be any application in the terminal device, and may also be a target application in the terminal device. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Optionally, in this embodiment of the present invention, when the first application is a target application in the terminal device, the target application may include an application other than a system application in the terminal device, for example, a third-party application.
It should be noted that, when the first application is any application in the terminal device, if the terminal device detects the first input, the terminal device may close all applications running in the background; or, the use state of all the applications running in the background is set to the disabled state. When the first application is a target application in the terminal device, if the terminal device detects the first input, the terminal device may close the target application running in the background; or setting the use state of the target application running in the background to be a forbidden state.
It is to be understood that, when non-target applications (e.g., system applications of the terminal device, etc.) are included in the applications running in the background, if the terminal device detects the first input, the terminal device may not perform any processing on the non-target applications running in the background, that is, the non-target applications still run in the background.
Optionally, in this embodiment of the present invention, the second application may be any application in the terminal device, and may also be an application of the first target type. The method can be determined according to actual use requirements, and is not limited in the embodiment of the invention.
Optionally, in this embodiment of the present invention, the first target type may include any application type that may relate to user privacy information, such as a payment type, a financial type, a communication type, and a shopping type. The method can be determined according to actual use requirements, and is not limited in the embodiment of the invention.
The following describes the above S201 and S202 by way of example.
For example, it is assumed that the first application is a third-party application in the terminal device, the second application is a payment-type application in the terminal device, the first input is an input that the user triggers the terminal device to run the second application in a foreground, and when the terminal device detects the first input, the terminal device sets the use state of the first application to a disabled state. Then, when three applications run in the background of the terminal device, the three applications are respectively: the application 1 is a system application in the terminal equipment, and the application 2 and the application 3 are third-party applications in the terminal equipment. If the terminal device detects that the user triggers the terminal device to run the application "pay 1" (i.e. the second application) in the foreground, the terminal device may set the use states of the application 2 and the application 3 (i.e. the application 2 and the application 3 are the first application) to the disabled state, so that the application 2 and the application 3 cannot acquire the privacy information of the user from the application "pay 1" to protect the privacy information of the user. Where "application 1" continues to run in the background.
Optionally, in this embodiment of the present invention, when the terminal device detects that the input of the user is the first input, the terminal device may determine whether the first application is running in the background, and if the first application is running in the background, the terminal device may close the first application or set the use state of the first application to the disabled state, and run the second application in the foreground; if the background does not run the first application, the terminal device may be running the second application.
For example, in conjunction with fig. 2, as shown in fig. 3, the above S202 may be implemented by S202a-S202c, or S202a and S202c, which are described below.
S202a, in the case that the input of the user is detected to be the first input, the terminal device determines whether the first application is running in the background of the terminal device.
S202b, the terminal device closes the first application running in the background of the terminal device or sets the use state of the first application to be disabled.
S202c, the terminal device runs the second application.
It should be noted that, in the embodiment of the present invention, the terminal device running the second application may be used to instruct the terminal device to run the second application in the foreground.
In the embodiment of the present invention, when the terminal device detects that the input of the user is the first input, the terminal device may determine whether the first application is running in the background, and if the first application is running in the background, the terminal device may close the first application or set the use state of the first application to a disabled state, and run the second application in the foreground; if the background does not run the first application, the terminal device may run the second application in the foreground. Therefore, in the control method provided by the embodiment of the invention, when the terminal device runs the second application in the background, the first application is not run in the background, so that the first application cannot acquire the privacy information of the user from the second application, the privacy information of the user can be protected, and the security performance of the terminal device can be improved.
It should be noted that, in the case where the first application is running in the background, the execution sequence between S202b and S202c may not be limited in the embodiment of the present invention. That is, in the embodiment of the present invention, S202b may be executed first, and then S202c may be executed; s202c may be executed first, and then S202b may be executed. In fig. 3, the first step of performing S202b and the second step of performing S202c are exemplified as an example.
The embodiment of the present invention provides a control method, where an application (i.e., a first application) running in a background of a terminal device may obtain data of an application (i.e., a second application) running in a foreground of the terminal device, for example, obtain a user name, user information, a password input by a user, and the like in the second application, so that when the terminal device detects that the user triggers the terminal device to run the second application in the foreground of the terminal device, or when the terminal device detects that the user triggers the terminal device to execute some specific operations (for example, inputting a password and the like) through the second application, the terminal device may close the first application running in the background of the terminal device, or set a use state of the first application running in the background of the terminal device to a disable state. Therefore, the first application can not acquire the data of the second application running in the foreground of the terminal device, namely the first application can not acquire the privacy information of the user from the second application, so that the privacy information of the user can be protected, and the safety performance of the terminal device can be improved.
Optionally, in this embodiment of the present invention, after the terminal device runs the second application, the terminal device may determine whether the second application includes an input method (that is, the second application has an own input method, for example, the first input method in this embodiment of the present invention). In the case that the input method is included in the second application, the terminal device may display a virtual keyboard of the input method in an interface of the second application; in the case where the input method is not included in the second application, the terminal device may display a virtual keyboard of the input method of the system of the terminal device in the interface of the second application. Therefore, the user can input information through a safe input method to ensure the safety of the information input by the user.
For example, referring to fig. 3, as shown in fig. 4, after S202c, the control method provided in the embodiment of the present invention may further include S203 and S204, or S203 and S205, which are described below.
S203, the terminal device determines whether the second application comprises the first input method.
And S204, the terminal equipment displays the first virtual keyboard in the interface of the second application.
The first virtual keyboard may be a virtual keyboard of the first input method.
And S205, the terminal device displays a second virtual keyboard in the interface of the second application.
The second virtual keyboard may be a virtual keyboard of a second input method, and the second input method may be a system input method of the terminal device.
In this embodiment of the present invention, after the terminal device runs the second application, the terminal device may determine whether the second application includes an input method (i.e., the first input method). And after determining whether the input method is included in the second application, if the first input method is included in the second application, the terminal device may display a virtual keyboard of the first input method (i.e., the first virtual keyboard) in an interface of the second application, so that a user may input information in the second application through the first virtual keyboard. If the first input method is not included in the second application, the terminal device may display a virtual keyboard of the system input method of the terminal device (i.e., the second virtual keyboard) in an interface of the second application, so that the user may input information in the second application through the second virtual keyboard. In this way, the user can input information in the second application through a safe input method, so that the safety of the information input by the user is ensured.
It is to be understood that the first input method may be an input method carried by the second application, for example, a security input method of the second application.
Optionally, in this embodiment of the present invention, after the terminal device determines whether the second application includes the first input method, the user may trigger the terminal device to display the first virtual keyboard or the second virtual keyboard in the interface of the second application through an input (for example, a third input in this embodiment of the present invention).
Specifically, in the embodiment of the present invention, after the terminal device determines whether the second application includes the first input method, in a case that the second application includes the first input method, a user may trigger the terminal device to display the first virtual keyboard in an interface of the second application through a third input; and under the condition that the second application does not comprise the first input method, the user can trigger the terminal equipment to display the second virtual keyboard in the interface of the second application through a third input.
In this embodiment of the present invention, the third input may be an input that a user triggers the terminal device to display a virtual keyboard in the interface of the second application.
Optionally, in this embodiment of the present invention, the third input may be input by a user in an information input area of the interface of the second application. Specifically, the third input may be any possible input such as a single-click input, a double-click input, or a long-press input of the user in the information input area. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
In the embodiment of the present invention, the long press input may be an input that a user presses in the information input area for a time period longer than or equal to a preset time period.
Optionally, in the embodiment of the present invention, the preset time duration may be a preset numerical value in the terminal device. The preset duration may be preset in the terminal device by a manufacturer of the terminal device. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
In the embodiment of the present invention, since the first input method is an input method in the second application, the terminal device may determine that the first input method is a safe input method, and if the terminal device displays the first virtual keyboard in the interface of the second application, the user may input information through the safe input method. Correspondingly, since the second input method is a system input method, the terminal device may also determine that the second input method is a secure input method, and if the terminal device displays the second virtual keyboard in the interface of the second application, the user may input information through the secure input method. Therefore, no matter the user inputs information by using the virtual keyboard of the first input method or inputs information by using the virtual keyboard of the second input method, the user can input information by using a safe input method, so that the user can be prevented from inputting information by using a non-system input method (such as a third-party input method), and the safety of the information input by the user can be further ensured.
Optionally, in this embodiment of the present invention, the terminal device may further detect an application running in the foreground of the terminal device, and when the terminal device detects that a certain specific application (for example, a third application in this embodiment of the present invention) runs in the foreground of the terminal device, the terminal device may prohibit applications (for example, a fourth application in this embodiment of the present invention) other than the application running in the foreground in the terminal device from using some functions (for example, target functions in this embodiment of the present invention) of the terminal device, so as to prevent the applications from obtaining information of the application running in the foreground through the functions, and thus, it may be ensured that privacy information of a user is not leaked.
For example, referring to fig. 2, as shown in fig. 5, after S202, the control method provided in the embodiment of the present invention may further include S206 and S207 described below.
And S206, the terminal equipment detects the application running in the foreground of the terminal equipment.
And S207, under the condition that the application operated in the foreground of the terminal device is detected to be the third application, forbidding the fourth application to use the target function of the terminal device.
The fourth application may be an application other than the third application in an application of the terminal device, and the target function may include at least one of: a recording function, a screen capture function, and a read/write function.
In the embodiment of the invention, the terminal device can detect the application running on the foreground of the terminal device, and when the terminal device detects that the application running on the foreground of the terminal device is the third application, the terminal device can forbid the fourth application from using the target function of the terminal device, so that the fourth application can be prevented from acquiring the data in the third application through the target application to acquire the privacy information of the user, and the privacy information of the user can be ensured not to be leaked.
It should be noted that, in the embodiment of the present invention, the read/write function may include a read function and a write function. The reading function comprises the functions of reading short messages, accessing a gallery and the like, and the functions can read data in the terminal equipment; the writing function may include a function of editing content in an application in the terminal device, such as writing a mail and editing information.
Optionally, in this embodiment of the present invention, the third application may be any application in the terminal device, and may also be an application of a second target type. The method can be determined according to actual use requirements, and is not limited in the embodiment of the invention.
Optionally, in this embodiment of the present invention, the second target type may include any application type that may relate to user privacy information, such as a payment type, a financial type, a communication type, and a shopping type. The method can be determined according to actual use requirements, and is not limited in the embodiment of the invention.
Optionally, in this embodiment of the present invention, the fourth application may be all applications in the terminal device except the third application, or may be an application that may have a security risk in the terminal device, for example, a third-party application in the terminal device. The method can be determined according to actual use requirements, and is not limited in the embodiment of the invention.
It should be noted that the execution sequence between S201-S202 and S206-S207 may not be limited in the embodiment of the present invention. That is, in the embodiment of the present invention, S201 to S202 may be executed first, and then S206 to S207 may be executed; it is also possible to perform S206-S207 first and then S201-S202. In fig. 5, the steps S201 to S202 are executed first, and then the steps S206 to S207 are executed as an exemplary illustration.
In the embodiment of the present invention, since functions (i.e., the target function) in the terminal device, such as a recording function, a screen capture function, and a read/write function, have the capability of acquiring data in the terminal device, the fourth application may acquire data of the terminal device using the third application by using these functions, that is, the fourth application may acquire the privacy information of the user. Therefore, under the condition that the terminal equipment forbids the fourth application to use the target function, the fourth application can not acquire the data of the terminal equipment using the third application, so that the safety of the privacy information of the user can be ensured, and the safety performance of the terminal equipment can be improved.
Optionally, in this embodiment of the present invention, after the terminal device sets the use state of the first application to the disabled state, if the terminal device determines that the terminal device exits from the second application, the terminal device may set the state of the first application to an enabled state, so that the user may normally use the first application.
For example, referring to fig. 2, as shown in fig. 6, after S202, the control method provided in the embodiment of the present invention may further include S208 described below.
And S208, after the terminal equipment exits from the second application, the terminal equipment sets the use state of the first application to be an enabling state.
In the embodiment of the present invention, after the terminal device sets the use state of the first application to the disabled state, if the terminal device exits from the second application, the terminal device may set the use state of the first application to the enabled state, so that the user may normally use the first application.
It should be noted that, in the embodiment of the present invention, the terminal device quitting the second application is used to instruct the terminal device to end running the second application (that is, the terminal device background and the terminal device foreground do not run the second application).
In the embodiment of the present invention, after the terminal device exits from the second application, even if the terminal device runs the first application in the background, the first application cannot acquire the information of the user in the second application, so that the terminal device may set the use state of the first application to the enabled state, so that the user may normally use the first application.
Optionally, in this embodiment of the present invention, after the terminal device sets the usage state of the first application to the disabled state, if the terminal device determines that the terminal device exits the second application, after the terminal device exits the second application, the terminal device may delete user data (for example, target data in this embodiment of the present invention) of the second application stored in the terminal device, so as to prevent leakage of the user data; alternatively, the terminal device may encrypt the user data of the second application stored in the terminal device so that other applications cannot access the user data of the second application, and thus the user data may be prevented from being leaked. Therefore, the safety performance of the terminal equipment can be improved.
For example, referring to fig. 2, as shown in fig. 7, after S202, the control method provided in the embodiment of the present invention may further include S209 described below.
And S209, after the terminal equipment exits the second application, the terminal equipment deletes the target data or encrypts the target data.
The target data may be user data of the second application stored in the terminal device.
In the embodiment of the present invention, after the terminal device exits from the second application, the terminal device may delete the target data; alternatively, the target data is encrypted to ensure that the target data is not compromised.
Optionally, in this embodiment of the present invention, before the terminal device encrypts the target data, the terminal device may display a prompt message to prompt the user to set an encryption password for the target data, and then the terminal device may encrypt the target data according to the encryption password, so that other applications cannot access the target data.
In the embodiment of the present invention, the encrypting the target data by the terminal device may be understood as: the target data is not visible to other applications, thereby making it impossible for these applications to acquire/access the target data.
In the embodiment of the present invention, since the terminal device deletes the target data to prevent other applications from acquiring the target data, or the terminal device encrypts the target data to prevent other applications from acquiring the target data, after the terminal device exits the second application, the terminal device uses any one of the two manners (deleting the target data and encrypting the target data) to prevent the user data of the second application used by the user from being leaked, so that the privacy information of the user can be protected, and the security performance of the terminal device can be further improved.
In the embodiment of the present invention, two operating systems are taken as an example below, and an exemplary description is given of a case where the terminal device in the embodiment of the present invention includes a plurality of operating systems.
Optionally, in the embodiment of the present invention, when the terminal device includes two operating systems (e.g., the first operating system and the second operating system in the embodiment of the present invention), the control method provided in the embodiment of the present invention may be applied to each of the two operating systems, or may be applied to one of the two operating systems (e.g., the second operating system in the embodiment of the present invention).
In this embodiment of the present invention, in a case that the control method provided in this embodiment of the present invention is applied to each operating system in the two operating systems, the control method of the terminal device is similar to the control method described in the above embodiment, and in order to avoid repetition, details are not described here again.
Optionally, in this embodiment of the present invention, when the control method provided in this embodiment of the present invention is applied to one operating system (hereinafter, referred to as a second operating system) of the two operating systems, if the operating system run by the terminal device is another operating system (hereinafter, referred to as a first operating system), the user may trigger the terminal device to run the second operating system through an input (hereinafter, referred to as a second input) to a certain object (for example, a target object in this embodiment of the present invention) in a user interface of the first operating system, so that the terminal device may execute the steps of the control method in the foregoing embodiment in the second operating system.
Optionally, the terminal device in the embodiment of the present invention may be a single-screen terminal device, and may also be a multi-screen terminal device. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
In the embodiment of the present invention, when the number of screens of the terminal device is different, the terminal device may respond to the second input in different forms. Specifically, when the number of screens of the terminal device is one (that is, the terminal device is a single-screen terminal device), the form of the terminal device responding to the second input may be a form one; when the number of the screens of the terminal device is greater than one (that is, the terminal device is a multi-screen terminal device), the form of the terminal device responding to the second input may be a form two. The following exemplary description of specific terminal devices responding to these two forms of the second input (i.e., form one and form two) is provided.
The first form: in a case that the operating system run by the terminal device is the first operating system, the user may trigger the terminal device to switch the operating system run by the terminal device from the first operating system to the second operating system through a second input to a certain object (for example, a target object in the embodiment of the present invention) in the user interface of the first operating system, so that the terminal device may execute the steps of the control method in the foregoing embodiment in the second operating system.
For example, referring to fig. 2, as shown in fig. 8, before S201, the control method provided in the embodiment of the present invention may further include S210 and S211 described below. Specifically, S201 may be implemented by S201a described below.
And S210, the terminal equipment receives a second input of the target object by the user.
And S211, the terminal equipment responds to the second input and switches the operating system of the terminal equipment from the first operating system to the second operating system.
S201a, the terminal device detects the user input in the second operating system.
The target object may be a target identifier or a target key, and the second input may be an input received by the terminal device in the first operating system.
In this embodiment of the present invention, when the operating system run by the terminal device is the first operating system, a user may trigger the terminal device to switch the operating system of the terminal device from the first operating system to the second operating system through an input to the target object, so that the terminal device detects an input of the user in the second operating system, and then the terminal device may execute the control method provided in this embodiment of the present invention in the second operating system according to the input of the user detected by the terminal device in the second operating system.
Optionally, in this embodiment of the present invention, if the target object is the target identifier, the target identifier may be an identifier used for indicating a second operating system in the first operating system.
Optionally, in this embodiment of the present invention, the target identifier may be an icon, or an interface and the like, which may be used to indicate the identifier of the second operating system. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Optionally, in this embodiment of the present invention, when the target object is the target identifier, the second input may be any possible input, such as a single-click input, a double-click input, or a re-press input, of the user on the target identifier. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
In an embodiment of the present invention, the press-again input may be an input that a user presses on the target identifier with a pressure greater than or equal to a preset pressure value.
Optionally, in this embodiment of the present invention, the preset pressure value may be a preset value in the terminal device. The preset pressure value may be preset in the terminal device by the manufacturer of the terminal device. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Optionally, in the embodiment of the present invention, if the target object is the target key, the target key may be one key or a combination key formed by combining a plurality of keys. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
For example, when the target key is a key, the target key may be any possible key such as a power key, an Artificial Intelligence (AI) key, or a volume key. When the target key is a combination key of a plurality of key combinations, the target key may be a combination of a power key and a volume key, or any possible key combination such as a combination of a power key and an AI key.
Optionally, in this embodiment of the present invention, when the target object is the target key, the second input may be any possible input, such as a long-press input or a short-press input of the target key by the user. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Optionally, in this embodiment of the present invention, the first operating system and the second operating system may be two different operating systems in the terminal device.
In an embodiment of the present invention, the first operating system and the second operating system may be developed by a terminal device manufacturer based on a source code of the operating system.
Optionally, in the embodiment of the present invention, the first operating system may be an operating system with a relatively high development degree of a terminal device manufacturer, and the second operating system may be an operating system with a relatively low development degree of the terminal device manufacturer.
It should be noted that, in the embodiment of the present invention, the source code similarity between the operating system with a relatively low development degree of the terminal device manufacturer and the operating system is relatively high, and the source code similarity between the operating system with a relatively high development degree of the terminal device manufacturer and the operating system is relatively low.
Of course, it is understood that the second operating system may also be an operating system corresponding to a platform provided by an operating system vendor.
Optionally, in the embodiment of the present invention, after the operating system manufacturer modifies the operating system provided by the operating system manufacturer, the operating system manufacturer may release the modified system patch to the terminal device manufacturer, so that the operating system used by the terminal device manufacturer is more complete and secure. After the operating system manufacturer releases the modified system patch to the terminal device manufacturer, the terminal device manufacturer may update the operating systems (e.g., the first operating system and the second operating system) on the terminal device in real time using the system patch. Therefore, after the terminal device updates the second operating system on the terminal device in real time, the terminal device can execute the control method provided by the embodiment of the invention in the more complete and safe second operating system, that is, the software environment for the terminal device to execute the control method is more complete and safe.
It should be noted that, for the above "form one," after the terminal device switches the operating system of the terminal device from the first operating system to the second operating system, the terminal device may execute the steps of the control method in the foregoing embodiment in the second operating system, and details are not described here to avoid repetition.
The second form: in a case that the terminal device runs the first operating system and does not run the second operating system, the user may trigger the terminal device to run the second operating system through a second input to a certain object (for example, a target object in the embodiment of the present invention) in the user interface of the first operating system (for example, the terminal device displays the user interface of the second operating system on the second screen of the terminal device), and then the terminal device may execute the steps of the control method in the above embodiment in the second operating system.
It should be noted that, the above "form two" is exemplarily explained by taking the number of screens of the terminal device as two (that is, the terminal device is a dual-screen terminal device) as an example, and the implementation manner for other cases where the number of screens of the terminal device is greater than one is similar to the implementation manner where the number of screens of the terminal device is two, and is not described again here.
For example, referring to fig. 2, as shown in fig. 9, before S201 described above, the control method provided in the embodiment of the present invention may further include S212 and S213 described below. Specifically, S201 may be implemented by S201b described below.
S212, the terminal equipment receives a second input of the target object from the user.
And S213, the terminal equipment responds to the second input and runs a second operating system.
S201b, the terminal device detects the user input in the second operating system.
The target object may be a target identifier or a target key, the second input may be an input received by the terminal device in a first operating system, the first operating system corresponds to a first screen of the terminal device, and the second operating system corresponds to a second screen of the terminal device.
In the embodiment of the present invention, when the terminal device runs the first operating system and does not run the second operating system, the user may trigger the terminal device to run the second operating system through an input to the target object, so that the terminal device detects an input of the user in the second operating system, and then the terminal device may execute the control method provided in the embodiment of the present invention in the second operating system according to the input of the user detected by the terminal device in the second operating system.
In this embodiment of the present invention, the correspondence between the first operating system and the first screen of the terminal device may be: the terminal equipment displays a user interface of the first operating system in a first screen of the terminal equipment; the correspondence between the second operating system and the second screen of the terminal device may be: and the terminal equipment displays the user interface of the second operating system in a second screen of the terminal equipment.
In other words, the application in the first screen of the terminal device (i.e., the application indicated by the application icon displayed in the first screen) may be run in the first operating system, and user data generated by the application in the first screen may be saved in the first operating system. Accordingly, the application in the second screen of the terminal device (i.e., the application indicated by the application icon displayed in the second screen) may be run in the second operating system, and the user data generated by the application in the second screen may be saved in the second operating system.
In the embodiment of the present invention, after the terminal device runs the second operating system, the terminal device may continue to run the first operating system. That is, the terminal device may simultaneously run the first operating system and the second operating system.
Optionally, as for the above "form two", the terminal device in the embodiment of the present invention may include a plurality of processors, or the processor of the terminal device is a multi-core processor. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
Specifically, when the terminal device includes a plurality of processors, one processor in the terminal device may correspond to one operating system. Taking the example that the terminal device includes two processors, processor 1 and processor 2 respectively. The processor 1 may correspond to the first operating system, and the processor 2 may correspond to the second operating system.
Of course, after the terminal device runs the second operating system, the terminal device may also stop running the first operating system. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
In the embodiment of the present invention, for the related description of the target object and the second input, reference may be specifically made to the detailed description of the target object and the second input in "form one", and details are not described here again.
It should be noted that, for the above "form two," after the terminal device runs the second operating system, the terminal device may execute the steps of the control method in the foregoing embodiment in the second operating system, and details are not described here to avoid repetition.
In this embodiment of the present invention, when the terminal device includes two operating systems, the terminal device may execute the control method provided in the embodiment of the present invention in one of the two operating systems (i.e., the second operating system), on one hand, the performance of the operating system (i.e., the first operating system) provided by a manufacturer of the terminal device may not be affected, and on the other hand, the security performance of the terminal device may be improved by executing the control method provided in the embodiment of the present invention in the second operating system.
In the embodiment of the present invention, the control methods shown in the above drawings are all exemplarily described with reference to one drawing in the embodiment of the present invention. In specific implementation, the control method shown in each of the above drawings may also be implemented by combining any other drawings that may be combined, which are illustrated in the above embodiments, and are not described herein again.
As shown in fig. 10, an embodiment of the present invention provides a terminal device 300, where the terminal device 300 includes a detection module 301 and a processing module 302. A detection module 301, configured to detect an input of a user; a processing module 302, configured to, when the detection module 301 detects that the input of the user is the first input, close the first application running in the background of the terminal device 300 or set the use state of the first application to the disabled state. Wherein the first input is any one of: and triggering the terminal equipment to run the input of the second application in the foreground of the terminal equipment and triggering the terminal equipment to execute the input of the preset operation through the second application.
Referring to fig. 10, as shown in fig. 11, the terminal device 300 further includes a receiving module 303. A receiving module 303, configured to receive a second input of the target object from the user before the detecting module 301 detects the input of the user; a processing module 302, further configured to switch the operating system of the terminal device from the first operating system to the second operating system in response to the second input received by the receiving module 303; the detecting module 301 is specifically configured to detect an input of a user in the second operating system. The target object is a target identification or a target key, and the second input is input received by the terminal device in the first operating system.
Referring to fig. 10, as shown in fig. 12, the terminal device 300 further includes a display module 304. The processing module 302 is further configured to determine whether the second application includes the first input method after the second application is executed; a display module 304, configured to display a first virtual keyboard in an interface of the second application if the processing module 302 determines that the first input method is included in the second application, or display a second virtual keyboard in the interface of the second application if the processing module 302 determines that the first input method is not included in the second application. The first virtual keyboard is a virtual keyboard of a first input method, the second virtual keyboard is a virtual keyboard of a second input method, and the second input method is a system input method of the terminal equipment.
The second application may be executed by the processing module 302.
Optionally, the detection module 301 is further configured to detect an application running in a foreground of the terminal device; the processing module 302 is further configured to prohibit the fourth application from using the target function of the terminal device when the detection module 301 detects that the application running in the foreground of the terminal device is the third application. Wherein, the fourth application is an application except the third application in the applications of the terminal device, and the target function includes at least one of the following: a recording function, a screen capture function, and a read/write function.
Optionally, the processing module 302 is further configured to set the use state of the first application to the enabled state after the use state of the first application is set to the disabled state and after the second application is exited.
Optionally, the processing module 302 is further configured to delete the target data or encrypt the target data after exiting the second application after setting the use state of the first application to the disabled state. The target data is user data of the second application stored in the terminal device.
The terminal device provided by the embodiment of the present invention can implement each process executed by the terminal device in the above control method embodiment, and can achieve the same technical effect, and for avoiding repetition, details are not described here again.
The present invention provides a terminal device, where an application (i.e., a first application) running in a background of the terminal device may obtain data of an application (i.e., a second application) running in a foreground of the terminal device, for example, obtain a user name, user information, a password input by a user, and the like in the second application, so that when the terminal device detects that the user triggers the terminal device to run the second application in the foreground of the terminal device, or when the terminal device detects that the user triggers the terminal device to execute a certain specific operation (for example, an operation preset in the terminal device) through the second application, the terminal device may close a first background application running in the background of the terminal device, or set a use state of the first background application running in the background of the terminal device to a disabled state. Therefore, the first application can not acquire the data of the second application running in the foreground of the terminal device, namely the first application can not acquire the privacy information of the user from the second application, so that the privacy information of the user can be protected, and the safety performance of the terminal device can be improved.
Fig. 13 is a hardware schematic diagram of a terminal device for implementing various embodiments of the present invention. As shown in fig. 13, the terminal device 100 includes, but is not limited to: a radio frequency unit 101, a network module 102, an audio output unit 103, an input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110 (which may be a plurality of processors or a single processor), a power supply 111, and the like. Those skilled in the art will appreciate that the terminal device configuration shown in fig. 13 does not constitute a limitation of the terminal device, and that the terminal device may include more or fewer components than shown, or combine certain components, or a different arrangement of components. In the embodiment of the present invention, the terminal device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 110 is configured to detect an input of a user; and closing the first application running in the background of the terminal equipment or setting the use state of the first application to be a forbidden state under the condition that the input of the user is detected to be the first input. Wherein the first input is any one of: and triggering the terminal equipment to run the input of the second application in the foreground of the terminal equipment and triggering the terminal equipment to execute the input of the preset operation through the second application.
The present invention provides a terminal device, where an application (i.e., a first application) running in a background of the terminal device may obtain data of an application (i.e., a second application) running in a foreground of the terminal device, for example, obtain a user name, user information, a password input by a user, and the like in the second application, so that when the terminal device detects that the user triggers the terminal device to run the second application in the foreground of the terminal device, or when the terminal device detects that the user triggers the terminal device to execute a certain specific operation (for example, an operation preset in the terminal device) through the second application, the terminal device may close a first background application running in the background of the terminal device, or set a use state of the first background application running in the background of the terminal device to a disabled state. Therefore, the first application can not acquire the data of the second application running in the foreground of the terminal device, namely the first application can not acquire the privacy information of the user from the second application, so that the privacy information of the user can be protected, and the safety performance of the terminal device can be improved.
It is understood that, in the embodiment of the present invention, the processor 110 may include a detection module 301 and a processing module 302 in a schematic structural diagram (for example, fig. 10) of the terminal device in the embodiment.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The terminal device provides wireless broadband internet access to the user through the network module 102, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal device 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the graphics processor 1041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.
The terminal device 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or the backlight when the terminal device 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal device posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal device. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and receives and executes commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 13, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the terminal device, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the terminal device, and is not limited herein.
The interface unit 108 is an interface for connecting an external device to the terminal apparatus 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal apparatus 100 or may be used to transmit data between the terminal apparatus 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the terminal device, connects various parts of the entire terminal device by using various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the terminal device. Processor 110 may include one or more processing units; alternatively, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The terminal device 100 may further include a power supply 111 (such as a battery) for supplying power to each component, and optionally, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the terminal device 100 includes some functional modules that are not shown, and are not described in detail here.
Optionally, an embodiment of the present invention further provides a terminal device, which includes the processor 110 shown in fig. 13, the memory 109, and a computer program stored in the memory 109 and capable of running on the processor 110, where the computer program, when executed by the processor 110, implements each process of the control method embodiment, and can achieve the same technical effect, and details are not described here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the control method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may include a read-only memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.