[go: up one dir, main page]

CN106354399A - Method, device, and electronic device for assignment of application permission - Google Patents

Method, device, and electronic device for assignment of application permission Download PDF

Info

Publication number
CN106354399A
CN106354399A CN201510420513.2A CN201510420513A CN106354399A CN 106354399 A CN106354399 A CN 106354399A CN 201510420513 A CN201510420513 A CN 201510420513A CN 106354399 A CN106354399 A CN 106354399A
Authority
CN
China
Prior art keywords
application
configuration
authorization
permission
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510420513.2A
Other languages
Chinese (zh)
Inventor
马向阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510420513.2A priority Critical patent/CN106354399A/en
Priority to PCT/CN2016/089078 priority patent/WO2017008676A1/en
Publication of CN106354399A publication Critical patent/CN106354399A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses an application permission assignment method, an application permission assignment device, and an electronic device; the method includes accepting the touch operation of the application icon, and accepting the selection operation of the authorization policy of the application when the touch operation agrees with the preset permission assignment triggering operation, and setting the relevant permission for the application according to the authorization policy selected, wherein the authorization policy is a member of the preset authorization policy set. By the adoption of the mentioned method, relevant permission collection can be granted directly to the application according to the authorization policy selected by users on the interface that contains an application icon, like an application desktop, thereby simplifying the steps of permission assignment, improving the assignment efficiency, and realizing the fast assignment of application permission.

Description

Application permission configuration method and device and electronic equipment
Technical Field
The application relates to the field of application authority management, in particular to an application authority configuration method. The application also provides an application authority configuration device and an electronic device.
Background
Mobile terminals are increasingly popular, mobile application functions are increasingly powerful, and in order to facilitate the use of users, many mobile terminal devices allow users to install mobile applications by themselves, so that the security of mobile application programs becomes increasingly important. For example, in the Android system, because of an open development platform, the authority control on the mobile application access system function is relatively loose, and most of the authority can be obtained only by application developer declaration. Mobile applications can therefore typically enjoy a variety of rights to access system functions, such as: the authority related to the user payment comprises sending short messages, dialing calls, surfing the internet and the like; the user privacy information authority comprises access message records, contact person information, call records and the like; the mobile terminal equipment communication permission comprises the steps of establishing WIFI connection, Bluetooth connection and the like.
Since some illegal mobile applications exist in reality, by using other authorities than the actual functions, the private data of the user is illegally acquired, the communication function of the mobile terminal device is illegally used, and key functions such as photographing are illegally used, which may cause significant loss to the user.
In view of the above, many mobile terminal devices have a permission configuration function, for example, a "permission management" function in "LBE security master", and through these permission configuration functions, a user is allowed to set, one by one, whether each mobile application has a permission to access a certain system function.
By adopting the method, the user needs to find and start the corresponding authority management program, find the application needing to be configured, find the authority needing to be configured from the plurality of authorities, and then execute the opening or closing operation, thereby granting or canceling the corresponding authority for the application. Therefore, the existing application authority configuration process is complicated in steps and low in efficiency.
Disclosure of Invention
The embodiment of the application authority configuration method is used for solving the problems of complicated steps and low efficiency of the existing application authority configuration process. The embodiment of the application also provides an application authority configuration device and electronic equipment.
The application provides an application authority configuration method, which comprises the following steps:
receiving touch operation on an application icon;
when the touch operation is consistent with a preset authority configuration triggering operation, receiving a selection operation of an authorization strategy of the application, and setting a corresponding authority for the application according to the selected authorization strategy;
wherein the authorization policy is a member of a preset set of authorization policies.
Optionally, the preset permission configuration triggering operation includes: long-press the application icon, double-click the application icon, triple-click the application icon, touch the application icon with a finger having specific fingerprint information, or touch the application icon in the permission configuration mode.
Optionally, when the preset permission configuration trigger operation is to touch the application icon in the permission configuration mode, before the touch operation on the application icon is received, the following switching operation to enter the permission configuration mode is performed:
receiving touch operation on a preset mode switching area in a display screen; or,
receiving a selection operation of a menu item for mode switching in a system menu; or,
and receiving the touch operation same as the preset mode switching gesture.
Optionally, when the touch operation is consistent with a preset permission configuration trigger operation, the following operations are performed:
verifying whether an executor of the touch operation has configuration authority; and if so, executing the selection operation of receiving the authorization policy of the application.
Optionally, the method is implemented on a device having a touch screen and the touch screen integrates a fingerprint sensor function;
the verifying whether the executor of the touch operation has a configuration right includes:
acquiring fingerprint information acquired when the touch operation is received;
judging whether the fingerprint information is consistent with the prestored fingerprint information with configuration authority or not; if the configuration authority is matched with the configuration authority, the executor is judged to have the configuration authority.
Optionally, the receiving a selection operation of the authorization policy of the application includes:
receiving an input authorization policy identifier; or,
and receiving selection operation of the application icons in different states displayed in a circulating mode, and determining the selected authorization strategy according to the states of the selected application icons and the corresponding relation between the preset states of the application icons and the authorization strategy.
Optionally, the receiving of the selection of the authorization policy of the application is performed by: receiving selection operation of application icons in different states displayed in a circulating mode;
the different state application icon comprises: application icons of different colors, application icons of different sizes, or application icons with different status indications.
Optionally, the receiving a selection operation of the application icons in different states of the circular display includes:
circularly displaying application icons in different states;
and acquiring the state of the selected application icon in the circulation display process.
Optionally, the cyclically displaying the application icons in different states includes:
displaying the application icons in the next state different from the current state according to a preset circular display sequence every time the touch operation on the application icons is received;
the acquiring the state of the selected application icon in the circulation display process comprises the following steps: and if the touch operation on the application icon is not received within a preset time period, the currently displayed application icon state is the selected application icon state.
Optionally, the cyclically displaying the application icons in different states includes:
automatically and circularly displaying application icons in different states according to a preset time interval;
the acquiring the state of the selected application icon in the circulation display process comprises the following steps: and receiving selection operation corresponding to the icon state in the circulation display process.
Optionally, the setting of the corresponding right for the application according to the selected authorization policy includes:
acquiring a permission set corresponding to the authorization strategy;
and setting the permission in the permission set for the application.
Optionally, the setting of the corresponding right for the application according to the selected authorization policy further includes:
calculating the intersection of the permission set corresponding to the authorization policy and the permission set required by the application;
the setting of the permissions in the permission set for the application comprises: setting the permissions contained in the intersection for the application.
Optionally, the set of authorization policies includes: an authorization policy set based on application requirements or an authorization policy set based on risk division;
the set of authorization policies based on application requirements includes the following authorization policies: a general policy, a trust policy, and an untrusted policy;
the risk partitioning-based set of authorization policies comprises the following authorization policies: low risk strategies, medium risk strategies, and high risk strategies.
Optionally, when the touch operation is consistent with a preset permission configuration trigger operation, before receiving a selection operation of the authorization policy of the application, the following operations are performed:
displaying the application icon in a preset mode, wherein the preset mode comprises the following steps: highlighted, or blinking.
Optionally, the number of the preset authorization policy sets is at least two;
when the touch operation is consistent with a preset authority configuration triggering operation, before the selection operation of receiving the authorization strategy of the application is executed, executing the following operations:
receiving a selection operation of an authorization policy set to which the application belongs;
the receiving a selection operation of an authorization policy of the application comprises: receiving a selection operation of an authorization policy of the application in the selected set of authorization policies.
Optionally, the application icon includes: an application icon displayed on the desktop.
Correspondingly, the present application also provides an application authority configuration device, including:
the touch operation receiving unit is used for receiving touch operation on the application icon;
the touch operation judging unit is used for judging whether the touch operation received by the touch operation receiving unit is consistent with a preset authority configuration triggering operation or not;
the policy selection receiving unit is used for receiving the selection operation of the applied authorization policy when the output of the touch operation judging unit is yes;
and the application permission setting unit is used for selecting the authorization strategy output by the receiving unit according to the strategy and setting corresponding permission for the application.
Optionally, when the preset permission configuration triggering operation is to click on an application icon in a permission configuration mode, the apparatus includes any one of the following units:
the first mode switching receiving unit is used for receiving touch operation on a preset mode switching area in a display screen before triggering the touch operation receiving unit to work; or,
and the second mode switching receiving unit is used for receiving the selection operation of a menu item for mode switching in a system menu before triggering the touch operation receiving unit to work.
Optionally, the apparatus includes:
and the configuration authority verification unit is used for verifying whether the executor of the touch operation has the configuration authority or not when the output of the touch operation judgment unit is yes, and triggering the strategy selection receiving unit to work when the executor of the touch operation has the configuration authority.
Optionally, the apparatus is disposed on a device having a touch screen, and the touch screen integrates a fingerprint sensor function;
the configuration right verifying unit includes:
the fingerprint information acquisition subunit is used for acquiring fingerprint information acquired by the touch operation receiving unit during working;
and the configuration authority judgment subunit is used for judging whether the fingerprint information conforms to the pre-stored fingerprint information with the configuration authority, and if so, judging that the executor has the configuration authority.
Optionally, the policy selection receiving unit is specifically configured to,
receiving an input authorization policy identifier; or,
and receiving selection operation of the application icons in different states displayed in a circulating mode, and determining the selected authorization strategy according to the states of the selected application icons and the corresponding relation between the preset states of the application icons and the authorization strategy.
Optionally, the policy selection receiving unit is specifically configured to receive a selection operation on application icons in different states displayed in a circulating manner, and determine the selected authorization policy according to the state of the selected application icon and a corresponding relationship between a preset state of the application icon and the authorization policy; the policy selection receiving unit includes:
the circulation display subunit is used for circularly displaying the application icons in different states;
the state acquisition subunit is used for acquiring the state of the selected application icon in the cyclic display process;
and the strategy determining subunit is used for determining the selected authorization strategy according to the application icon state acquired by the state acquiring subunit and the corresponding relation between the preset application icon state and the authorization strategy.
Optionally, the circular display subunit is specifically configured to, each time a touch operation on the application icon is received, display the application icon in a next state different from the current state according to a preset circular display sequence;
the state obtaining subunit is specifically configured to determine whether a touch operation on the application icon is not received within a preset time period, and if so, determine that the currently displayed state of the application icon is the state of the selected application icon.
Optionally, the circular display subunit is specifically configured to, according to a preset time interval, automatically and circularly display the application icons in different states;
the state acquiring subunit is specifically configured to receive, in the cyclic display process, a selection operation for a state of the icon.
Optionally, the application permission setting unit includes:
the authority set acquiring subunit is used for acquiring an authority set corresponding to the authorization policy output by the policy selection receiving unit;
and the permission setting and executing subunit is used for setting the permission in the permission set acquired by the permission set acquiring subunit for the application.
Optionally, the application permission setting unit further includes:
the intersection calculation subunit is used for calculating the intersection of the permission set acquired by the permission set acquisition subunit and the permission set required by the application;
the permission setting execution subunit is specifically configured to set, for the application, a permission included in the intersection calculated by the intersection calculation subunit.
Optionally, the apparatus includes:
and the icon highlighting display unit is used for displaying the application icon in a preset mode and then triggering the strategy selection receiving unit to work when the output of the touch operation judging unit is yes.
Optionally, the apparatus includes:
the set selection receiving unit is used for receiving the selection operation of the authorization policy set to which the application belongs and triggering the policy selection receiving unit to work when the output of the touch operation judging unit is yes;
the policy selection receiving unit is specifically configured to receive a selection operation of an authorization policy of the application in the selected authorization policy set.
In addition, the present application also provides an electronic device, including:
a display;
a processor;
a memory for storing an application rights configuration program, which when read and executed by the processor performs the following operations: receiving touch operation on an application icon; when the touch operation is consistent with a preset authority configuration triggering operation, receiving a selection operation of an authorization strategy of the application, and setting a corresponding authority for the application according to the selected authorization strategy; wherein the authorization policy is a member of a preset set of authorization policies.
Compared with the prior art, the method has the following advantages:
according to the application permission configuration method, when the received touch operation on the application icon is consistent with the preset permission configuration triggering operation, the selection operation on the authorization strategy of the application is received, and the corresponding permission is set for the application according to the selected authorization strategy. By adopting the method, the corresponding permission set can be directly granted to the application on the application desktop and other interfaces containing the application icons according to the authorization strategy selected by the user, so that the permission configuration steps are simplified, the configuration efficiency is improved, and the rapid configuration of the application permission is realized.
Drawings
FIG. 1 is a flow chart of an embodiment of an application rights configuration method of the present application;
FIG. 2 is a flowchart of a process for determining a selected authorization policy by receiving a selection operation of an application icon in different states of a circular display according to an embodiment of the present application;
FIG. 3 is a flowchart of a process for setting corresponding permissions for an application according to a selected authorization policy according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an embodiment of an application authority configuration apparatus according to the present application;
FIG. 5 is a schematic diagram of an embodiment of an electronic device of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of implementation in many different ways than those herein set forth and of similar import by those skilled in the art without departing from the spirit and scope of this application, and it is therefore not limited to the specific implementations disclosed below.
In the present application, an application authority configuration method, an application authority configuration device, and an electronic device are provided, respectively, and detailed descriptions are made one by one in the following embodiments.
The application permission configuration method and device provided by the embodiment of the application permission configuration method and device can be applied to mobile terminal equipment such as a smart phone, a palm computer and a tablet personal computer, and can also be applied to other electronic equipment such as a computer and the like which can be provided with application programs, so that the application permission can be rapidly configured, and the use of a user is facilitated.
Please refer to fig. 1, which is a flowchart illustrating an embodiment of an application authority configuration method according to the present application. The method comprises the following steps:
step 101, receiving a touch operation on an application icon.
According to the technical scheme, when the received touch operation aiming at the application icon is consistent with the preset authority configuration triggering operation, the selection operation of the authorization strategy of the application is received, and the corresponding authority is set for the application according to the selected authorization strategy, so that the application authority is rapidly configured.
The authority is for an application (also referred to as an application program) installed in an electronic device such as a mobile terminal, and means whether the application has a right to access a system function. The access system functions include, but are not limited to: access private data, use a hardware module such as a camera device, or establish communication connection such as WiFi, bluetooth, and the like. Normally, an application can only access the system function to which the authority is granted, for example, the authority to use the camera is granted to an application, and the application can take a picture or record a video by using the camera, otherwise the application cannot perform the above operation.
The authorization policy is a member of an authorization policy set, and the authorization policy set and various authorization policies contained in the authorization policy set are preset. To facilitate understanding of the present technical solution, before describing step 101, the set of authorization policies and the authorization policies are further described.
Each authorization strategy in the authorization strategy set corresponds to a strategy for authorizing the application, and the technical scheme grants the authority set corresponding to the strategy for the corresponding application according to the authorization strategy selected by the user, thereby realizing the rapid authorization of the application. In specific implementation, an authorization policy set may be preset according to actual needs, for example: an authorization policy set based on application requirements can be set, and an authorization policy set based on risk division can also be set.
The set of authorization policies based on application requirements may include the following authorization policies: a general policy, a trust policy, and an untrusted policy. The common policy means that a conventional right of application is granted, for example, in the process of installing the application, the application applies for 10 rights of accessing system functions, and the user selects 5 rights from the rights, so that when the common policy is adopted, the 5 conventional rights customized by the user can be granted to the application; the trust mode is to grant all the permissions required by the application, for example, in an Android system, each application can declare the required permissions in the corresponding Android manifest.xml, and then when a trust policy is adopted, all the declared permissions can be granted to the application; an untrusted policy means that no rights are granted to any kind of rights required by the application, and such an authorization policy may be employed for applications that are not normally understood to be of origin.
The set of authorization policies based on risk partitioning may include the following authorization policies: in this way, the permissions to access system functions can be pre-classified into the following two categories: 1) basic and simple rights, such as: simple permissions of accessing calendar, browsing files, etc.; 2) risky jurisdictions such as: the authority to dial a call, read a short message, send a short message, etc. may reveal the privacy of the user or consume the wealth of the user. The low risk strategy is to only grant basic and simple authority to the application; the risk policy means that on the basis of granting basic and simple permission to the application, a small number of risky permission to the application can be granted; a high risk policy means that a large number of risky rights can be granted to an application on the basis of granting basic and simple rights to the application. In specific implementation, the permission sets corresponding to the low-risk, medium-risk and high-risk policies can be uniformly set for all the applications in advance. Considering that the functions of different applications are different, and the requirements for accessing the system functions are different, the permission sets corresponding to the low-risk, medium-risk and high-risk policies may be set for each application.
In the above, two authorization policy sets and the authorization policy included in each set are listed, and when the technical solution of the present application is implemented, any one of the authorization policy sets may be preset in the above manner, or another authorization policy set different from the above manner may be preset according to the property of the required authorization policy. For convenience of description, in this embodiment, a set of authorization policies based on application requirements is adopted, where the set includes the following authorization policies: a general policy, a trust policy, and an untrusted policy.
After the set of authorization policies is preset, the touch operation on the application icon may be received in this step 101. The application icons generally refer to application icons displayed on a screen, including application icons displayed on an application desktop. Because the application desktop usually comprises a plurality of application icons and can be displayed by turning pages, a user can conveniently find an application program which wants to be subjected to authority configuration on the desktop and touch the corresponding application icon.
The touch operation in the present technical solution generally refers to a touch or control operation on a screen, and includes: the method comprises the following steps of performing touch operation on a touch screen device or performing clicking operation on a non-touch screen device by using external equipment such as a mouse and the like. If a user wants to configure the authority of a certain application, the user can start the application by touch operation of an application icon of the application, and then the touch operation of the application icon is received in the step.
And 102, judging whether the touch operation is consistent with a preset authority configuration triggering operation or not, and if so, executing a step 103.
If the touch operation received in step 101 is consistent with the preset permission configuration triggering operation, it indicates that the user wishes to start the permission configuration process, in which case step 103 is executed.
The permission configuration triggering operation is usually preset, and may include: long-press the application icon, double-click the application icon, triple-click the application icon, touch the application icon with a finger having specific fingerprint information, or touch the application icon in the permission configuration mode. The long press, double click, and triple click of the application icon are operation modes that are easy to understand, and are not described herein, and the other two types of permission configuration trigger operations and related embodiments are further described below.
If the preset permission configuration triggering operation is that a finger with specific fingerprint information is used to touch the application icon, in a specific implementation, on one hand, a touch screen receiving touch needs to integrate a function of a fingerprint sensor, and on the other hand, before step 101 is executed, a user can be prompted to input a fingerprint image of the finger used for triggering permission configuration through the fingerprint sensor, a fingerprint characteristic value, namely fingerprint information, is extracted from the fingerprint image, and then the fingerprint information is stored, in this step, the fingerprint information acquired in the process of receiving touch operation in step 101 can be compared with the pre-stored fingerprint information used for triggering permission configuration, and if the fingerprint information is successfully matched with the pre-stored fingerprint information, the user wants to execute the permission configuration operation on the application.
If the preset permission configuration triggering operation is that the application icon is clicked in the permission configuration mode, a specific implementation manner may be that, before executing step 101, a switching operation of entering the permission configuration mode performed by the user is received, for example, a control prompting the user to enter the permission configuration mode may be displayed in a preset area of a display screen, and the user clicks the control to indicate that the permission configuration mode is to be entered; a menu item for switching the permission configuration mode can be added in the system menu, and the user indicates to enter the permission configuration mode when selecting the menu item; a mode switching gesture may also be preset, and the user performing a screen touch operation consistent with the gesture also indicates that the permission configuration mode is to be entered, where the mode switching gesture includes: the finger slides and the sliding distance exceeds preset length at the edge of the left side and the right side of the screen, or the finger slides and the sliding distance exceeds preset length from the outer side of the screen to the inner side of the screen, and the preset length can be set to be 1 cm, 2 cm and other numerical values according to specific requirements.
If the user performs the above operation, the method receives a corresponding touch or selection operation, so as to enter the permission configuration mode, and on this basis, if the touch operation on the application icon is received in step 101, it indicates that the user wishes to perform the permission configuration operation on the application.
Preferably, in a case that the touch operation is consistent with a preset permission configuration triggering operation, in order to make a user interface more friendly, the touched application icon may be highlighted in a preset manner, so as to clearly inform the user of the selected object. The preset mode comprises the following steps: highlighting or flashing, and other means may be used as long as they are distinguishable from other application icons.
If the received touch operation is determined to be consistent with the preset permission configuration triggering operation, the user can enter a permission configuration mode, and the subsequent step 103 of receiving the selection operation of the applied authorization policy is executed.
And 103, receiving a selection operation of the authorization policy of the application.
Preferably, in order to avoid that the application permission configuration method provided by the present technical solution is used by a malicious operator and unnecessary loss is brought to a legitimate user, before executing this step, it may be verified whether a user executing the touch operation has a configuration permission, and a subsequent operation is executed under the condition that the user has the permission. For example, the user may be prompted to input a password, and when the input password is consistent with a preset corresponding password, the current user is considered to have the configuration authority; the user can also be prompted to input a fingerprint image on the fingerprint sensor to acquire fingerprint information, the acquired fingerprint information is compared with the pre-stored fingerprint information with the configuration authority, and if the acquired fingerprint information and the pre-stored fingerprint information with the configuration authority are consistent, the current operator is indicated to have the configuration authority.
Further, if the technical solution is implemented on a device having a touch screen and the touch screen integrates a fingerprint sensor function, the above verification process may be further simplified: when receiving a touch operation of a user on an application icon in step 101, fingerprint information of the user may be acquired, and if the fingerprint information matches with pre-stored fingerprint information with configuration authority, it indicates that the current operator has the configuration authority. By adopting the mode, the user does not need to be additionally prompted to carry out identity authentication, the operation flow of the user can be simplified, and the permission configuration process is quicker while the safety is ensured.
The receiving of the selection operation of the authorization policy of the application in this step can be implemented in various ways in specific implementation. Several ways are listed here:
an input authorization policy identification may be received. The specific implementation manner may be that, when the authorization policy set is set in advance, a corresponding identifier is specified for each authorization policy, for example: if 0 corresponds to the normal policy, 1 corresponds to the trust policy, and 2 corresponds to the distrust policy, then the step may display a prompt for inputting authorization policy information and corresponding input controls for the selected application icon, for example: the text input box or the drop-down list containing various authorization policies can receive the authorization policy identification input or selected by the user, so that the authorization policy selected by the user for the application is known.
And the method can also receive the selection operation of the application icons in different states displayed in a circulating way, and determine the selected authorization policy according to the states of the selected application icons and the corresponding relation between the preset states of the application icons and the authorization policy. This approach is user-friendly and easy for the user to understand, so the embodiment will be described below with an emphasis on this implementation.
The different-state application icon includes: application icons of different colors, application icons of different sizes, or application icons with different status indications. The user may preset the authorization policy corresponding to each state, for example, may set the corresponding relationship between the icons with different colors and the authorization policy: the yellow icon corresponds to a common strategy, the green icon corresponds to a trust strategy, and the red icon corresponds to an untrusted strategy; the corresponding relationship between the icons with different sizes and the authorization policy can also be set as follows: the small icons correspond to distrust strategies, the medium-sized icons correspond to common strategies, and the large icons correspond to trust strategies; the corresponding relationship between different state identifiers displayed on the application icon and the authorization policy can also be set as follows: the identifier 0 corresponds to a common policy, the identifier 1 corresponds to a trust policy, and the identifier 2 corresponds to an untrusted policy.
After the above setting is performed in advance, different states of the icon can be displayed in a loop for the application icon selected in step 101 through touch operation, the state of the application icon selected by the user is obtained, and the authorization policy selected by the user can be determined according to the state of the application icon. Specifically, the method comprises steps 103-1 to 103-3, which are described below with reference to FIG. 2.
And step 103-1, circularly displaying the application icons in different states.
The circular display process may be performed automatically or based on user actuation. The specific implementation can adopt the following two modes:
1) and displaying the application icons in the next state different from the current state according to a preset circular display sequence every time the touch operation on the application icons is received. For example: the preset cycle display sequence is as follows: ordinary policy- > trust policy- > distrust policy- > ordinary policy, and different colors in the above example are used to represent different authorization policies, then if the current application is in ordinary policy, the application icon may be displayed in an initial state of yellow; after receiving the touch of the user, updating the color of the icon to be the color corresponding to the trust strategy, namely displaying a green icon; if the user touch is received again, the color of the icon corresponding to the distrust policy is displayed, namely, a red icon is displayed. By adopting the mode, the application icons can display different colors in a circulating mode according to the touch operation of the user.
2) And circularly displaying the application icons in different states according to a preset time interval. For example: the preset time interval is 3 seconds, and the state of the application icon is changed every 3 seconds. In this way, application icons in different states are automatically cycled through without user involvement.
And 103-2, acquiring the state of the selected application icon in the circulation display process.
In the case of the above mode 1), the state of the application icon selected in the loop display process may be acquired by: and if the touch operation on the application icon is not received within a preset time period, the currently displayed application icon state is the selected application icon state.
In the case of the above-described mode 2), the state of the application icon selected in the loop display process may be acquired by: in the circular display process, a selection operation for the application icon state is received, for example, if a touch operation for the application icon is received, the selection operation indicates that the user selects the application icon state when being touched. It should be noted that, if the user starts the permission configuration process by pressing the application icon for a long time in step 101 and the long-press state is still maintained during the cyclic display of the application icon, the selecting operation may be an end long-press operation, that is: and detecting that the icon state when the long-time pressing operation is finished is the icon state selected by the user. In particular implementations, the circular display process may be stopped after receiving a selection operation for the icon state.
And 103-3, determining the selected authorization policy according to the selected application icon state and the corresponding relation between the preset application icon state and the authorization policy.
After the selected application icon state is obtained in step 103-2, the authorization policy selected by the user for the application may be obtained according to the corresponding relationship between the preset application icon state and the authorization policy.
And step 104, setting corresponding authority for the application according to the selected authorization policy.
And executing the step, acquiring the authorization strategy selected by the user for the application, and realizing the rapid configuration of the application permission by acquiring the permission set corresponding to the authorization strategy and setting the permission for the application. The above process is further described with reference to fig. 3.
Step 104-1: and acquiring a permission set corresponding to the authorization policy.
Since the permissions granted to the application by using different authorization policies are different, a set of permissions corresponding to the authorization policies is obtained first. The following examples are given.
In this embodiment, a set of authorization policies based on the application requirements is used, and if the authorization policy selected in step 103 is a trust mode, it indicates that all the required rights can be granted to the application. Then, in this step, a set of permissions required by the application may be obtained, for example, in an Android system, by reading an Android manifest xml file corresponding to the application, each permission stated by the application and required by the application may be obtained, and the permissions collectively form the set of permissions.
In other embodiments, the set of permissions corresponding to the authorization policy may be obtained in a corresponding manner. For example, if a set of authorization policies based on risk partitioning is employed and the authorization policy selected in step 103 is a low risk policy, then basic and simple rights can be selected from the rights provided by the system in this step to form the set of rights. If the authorization policy sets are preset as in step 101, the permission sets corresponding to the low, medium, and high risk policies are preset for each application, then the step may directly obtain the permission set corresponding to the low risk policy preset for the application.
Step 104-2: and setting the permission in the permission set for the application.
In specific implementation, an authority setting interface provided by the system may be called to grant each authority in the authority set acquired in step 104-1 to the application, thereby completing the rapid configuration of the application authority. For example, if the method is implemented on a smart phone adopting an Android system, the configuration process can be completed by calling an authority setting interface provided by the Android system.
It should be noted that, in other embodiments, if the set of permissions corresponding to the selected authorization policy obtained in step 104-1 is a set of general permissions for all applications, for example, a set of general permissions for a low-risk policy, in this case, in order to avoid granting unnecessary additional permissions to an application and causing unnecessary security risks, an intersection of the set of permissions obtained in step 104-1 and the set of permissions required by the application may be calculated, and then permissions in the intersection may be used to perform permission setting for the application.
The present embodiment is described in detail through the above steps 101 to 104. In this embodiment, an authorization policy set is preset, and corresponding applications are authorized according to an authorization policy selected by a user from the set. In other embodiments, two or more authorization policy sets may be preset, and when a touch operation of a user on an application icon is received and the touch operation is consistent with a preset permission configuration trigger operation, the user may be prompted to select among a plurality of preset authorization policy sets, for example: and circularly displaying application icons representing different authorization policy sets in different states, and after a user selects a certain authorization policy set, further prompting the user to select a specific authorization policy from the selected authorization policy set and authorizing the application according to the selection of the user. By adopting the method, more selection opportunities can be provided for the user, so that more flexible and various authorization strategies can be adopted for carrying out authority configuration on the application.
In summary, the application permission configuration method provided by the application can grant the corresponding permission set for the application according to the authorization policy selected by the user directly on the application desktop and other interfaces containing the application icons, thereby simplifying permission configuration steps, improving configuration efficiency and realizing rapid configuration of the application permission.
In the foregoing embodiment, an application permission configuration method is provided, and correspondingly, the application also provides an application permission configuration device. Please refer to fig. 4, which is a schematic diagram of an embodiment of an application authority configuration device according to the present application. Since the apparatus embodiments are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for relevant points. The device embodiments described below are merely illustrative.
An application authority configuration device of this embodiment includes: a touch operation receiving unit 401, configured to receive a touch operation on an application icon; a touch operation determining unit 402, configured to determine whether the touch operation received by the touch operation receiving unit is consistent with a preset permission configuration trigger operation; a policy selection receiving unit 403, configured to receive a selection operation on the applied authorization policy when the output of the touch operation determining unit is yes; an application permission setting unit 404, configured to select, according to the policy, the authorization policy output by the receiving unit, and set a corresponding permission for the application.
Optionally, when the preset permission configuration triggering operation is to click on an application icon in a permission configuration mode, the apparatus includes any one of the following units:
the first mode switching receiving unit is used for receiving touch operation on a preset mode switching area in a display screen before triggering the touch operation receiving unit to work; or,
and the second mode switching receiving unit is used for receiving the selection operation of a menu item for mode switching in a system menu before triggering the touch operation receiving unit to work.
Optionally, the apparatus includes:
and the configuration authority verification unit is used for verifying whether the executor of the touch operation has the configuration authority or not when the output of the touch operation judgment unit is yes, and triggering the strategy selection receiving unit to work when the executor of the touch operation has the configuration authority.
Optionally, the apparatus is disposed on a device having a touch screen, and the touch screen integrates a fingerprint sensor function;
the configuration right verifying unit includes:
the fingerprint information acquisition subunit is used for acquiring fingerprint information acquired by the touch operation receiving unit during working;
and the configuration authority judgment subunit is used for judging whether the fingerprint information conforms to the pre-stored fingerprint information with the configuration authority, and if so, judging that the executor has the configuration authority.
Optionally, the policy selection receiving unit is specifically configured to,
receiving an input authorization policy identifier; or,
and receiving selection operation of the application icons in different states displayed in a circulating mode, and determining the selected authorization strategy according to the states of the selected application icons and the corresponding relation between the preset states of the application icons and the authorization strategy.
Optionally, the policy selection receiving unit is specifically configured to receive a selection operation on application icons in different states displayed in a circulating manner, and determine the selected authorization policy according to the state of the selected application icon and a corresponding relationship between a preset state of the application icon and the authorization policy; the policy selection receiving unit includes:
the circulation display subunit is used for circularly displaying the application icons in different states;
the state acquisition subunit is used for acquiring the state of the selected application icon in the cyclic display process;
and the strategy determining subunit is used for determining the selected authorization strategy according to the application icon state acquired by the state acquiring subunit and the corresponding relation between the preset application icon state and the authorization strategy.
Optionally, the circular display subunit is specifically configured to, each time a touch operation on the application icon is received, display the application icon in a next state different from the current state according to a preset circular display sequence;
the state obtaining subunit is specifically configured to determine whether a touch operation on the application icon is not received within a preset time period, and if so, determine that the currently displayed state of the application icon is the state of the selected application icon.
Optionally, the circular display subunit is specifically configured to, according to a preset time interval, automatically and circularly display the application icons in different states;
the state acquiring subunit is specifically configured to receive, in the cyclic display process, a selection operation for a state of the icon.
Optionally, the application permission setting unit includes:
the authority set acquiring subunit is used for acquiring an authority set corresponding to the authorization policy output by the policy selection receiving unit;
and the permission setting and executing subunit is used for setting the permission in the permission set acquired by the permission set acquiring subunit for the application.
Optionally, the application permission setting unit further includes:
the intersection calculation subunit is used for calculating the intersection of the permission set acquired by the permission set acquisition subunit and the permission set required by the application;
the permission setting execution subunit is specifically configured to set, for the application, a permission included in the intersection calculated by the intersection calculation subunit.
Optionally, the apparatus includes:
and the icon highlighting display unit is used for displaying the application icon in a preset mode and triggering the strategy selection receiving unit to work when the output of the touch operation judging unit is yes.
Optionally, the apparatus includes:
the set selection receiving unit is used for receiving the selection operation of the authorization policy set to which the application belongs and triggering the policy selection receiving unit to work when the output of the touch operation judging unit is yes;
the policy selection receiving unit is specifically configured to receive a selection operation of an authorization policy of the application in the selected authorization policy set.
In the above embodiment, an application authority configuration method and an application authority configuration device are provided, and in addition, an electronic device is also provided; the electronic equipment comprises the following embodiments:
please refer to fig. 5, which shows a schematic diagram of an embodiment of an electronic device according to the present application.
The electronic device includes: a display 501; a processor 502; a memory 503;
the memory 503 is used for storing an application right configuration program, and when the program is read and executed by the processor, the program performs the following operations: receiving touch operation on an application icon; when the touch operation is consistent with a preset authority configuration triggering operation, receiving a selection operation of an authorization strategy of the application, and setting a corresponding authority for the application according to the selected authorization strategy; wherein the authorization policy is a member of a preset set of authorization policies.
Although the present application has been described with reference to the preferred embodiments, it is not intended to limit the present application, and those skilled in the art can make variations and modifications without departing from the spirit and scope of the present application, therefore, the scope of the present application should be determined by the claims that follow.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
1. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
2. As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

Claims (29)

1. An application authority configuration method is characterized by comprising the following steps:
receiving touch operation on an application icon;
when the touch operation is consistent with a preset authority configuration triggering operation, receiving a selection operation of an authorization strategy of the application, and setting a corresponding authority for the application according to the selected authorization strategy;
wherein the authorization policy is a member of a preset set of authorization policies.
2. The application permission configuration method according to claim 1, wherein the preset permission configuration trigger operation comprises: long-press the application icon, double-click the application icon, triple-click the application icon, touch the application icon with a finger having specific fingerprint information, or touch the application icon in the permission configuration mode.
3. The method according to claim 2, wherein when the preset permission configuration trigger operation is to touch the application icon in a permission configuration mode, before the receiving of the touch operation on the application icon, the following switching operation to enter the permission configuration mode is performed:
receiving touch operation on a preset mode switching area in a display screen; or,
receiving a selection operation of a menu item for mode switching in a system menu; or,
and receiving the touch operation same as the preset mode switching gesture.
4. The application permission configuration method according to claim 1, wherein when the touch operation is consistent with a preset permission configuration trigger operation, the following operations are performed:
verifying whether an executor of the touch operation has configuration authority; and if so, executing the selection operation of receiving the authorization policy of the application.
5. The application authority configuration method according to claim 4, wherein the method is implemented on a device having a touch screen and the touch screen integrates a fingerprint sensor function;
the verifying whether the executor of the touch operation has a configuration right includes:
acquiring fingerprint information acquired when the touch operation is received;
judging whether the fingerprint information is consistent with the prestored fingerprint information with configuration authority or not; if the configuration authority is matched with the configuration authority, the executor is judged to have the configuration authority.
6. The method for configuring application authority according to claim 1, wherein the receiving a selection operation of an authorization policy of the application comprises:
receiving an input authorization policy identifier; or,
and receiving selection operation of the application icons in different states displayed in a circulating mode, and determining the selected authorization strategy according to the states of the selected application icons and the corresponding relation between the preset states of the application icons and the authorization strategy.
7. The application authority configuration method according to claim 6, wherein the receiving of the selection of the authorization policy of the application is to: receiving selection operation of application icons in different states displayed in a circulating mode;
the different state application icon comprises: application icons of different colors, application icons of different sizes, or application icons with different status indications.
8. The method for configuring application authority according to claim 7, wherein the receiving a selection operation of the application icons in different states displayed in a cycle comprises:
circularly displaying application icons in different states;
and acquiring the state of the selected application icon in the circulation display process.
9. The method for configuring application authority according to claim 8, wherein the step of circularly displaying application icons in different states comprises the steps of:
displaying the application icons in the next state different from the current state according to a preset circular display sequence every time the touch operation on the application icons is received;
the acquiring the state of the selected application icon in the circulation display process comprises the following steps: and if the touch operation on the application icon is not received within a preset time period, the currently displayed application icon state is the selected application icon state.
10. The method for configuring application authority according to claim 8, wherein the step of circularly displaying application icons in different states comprises the steps of:
automatically and circularly displaying application icons in different states according to a preset time interval;
the acquiring the state of the selected application icon in the circulation display process comprises the following steps: and receiving selection operation corresponding to the icon state in the circulation display process.
11. The method for configuring application permissions according to claim 1, wherein the setting of the corresponding permissions for the application according to the selected authorization policy comprises:
acquiring a permission set corresponding to the authorization strategy;
and setting the permission in the permission set for the application.
12. The method for configuring application permissions according to claim 11, wherein the setting corresponding permissions for the application according to the selected authorization policy further comprises:
calculating the intersection of the permission set corresponding to the authorization policy and the permission set required by the application;
the setting of the permissions in the permission set for the application comprises: setting the permissions contained in the intersection for the application.
13. The application right configuration method according to any one of claims 1 to 12, wherein the set of authorization policies comprises: an authorization policy set based on application requirements or an authorization policy set based on risk division;
the set of authorization policies based on application requirements includes the following authorization policies: a general policy, a trust policy, and an untrusted policy;
the risk partitioning-based set of authorization policies comprises the following authorization policies: low risk strategies, medium risk strategies, and high risk strategies.
14. The application permission configuration method according to any one of claims 1 to 12, wherein when the touch operation is consistent with a preset permission configuration trigger operation, before receiving a selection operation of an authorization policy of the application, performing the following operations:
displaying the application icon in a preset mode, wherein the preset mode comprises the following steps: highlighted, or blinking.
15. The application authority configuration method according to any of claims 1-12, wherein the preset authorization policy set is at least two;
when the touch operation is consistent with a preset authority configuration triggering operation, before the selection operation of receiving the authorization strategy of the application is executed, executing the following operations:
receiving a selection operation of an authorization policy set to which the application belongs;
the receiving a selection operation of an authorization policy of the application comprises: receiving a selection operation of an authorization policy of the application in the selected set of authorization policies.
16. The application authority configuration method according to any one of claims 1 to 12, wherein the application icon includes: an application icon displayed on the desktop.
17. An application authority configuration apparatus, comprising:
the touch operation receiving unit is used for receiving touch operation on the application icon;
the touch operation judging unit is used for judging whether the touch operation received by the touch operation receiving unit is consistent with a preset authority configuration triggering operation or not;
the policy selection receiving unit is used for receiving the selection operation of the applied authorization policy when the output of the touch operation judging unit is yes;
and the application permission setting unit is used for selecting the authorization strategy output by the receiving unit according to the strategy and setting corresponding permission for the application.
18. The application permission configuration device of claim 17, wherein when the preset permission configuration trigger operation is to click an application icon in a permission configuration mode, the device comprises any one of the following units:
the first mode switching receiving unit is used for receiving touch operation on a preset mode switching area in a display screen before triggering the touch operation receiving unit to work; or,
and the second mode switching receiving unit is used for receiving the selection operation of a menu item for mode switching in a system menu before triggering the touch operation receiving unit to work.
19. The application right configuration device according to claim 17, comprising:
and the configuration authority verification unit is used for verifying whether the executor of the touch operation has the configuration authority or not when the output of the touch operation judgment unit is yes, and triggering the strategy selection receiving unit to work when the executor of the touch operation has the configuration authority.
20. The application authority configuration device according to claim 19, wherein the device is deployed on a device having a touch screen, and the touch screen integrates a fingerprint sensor function;
the configuration right verifying unit includes:
the fingerprint information acquisition subunit is used for acquiring fingerprint information acquired by the touch operation receiving unit during working;
and the configuration authority judgment subunit is used for judging whether the fingerprint information conforms to the pre-stored fingerprint information with the configuration authority, and if so, judging that the executor has the configuration authority.
21. The application authority configuration device according to claim 17, wherein the policy selection receiving unit is specifically configured to,
receiving an input authorization policy identifier; or,
and receiving selection operation of the application icons in different states displayed in a circulating mode, and determining the selected authorization strategy according to the states of the selected application icons and the corresponding relation between the preset states of the application icons and the authorization strategy.
22. The apparatus for configuring application permissions according to claim 21, wherein the policy selection receiving unit is specifically configured to receive a selection operation on application icons in different states that are displayed in a loop, and determine the selected authorization policy according to a state of the selected application icon and a corresponding relationship between a preset state of the application icon and the authorization policy; the policy selection receiving unit includes:
the circulation display subunit is used for circularly displaying the application icons in different states;
the state acquisition subunit is used for acquiring the state of the selected application icon in the cyclic display process;
and the strategy determining subunit is used for determining the selected authorization strategy according to the application icon state acquired by the state acquiring subunit and the corresponding relation between the preset application icon state and the authorization strategy.
23. The apparatus according to claim 22, wherein the loop display subunit is configured to, each time a touch operation on the application icon is received, display an application icon in a next state different from the current state according to a preset loop display sequence;
the state obtaining subunit is specifically configured to determine whether a touch operation on the application icon is not received within a preset time period, and if so, determine that the currently displayed state of the application icon is the state of the selected application icon.
24. The application authority configuration device according to claim 22, wherein the circulation display subunit is specifically configured to, according to a preset time interval, automatically circulate and display application icons in different states;
the state acquiring subunit is specifically configured to receive, in the cyclic display process, a selection operation for a state of the icon.
25. The application authority configuration device according to claim 17, wherein the application authority setting unit includes:
the authority set acquiring subunit is used for acquiring an authority set corresponding to the authorization policy output by the policy selection receiving unit;
and the permission setting and executing subunit is used for setting the permission in the permission set acquired by the permission set acquiring subunit for the application.
26. The application authority configuration device according to claim 25, wherein the application authority setting unit further comprises:
the intersection calculation subunit is used for calculating the intersection of the permission set acquired by the permission set acquisition subunit and the permission set required by the application;
the permission setting execution subunit is specifically configured to set, for the application, a permission included in the intersection calculated by the intersection calculation subunit.
27. The application right configuration device according to any one of claims 17 to 26, comprising:
and the icon highlighting display unit is used for displaying the application icon in a preset mode and triggering the strategy selection receiving unit to work when the output of the touch operation judging unit is yes.
28. The application right configuration device according to any one of claims 17 to 26, comprising:
the set selection receiving unit is used for receiving the selection operation of the authorization policy set to which the application belongs and triggering the policy selection receiving unit to work when the output of the touch operation judging unit is yes;
the policy selection receiving unit is specifically configured to receive a selection operation of an authorization policy of the application in the selected authorization policy set.
29. An electronic device, comprising:
a display;
a processor;
a memory for storing an application rights configuration program, which when read and executed by the processor performs the following operations: receiving touch operation on an application icon; when the touch operation is consistent with a preset authority configuration triggering operation, receiving a selection operation of an authorization strategy of the application, and setting a corresponding authority for the application according to the selected authorization strategy; wherein the authorization policy is a member of a preset set of authorization policies.
CN201510420513.2A 2015-07-16 2015-07-16 Method, device, and electronic device for assignment of application permission Pending CN106354399A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510420513.2A CN106354399A (en) 2015-07-16 2015-07-16 Method, device, and electronic device for assignment of application permission
PCT/CN2016/089078 WO2017008676A1 (en) 2015-07-16 2016-07-07 Application authority configuration method and apparatus, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510420513.2A CN106354399A (en) 2015-07-16 2015-07-16 Method, device, and electronic device for assignment of application permission

Publications (1)

Publication Number Publication Date
CN106354399A true CN106354399A (en) 2017-01-25

Family

ID=57756837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510420513.2A Pending CN106354399A (en) 2015-07-16 2015-07-16 Method, device, and electronic device for assignment of application permission

Country Status (2)

Country Link
CN (1) CN106354399A (en)
WO (1) WO2017008676A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009412A (en) * 2017-12-26 2018-05-08 华勤通讯技术有限公司 Using the authorization method and electronic equipment of item
CN108427886A (en) * 2018-01-25 2018-08-21 上海掌门科技有限公司 A kind of application program access rights setting method, system, equipment and readable medium
CN109214207A (en) * 2018-08-22 2019-01-15 郑州云海信息技术有限公司 The management method and device of permission in the network of multi-user access
CN109241765A (en) * 2018-07-17 2019-01-18 奇酷互联网络科技(深圳)有限公司 Mobile terminal and the right management method of application program, device
CN109255214A (en) * 2018-09-13 2019-01-22 广东电网有限责任公司 A kind of authority configuring method and device
CN109542282A (en) * 2018-10-30 2019-03-29 维沃移动通信有限公司 A kind of interface display method and terminal device
CN109766680A (en) * 2018-12-27 2019-05-17 维沃移动通信有限公司 Authority control method and terminal
CN110032422A (en) * 2019-04-19 2019-07-19 维沃移动通信有限公司 A kind of application management method, terminal device and computer readable storage medium
CN111382418A (en) * 2020-03-06 2020-07-07 Oppo广东移动通信有限公司 Application rights management method, device, storage medium and electronic device
CN117251085A (en) * 2023-11-20 2023-12-19 北京小米移动软件有限公司 Positioning method and device of equipment application, electronic equipment and storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199255A (en) * 2020-10-15 2021-01-08 Oppo广东移动通信有限公司 Permission to use monitoring method, device, equipment and storage medium
CN112817498A (en) * 2021-02-23 2021-05-18 Oppo广东移动通信有限公司 Application authority management method, device, storage medium and terminal

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833651A (en) * 2009-03-10 2010-09-15 Lg电子株式会社 The method of portable terminal and control portable terminal
CN101853379A (en) * 2009-03-18 2010-10-06 Lg电子株式会社 The method of portable terminal and this portable terminal of control
CN102214104A (en) * 2011-07-20 2011-10-12 宇龙计算机通信科技(深圳)有限公司 Android-based application program management method and system
CN102340398A (en) * 2010-07-27 2012-02-01 中国移动通信有限公司 Security Policy Setting, Confirmation Method, Application Program Execution Operation Method and Device
US20120327106A1 (en) * 2011-06-27 2012-12-27 Won Yoonchan Mobile terminal and screen partitioning method thereof
CN103176727A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Application program starting method and communication terminal
CN103886237A (en) * 2014-03-26 2014-06-25 深圳市亚略特生物识别科技有限公司 Control method and system for electronic device with fingerprint sensor and touch screen
CN103905651A (en) * 2014-04-30 2014-07-02 北京邮电大学 Method and system for application permission management in intelligent terminal
CN104217150A (en) * 2014-08-21 2014-12-17 百度在线网络技术(北京)有限公司 Method and device for calling application
CN104461261A (en) * 2014-12-05 2015-03-25 上海斐讯数据通信技术有限公司 System and method for managing defaulted applications of mobile terminal
CN104657658A (en) * 2015-02-13 2015-05-27 深圳酷派技术有限公司 Application installation method and terminal
CN104717357A (en) * 2013-10-10 2015-06-17 Lg电子株式会社 Mobile terminal and method of controlling therefor
CN104751071A (en) * 2015-03-16 2015-07-01 联想(北京)有限公司 Information processing method and electronic equipment
CN104765552A (en) * 2015-04-28 2015-07-08 小米科技有限责任公司 Authority management method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156222A (en) * 2014-08-29 2014-11-19 诚迈科技(南京)股份有限公司 Method for self-defining Android equipment desktop

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101833651A (en) * 2009-03-10 2010-09-15 Lg电子株式会社 The method of portable terminal and control portable terminal
CN101853379A (en) * 2009-03-18 2010-10-06 Lg电子株式会社 The method of portable terminal and this portable terminal of control
CN102340398A (en) * 2010-07-27 2012-02-01 中国移动通信有限公司 Security Policy Setting, Confirmation Method, Application Program Execution Operation Method and Device
US20120327106A1 (en) * 2011-06-27 2012-12-27 Won Yoonchan Mobile terminal and screen partitioning method thereof
CN102214104A (en) * 2011-07-20 2011-10-12 宇龙计算机通信科技(深圳)有限公司 Android-based application program management method and system
CN103176727A (en) * 2011-12-23 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Application program starting method and communication terminal
CN104717357A (en) * 2013-10-10 2015-06-17 Lg电子株式会社 Mobile terminal and method of controlling therefor
CN103886237A (en) * 2014-03-26 2014-06-25 深圳市亚略特生物识别科技有限公司 Control method and system for electronic device with fingerprint sensor and touch screen
CN103905651A (en) * 2014-04-30 2014-07-02 北京邮电大学 Method and system for application permission management in intelligent terminal
CN104217150A (en) * 2014-08-21 2014-12-17 百度在线网络技术(北京)有限公司 Method and device for calling application
CN104461261A (en) * 2014-12-05 2015-03-25 上海斐讯数据通信技术有限公司 System and method for managing defaulted applications of mobile terminal
CN104657658A (en) * 2015-02-13 2015-05-27 深圳酷派技术有限公司 Application installation method and terminal
CN104751071A (en) * 2015-03-16 2015-07-01 联想(北京)有限公司 Information processing method and electronic equipment
CN104765552A (en) * 2015-04-28 2015-07-08 小米科技有限责任公司 Authority management method and device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009412A (en) * 2017-12-26 2018-05-08 华勤通讯技术有限公司 Using the authorization method and electronic equipment of item
WO2019144928A1 (en) * 2018-01-25 2019-08-01 上海掌门科技有限公司 Method, system and device for setting access permission of application, and readable medium
CN108427886A (en) * 2018-01-25 2018-08-21 上海掌门科技有限公司 A kind of application program access rights setting method, system, equipment and readable medium
CN108427886B (en) * 2018-01-25 2020-06-02 上海掌门科技有限公司 Method, system, device and readable medium for setting access authority of application program
CN109241765A (en) * 2018-07-17 2019-01-18 奇酷互联网络科技(深圳)有限公司 Mobile terminal and the right management method of application program, device
CN109241765B (en) * 2018-07-17 2022-06-17 奇酷互联网络科技(深圳)有限公司 Mobile terminal and method and device for managing authority of application program
CN109214207A (en) * 2018-08-22 2019-01-15 郑州云海信息技术有限公司 The management method and device of permission in the network of multi-user access
CN109255214A (en) * 2018-09-13 2019-01-22 广东电网有限责任公司 A kind of authority configuring method and device
CN109542282B (en) * 2018-10-30 2021-02-23 维沃移动通信有限公司 Interface display method and terminal equipment
CN109542282A (en) * 2018-10-30 2019-03-29 维沃移动通信有限公司 A kind of interface display method and terminal device
CN109766680A (en) * 2018-12-27 2019-05-17 维沃移动通信有限公司 Authority control method and terminal
CN109766680B (en) * 2018-12-27 2021-01-08 维沃移动通信有限公司 Authority control method and terminal
CN110032422A (en) * 2019-04-19 2019-07-19 维沃移动通信有限公司 A kind of application management method, terminal device and computer readable storage medium
CN110032422B (en) * 2019-04-19 2021-09-24 维沃移动通信有限公司 Application management method, terminal device and computer-readable storage medium
CN111382418A (en) * 2020-03-06 2020-07-07 Oppo广东移动通信有限公司 Application rights management method, device, storage medium and electronic device
CN117251085A (en) * 2023-11-20 2023-12-19 北京小米移动软件有限公司 Positioning method and device of equipment application, electronic equipment and storage medium
CN117251085B (en) * 2023-11-20 2024-03-19 北京小米移动软件有限公司 Positioning method and device of equipment application, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2017008676A1 (en) 2017-01-19

Similar Documents

Publication Publication Date Title
CN106354399A (en) Method, device, and electronic device for assignment of application permission
CN103686722B (en) Access control method and device
EP2775416B1 (en) Apparatus and method for configuring password and for releasing lock
CN104657674B (en) The insulation blocking system and method for private data in a kind of mobile phone
US20160328602A1 (en) Method, device, and system for displaying user interface
AU2019253827B2 (en) Method, system, and device for process triggering
CN108763951B (en) Data protection method and device
US20160094548A1 (en) Method for secure key injection with biometric sensors
CN108460259B (en) Information processing method and device and terminal
CN105447365B (en) A kind of method for secret protection and user terminal based on control
Vecchiato et al. The perils of Android security configuration
CN113468620B (en) Method and device for realizing safety keyboard
WO2016180234A1 (en) Method and apparatus for building secure environment
CN104715172B (en) A kind of application program launching method and device
CN106991307A (en) Using time slot scrambling and device
CN106933666B (en) Method for calling information input program and electronic equipment
HK1233348A1 (en) Application permission collocation method, apparatus and electronic device
HK1233348A (en) Application permission collocation method, apparatus and electronic device
CN106682509A (en) Window body processing method and device
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
TW201828141A (en) Application privilege configuration method, apparatus and electronic device simplifying the privilege configuration step, improving the configuration efficiency, and realizing rapid application privilege configuration
WO2017197976A1 (en) Method for hiding/displaying application program, and terminal device
US10212168B2 (en) Electronic device and control method thereof
KR100664148B1 (en) How to lock the function of the portable terminal
CN108846272A (en) Application security management method and device and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1233348

Country of ref document: HK

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170125

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1233348

Country of ref document: HK