CN107145790A - A kind of method and terminal for managing application permission - Google Patents

A kind of method and terminal for managing application permission Download PDF

Info

Publication number
CN107145790A
CN107145790A CN201710218506.3A CN201710218506A CN107145790A CN 107145790 A CN107145790 A CN 107145790A CN 201710218506 A CN201710218506 A CN 201710218506A CN 107145790 A CN107145790 A CN 107145790A
Authority
CN
China
Prior art keywords
application
list
permissions list
default
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710218506.3A
Other languages
Chinese (zh)
Inventor
陈利顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710218506.3A priority Critical patent/CN107145790A/en
Publication of CN107145790A publication Critical patent/CN107145790A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of method and terminal for managing application permission, wherein, a kind of method for managing application permission, if the predetermined registration operation by detecting the application of operation first, judges whether first application is default application according to the default list of application that starts;If first application is not the default application, target permissions list is generated according to the permissions list of default access list and the described first application;The content of the target permissions list is shown according to the display format of the default access list.Realize when startup is applied, specification prompting user sets the information of authority, improves Consumer's Experience.

Description

A kind of method and terminal for managing application permission
Technical field
The invention belongs to electronic technology field, more particularly to a kind of method and terminal for managing application permission.
Background technology
As the application provided in application market is increasingly enriched, the application installed in terminal is also more and more.At present, though So most of applications all can first prompt the user with the information for setting authority before runtime, just be brought into operation after user confirms, But, because the involved field of application is different with function, the authority content that required request is authorized during operation is also different, causes User points out to set the information content or form of authority disorderly and unsystematic when startup is applied.
Therefore, exist in the prior art when user starts application is run, because prompting user sets the information of authority not advise Model, the problem of difference is experienced is brought to user.
The content of the invention
The embodiment of the present invention provides a kind of method and terminal for managing application permission so that when startup is applied, specification Point out user that the information of authority is set, improve Consumer's Experience.
In a first aspect, the embodiments of the invention provide a kind of method for managing application permission, methods described includes:
If detecting the predetermined registration operation of the application of operation first, first application is judged according to the default list of application that starts Whether it is default application;
If first application is not the default application, according to the authority of default access list and the described first application List generates target permissions list;
The content of the target permissions list is shown according to the display format of the default access list.
On the other hand, a kind of terminal of the embodiment of the present invention, including:
First judging unit, if the predetermined registration operation for detecting the application of operation first, application row are started according to default Table judges whether first application is default application;
Target permission build unit, if being not the default application for the described first application, is arranged according to default access Table and the permissions list generation target permissions list of the described first application;
First display unit, for showing the target permissions list according to the display format of the default access list Content.
In such scheme, if the predetermined registration operation by detecting the application of operation first, list of application is started according to default Whether judge first application is default application;If first application is not the default application, according to default access The permissions list generation target permissions list of list and the described first application;It is aobvious according to the display format of the default access list Show the content of the target permissions list.Realize when startup is applied, specification prompting user sets the information of authority, improves Consumer's Experience.
Brief description of the drawings
Technical scheme, is used required in being described below to embodiment in order to illustrate the embodiments of the present invention more clearly Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of method for managing application permission provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the method for management application permission that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of terminal schematic block diagram that another embodiment of the present invention is provided;
Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" be indicated Described feature, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, it is whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and "the" are intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combination, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but with touching Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application programs, demonstration Application programs, word-processing application program, website create application programs, disk imprinting application programs, electricity Sub-table application programs, game application program, telephony application program, videoconference application program, electricity Application programs, photo management application are supported in sub- mail applications program, instant messaging applications program, exercise Program program, digital camera application program program, digital camera application programs, web-browsing application programs, numeral Music player application program program and/or video frequency player application programs.
The various application programs that can be performed in terminal can use at least one of such as touch sensitive surface Public physical user-interface device.It can adjust and/or change between application programs and/or in corresponding application programs program Become the corresponding information shown in the one or more functions and terminal of touch sensitive surface.So, the public physics frame of terminal Structure (for example, touch sensitive surface) can support the various application programs with user interface directly perceived and transparent for a user Program.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of method for managing application permission provided in an embodiment of the present invention. The executive agent that the method for application permission is managed in the present embodiment is terminal.Terminal can move for smart mobile phone, tablet personal computer etc. Dynamic terminal, but not limited to this, can also be other-end, not be limited herein.As shown in figure 1, the method for management application permission It may comprise steps of:
S101:If detecting the predetermined registration operation of the application of operation first, described the is judged according to the default list of application that starts Whether one application is default application.
In step S101, the first application is the application installed in terminal, and the predetermined registration operation of the application of operation first can Click action during being user's the first application of startup, or by switching the behaviour that startup first is applied in some application program Make.
For example, user detects the pre- of the application of operation first by clicking on the first icon applied on terminal desktop If the icon of the first application on terminal desktop is clicked in operation for user.
For another example in the application for reading article, switching to the first application by sharing article content by current interface, i.e., The predetermined registration operation for detecting the application of operation first is the operation in the first application for sharing article.
It should be noted that default start the information that list of application is used to describe default application, wherein, it is root to preset application Can directly it be run according to operation predetermined registration operation, the application without carrying out priority assignation or rights management.
It is understood that default application can have been installed or uninstalled application including terminal.It is default to start application List or default application, can update according to the renewal of the operating system of terminal, can also be set by User Defined.
S102:If first application is not the default application, according to default access list and the described first application Permissions list generation target permissions list.
In step s 102, default access list is by terminal when starting first or updating operating system, from service The default access list that device is downloaded.The permissions list of first application is applied when being activated for first, in the first application of display The permissions list carried.
It should be noted that default access list includes all items information in the permissions list of the first application.It is default Permissions list can be different according to the version of terminal operating system, and the rights format of its authority information pointed out and/or prompting also may be used With difference.
In all embodiments of the invention, terminal obtains default access list from server or updates default access row The specific implementation of table can be:When terminal is dispatched from the factory public key and a unique ID identity are allocated to each terminal Number, wherein, public key is used for CIPHERING REQUEST data, and ID identity number is used to send jointly to server with request data.
Server can find private key corresponding with terminal by ID identity number.
After terminal enters operating system, point out to carry out operating system initialization, and version number, the end of read operation system Hold model, International Mobile Equipment Identity code (International Mobile Equipment Identity, IMEI), authority The parameters such as listing version number, server is sent jointly to public key encryption request data and ID identity number.
Server searches private key corresponding with terminal by ID identity number, and takes out private key decoding request data.Solution After close success, terminal directly downloads default access list, or judge existing default access list whether need update, specifically It can be the version number by comparing default access list.If desired default access list is updated, then returned new pre- If the information of permissions list is updated to default access list;If need not update, prompt message is returned, need not with prompting Update.
S103:The content of the target permissions list is shown according to the display format of the default access list.
In step s 103, the display format of default access list can according to the version of default access list it is different without Together.
It should be noted that display format includes:Display font, display location or display duration.
It is understood that the display format of default access list is default display format in terminal operating system, It will not change because of the change of the first application.The target permissions list is shown with the display format of the default access list Content, has unified to inquire look & feel during user authority setting.
In such scheme, if the predetermined registration operation by detecting the application of operation first, list of application is started according to default Whether judge first application is default application;If first application is not the default application, according to default access The permissions list generation target permissions list of list and the described first application;It is aobvious according to the display format of the default access list Show the content of the target permissions list.Realize when startup is applied, specification prompting user sets the information of authority, improves Consumer's Experience.
Fig. 2 is referred to, Fig. 2 is a kind of exemplary flow of the method for management application permission that another embodiment of the present invention is provided Figure.The executive agent that the method for application permission is managed in the present embodiment is terminal.Terminal can be smart mobile phone, tablet personal computer etc. Mobile terminal, but not limited to this, can also be other-end, not be limited herein.As shown in Fig. 2 the side of management application permission Method may comprise steps of:
S201:If detecting the predetermined registration operation of the application of operation first, described the is judged according to the default list of application that starts Whether one application is default application.
It is understood that step S201 in the present embodiment and step S101 in above-described embodiment implementation and Particular content is consistent, for details, reference can be made to the description of step S101 in above-described embodiment, here is omitted.
S202:If first application is not the default application, according to default access list and the described first application Permissions list generation target permissions list.
Step S202 can specifically include:Obtain in the default access list with described first application permissions list in Identical authority content;It regard the authority content as the target permissions list.
It should be noted that default access list include first application permissions list in all items information, be by Terminal when starting or updating operating system first, the default access list downloaded from server.
The permissions list of first application is applied when being activated for first, the authority row carried in the first application of display Table.
" calling WLAN to switch ", " transmitting/receiving information ", " reading contact person are included with the project information in default access list Exemplified by information " and " prompting pushed information ", only have when the project information in the permissions list of the first application and " read contact person's letter Breath " when, that is, obtain in the default access list with described first application permissions list in identical authority content for " read There was only the content of " reading associated person information " in associated person information ", i.e., described target permissions list.
It is understood that terminal obtains default access list from server or updates default access list, its is specific Implementation is consistent with implementation and particular content in S102 in above-described embodiment, for details, reference can be made in above-described embodiment Step S102 description, here is omitted.
S203:If first application is the default application, first application is directly run.
It should be noted that step S202 and step S203 belongs between step arranged side by side, i.e. step S202 and step S203 Order in no particular order, just no longer performs step S203, after step S203 is performed just not after step S202 is performed Step S202 is performed again, untill reacquiring current operation gesture.
It is understood that default application is that can directly be run according to operation predetermined registration operation, without carrying out priority assignation Or the application of rights management, therefore, if first application is the default application, directly run first application.
S204:The content of the target permissions list is shown according to the display format of the default access list.
In step S204, the display format of default access list can according to the version of default access list it is different without Together.
It should be noted that display format includes:Display font, display location or display duration.
It is understood that the display format of default access list is default display format in terminal operating system, It will not change because of the change of the first application.The target permissions list is shown with the display format of the default access list Content, has unified to inquire look & feel during user authority setting.
Step S204 can specifically include:If detect first application obtains preset attribute value, root by reflecting Judge whether to show the target permissions list according to the display format of the default access list according to the preset attribute value Content;If the preset attribute value meets preparatory condition, the mesh is shown according to the display format of the default access list Mark the content of permissions list.
It should be noted that whether the priority assignation that preparatory condition is used to describe the first application can enter in the way of generation authorizes Row is set, i.e., the display format of default permissions list is shown and set to it in the operating system of terminal.
If it is understood that the preset attribute value does not meet preparatory condition or does not get the preset attribute Value, then show the content of the permissions list of the first application.
If be not detected by first application obtains preset attribute value by reflecting, directly arranged according to the default access The display format of table shows the content of the target permissions list.
S205:If user's first application operation according to the target permissions list mandate, recording described first should Information, to be detected in next time during the predetermined registration operation for running first application, directly runs first application.
In step S205, the information of first application can include:The title of application, the version number of application or the In the permissions list of one application, or title, the permissions list of the first application and the version number of the first application of the first application At least one information.It should be noted that user first application operation, Ke Yishi according to the target permissions list mandate Authorize described first to run resource using the part of using terminal in operation, or authorize first application to obtain in operation Take the data of some types in terminal.
It is understood that when the predetermined registration operation for running first application is detected in next time, directly running described the Information operation first application of first application of one application, i.e. basis and record.
S206:If detect first application obtains current entitlement acknowledgement state by reflecting, according to described current First application is closed or run to authority acknowledgement state.
In step S206, current entitlement set state be used for describe it is described first application whether carried out authority confirm carry Show or authority confirms to set.
Step S206 can specifically include:If current entitlement acknowledgement state not carry out authority confirmation, closes described the One application;If current entitlement acknowledgement state runs first application to have carried out authority confirmation.
It is understood that judge current entitlement acknowledgement state, it can avoid applying and set not carried out authority Put the phenomenon that prompting is just directly run.
S207:If detecting the predetermined registration operation that triggering updates the second application, whether the described second information applied is judged It has been recorded.
In step S207, if detecting the predetermined registration operation that triggering updates the second application, second application is judged Whether information has been recorded.
In step S207, the predetermined registration operation that triggering updates the second application can include:Second is selected in application market Using the operation being updated, or when starting second and applying, the second application, which is pushed, updates confirmation, is confirmed by user to the The operation that two applications are updated.
It should be noted that judge it is described second application information whether be recorded, i.e., judge second apply whether by Start and ran.
The information of second application can include:Title, the version number of application or the authority of the second application of application At least one information in list, or title, the permissions list of the second application and the version number of application applied.
S208:If the information of second application has been recorded, obtains to update the data from server and answer described second Permissions list is updated, to obtain the permissions list of the second new application.
In step S208, if the information of second application has been recorded, obtains and updated the data to institute from server The permissions list for stating the second application is updated, to obtain the permissions list of the second new application.
The permissions list of the described second application is updated it should be noted that obtaining and updating the data from server, can To be to carry out whole renewals to the permissions list of the second application, or part updates.
It is understood that the content in the permissions list of the second new application can be arranged with the authority of the described second application Content in table is at least partly identical, or all different.
S209:If in the full content of permissions list and the permissions list of the described second application of the second new application Partial content it is identical, and detect run it is described second application predetermined registration operation, then directly run it is described second application.
In step S209, the full content of the permissions list of the second application newly is answered for describing second after updating The second application after the authority of resource, or renewal is run with the part of using terminal in the process of running to obtain in operation eventually The authority of the data of some types in end.
It should be noted that the full content and the authority of the described second application of the permissions list of the second new application Partial content in list is identical, describes whole authority contents and described second in the permissions list of the second new application Whole authority contents in the permissions list of application are identical, i.e., after the second application updates, in the second new permissions list applied Authority content with described second application permissions list in whole authority contents it is identical.
It is understood that after the second application updates, authority content in the permissions list of new the second application with it is described Whole authority contents in the permissions list of second application are identical, the coding and described second of the permissions list of the second application newly The coding of the permissions list of application can be different.
S210:If in the partial content of permissions list and the permissions list of the described second application of the second new application Partial content it is different, and detect the predetermined registration operation for running second application, then with the display of the default access list Form shows the content of the permissions list of the second new application, so that user sets to running the second application progress authority Put.
In step S210, the display format of default access list can according to the version of default access list it is different without Together.
It is understood that display format includes:Display content, display font, display location or display duration.
It should be noted that the partial content and the authority of the described second application of the permissions list of the second new application Partial content in list is different, that is, second after updating runs the power of resource using the part of using terminal in the process of running Limit, second is different using the authority part of the part operation resource of using terminal in the process of running during from not updating.Or more The second application after new obtains the authority of the data of some types in terminal in operation, and second applies in fortune during with not updating The authority part of the data of some types in row in acquisition terminal is different.
In such scheme, if the predetermined registration operation by detecting the application of operation first, list of application is started according to default Whether judge first application is default application;If first application is not the default application, according to default access The permissions list generation target permissions list of list and the described first application;It is aobvious according to the display format of the default access list Show the content of the target permissions list.Realize when startup is applied, specification prompting user sets the information of authority, improves Consumer's Experience.
If the first application according to the target permissions list mandate is run by user, first application is recorded Information so that next time detect run it is described first application predetermined registration operation when, directly run it is described first application, without Carry out priority assignation.
It is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 3.Terminal 300 can be intelligent hand The mobile terminals such as machine, tablet personal computer, can also be other-end, not be limited herein.It is each that the terminal 300 of the present embodiment includes Unit is used to perform each step in the corresponding embodiments of Fig. 1, specifically refers to the phase in the corresponding embodiments of Fig. 1 and Fig. 1 Description is closed, is not repeated herein.
The terminal 300 of the present embodiment includes:First judging unit 301, target permission build unit 302 and first are shown Unit 303.Specifically:
First judging unit 301, if the predetermined registration operation for detecting the application of operation first, application is started according to default List judges whether first application is default application.
If for example, the first judging unit 301 detects the predetermined registration operation of the application of operation first, application is started according to default List judges whether first application is default application.
Target permission build unit 302, if being not the default application for the described first application, according to default access The permissions list generation target permissions list of list and the described first application, and target permissions list is sent to the first display list Member 303.
If for example, the application of target permission build unit 302 described first is not the default application, according to default access The permissions list generation target permissions list of list and the described first application, and target permissions list is sent to the first display list Member 303.
First display unit 303, the target permissions list for receiving the transmission of target permission build unit 302, and according to The display format of the default access list shows the content of the target permissions list.
For example, the target permissions list that the first display unit 303 reception target permission build unit 302 is sent, and according to The display format of the default access list shows the content of the target permissions list.
In such scheme, if the predetermined registration operation by detecting the application of operation first, list of application is started according to default Whether judge first application is default application;If first application is not the default application, according to default access The permissions list generation target permissions list of list and the described first application;It is aobvious according to the display format of the default access list Show the content of the target permissions list.Realize when startup is applied, specification prompting user sets the information of authority, improves Consumer's Experience.
It is a kind of schematic block diagram for terminal that another embodiment of the present invention is provided referring to Fig. 4.Terminal 400 can be intelligence The mobile terminals such as energy mobile phone, tablet personal computer, can also be other-end, not be limited herein.The terminal 400 of the present embodiment includes Each unit be used to perform each step in the corresponding embodiments of Fig. 2, specifically refer in the corresponding embodiments of Fig. 2 and Fig. 2 Associated description, do not repeat herein.
The terminal 400 of the present embodiment includes:First judging unit 401, the operation of target permission build unit 402, first are single First 403, first display unit 404, recording unit 405, execution unit 406, the second judging unit 407, updating block 408, fortune The display unit 410 of row unit 409 and second.Specifically:
First judging unit 401, if the predetermined registration operation for detecting the application of operation first, application is started according to default List judges whether first application is default application.
If for example, the first judging unit 401 detects the predetermined registration operation of the application of operation first, application is started according to default List judges whether first application is default application.
Target permission build unit 402, if being not the default application for the described first application, according to default access The permissions list generation target permissions list of list and the described first application, and target permissions list is sent to the first display list Member 404.
If for example, the application of target permission build unit 402 described first is not the default application, according to default access The permissions list generation target permissions list of list and the described first application, and target permissions list is sent to the first display list Member 404.
Further, target permission build unit 402 can include:Acquiring unit and target permissions list unit.Specifically Ground:
Acquiring unit, for obtain in the default access list with described first application permissions list in identical weigh Authority content is simultaneously sent to target permissions list unit by limit content.
For example, being weighed in the acquiring unit acquisition default access list with identical in the permissions list of the described first application Authority content is simultaneously sent to target permissions list unit by limit content.
Target permissions list unit, for receive acquiring unit transmission authority content, and using the authority content as The target permissions list.
For example, target permissions list unit receive acquiring unit send authority content, and using the authority content as The target permissions list.
First running unit 403, if being the default application for the described first application, directly running described first should With.
If for example, first application of the first running unit 403 is the default application, directly running described first should With.
First display unit 404, the target permissions list for receiving the transmission of target permission build unit 402, and according to The display format of the default access list shows the content of the target permissions list.
For example, the target permissions list that the first display unit 404 reception target permission build unit 402 is sent, and according to The display format of the default access list shows the content of the target permissions list.
Recording unit 405, if the first application operation according to the target permissions list mandate for user, is recorded The information of first application, to be detected in next time during the predetermined registration operation for running first application, directly runs described the One application.
If for example, the user of recording unit 405 first application operation according to the target permissions list mandate, is recorded The information of first application, to be detected in next time during the predetermined registration operation for running first application, directly runs described the One application.
Execution unit 406, if for detecting first application by reflecting acquisition current entitlement acknowledgement state, root First application is closed or run according to the current entitlement acknowledgement state.
If for example, execution unit 406 detects first application obtains current entitlement acknowledgement state, root by reflecting First application is closed or run according to the current entitlement acknowledgement state.
Second judging unit 407, if updating the predetermined registration operation of the second application for detecting triggering, judges described second Whether the information of application has been recorded.
If for example, the second judging unit 407 detects the predetermined registration operation that triggering updates the second application, judging described second Whether the information of application has been recorded.
Updating block 408, if the information for the described second application has been recorded, obtains from server and updates the data pair The permissions list of second application is updated, to obtain the permissions list of the second new application.
If for example, the information that updating block 408 described second is applied has been recorded, obtaining and updating the data pair from server The permissions list of second application is updated, to obtain the permissions list of the second new application.
Running unit 409, if full content and the described second application for the permissions list of the second new application Permissions list in partial content it is identical, and detect run it is described second application predetermined registration operation, then directly operation described in Second application.
If for example, full content and the described second application of the permissions list of the second new application of running unit 409 Permissions list in partial content it is identical, and detect run it is described second application predetermined registration operation, then directly operation described in Second application.
Second display unit 410, if the partial content and described second of the permissions list for the second new application Partial content in the permissions list of application is different, and detects the predetermined registration operation for running second application, then with described pre- If the display format of permissions list shows the content of the permissions list of the second new application, so that user is to running described the Two applications carry out priority assignation.
If for example, the partial content and described second of the permissions list of the second new application of the second display unit 410 Partial content in the permissions list of application is different, and detects the predetermined registration operation for running second application, then with described pre- If the display format of permissions list shows the content of the permissions list of the second new application, so that user is to running described the Two applications carry out priority assignation.
In such scheme, if the predetermined registration operation by detecting the application of operation first, list of application is started according to default Whether judge first application is default application;If first application is not the default application, according to default access The permissions list generation target permissions list of list and the described first application;It is aobvious according to the display format of the default access list Show the content of the target permissions list.Realize when startup is applied, specification prompting user sets the information of authority, improves Consumer's Experience.
If the first application according to the target permissions list mandate is run by user, first application is recorded Information so that next time detect run it is described first application predetermined registration operation when, directly run it is described first application, without Carry out priority assignation.
It is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided referring to Fig. 5.The present embodiment as shown in Figure 5 In terminal 500 can include:It is one or more processors 501, one or more input equipments 502, one or more then defeated Go out equipment 503 and one or more memories 504.Above-mentioned processor 501, then input equipment 502, output equipment 503 and storage Device 504 completes mutual communication by communication bus 505.
Memory 504 is instructed for storage program.
The programmed instruction that processor 501 is used to be stored according to memory 504 performs following operate:
If processor 501 is used for the predetermined registration operation for detecting the application of operation first, sentenced according to the default list of application that starts Whether disconnected first application is default application.
If it is not the default application that processor 501, which is additionally operable to first application, according to default access list and institute State the permissions list generation target permissions list of the first application.
If it is the default application that processor 501, which is additionally operable to first application, first application is directly run.
Processor 501 is additionally operable to be shown in the target permissions list according to the display format of the default access list Hold.
If processor 501 is additionally operable to user's first application operation according to the target permissions list mandate, record The information of first application, to be detected in next time during the predetermined registration operation for running first application, directly runs described the One application.
If processor 501 is additionally operable to detect first application by reflecting acquisition current entitlement acknowledgement state, root First application is closed or run according to the current entitlement acknowledgement state.
If processor 501 is additionally operable to detect the predetermined registration operation that triggering updates the second application, second application is judged Information whether be recorded.
If the information that processor 501 is additionally operable to second application has been recorded, obtains and update the data pair from server The permissions list of second application is updated, to obtain the permissions list of the second new application.
If processor 501 is additionally operable to full content and the described second application of the permissions list of the second new application Partial content in permissions list is identical, and detects the predetermined registration operation for running second application, then directly runs described the Two applications.
If processor 501 is additionally operable to partial content and the described second application of the permissions list of the second new application Partial content in permissions list is different, and detects the predetermined registration operation for running second application, then with the default access The display format of list shows the content of the permissions list of the second new application, so that user is to running second application Carry out priority assignation.
Processor 501 is identical with the permissions list of the described first application in the default access list specifically for obtaining Authority content.
Processor 501 is specifically for regarding the authority content as the target permissions list.
In such scheme, if the predetermined registration operation by detecting the application of operation first, list of application is started according to default Whether judge first application is default application;If first application is not the default application, according to default access The permissions list generation target permissions list of list and the described first application;It is aobvious according to the display format of the default access list Show the content of the target permissions list.Realize when startup is applied, specification prompting user sets the information of authority, improves Consumer's Experience.
It should be appreciated that in embodiments of the present invention, alleged processor 501 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (application software lication Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other can Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor Or the processor can also be any conventional processor etc..
Input equipment 502 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), camera, microphone etc., then output equipment 503 can include display (LCD etc.), loudspeaker etc..
The memory 505 can include read-only storage and random access memory, and to processor 501 provide instruction and Data.The a part of of memory 505 can also include nonvolatile RAM.For example, memory 505 can also be deposited Store up the information of device type.
In the specific implementation, processor 501, input equipment 502, the output equipment 503 described in the embodiment of the present invention can Perform the reality described in the first embodiment and second embodiment of the method for management application permission provided in an embodiment of the present invention Existing mode, also can perform the implementation of the terminal described by the embodiment of the present invention, will not be repeated here.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, depending on the application-specific and design constraint bar of technical scheme Part.Professional and technical personnel can realize described function to each specific application program using distinct methods, still This realization is it is not considered that beyond the scope of this invention.
It is apparent to those skilled in the art that, for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
, can be by it in several embodiments provided herein, it should be understood that disclosed terminal and method Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection or electricity, mechanical or other forms are connected.
Step in present invention method can be sequentially adjusted, merged and deleted according to actual needs.
Unit in terminal of the embodiment of the present invention can be combined, divided and deleted according to actual needs.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, it can be stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially The part contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are to cause a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

1. a kind of method for managing application permission, it is characterised in that methods described includes:
If detecting the predetermined registration operation of the application of operation first, start whether list of application judges first application according to default For default application;
If first application is not the default application, according to the permissions list of default access list and the described first application Generate target permissions list;
The content of the target permissions list is shown according to the display format of the default access list.
2. according to the method described in claim 1, it is characterised in that if first application is not the default application, Target permissions list is then generated according to the permissions list of default access list and the described first application, including:
Obtain in the default access list with described first application permissions list in identical authority content;
It regard the authority content as the target permissions list.
3. method according to claim 1 or 2, it is characterised in that methods described also includes:
If user's first application operation according to the target permissions list mandate, the information of first application is recorded, To be detected in next time during the predetermined registration operation for running first application, first application is directly run.
4. method according to claim 3, it is characterised in that methods described also includes:
If detecting the predetermined registration operation that triggering updates the second application, judge whether the information of second application has been recorded;
If the information of second application has been recorded, the authority row updated the data to the described second application are obtained from server Table is updated, to obtain the permissions list of the second new application.
5. method according to claim 4, it is characterised in that if the information of second application has been recorded, Using the permissions list after renewal as the described second permissions list applied, and described second is deleted using original permissions list Afterwards, including:
If in the part in the full content of permissions list and the permissions list of the described second application of the second new application Appearance is identical, and detects the predetermined registration operation for running second application, then directly runs second application;
If in the part in the partial content of permissions list and the permissions list of the described second application of the second new application Hold difference, and detect the predetermined registration operation for running second application, then shown with the display format of the default access list The content of the permissions list of the second new application, so that user carries out priority assignation to running second application.
6. a kind of terminal, it is characterised in that including:
First judging unit, if the predetermined registration operation for detecting the application of operation first, sentences according to the default list of application that starts Whether disconnected first application is default application;
Target permission build unit, if being not the default application for the described first application, according to default access list and The permissions list generation target permissions list of first application;
First display unit, for being shown according to the display format of the default access list in the target permissions list Hold.
7. terminal according to claim 6, it is characterised in that the target permission build unit includes:
Acquiring unit, for obtain in the default access list with the permissions list of the described first application in identical authority Hold;
Target permissions list unit, for regarding the authority content as the target permissions list.
8. the terminal according to claim 6 or 7, it is characterised in that the terminal also includes:
Recording unit, if the first application operation according to the target permissions list mandate for user, records described the The information of one application, to be detected in next time during the predetermined registration operation for running first application, directly runs first application.
9. terminal according to claim 8, it is characterised in that the terminal also includes:
Second judging unit, if updating the predetermined registration operation of the second application for detecting triggering, judges second application Whether information has been recorded;
Updating block, if the information for the described second application has been recorded, obtains from server and updates the data to described the The permissions list of two applications is updated, to obtain the permissions list of the second new application.
10. terminal according to claim 9, it is characterised in that the terminal also includes:
Running unit, if the full content and the authority of the described second application for the permissions list of the second new application are arranged Partial content in table is identical, and detects the predetermined registration operation for running second application, then directly runs second application;
Second display unit, if partial content and the power of the described second application for the permissions list of the second new application The partial content limited in list is different, and detects the predetermined registration operation for running second application, then is arranged with the default access The display format of table shows the content of the permissions list of the second new application, so that user enters to running second application Row priority assignation.
CN201710218506.3A 2017-04-05 2017-04-05 A kind of method and terminal for managing application permission Withdrawn CN107145790A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710218506.3A CN107145790A (en) 2017-04-05 2017-04-05 A kind of method and terminal for managing application permission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710218506.3A CN107145790A (en) 2017-04-05 2017-04-05 A kind of method and terminal for managing application permission

Publications (1)

Publication Number Publication Date
CN107145790A true CN107145790A (en) 2017-09-08

Family

ID=59775215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710218506.3A Withdrawn CN107145790A (en) 2017-04-05 2017-04-05 A kind of method and terminal for managing application permission

Country Status (1)

Country Link
CN (1) CN107145790A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989325A (en) * 2018-08-03 2018-12-11 华数传媒网络有限公司 Encryption communication method, apparatus and system
CN109522741A (en) * 2018-10-24 2019-03-26 维沃移动通信有限公司 A kind of application program permission reminding method and its terminal device
CN111093173A (en) * 2019-12-25 2020-05-01 惠州Tcl移动通信有限公司 Method and device for limiting starting of STK application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320882A (en) * 2014-07-28 2016-02-10 腾讯科技(深圳)有限公司 Method and device for controlling permission of application programs
CN105335649A (en) * 2015-10-14 2016-02-17 上海斐讯数据通信技术有限公司 Intelligent terminal application program authority management method and system
CN105631311A (en) * 2015-04-27 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Application program authority management method and device as well as terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320882A (en) * 2014-07-28 2016-02-10 腾讯科技(深圳)有限公司 Method and device for controlling permission of application programs
CN105631311A (en) * 2015-04-27 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Application program authority management method and device as well as terminal
CN105335649A (en) * 2015-10-14 2016-02-17 上海斐讯数据通信技术有限公司 Intelligent terminal application program authority management method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989325A (en) * 2018-08-03 2018-12-11 华数传媒网络有限公司 Encryption communication method, apparatus and system
CN109522741A (en) * 2018-10-24 2019-03-26 维沃移动通信有限公司 A kind of application program permission reminding method and its terminal device
CN111093173A (en) * 2019-12-25 2020-05-01 惠州Tcl移动通信有限公司 Method and device for limiting starting of STK application
CN111093173B (en) * 2019-12-25 2023-03-10 惠州Tcl移动通信有限公司 Method and device for limiting starting of STK application

Similar Documents

Publication Publication Date Title
AU2014240260B2 (en) User interface management method and system
CN104794105B (en) It is a kind of for handling the method, system, touch-sensitive device of touch event
CN103150109B (en) Touch event model for web page
CN101727274B (en) Method, system and graphical user interface for enabling a user to access enterprise data on a portable electronic device
CN104102882B (en) Protection method and device for privacy data of application program
CN108605220B (en) Application processing method and device for embedded universal integrated circuit card
JP2010541080A (en) Service-oriented pipeline structure
CN108170438A (en) A kind of application program automatic installation method, terminal and computer-readable medium
CN105308900A (en) Virtual mobile phone interface system and method thereof
CN106547569A (en) A kind of page access method and apparatus in application
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN104011698A (en) Access to supplemental data based on identifier derived from corresponding primary application data
CN107480001A (en) System recovery method and device
CN107451244A (en) File naming method, mobile terminal and computer-readable recording medium
CN105556534B (en) For suggesting the electronic equipment and method of response guide when refusing
CN105871695A (en) Emoji sending method and device
CN109271211A (en) Method, apparatus of attending to anything else, equipment and the medium of application program
CN107145790A (en) A kind of method and terminal for managing application permission
CN108304107A (en) A kind of display application drawing calibration method, terminal and computer readable storage medium
CN106648287A (en) Method and terminal for replacing application icon
CN106648316A (en) Unlocking method and terminal
CN106648962B (en) A kind of management method, device and intelligent terminal for opening application more
CN106484480A (en) A kind of determination method of application of attending to anything else, device and terminal
CN106201639A (en) A kind of replacing application drawing calibration method and terminal
CN109324816A (en) Game loading method and Related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170908