CN108537027A - Resource allocation methods and device, terminal, computer readable storage medium - Google Patents
Resource allocation methods and device, terminal, computer readable storage medium Download PDFInfo
- Publication number
- CN108537027A CN108537027A CN201810316567.8A CN201810316567A CN108537027A CN 108537027 A CN108537027 A CN 108537027A CN 201810316567 A CN201810316567 A CN 201810316567A CN 108537027 A CN108537027 A CN 108537027A
- Authority
- CN
- China
- Prior art keywords
- user
- space
- terminal
- resource allocation
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5011—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Telephone Function (AREA)
Abstract
This application involves a kind of resource allocation methods and device, terminal, computer readable storage medium.This method includes:User gradation is divided for the user in terminal, and corresponding access right is configured for each user gradation;According to the access right of different user, the resource allocation policy to each user's space is determined;According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.By the above method, the resource allocation in terminal can be kept more reasonable according to user's feature and demand reasonable distribution resource, and according to the resource of different user hierarchical management user's space, be conducive to protection privacy of user.
Description
Technical field
This application involves fields of communication technology, can more particularly to a kind of resource allocation methods and device, terminal, computer
Read storage medium.
Background technology
With the intelligent development of communication equipment, people are more and more frequent to the use of intelligent terminal in daily life,
When multiple roles are used in conjunction with the same intelligent terminal, different role might have some privacy informations on intelligent terminal,
Such as oneself shares the same intelligent terminal, the i.e. same terminal of multiple users share with household;Or same user is with different identity
Use intelligent terminal, such as life and work;It needs to carry out secret protection.
Traditional secret protection mode by be arranged in terminal multiple separate spaces for different user use, but with
That user is more and more for the demand of secret protection, traditional secret protection mode cannot be satisfied hidden in subscriber handover process
Private protection demand, and it is unreasonable for the resource allocation of different user and be easy to cause the waste of system resource.
Invention content
A kind of resource allocation methods of the embodiment of the present application offer, device, computer equipment and storage medium, can optimize end
The resource allocation of multiple user's spaces on end, reduces the waste of system resource.
A kind of resource allocation methods are applied to the terminal with Multi-User Dimension, the method includes:
User gradation is divided for the user in terminal, and corresponding access right is configured for each user gradation;
According to the access right of different user, the resource allocation policy to each user's space is determined;
According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.
A kind of resource allocation device, including:
Configuration module for dividing user gradation for the user in terminal, and makes for the configuration of each user gradation is corresponding
Use permission;
Tactful determining module determines the resource allocation to each user's space for the access right according to different user
Strategy;
Resource allocation module, for according to the resource allocation policy, being carried out to multiple user's spaces in the terminal
Resource allocation.
A kind of terminal, including memory and processor store computer program, the computer journey in the memory
When sequence is executed by the processor so that the processor executes the step of resource allocation methods.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of resource allocation methods are realized when row.
Above-mentioned resource allocation methods and device, terminal, computer readable storage medium, by being divided for the user in terminal
User gradation, and corresponding access right is configured for each user gradation, according to the access right of different user, determine to each
The resource allocation policy of user's space provides multiple user's spaces in the terminal according to the resource allocation policy
Source is allocated, and the resource allocation in terminal can be kept more reasonable, and according to or not user's feature and demand reasonable distribution resource
The resource of user's space is managed with user gradation, is conducive to protection privacy of user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 2 is the flow chart of resource allocation methods in one embodiment;
Fig. 3 is the flow chart of resource allocation methods in another embodiment;
Fig. 4 is the flow chart of resource allocation methods in another embodiment;
Fig. 5 is the flow chart of resource allocation methods in another embodiment;
Fig. 6 is the flow chart of resource allocation methods in another embodiment;
Fig. 7 is the flow chart of resource allocation methods in another embodiment;
Fig. 8 is the user setup interface schematic diagram of the terminal in one embodiment;
Fig. 9 is the structure diagram of resource allocation device in one embodiment;
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
Unless otherwise defined, all of technologies and scientific terms used here by the article and belong to the technical field of the application
The normally understood meaning of technical staff is identical.The term used in the description of the present application is intended merely to description tool herein
The purpose of the embodiment of body, it is not intended that limitation the application.It is appreciated that term " first " used in this application, " second "
Etc. can be used to describe various elements herein, but these elements should not be limited by these terms.These terms are only used to by first
A element is distinguished with another element.It for example, can be by the first client in the case where not departing from scope of the present application
Referred to as the second client, and similarly, the second client can be known as the first client.First client and the second client two
Person is client, but it is not same client.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment.The terminal includes the place connected by system bus
Manage device, memory and network interface.Wherein, which supports the operation of entire terminal for providing calculating and control ability.
Memory for storing data, program, and/or instruction code etc., at least one computer program is stored on memory, the calculating
Machine program can be executed by processor, to realize the resource allocation methods suitable for terminal provided in the embodiment of the present application.Storage
Device may include the non-volatile memory mediums such as magnetic disc, CD, read-only memory (Read-Only Memory, ROM), or with
Machine storage memory (Random-Access-Memory, RAM) etc..For example, in one embodiment, memory includes non-volatile
Property storage medium and built-in storage.Non-volatile memory medium is stored with operating system, database and computer program.The data
A kind of resource allocation methods relevant data provided for realizing above each embodiment are provided in library.The computer journey
Sequence can be performed by processor, for realizing a kind of resource allocation methods that each embodiment of the application is provided.Interior storage
Device provides the running environment of cache for operating system, database and the computer program in non-volatile memory medium.Net
Network interface can be Ethernet card or wireless network card etc., for being communicated with external electronic equipment.The terminal can be hand
Machine, tablet computer or personal digital assistant or Wearable etc..
It will be understood by those skilled in the art that structure shown in Fig. 1, is only tied with the relevant part of application scheme
The block diagram of structure, does not constitute the restriction for the terminal being applied thereon to application scheme, and specific terminal may include than figure
Shown in more or fewer components, either combine certain components or arranged with different components.
In one embodiment, as shown in Fig. 2, providing a kind of resource allocation methods, it is applied to that there is Multi-User Dimension
Terminal on, when using the terminal there are multi-user, end can be made according to the characteristics of different user and demand assignment system resource
Resource allocation on end is more reasonable.The resource allocation methods, include the following steps 202~step 206:
Step 202:User gradation is divided for the user in terminal, and the corresponding right to use is configured for each user gradation
Limit.
Wherein, there is multi-user mode in terminal, i.e., multiple user's spaces can be set in terminal, each user's space
Data are mutual indepedent, and multiple users can log in the same application, but the account data of user is mutual indepedent.It can be by encrypting hand
Each user's space is encrypted in section (such as verification password, fingerprint recognition, recognition of face, Application on Voiceprint Recognition, the identification of ear line etc.),
To protect the privacy of user of each user's space.
Different Role Informations can be arranged in different users in terminal, obtain the Role Information of the user, and is
The Role Information divides corresponding user gradation, and the right to use of user's space is limited according to the user gradation of different role information
Limit.
Role Information includes but not limited to identity characteristic, age characteristics, sex character, relationship characteristic.For example, identity characteristic
Can be parent, children, by care crowd etc., age characteristics can be adult, minor, the elderly etc., sex character
Including male and female, relationship characteristic includes household, friend, colleague, stranger etc..
For example, Role Information of the user in terminal can be divided into owner, child user and visitor.Wherein, owner is
Terminal owner is normally only terminal owner oneself in use, just with owner's identity logs, and owner possesses highest user etc.
Grade, after login, owner can carry out all operations, including add or delete other users, authorize other users using call and
SMS function.Child user is other users being arranged in addition to owner, when the relatives or friend being familiar with are in use, can lead to
The identity logs of child user are crossed, child user possesses secondary user's grade, and after login, child user can use most of function, but
The function that can influence owner, such as factory reset, interruption-free function can not be used.Visitor is typically for temporary visit user
The user's space of setting can be by visitor's identity logs when the friend not being familiar with borrows, and the user gradation of visitor is most
Low, after login, Guest User is only capable of carrying out part operation, cannot use short message, installation unknown applications etc..
Step 204:According to the access right of different user, the resource allocation policy to each user's space is determined.
The resource of user's space includes but not limited to memory space, running memory, number of applications, and memory space is for storing
The system application data and user's private data of user, running memory determine the size that application can be run in the user's space and
Quantity, number of applications can be the number of applications for allowing the number of applications of installation and allowing operation.
Specifically, the access right of user can be the access right to system resource in user's space.That is, when inspection
When measuring user's login, the access right of currently logged on user is read, the maximum of active user is determined according to the access right
Allow resource, and user's space is loaded according to the maximum allowable resource.
Optionally, the access right of user can also be switching permission.Switch permission for the user's space setting in terminal,
Determine whether active user space can switch to private space according to switching permission, if private space cannot be switched to,
The entrance of private space is not shown in active user space.
Step 206:According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.
There are multiple user's spaces in terminal, and be likely to occur the state of multiple user's spaces while operation, work as terminal
On when being operated together there are multiple user's spaces, specifically include the user's space of front stage operation and the user's space of running background.
Different according to the user gradation of different user in terminal, the priority of resource allocation of user's space is also different, different priority
Corresponding different resource constraint degree.The higher user's space of priority is lower to the limited degree of its workable resource.Then
Determined to the resource allocation policy of each user's space according to different user rank, to multiple user's spaces in the terminal into
Row resource allocation.
Specifically, when running multiple user's spaces in terminal, after comparing the first space in front stage operation and being in
The user gradation of the second space of platform operation is described when the user gradation of the second space is higher than first space
Second space configuration meets the permission resource for presetting application operation, and limits the maximum allowable resource in first space.
Above-mentioned resource allocation methods by dividing user gradation for the user in terminal, and configure for each user gradation
Corresponding access right determines the resource allocation policy to each user's space, according to institute according to the access right of different user
Resource allocation policy is stated, resource allocation is carried out to multiple user's spaces in the terminal, it can be according to user's feature and demand
Reasonable distribution resource keeps the resource allocation in terminal more reasonable, and according to the resource of different user hierarchical management user's space,
Conducive to protection privacy of user.
In one embodiment, it as shown in figure 3, according to the access right of different user, determines to each user's space
Resource allocation policy, i.e. step 204 may include:
Step 302:When detecting that user logs in, the access right of currently logged on user is read.
When detecting that user logs in, system verifies the Role Information for logining user, such as passes through password authentification mechanism pair
The Role Information for logining user is verified, and the password authentification mechanism during this can be fingerprint password authentification, numerical ciphers
Verification, graphical passwords verification or face password authentification etc..Specifically, receiving user, in user to login the verification that is inputted in interface close
Code, judges whether the verification password matches at least one preset password;In the feelings that verification password matches with preset password
Under condition, user's space corresponding with the preset password is logined.Further, the Role Information for currently logining user is obtained, according to
The user gradation of the Role Information determines corresponding access right.
Step 304:The maximum allowable resource of active user is determined according to the access right, and according to described maximum allowable
Resource loads user's space.
Maximum allowable resource includes maximum free memory, maximum running memory, the maximum number of applications etc. that can be run,
Resource allocation is carried out to active user space according to the access right of user, for the high user's space of user gradation, is used
Permission is relatively high, then user has higher use demand, such as needs the memory space of bigger (private to load private data
Data can be private application, photograph album and documentum privatum etc.), it is therefore desirable to more system resources are given to meet user's need
It asks.
Accordingly for the lower user's space of user gradation, access right has been restricted, then user, which uses, needs
It asks and is relatively low, then it can be by limiting the maximum allowable resource of the user's space with reasonable distribution system resource, and realize
Further effect of the low user's space of limitation user gradation to the utilization rate of terminal.
For example, it if the current Role Information for logining user is visitor, can only load public in public space
Data that is to say and may have access to common application in visitor space.Such as the owner of terminal terminal is temporarily lent other people in use,
It is not intended to other people to access the privacy application of owner, then may be provided in the user's space and only load common data.
Resource allocation methods provided in this embodiment, by when detecting that user logs in, reading currently logged on user's
Access right determines the maximum allowable resource of active user according to the access right, and is added according to the maximum allowable resource
User's space is carried, system memory space utilization ratio, and lifting system operating rate are improved.
In one embodiment, as shown in figure 4, when terminal changes user, step 204 can also include:
Step 402:For the user's space setting switching permission in the terminal.
In the present embodiment, terminal change user specifically refers to terminal and is transferred to other use from a user
Person may include:Owner uses terminal to household, owner uses terminal to children, owner uses terminal to friend, machine
Chief commander's terminal gives the people that is not familiar with to use etc..When terminal changes user, the privacy of owner all suffers from asking of being leaked
Topic, therefore be the user's space setting switching permission in the terminal.
Wherein, the multi-user mode in terminal includes user's space and private space, the Dynamic data exchange of private space, hidden
Application can be added in private space, can also add the individual privacy informations such as contact person, short message, memorandum.Private space is usual
It can only be switched by owner space, protect privacy of user well.When in terminal there are when multiple user's spaces, due to
The difference of user gradation, different users have differences the access right of terminal, can in the high user's space of user gradation
There can be the use demand for switching to private space, it is therefore desirable to which the switching permission of user's space is set according to user gradation.
Specifically, the setting higher user of user gradation has the permission for switching to private space, namely in user gradation
Display switches to the entrance of private space in higher user's space;Setting the lower user of user gradation do not have switch to it is hidden
The permission in private space, namely there is no the entrances for switching to private space in the lower user's space of user gradation.
Step 404:Determine whether active user space can switch to private space according to the switching permission.
When detecting that user logs in, judge whether active user is hidden with switching to during loading user's space
The permission in private space specifically obtains the user gradation of active user, by the user gradation of active user and pre-set user grade
It is compared, if current user's level is higher than pre-set user grade, in active user space, load can switch to private space
Entrance, indicate from active user space to switch to private space;If current user's level is less than pre-set user grade,
Execute step 406:Do not show that the entrance of private space, expression cannot be switched to from active user space in active user space
Private space namely active user do not have the permission for accessing private space.It is understood that when there are hidden in user's space
It when the entrance in private space, needs that private space could be accessed after the encrypted authentication by private space, wherein encrypted authentication can be with
It is verification password, fingerprint recognition, recognition of face, Application on Voiceprint Recognition, the identification of ear line etc..
Resource allocation methods provided in this embodiment switch permission, user gradation according to different user grade installation space
High space can switch to private space, and the low space of user gradation can not switch to private space, and privacy is accessed improving
Also ensure the concealment of privacy of user while the convenience in space.
In one embodiment, further include the secret application executed to active user space when terminal changes user
The operations the step of such as it is hidden, encrypts and pretends.Under multi-user scene, mobile phone is given to other users in use, may
Cause other users to browse the content of this user and causes privacy leakage.Therefore, for different users, it is provided which setting secret
Application function the operations such as can be hidden, encrypt and pretend for secret application.Such as the desktop of user, screen locking, notice,
The secret application that paths do not show active user is set etc., or the secret application setting encryption in active user space is tested
Entrance is demonstrate,proved, needs just to may have access to after being verified accordingly.
In one embodiment, as shown in figure 5, it is described according to the resource allocation policy, to multiple in the terminal
User's space carries out resource allocation, including:
Step 502:When running multiple user's spaces in the terminal, compare the first space and place in front stage operation
In the user gradation of the second space of running background.
Specifically, the space that the first space representation is currently running that is to say that user can pass through terminal display interface
The space being immediately seen, second space indicate the space in running background, and that is to say can not be straight by the display interface of terminal
Connect the content for viewing second space.When user logins the first space, the second space in addition to the first space is also at low work(
Working condition is consumed, compares the user gradation in the first space and the second space in running background in front stage operation at this time,
Resource allocation is carried out to multiple user's spaces in terminal according to user gradation.
Step 504:When the user gradation of the second space is higher than first space, configured for the second space
Meet the permission resource for presetting application operation, and limits the maximum allowable resource in first space.
When the user gradation of the second space in running background is higher than the user etc. in the first space in front stage operation
When grade, indicate that the priority level of second space is higher than the first space, then second space may be important user's space, such as machine
The principal space needs to meet the permission resource for presetting application operation for second space configuration at this time, pre- in second space to ensure
If using can normal operation, which can be system application, such as such as calendar, clock, weather, antivirus application
Deng the higher application of frequency of use, such as wechat, QQ, music player etc. being can also be, to meet the use demand of user.
Identical, the priority level in the first space is less than second space, then it represents that and the first space may be limited users space, such as
Visitor limits the maximum allowable resource in the first space at this time, to reach user's using to terminal in the first space of limitation
Purpose.
For example, such as parent and children share a mobile phone, higher grade are arranged for parent, while also correspondence is enjoyed
There are more resources.When two spaces are run simultaneously, if parent subscriber is transferred to running background, it is also possible to there is still a need for holdings
The operation of certain applications passes through limiting child user couple even if child user limits the use of its resource if being in front stage operation
The use of mobile phone resources, to achieve the purpose that limiting child uses mobile phone.
Resource allocation methods provided in this embodiment improve the reasonability of resource allocation, and according to different user
Role Information carries out reasonably resource allocation, meets user demand for the characteristics of different user, promotes user experience.
In one embodiment, as shown in fig. 6, dividing user gradation for the user in terminal, and it is each user gradation
Corresponding access right is configured, further includes:
Step 602:User in the terminal is divided into adult human user and is looked after user, and configures the adult and uses
The user's space at family is the first estate, and the configuration user's space for being looked after user is the second grade.
Multi-user in terminal is managed, the biological characteristic of user is acquired, according to the identity of user, age, body
Situation etc. judges the Role Information of user.The user in terminal is divided into adult human user according to the Role Information of user and is closed
According to user, and the user's space for configuring adult human user is the first estate, and the user's space that user is looked after in configuration is the second grade,
Wherein the priority level of the first estate is higher than the priority level of the second grade.Wherein, adult human user can be adult user, machine
It is main I, the parent of owner, owner elder etc., looked after user can be children, be not grown up, the needs such as the elderly are supervised
Object.
Specifically, when terminal is in use state, the various sensors that can have by it are obtained about terminal
The biological characteristic of holder.These sensors may include:Face recognition sensor (such as 3D face recognitions, face-image are known
Not), iris sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..Therewith
Corresponding, these biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature
More than one.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into
Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held
When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal
When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.It is appreciated that
It is that can also obtain biological characteristic of user, such as user's input, big data analysis etc., the present embodiment pair by other means
This is without limiting.
Step 604:The user's space of described the first estate has the permission into the user's space of second grade.
Specifically, since the priority level of the first estate is higher than the priority level of the second grade, the use of the first estate
The user for the user's space namely the first estate that family space can enter the second grade can check the user's space of the second grade
Content, such as parent subscriber can check the content in child user space, to realize supervision or management and control etc. to child user.
On the contrary, the user's space of the second grade does not have the use of permission namely the second grade into the user's space of the first estate
Family can not check the content of the user's space of the first estate, protect the privacy of the higher user of priority level.
Resource allocation methods provided in this embodiment, by controlling access privilege for user setting different brackets,
The diversified demand of user can be met according to the access rights of user's feature and demand management terminal, improve user experience.
In one embodiment, as shown in fig. 7, the resource allocation methods further include:
Step 702:Obtain the operational order input by user for acting on user setup interface.
Specifically, it is the user setup interface schematic diagram of terminal, user setup interface is for being arranged angle with reference to shown in Fig. 8
Color information, such as may include increasing user, deleting user, setting user right etc..Input by user use is acted on when detecting
When the operational order at interface is arranged in family, step 604 is executed.
Step 704:According to the operational order, the Role Information is set.
For example, when receiving addition or adding the operational order of visitor, user setup interface prompt addition is used
Family or Guest User will appear user's icon, the user that locking screen interface is shown is as current after adding user on locking screen interface
The user of login.When receiving the operational order for deleting user, whether user setup interface prompt needs to delete user, such as
" to remove this userSystem will delete all applications and data ", it determines the need for deleting according to user feedback current
User, the data of the user can be removed simultaneously by deleting user.When receiving priority assignation operation, obtains and need that permission is arranged
Whether role, user setup interface prompt need to authorize permission, such as " allowing using call and information and shared log ",
Determine whether to authorize according to user feedback, after being authorized, which can use phone and SMS function, acceptable and host
Shared message registration and short message.If owner authorizes multiple child users, can also be shared between authorized child user
Message registration and short message.Optionally, when user needs to switch role, the role to be logged in is clicked, in the menu of pop-up
Click switching role.Character icon can also be clicked in locking screen interface, then click the role for wanting to log in, carried out password and test
The user's space after switching is logined after card.
Data processing method provided in this embodiment, can be according to the operation input by user for acting on user setup interface
The Role Information is arranged in instruction, and the terminal convenient for using polygonal color is managed, and promotes user experience.
It should be understood that although each step in the flow chart of Fig. 2-7 is shown successively according to the instruction of arrow,
These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-7
Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can either the sub-step of other steps or at least part in stage be in turn or alternately with other steps
It executes.
As shown in figure 9, in one embodiment, providing a kind of resource allocation device, which includes:Configuration module 910,
Tactful determining module 920, resource allocation module 930.
Configuration module 910, for dividing user gradation for the user in terminal, and it is corresponding for the configuration of each user gradation
Access right.
Tactful determining module 920 determines the resource point to each user's space for the access right according to different user
With strategy.
Resource allocation module 930, for according to the resource allocation policy, to multiple user's spaces in the terminal into
Row resource allocation.
Above-mentioned resource allocation device is user's division user gradation in terminal, and be each by configuration module 910
User gradation configures corresponding access right, and tactful determining module 920 is determined according to the access right of different user to each use
The resource allocation policy in family space, resource allocation module 930 is according to the resource allocation policy, to multiple use in the terminal
Family space carries out resource allocation, the resource allocation in terminal can be made more to close according to user's feature and demand reasonable distribution resource
Reason, and according to the resource of different user hierarchical management user's space, it is conducive to protection privacy of user.
In one embodiment, configuration module 910 is additionally operable to obtain the Role Information of the user, and believes for the role
Breath divides corresponding user gradation.
In one embodiment, configuration module 910 be additionally operable to by the user in the terminal be divided into adult human user and by
The user's space looked after user, and configure the adult human user is the first estate, the configuration user's space for being looked after user
For the second grade;The user's space of described the first estate has the permission into the user's space of second grade.
In one embodiment, tactful determining module 920 is additionally operable to when detecting that user logs in, and is read current log in and is used
The access right at family;The maximum allowable resource of active user is determined according to the access right, and according to the maximum allowable money
Source loads user's space.
In one embodiment, tactful determining module 920 is additionally operable to as the user's space setting switching power in the terminal
Limit;Determine whether active user space can switch to private space according to the switching permission;If it is not, then in active user's sky
The interior entrance for not showing private space.
In one embodiment, resource allocation module 930 is additionally operable to when running multiple user's spaces in the terminal, than
The user gradation in the first space and the second space in running background relatively in front stage operation;When the use of the second space
When family grade is higher than first space, the permission resource for presetting application operation is met for second space configuration, and limit
The maximum allowable resource in first space.
In one embodiment, further include user setting module, input by user user setting circle is acted on for obtaining
The operational order in face;According to the operational order, the user information is set.
The division of modules is only used for for example, in other embodiments, can will provide in above-mentioned resource allocation device
Source distributor is divided into different modules as required, to complete all or part of function of above-mentioned resource allocation device.
Specific about resource allocation device limits the restriction that may refer to above for resource allocation methods, herein not
It repeats again.Modules in above-mentioned resource allocation device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the resource allocation device provided in the embodiment of the present application can be the shape of computer program
Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal
Or on the memory of server.When the computer program is executed by processor, method described in the embodiment of the present application is realized
Step.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer
The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors
When so that the processor executes the resource allocation methods as described in the various embodiments described above.
The embodiment of the present application also provides a kind of computer program products.A kind of computer program product including instruction,
When run on a computer so that computer executes the resource allocation methods described in the various embodiments described above.
The embodiment of the present application also provides a kind of terminal devices.As shown in Figure 10, for convenience of description, it illustrates only and this
Apply for that the relevant part of embodiment, particular technique details are not disclosed, please refers to the embodiment of the present application method part.The terminal is set
Include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS for that can be
The arbitrary terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, Wearable, using terminal device as mobile phone
For:
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 10, hand
Machine includes:Radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display unit 1040,
Sensor 1050, voicefrequency circuit 1060, Wireless Fidelity (wireless fidelity, WiFi) module 1070, processor 1080,
And the equal components of power supply 1090.It will be understood by those skilled in the art that handset structure shown in Fig. 10 is not constituted to mobile phone
It limits, may include either combining certain components or different components arrangement than illustrating more or fewer components.
Wherein, RF circuits 1010 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station
After downlink information receives, handled to processor 1080;The data of uplink can also be sent to base station.In general, RF circuits include
But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier,
LNA), duplexer etc..In addition, RF circuits 1010 can also be communicated with network and other equipment by radio communication.It is above-mentioned wireless
Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of
Mobile communication, GSM), general packet radio service (General Packet Radio Service,
GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code
Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email,
Short message service (Short Messaging Service, SMS) etc..
Memory 1020 can be used for storing software program and module, and processor 1080 is stored in memory by operation
1020 software program and module, to execute various function application and the data processing of mobile phone.Memory 1020 can be led
To include program storage area and data storage area, wherein program storage area can storage program area, needed at least one function
Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;It data storage area can
Storage uses created data (such as audio data, address list etc.) etc. according to mobile phone.In addition, memory 1020 can wrap
High-speed random access memory is included, can also include nonvolatile memory, for example, at least disk memory, a flash memories
Part or other volatile solid-state parts.
Input unit 1030 can be used for receiving the number or character information of input, and generates and set with the user of mobile phone 1000
It sets and the related key signals of function control inputs.Specifically, input unit 1030 may include touch panel 1031 and other
Input equipment 1032.Touch panel 1031, alternatively referred to as touch screen collect user on it or neighbouring touch operation (are compared
Such as user is using finger, stylus any suitable object or attachment on touch panel 1031 or near touch panel 1031
Operation), and corresponding attachment device is driven according to preset formula.In one embodiment, touch panel 1031 can
Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and examine
The signal that touch operation is brought is surveyed, touch controller is transmitted a signal to;Touch controller is received from touch detecting apparatus to be touched
Information is touched, and is converted into contact coordinate, then gives processor 1080, and order that processor 1080 is sent can be received and added
To execute.Furthermore, it is possible to realize touch panel using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
1031.In addition to touch panel 1031, input unit 1030 can also include other input equipments 1032.Specifically, other are inputted
Equipment 1032 can include but is not limited to one in physical keyboard, function key (such as volume control button, switch key etc.) etc.
Kind is a variety of.
Display unit 1040 can be used for showing information input by user or be supplied to user information and mobile phone it is each
Kind menu.Display unit 1040 may include display panel 1041.In one embodiment, liquid crystal display may be used
(Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode,
) etc. OLED forms configure display panel 1041.In one embodiment, touch panel 1031 can cover display panel 1041,
When touch panel 1031 detects on it or after neighbouring touch operation, processor 1080 is sent to determine touch event
Type is followed by subsequent processing device 1080 and provides corresponding visual output on display panel 1041 according to the type of touch event.Although
In Fig. 10, touch panel 1031 and display panel 1041 are to realize the input and input of mobile phone as two independent components
Function, but in some embodiments it is possible to touch panel 1031 and display panel 1041 are integrated and are realized the input of mobile phone
And output function.
Mobile phone 1000 may also include at least one sensor 1050, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ring
The light and shade of border light adjusts the brightness of display panel 1041, and proximity sensor can close display when mobile phone is moved in one's ear
Panel 1041 and/or backlight.Motion sensor may include acceleration transducer, can detect all directions by acceleration transducer
The size of upper acceleration can detect that size and the direction of gravity when static, the application that can be used to identify mobile phone posture is (such as horizontal
Vertical screen switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer,
Other sensors such as hygrometer, thermometer, infrared sensor etc..
Voicefrequency circuit 1060, loud speaker 1061 and microphone 1062 can provide the audio interface between user and mobile phone.Sound
The transformed electric signal of the audio data received can be transferred to loud speaker 1061 by frequency circuit 1060, by 1061 turns of loud speaker
It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1062, by voicefrequency circuit
Audio data is converted to after 1060 receptions, then by after the processing of audio data output processor 1080, can be sent out through RF circuits 1010
Another mobile phone is given, or audio data is exported to memory 1020 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 1070
Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Figure 10 is shown
WiFi module 1070, but it is understood that, and it is not belonging to must be configured into for mobile phone 1000, it can save as needed
Slightly.
Processor 1080 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone,
By running or execute the software program and/or module that are stored in memory 1020, and calls and be stored in memory 1020
Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.In one embodiment,
Processor 1080 may include one or more processing units.In one embodiment, processor 1080 can integrate application processor
And modem processor, wherein the main processing operation system of application processor, user interface and application program etc.;Modulatedemodulate
Processor is adjusted mainly to handle wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor
In 1080.
Mobile phone 1000 further includes the power supply 1090 (such as battery) powered to all parts, it is preferred that power supply can pass through
Power-supply management system and processor 1080 are logically contiguous, to realize management charging, electric discharge, Yi Jigong by power-supply management system
The functions such as consumption management.
In one embodiment, mobile phone 1000 can also include camera, bluetooth module etc..
In the embodiment of the present application, the processor 1080 included by the terminal device executes the calculating of storage on a memory
The resource allocation methods described in the various embodiments described above are realized when machine program.
When the execution of the computer program run on a processor, it can be provided according to user's feature and demand reasonable distribution
Source keeps the resource allocation in terminal more reasonable, and according to the resource of different user hierarchical management user's space, is conducive to protection and uses
Family privacy.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile
And/or volatile memory.Nonvolatile memory may include that read-only memory (ROM), programming ROM (PROM), electricity can be compiled
Journey ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory
(RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM
(SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM
(ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight
Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
Cannot the limitation to the application the scope of the claims therefore be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the guarantor of the application
Protect range.Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (10)
1. a kind of resource allocation methods are applied to the terminal with Multi-User Dimension, the method includes:
User gradation is divided for the user in terminal, and corresponding access right is configured for each user gradation;
According to the access right of different user, the resource allocation policy to each user's space is determined;
According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.
2. according to the method described in claim 1, it is characterized in that, the user in terminal divides user gradation, including:
The Role Information of the user is obtained, and corresponding user gradation is divided for the Role Information;Wherein, role's letter
Breath includes one or more of identity characteristic, age characteristics, sex character, relationship characteristic.
3. according to the method described in claim 1, it is characterized in that, the access right according to different user, determines to every
The resource allocation policy of a user's space, including:
When detecting that user logs in, the access right of currently logged on user is read;
The maximum allowable resource of active user is determined according to the access right, and user is loaded according to the maximum allowable resource
Space;Wherein, the resource includes one or more of memory space, running memory, number of applications.
4. according to the method described in claim 3, it is characterized in that, the method further includes:
For the user's space setting switching permission in the terminal;
Determine whether active user space can switch to private space according to the switching permission;
If it is not, not showing the entrance of private space in active user space then.
5. according to the method described in claim 1, it is characterized in that, described according to the resource allocation policy, to the terminal
On multiple user's spaces carry out resource allocation, including:
When running multiple user's spaces in the terminal, compares the first space in front stage operation and be in running background
The user gradation of second space;
When the user gradation of the second space is higher than first space, meet default application for second space configuration
The permission resource of operation, and limit the maximum allowable resource in first space.
6. according to the method described in claim 1, it is characterized in that, described is that the user in terminal divides user gradation, and is
Each user gradation configures corresponding access right, further includes:
User in the terminal is divided into adult human user and is looked after user, and configures the user's space of the adult human user
For the first estate, the configuration user's space for being looked after user is the second grade;
The user's space of described the first estate has the permission into the user's space of second grade.
7. according to the method described in claim 1, it is characterized in that, the method further includes:
Obtain the operational order input by user for acting on user setup interface;The wherein described user setup interface is used for being arranged
Family information;
According to the operational order, the user information is set.
8. a kind of resource allocation device, which is characterized in that including:
Configuration module for dividing user gradation for the user in terminal, and configures the corresponding right to use for each user gradation
Limit;
Tactful determining module determines the resource allocation policy to each user's space for the access right according to different user;
Resource allocation module, for according to the resource allocation policy, resource to be carried out to multiple user's spaces in the terminal
Allotment.
9. a kind of terminal, including memory and processor, computer program, the computer program are stored in the memory
When being executed by the processor so that the processor executes the resource allocation methods as described in any one of claim 1 to 7
The step of.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of resource allocation methods as described in any one of claim 1 to 7 are realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810316567.8A CN108537027A (en) | 2018-04-10 | 2018-04-10 | Resource allocation methods and device, terminal, computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810316567.8A CN108537027A (en) | 2018-04-10 | 2018-04-10 | Resource allocation methods and device, terminal, computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108537027A true CN108537027A (en) | 2018-09-14 |
Family
ID=63479870
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810316567.8A Pending CN108537027A (en) | 2018-04-10 | 2018-04-10 | Resource allocation methods and device, terminal, computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108537027A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109656352A (en) * | 2018-12-25 | 2019-04-19 | 杭州达现科技有限公司 | A kind of fast resource exchange method and apparatus of display interface |
CN109711193A (en) * | 2018-12-24 | 2019-05-03 | 杭州达现科技有限公司 | A kind of sharing method and device of memory space |
CN111836133A (en) * | 2020-07-16 | 2020-10-27 | 鸣飞伟业技术有限公司 | Voice program-controlled exchange system |
CN112422325A (en) * | 2020-10-30 | 2021-02-26 | 蒋光洵 | Management method and system based on multi-cloud mixed platform |
US20210141913A1 (en) * | 2019-11-12 | 2021-05-13 | Accenture Global Solutions Limited | System and Method for Management of Policies and User Data during Application Access Sessions |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
CN104516777A (en) * | 2013-10-04 | 2015-04-15 | 三星电子株式会社 | User interface management method and system |
-
2018
- 2018-04-10 CN CN201810316567.8A patent/CN108537027A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103108082A (en) * | 2013-01-24 | 2013-05-15 | 北京航空航天大学 | Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system |
CN104516777A (en) * | 2013-10-04 | 2015-04-15 | 三星电子株式会社 | User interface management method and system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109711193A (en) * | 2018-12-24 | 2019-05-03 | 杭州达现科技有限公司 | A kind of sharing method and device of memory space |
CN109711193B (en) * | 2018-12-24 | 2021-03-19 | 杭州达现科技有限公司 | Storage space sharing method and device |
CN109656352A (en) * | 2018-12-25 | 2019-04-19 | 杭州达现科技有限公司 | A kind of fast resource exchange method and apparatus of display interface |
US20210141913A1 (en) * | 2019-11-12 | 2021-05-13 | Accenture Global Solutions Limited | System and Method for Management of Policies and User Data during Application Access Sessions |
US11995214B2 (en) * | 2019-11-12 | 2024-05-28 | Accenture Global Solutions Limited | System and method for management of policies and user data during application access sessions |
CN111836133A (en) * | 2020-07-16 | 2020-10-27 | 鸣飞伟业技术有限公司 | Voice program-controlled exchange system |
CN111836133B (en) * | 2020-07-16 | 2022-03-01 | 鸣飞伟业技术有限公司 | Voice program-controlled exchange system |
CN112422325A (en) * | 2020-10-30 | 2021-02-26 | 蒋光洵 | Management method and system based on multi-cloud mixed platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108536783A (en) | Data processing method and device, terminal, computer readable storage medium | |
CN108537027A (en) | Resource allocation methods and device, terminal, computer readable storage medium | |
US9864984B2 (en) | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions | |
US20180324166A1 (en) | Presence-based credential updating | |
KR102302350B1 (en) | Method and apparatus for providing the security function | |
CN112491783B (en) | User authentication confidence based on multiple devices | |
CN108521494B (en) | Terminal control method and device, readable storage medium and terminal | |
KR102347827B1 (en) | Apparatus and method for secure message transmission | |
CN104516777A (en) | User interface management method and system | |
US10242167B2 (en) | Method for user authentication and electronic device implementing the same | |
US9891969B2 (en) | Method and apparatus for device state based encryption key | |
CN105960774A (en) | Near field communication authentication mechanism | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
WO2018000370A1 (en) | Mobile terminal authentication method and mobile terminal | |
CN107437009A (en) | Authority control method and related product | |
CN106778130A (en) | A kind of display methods of message, display device and mobile terminal | |
WO2019196693A1 (en) | Application control method and device, readable storage medium and terminal | |
CN108616652A (en) | Data guard method and device, terminal, computer readable storage medium | |
US20190026452A1 (en) | Method for Associating Application Program with Biometric Feature, Apparatus, and Mobile Terminal | |
CN110198301A (en) | A kind of service data acquisition methods, device and equipment | |
CN110941821A (en) | Data processing method, device and storage medium | |
CN107395880A (en) | Method for information display, device and terminal | |
CN108537037A (en) | Privacy control method and device, computer readable storage medium, terminal | |
CN105830502B (en) | Method and apparatus in intelligent home system for searching for and controlling controlled person | |
CN108573169A (en) | Nearest task list display methods and device, storage medium, electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180914 |