CN108537027A - Resource allocation methods and device, terminal, computer readable storage medium - Google Patents

Resource allocation methods and device, terminal, computer readable storage medium Download PDF

Info

Publication number
CN108537027A
CN108537027A CN201810316567.8A CN201810316567A CN108537027A CN 108537027 A CN108537027 A CN 108537027A CN 201810316567 A CN201810316567 A CN 201810316567A CN 108537027 A CN108537027 A CN 108537027A
Authority
CN
China
Prior art keywords
user
space
terminal
resource allocation
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810316567.8A
Other languages
Chinese (zh)
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810316567.8A priority Critical patent/CN108537027A/en
Publication of CN108537027A publication Critical patent/CN108537027A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)

Abstract

This application involves a kind of resource allocation methods and device, terminal, computer readable storage medium.This method includes:User gradation is divided for the user in terminal, and corresponding access right is configured for each user gradation;According to the access right of different user, the resource allocation policy to each user's space is determined;According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.By the above method, the resource allocation in terminal can be kept more reasonable according to user's feature and demand reasonable distribution resource, and according to the resource of different user hierarchical management user's space, be conducive to protection privacy of user.

Description

Resource allocation methods and device, terminal, computer readable storage medium
Technical field
This application involves fields of communication technology, can more particularly to a kind of resource allocation methods and device, terminal, computer Read storage medium.
Background technology
With the intelligent development of communication equipment, people are more and more frequent to the use of intelligent terminal in daily life, When multiple roles are used in conjunction with the same intelligent terminal, different role might have some privacy informations on intelligent terminal, Such as oneself shares the same intelligent terminal, the i.e. same terminal of multiple users share with household;Or same user is with different identity Use intelligent terminal, such as life and work;It needs to carry out secret protection.
Traditional secret protection mode by be arranged in terminal multiple separate spaces for different user use, but with That user is more and more for the demand of secret protection, traditional secret protection mode cannot be satisfied hidden in subscriber handover process Private protection demand, and it is unreasonable for the resource allocation of different user and be easy to cause the waste of system resource.
Invention content
A kind of resource allocation methods of the embodiment of the present application offer, device, computer equipment and storage medium, can optimize end The resource allocation of multiple user's spaces on end, reduces the waste of system resource.
A kind of resource allocation methods are applied to the terminal with Multi-User Dimension, the method includes:
User gradation is divided for the user in terminal, and corresponding access right is configured for each user gradation;
According to the access right of different user, the resource allocation policy to each user's space is determined;
According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.
A kind of resource allocation device, including:
Configuration module for dividing user gradation for the user in terminal, and makes for the configuration of each user gradation is corresponding Use permission;
Tactful determining module determines the resource allocation to each user's space for the access right according to different user Strategy;
Resource allocation module, for according to the resource allocation policy, being carried out to multiple user's spaces in the terminal Resource allocation.
A kind of terminal, including memory and processor store computer program, the computer journey in the memory When sequence is executed by the processor so that the processor executes the step of resource allocation methods.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of resource allocation methods are realized when row.
Above-mentioned resource allocation methods and device, terminal, computer readable storage medium, by being divided for the user in terminal User gradation, and corresponding access right is configured for each user gradation, according to the access right of different user, determine to each The resource allocation policy of user's space provides multiple user's spaces in the terminal according to the resource allocation policy Source is allocated, and the resource allocation in terminal can be kept more reasonable, and according to or not user's feature and demand reasonable distribution resource The resource of user's space is managed with user gradation, is conducive to protection privacy of user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment;
Fig. 2 is the flow chart of resource allocation methods in one embodiment;
Fig. 3 is the flow chart of resource allocation methods in another embodiment;
Fig. 4 is the flow chart of resource allocation methods in another embodiment;
Fig. 5 is the flow chart of resource allocation methods in another embodiment;
Fig. 6 is the flow chart of resource allocation methods in another embodiment;
Fig. 7 is the flow chart of resource allocation methods in another embodiment;
Fig. 8 is the user setup interface schematic diagram of the terminal in one embodiment;
Fig. 9 is the structure diagram of resource allocation device in one embodiment;
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
Unless otherwise defined, all of technologies and scientific terms used here by the article and belong to the technical field of the application The normally understood meaning of technical staff is identical.The term used in the description of the present application is intended merely to description tool herein The purpose of the embodiment of body, it is not intended that limitation the application.It is appreciated that term " first " used in this application, " second " Etc. can be used to describe various elements herein, but these elements should not be limited by these terms.These terms are only used to by first A element is distinguished with another element.It for example, can be by the first client in the case where not departing from scope of the present application Referred to as the second client, and similarly, the second client can be known as the first client.First client and the second client two Person is client, but it is not same client.
Fig. 1 is the internal structure schematic diagram of terminal in one embodiment.The terminal includes the place connected by system bus Manage device, memory and network interface.Wherein, which supports the operation of entire terminal for providing calculating and control ability. Memory for storing data, program, and/or instruction code etc., at least one computer program is stored on memory, the calculating Machine program can be executed by processor, to realize the resource allocation methods suitable for terminal provided in the embodiment of the present application.Storage Device may include the non-volatile memory mediums such as magnetic disc, CD, read-only memory (Read-Only Memory, ROM), or with Machine storage memory (Random-Access-Memory, RAM) etc..For example, in one embodiment, memory includes non-volatile Property storage medium and built-in storage.Non-volatile memory medium is stored with operating system, database and computer program.The data A kind of resource allocation methods relevant data provided for realizing above each embodiment are provided in library.The computer journey Sequence can be performed by processor, for realizing a kind of resource allocation methods that each embodiment of the application is provided.Interior storage Device provides the running environment of cache for operating system, database and the computer program in non-volatile memory medium.Net Network interface can be Ethernet card or wireless network card etc., for being communicated with external electronic equipment.The terminal can be hand Machine, tablet computer or personal digital assistant or Wearable etc..
It will be understood by those skilled in the art that structure shown in Fig. 1, is only tied with the relevant part of application scheme The block diagram of structure, does not constitute the restriction for the terminal being applied thereon to application scheme, and specific terminal may include than figure Shown in more or fewer components, either combine certain components or arranged with different components.
In one embodiment, as shown in Fig. 2, providing a kind of resource allocation methods, it is applied to that there is Multi-User Dimension Terminal on, when using the terminal there are multi-user, end can be made according to the characteristics of different user and demand assignment system resource Resource allocation on end is more reasonable.The resource allocation methods, include the following steps 202~step 206:
Step 202:User gradation is divided for the user in terminal, and the corresponding right to use is configured for each user gradation Limit.
Wherein, there is multi-user mode in terminal, i.e., multiple user's spaces can be set in terminal, each user's space Data are mutual indepedent, and multiple users can log in the same application, but the account data of user is mutual indepedent.It can be by encrypting hand Each user's space is encrypted in section (such as verification password, fingerprint recognition, recognition of face, Application on Voiceprint Recognition, the identification of ear line etc.), To protect the privacy of user of each user's space.
Different Role Informations can be arranged in different users in terminal, obtain the Role Information of the user, and is The Role Information divides corresponding user gradation, and the right to use of user's space is limited according to the user gradation of different role information Limit.
Role Information includes but not limited to identity characteristic, age characteristics, sex character, relationship characteristic.For example, identity characteristic Can be parent, children, by care crowd etc., age characteristics can be adult, minor, the elderly etc., sex character Including male and female, relationship characteristic includes household, friend, colleague, stranger etc..
For example, Role Information of the user in terminal can be divided into owner, child user and visitor.Wherein, owner is Terminal owner is normally only terminal owner oneself in use, just with owner's identity logs, and owner possesses highest user etc. Grade, after login, owner can carry out all operations, including add or delete other users, authorize other users using call and SMS function.Child user is other users being arranged in addition to owner, when the relatives or friend being familiar with are in use, can lead to The identity logs of child user are crossed, child user possesses secondary user's grade, and after login, child user can use most of function, but The function that can influence owner, such as factory reset, interruption-free function can not be used.Visitor is typically for temporary visit user The user's space of setting can be by visitor's identity logs when the friend not being familiar with borrows, and the user gradation of visitor is most Low, after login, Guest User is only capable of carrying out part operation, cannot use short message, installation unknown applications etc..
Step 204:According to the access right of different user, the resource allocation policy to each user's space is determined.
The resource of user's space includes but not limited to memory space, running memory, number of applications, and memory space is for storing The system application data and user's private data of user, running memory determine the size that application can be run in the user's space and Quantity, number of applications can be the number of applications for allowing the number of applications of installation and allowing operation.
Specifically, the access right of user can be the access right to system resource in user's space.That is, when inspection When measuring user's login, the access right of currently logged on user is read, the maximum of active user is determined according to the access right Allow resource, and user's space is loaded according to the maximum allowable resource.
Optionally, the access right of user can also be switching permission.Switch permission for the user's space setting in terminal, Determine whether active user space can switch to private space according to switching permission, if private space cannot be switched to, The entrance of private space is not shown in active user space.
Step 206:According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.
There are multiple user's spaces in terminal, and be likely to occur the state of multiple user's spaces while operation, work as terminal On when being operated together there are multiple user's spaces, specifically include the user's space of front stage operation and the user's space of running background. Different according to the user gradation of different user in terminal, the priority of resource allocation of user's space is also different, different priority Corresponding different resource constraint degree.The higher user's space of priority is lower to the limited degree of its workable resource.Then Determined to the resource allocation policy of each user's space according to different user rank, to multiple user's spaces in the terminal into Row resource allocation.
Specifically, when running multiple user's spaces in terminal, after comparing the first space in front stage operation and being in The user gradation of the second space of platform operation is described when the user gradation of the second space is higher than first space Second space configuration meets the permission resource for presetting application operation, and limits the maximum allowable resource in first space.
Above-mentioned resource allocation methods by dividing user gradation for the user in terminal, and configure for each user gradation Corresponding access right determines the resource allocation policy to each user's space, according to institute according to the access right of different user Resource allocation policy is stated, resource allocation is carried out to multiple user's spaces in the terminal, it can be according to user's feature and demand Reasonable distribution resource keeps the resource allocation in terminal more reasonable, and according to the resource of different user hierarchical management user's space, Conducive to protection privacy of user.
In one embodiment, it as shown in figure 3, according to the access right of different user, determines to each user's space Resource allocation policy, i.e. step 204 may include:
Step 302:When detecting that user logs in, the access right of currently logged on user is read.
When detecting that user logs in, system verifies the Role Information for logining user, such as passes through password authentification mechanism pair The Role Information for logining user is verified, and the password authentification mechanism during this can be fingerprint password authentification, numerical ciphers Verification, graphical passwords verification or face password authentification etc..Specifically, receiving user, in user to login the verification that is inputted in interface close Code, judges whether the verification password matches at least one preset password;In the feelings that verification password matches with preset password Under condition, user's space corresponding with the preset password is logined.Further, the Role Information for currently logining user is obtained, according to The user gradation of the Role Information determines corresponding access right.
Step 304:The maximum allowable resource of active user is determined according to the access right, and according to described maximum allowable Resource loads user's space.
Maximum allowable resource includes maximum free memory, maximum running memory, the maximum number of applications etc. that can be run, Resource allocation is carried out to active user space according to the access right of user, for the high user's space of user gradation, is used Permission is relatively high, then user has higher use demand, such as needs the memory space of bigger (private to load private data Data can be private application, photograph album and documentum privatum etc.), it is therefore desirable to more system resources are given to meet user's need It asks.
Accordingly for the lower user's space of user gradation, access right has been restricted, then user, which uses, needs It asks and is relatively low, then it can be by limiting the maximum allowable resource of the user's space with reasonable distribution system resource, and realize Further effect of the low user's space of limitation user gradation to the utilization rate of terminal.
For example, it if the current Role Information for logining user is visitor, can only load public in public space Data that is to say and may have access to common application in visitor space.Such as the owner of terminal terminal is temporarily lent other people in use, It is not intended to other people to access the privacy application of owner, then may be provided in the user's space and only load common data.
Resource allocation methods provided in this embodiment, by when detecting that user logs in, reading currently logged on user's Access right determines the maximum allowable resource of active user according to the access right, and is added according to the maximum allowable resource User's space is carried, system memory space utilization ratio, and lifting system operating rate are improved.
In one embodiment, as shown in figure 4, when terminal changes user, step 204 can also include:
Step 402:For the user's space setting switching permission in the terminal.
In the present embodiment, terminal change user specifically refers to terminal and is transferred to other use from a user Person may include:Owner uses terminal to household, owner uses terminal to children, owner uses terminal to friend, machine Chief commander's terminal gives the people that is not familiar with to use etc..When terminal changes user, the privacy of owner all suffers from asking of being leaked Topic, therefore be the user's space setting switching permission in the terminal.
Wherein, the multi-user mode in terminal includes user's space and private space, the Dynamic data exchange of private space, hidden Application can be added in private space, can also add the individual privacy informations such as contact person, short message, memorandum.Private space is usual It can only be switched by owner space, protect privacy of user well.When in terminal there are when multiple user's spaces, due to The difference of user gradation, different users have differences the access right of terminal, can in the high user's space of user gradation There can be the use demand for switching to private space, it is therefore desirable to which the switching permission of user's space is set according to user gradation.
Specifically, the setting higher user of user gradation has the permission for switching to private space, namely in user gradation Display switches to the entrance of private space in higher user's space;Setting the lower user of user gradation do not have switch to it is hidden The permission in private space, namely there is no the entrances for switching to private space in the lower user's space of user gradation.
Step 404:Determine whether active user space can switch to private space according to the switching permission.
When detecting that user logs in, judge whether active user is hidden with switching to during loading user's space The permission in private space specifically obtains the user gradation of active user, by the user gradation of active user and pre-set user grade It is compared, if current user's level is higher than pre-set user grade, in active user space, load can switch to private space Entrance, indicate from active user space to switch to private space;If current user's level is less than pre-set user grade, Execute step 406:Do not show that the entrance of private space, expression cannot be switched to from active user space in active user space Private space namely active user do not have the permission for accessing private space.It is understood that when there are hidden in user's space It when the entrance in private space, needs that private space could be accessed after the encrypted authentication by private space, wherein encrypted authentication can be with It is verification password, fingerprint recognition, recognition of face, Application on Voiceprint Recognition, the identification of ear line etc..
Resource allocation methods provided in this embodiment switch permission, user gradation according to different user grade installation space High space can switch to private space, and the low space of user gradation can not switch to private space, and privacy is accessed improving Also ensure the concealment of privacy of user while the convenience in space.
In one embodiment, further include the secret application executed to active user space when terminal changes user The operations the step of such as it is hidden, encrypts and pretends.Under multi-user scene, mobile phone is given to other users in use, may Cause other users to browse the content of this user and causes privacy leakage.Therefore, for different users, it is provided which setting secret Application function the operations such as can be hidden, encrypt and pretend for secret application.Such as the desktop of user, screen locking, notice, The secret application that paths do not show active user is set etc., or the secret application setting encryption in active user space is tested Entrance is demonstrate,proved, needs just to may have access to after being verified accordingly.
In one embodiment, as shown in figure 5, it is described according to the resource allocation policy, to multiple in the terminal User's space carries out resource allocation, including:
Step 502:When running multiple user's spaces in the terminal, compare the first space and place in front stage operation In the user gradation of the second space of running background.
Specifically, the space that the first space representation is currently running that is to say that user can pass through terminal display interface The space being immediately seen, second space indicate the space in running background, and that is to say can not be straight by the display interface of terminal Connect the content for viewing second space.When user logins the first space, the second space in addition to the first space is also at low work( Working condition is consumed, compares the user gradation in the first space and the second space in running background in front stage operation at this time, Resource allocation is carried out to multiple user's spaces in terminal according to user gradation.
Step 504:When the user gradation of the second space is higher than first space, configured for the second space Meet the permission resource for presetting application operation, and limits the maximum allowable resource in first space.
When the user gradation of the second space in running background is higher than the user etc. in the first space in front stage operation When grade, indicate that the priority level of second space is higher than the first space, then second space may be important user's space, such as machine The principal space needs to meet the permission resource for presetting application operation for second space configuration at this time, pre- in second space to ensure If using can normal operation, which can be system application, such as such as calendar, clock, weather, antivirus application Deng the higher application of frequency of use, such as wechat, QQ, music player etc. being can also be, to meet the use demand of user. Identical, the priority level in the first space is less than second space, then it represents that and the first space may be limited users space, such as Visitor limits the maximum allowable resource in the first space at this time, to reach user's using to terminal in the first space of limitation Purpose.
For example, such as parent and children share a mobile phone, higher grade are arranged for parent, while also correspondence is enjoyed There are more resources.When two spaces are run simultaneously, if parent subscriber is transferred to running background, it is also possible to there is still a need for holdings The operation of certain applications passes through limiting child user couple even if child user limits the use of its resource if being in front stage operation The use of mobile phone resources, to achieve the purpose that limiting child uses mobile phone.
Resource allocation methods provided in this embodiment improve the reasonability of resource allocation, and according to different user Role Information carries out reasonably resource allocation, meets user demand for the characteristics of different user, promotes user experience.
In one embodiment, as shown in fig. 6, dividing user gradation for the user in terminal, and it is each user gradation Corresponding access right is configured, further includes:
Step 602:User in the terminal is divided into adult human user and is looked after user, and configures the adult and uses The user's space at family is the first estate, and the configuration user's space for being looked after user is the second grade.
Multi-user in terminal is managed, the biological characteristic of user is acquired, according to the identity of user, age, body Situation etc. judges the Role Information of user.The user in terminal is divided into adult human user according to the Role Information of user and is closed According to user, and the user's space for configuring adult human user is the first estate, and the user's space that user is looked after in configuration is the second grade, Wherein the priority level of the first estate is higher than the priority level of the second grade.Wherein, adult human user can be adult user, machine It is main I, the parent of owner, owner elder etc., looked after user can be children, be not grown up, the needs such as the elderly are supervised Object.
Specifically, when terminal is in use state, the various sensors that can have by it are obtained about terminal The biological characteristic of holder.These sensors may include:Face recognition sensor (such as 3D face recognitions, face-image are known Not), iris sensor, fingerprint sensor (screen lower fingerprint, back fingerprint, side fingerprint etc.), microphone and earphone etc..Therewith Corresponding, these biological characteristics may include in facial characteristics, iris feature, fingerprint characteristic, vocal print feature and ear line feature More than one.
During gatherer process can be happened at holder terminal using terminal, and in a manner of imperceptible into Row.Such as when holder terminal is when clicking screen, can passing through screen, fingerprint sensor obtains fingerprint characteristic down;When terminal is held When browsing screen content, front camera can obtain its face-image and then obtain facial characteristics person;Work as holder terminal When call, its vocal print feature is obtained;When holder terminal is listened to music using earphone, its ear line feature is obtained.It is appreciated that It is that can also obtain biological characteristic of user, such as user's input, big data analysis etc., the present embodiment pair by other means This is without limiting.
Step 604:The user's space of described the first estate has the permission into the user's space of second grade.
Specifically, since the priority level of the first estate is higher than the priority level of the second grade, the use of the first estate The user for the user's space namely the first estate that family space can enter the second grade can check the user's space of the second grade Content, such as parent subscriber can check the content in child user space, to realize supervision or management and control etc. to child user. On the contrary, the user's space of the second grade does not have the use of permission namely the second grade into the user's space of the first estate Family can not check the content of the user's space of the first estate, protect the privacy of the higher user of priority level.
Resource allocation methods provided in this embodiment, by controlling access privilege for user setting different brackets, The diversified demand of user can be met according to the access rights of user's feature and demand management terminal, improve user experience.
In one embodiment, as shown in fig. 7, the resource allocation methods further include:
Step 702:Obtain the operational order input by user for acting on user setup interface.
Specifically, it is the user setup interface schematic diagram of terminal, user setup interface is for being arranged angle with reference to shown in Fig. 8 Color information, such as may include increasing user, deleting user, setting user right etc..Input by user use is acted on when detecting When the operational order at interface is arranged in family, step 604 is executed.
Step 704:According to the operational order, the Role Information is set.
For example, when receiving addition or adding the operational order of visitor, user setup interface prompt addition is used Family or Guest User will appear user's icon, the user that locking screen interface is shown is as current after adding user on locking screen interface The user of login.When receiving the operational order for deleting user, whether user setup interface prompt needs to delete user, such as " to remove this userSystem will delete all applications and data ", it determines the need for deleting according to user feedback current User, the data of the user can be removed simultaneously by deleting user.When receiving priority assignation operation, obtains and need that permission is arranged Whether role, user setup interface prompt need to authorize permission, such as " allowing using call and information and shared log ", Determine whether to authorize according to user feedback, after being authorized, which can use phone and SMS function, acceptable and host Shared message registration and short message.If owner authorizes multiple child users, can also be shared between authorized child user Message registration and short message.Optionally, when user needs to switch role, the role to be logged in is clicked, in the menu of pop-up Click switching role.Character icon can also be clicked in locking screen interface, then click the role for wanting to log in, carried out password and test The user's space after switching is logined after card.
Data processing method provided in this embodiment, can be according to the operation input by user for acting on user setup interface The Role Information is arranged in instruction, and the terminal convenient for using polygonal color is managed, and promotes user experience.
It should be understood that although each step in the flow chart of Fig. 2-7 is shown successively according to the instruction of arrow, These steps are not that the inevitable sequence indicated according to arrow executes successively.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-7 Part steps may include that either these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can either the sub-step of other steps or at least part in stage be in turn or alternately with other steps It executes.
As shown in figure 9, in one embodiment, providing a kind of resource allocation device, which includes:Configuration module 910, Tactful determining module 920, resource allocation module 930.
Configuration module 910, for dividing user gradation for the user in terminal, and it is corresponding for the configuration of each user gradation Access right.
Tactful determining module 920 determines the resource point to each user's space for the access right according to different user With strategy.
Resource allocation module 930, for according to the resource allocation policy, to multiple user's spaces in the terminal into Row resource allocation.
Above-mentioned resource allocation device is user's division user gradation in terminal, and be each by configuration module 910 User gradation configures corresponding access right, and tactful determining module 920 is determined according to the access right of different user to each use The resource allocation policy in family space, resource allocation module 930 is according to the resource allocation policy, to multiple use in the terminal Family space carries out resource allocation, the resource allocation in terminal can be made more to close according to user's feature and demand reasonable distribution resource Reason, and according to the resource of different user hierarchical management user's space, it is conducive to protection privacy of user.
In one embodiment, configuration module 910 is additionally operable to obtain the Role Information of the user, and believes for the role Breath divides corresponding user gradation.
In one embodiment, configuration module 910 be additionally operable to by the user in the terminal be divided into adult human user and by The user's space looked after user, and configure the adult human user is the first estate, the configuration user's space for being looked after user For the second grade;The user's space of described the first estate has the permission into the user's space of second grade.
In one embodiment, tactful determining module 920 is additionally operable to when detecting that user logs in, and is read current log in and is used The access right at family;The maximum allowable resource of active user is determined according to the access right, and according to the maximum allowable money Source loads user's space.
In one embodiment, tactful determining module 920 is additionally operable to as the user's space setting switching power in the terminal Limit;Determine whether active user space can switch to private space according to the switching permission;If it is not, then in active user's sky The interior entrance for not showing private space.
In one embodiment, resource allocation module 930 is additionally operable to when running multiple user's spaces in the terminal, than The user gradation in the first space and the second space in running background relatively in front stage operation;When the use of the second space When family grade is higher than first space, the permission resource for presetting application operation is met for second space configuration, and limit The maximum allowable resource in first space.
In one embodiment, further include user setting module, input by user user setting circle is acted on for obtaining The operational order in face;According to the operational order, the user information is set.
The division of modules is only used for for example, in other embodiments, can will provide in above-mentioned resource allocation device Source distributor is divided into different modules as required, to complete all or part of function of above-mentioned resource allocation device.
Specific about resource allocation device limits the restriction that may refer to above for resource allocation methods, herein not It repeats again.Modules in above-mentioned resource allocation device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in or independently of in the processor in computer equipment, can also store in a software form in the form of hardware In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
Realizing for modules in the resource allocation device provided in the embodiment of the present application can be the shape of computer program Formula.The computer program can be run in terminal or server.The program module that the computer program is constituted is storable in terminal Or on the memory of server.When the computer program is executed by processor, method described in the embodiment of the present application is realized Step.
The embodiment of the present application also provides a kind of computer readable storage mediums.One or more is executable comprising computer The non-volatile computer readable storage medium storing program for executing of instruction, when the computer executable instructions are executed by one or more processors When so that the processor executes the resource allocation methods as described in the various embodiments described above.
The embodiment of the present application also provides a kind of computer program products.A kind of computer program product including instruction, When run on a computer so that computer executes the resource allocation methods described in the various embodiments described above.
The embodiment of the present application also provides a kind of terminal devices.As shown in Figure 10, for convenience of description, it illustrates only and this Apply for that the relevant part of embodiment, particular technique details are not disclosed, please refers to the embodiment of the present application method part.The terminal is set Include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS for that can be The arbitrary terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, Wearable, using terminal device as mobile phone For:
Figure 10 is the block diagram with the part-structure of the relevant mobile phone of terminal provided by the embodiments of the present application.With reference to figure 10, hand Machine includes:Radio frequency (Radio Frequency, RF) circuit 1010, memory 1020, input unit 1030, display unit 1040, Sensor 1050, voicefrequency circuit 1060, Wireless Fidelity (wireless fidelity, WiFi) module 1070, processor 1080, And the equal components of power supply 1090.It will be understood by those skilled in the art that handset structure shown in Fig. 10 is not constituted to mobile phone It limits, may include either combining certain components or different components arrangement than illustrating more or fewer components.
Wherein, RF circuits 1010 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 1080;The data of uplink can also be sent to base station.In general, RF circuits include But be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 1010 can also be communicated with network and other equipment by radio communication.It is above-mentioned wireless Communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 1020 can be used for storing software program and module, and processor 1080 is stored in memory by operation 1020 software program and module, to execute various function application and the data processing of mobile phone.Memory 1020 can be led To include program storage area and data storage area, wherein program storage area can storage program area, needed at least one function Application program (such as the application program of sound-playing function, application program of image player function etc.) etc.;It data storage area can Storage uses created data (such as audio data, address list etc.) etc. according to mobile phone.In addition, memory 1020 can wrap High-speed random access memory is included, can also include nonvolatile memory, for example, at least disk memory, a flash memories Part or other volatile solid-state parts.
Input unit 1030 can be used for receiving the number or character information of input, and generates and set with the user of mobile phone 1000 It sets and the related key signals of function control inputs.Specifically, input unit 1030 may include touch panel 1031 and other Input equipment 1032.Touch panel 1031, alternatively referred to as touch screen collect user on it or neighbouring touch operation (are compared Such as user is using finger, stylus any suitable object or attachment on touch panel 1031 or near touch panel 1031 Operation), and corresponding attachment device is driven according to preset formula.In one embodiment, touch panel 1031 can Including both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and examine The signal that touch operation is brought is surveyed, touch controller is transmitted a signal to;Touch controller is received from touch detecting apparatus to be touched Information is touched, and is converted into contact coordinate, then gives processor 1080, and order that processor 1080 is sent can be received and added To execute.Furthermore, it is possible to realize touch panel using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves 1031.In addition to touch panel 1031, input unit 1030 can also include other input equipments 1032.Specifically, other are inputted Equipment 1032 can include but is not limited to one in physical keyboard, function key (such as volume control button, switch key etc.) etc. Kind is a variety of.
Display unit 1040 can be used for showing information input by user or be supplied to user information and mobile phone it is each Kind menu.Display unit 1040 may include display panel 1041.In one embodiment, liquid crystal display may be used (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, ) etc. OLED forms configure display panel 1041.In one embodiment, touch panel 1031 can cover display panel 1041, When touch panel 1031 detects on it or after neighbouring touch operation, processor 1080 is sent to determine touch event Type is followed by subsequent processing device 1080 and provides corresponding visual output on display panel 1041 according to the type of touch event.Although In Fig. 10, touch panel 1031 and display panel 1041 are to realize the input and input of mobile phone as two independent components Function, but in some embodiments it is possible to touch panel 1031 and display panel 1041 are integrated and are realized the input of mobile phone And output function.
Mobile phone 1000 may also include at least one sensor 1050, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ring The light and shade of border light adjusts the brightness of display panel 1041, and proximity sensor can close display when mobile phone is moved in one's ear Panel 1041 and/or backlight.Motion sensor may include acceleration transducer, can detect all directions by acceleration transducer The size of upper acceleration can detect that size and the direction of gravity when static, the application that can be used to identify mobile phone posture is (such as horizontal Vertical screen switches), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, Other sensors such as hygrometer, thermometer, infrared sensor etc..
Voicefrequency circuit 1060, loud speaker 1061 and microphone 1062 can provide the audio interface between user and mobile phone.Sound The transformed electric signal of the audio data received can be transferred to loud speaker 1061 by frequency circuit 1060, by 1061 turns of loud speaker It is changed to voice signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 1062, by voicefrequency circuit Audio data is converted to after 1060 receptions, then by after the processing of audio data output processor 1080, can be sent out through RF circuits 1010 Another mobile phone is given, or audio data is exported to memory 1020 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 1070 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Figure 10 is shown WiFi module 1070, but it is understood that, and it is not belonging to must be configured into for mobile phone 1000, it can save as needed Slightly.
Processor 1080 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, By running or execute the software program and/or module that are stored in memory 1020, and calls and be stored in memory 1020 Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.In one embodiment, Processor 1080 may include one or more processing units.In one embodiment, processor 1080 can integrate application processor And modem processor, wherein the main processing operation system of application processor, user interface and application program etc.;Modulatedemodulate Processor is adjusted mainly to handle wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor In 1080.
Mobile phone 1000 further includes the power supply 1090 (such as battery) powered to all parts, it is preferred that power supply can pass through Power-supply management system and processor 1080 are logically contiguous, to realize management charging, electric discharge, Yi Jigong by power-supply management system The functions such as consumption management.
In one embodiment, mobile phone 1000 can also include camera, bluetooth module etc..
In the embodiment of the present application, the processor 1080 included by the terminal device executes the calculating of storage on a memory The resource allocation methods described in the various embodiments described above are realized when machine program.
When the execution of the computer program run on a processor, it can be provided according to user's feature and demand reasonable distribution Source keeps the resource allocation in terminal more reasonable, and according to the resource of different user hierarchical management user's space, is conducive to protection and uses Family privacy.
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Nonvolatile memory may include that read-only memory (ROM), programming ROM (PROM), electricity can be compiled Journey ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously Cannot the limitation to the application the scope of the claims therefore be interpreted as.It should be pointed out that for those of ordinary skill in the art For, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the guarantor of the application Protect range.Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of resource allocation methods are applied to the terminal with Multi-User Dimension, the method includes:
User gradation is divided for the user in terminal, and corresponding access right is configured for each user gradation;
According to the access right of different user, the resource allocation policy to each user's space is determined;
According to the resource allocation policy, resource allocation is carried out to multiple user's spaces in the terminal.
2. according to the method described in claim 1, it is characterized in that, the user in terminal divides user gradation, including:
The Role Information of the user is obtained, and corresponding user gradation is divided for the Role Information;Wherein, role's letter Breath includes one or more of identity characteristic, age characteristics, sex character, relationship characteristic.
3. according to the method described in claim 1, it is characterized in that, the access right according to different user, determines to every The resource allocation policy of a user's space, including:
When detecting that user logs in, the access right of currently logged on user is read;
The maximum allowable resource of active user is determined according to the access right, and user is loaded according to the maximum allowable resource Space;Wherein, the resource includes one or more of memory space, running memory, number of applications.
4. according to the method described in claim 3, it is characterized in that, the method further includes:
For the user's space setting switching permission in the terminal;
Determine whether active user space can switch to private space according to the switching permission;
If it is not, not showing the entrance of private space in active user space then.
5. according to the method described in claim 1, it is characterized in that, described according to the resource allocation policy, to the terminal On multiple user's spaces carry out resource allocation, including:
When running multiple user's spaces in the terminal, compares the first space in front stage operation and be in running background The user gradation of second space;
When the user gradation of the second space is higher than first space, meet default application for second space configuration The permission resource of operation, and limit the maximum allowable resource in first space.
6. according to the method described in claim 1, it is characterized in that, described is that the user in terminal divides user gradation, and is Each user gradation configures corresponding access right, further includes:
User in the terminal is divided into adult human user and is looked after user, and configures the user's space of the adult human user For the first estate, the configuration user's space for being looked after user is the second grade;
The user's space of described the first estate has the permission into the user's space of second grade.
7. according to the method described in claim 1, it is characterized in that, the method further includes:
Obtain the operational order input by user for acting on user setup interface;The wherein described user setup interface is used for being arranged Family information;
According to the operational order, the user information is set.
8. a kind of resource allocation device, which is characterized in that including:
Configuration module for dividing user gradation for the user in terminal, and configures the corresponding right to use for each user gradation Limit;
Tactful determining module determines the resource allocation policy to each user's space for the access right according to different user;
Resource allocation module, for according to the resource allocation policy, resource to be carried out to multiple user's spaces in the terminal Allotment.
9. a kind of terminal, including memory and processor, computer program, the computer program are stored in the memory When being executed by the processor so that the processor executes the resource allocation methods as described in any one of claim 1 to 7 The step of.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of resource allocation methods as described in any one of claim 1 to 7 are realized when being executed by processor.
CN201810316567.8A 2018-04-10 2018-04-10 Resource allocation methods and device, terminal, computer readable storage medium Pending CN108537027A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810316567.8A CN108537027A (en) 2018-04-10 2018-04-10 Resource allocation methods and device, terminal, computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810316567.8A CN108537027A (en) 2018-04-10 2018-04-10 Resource allocation methods and device, terminal, computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108537027A true CN108537027A (en) 2018-09-14

Family

ID=63479870

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810316567.8A Pending CN108537027A (en) 2018-04-10 2018-04-10 Resource allocation methods and device, terminal, computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108537027A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109656352A (en) * 2018-12-25 2019-04-19 杭州达现科技有限公司 A kind of fast resource exchange method and apparatus of display interface
CN109711193A (en) * 2018-12-24 2019-05-03 杭州达现科技有限公司 A kind of sharing method and device of memory space
CN111836133A (en) * 2020-07-16 2020-10-27 鸣飞伟业技术有限公司 Voice program-controlled exchange system
CN112422325A (en) * 2020-10-30 2021-02-26 蒋光洵 Management method and system based on multi-cloud mixed platform
US20210141913A1 (en) * 2019-11-12 2021-05-13 Accenture Global Solutions Limited System and Method for Management of Policies and User Data during Application Access Sessions

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103108082A (en) * 2013-01-24 2013-05-15 北京航空航天大学 Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN104516777A (en) * 2013-10-04 2015-04-15 三星电子株式会社 User interface management method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103108082A (en) * 2013-01-24 2013-05-15 北京航空航天大学 Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN104516777A (en) * 2013-10-04 2015-04-15 三星电子株式会社 User interface management method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711193A (en) * 2018-12-24 2019-05-03 杭州达现科技有限公司 A kind of sharing method and device of memory space
CN109711193B (en) * 2018-12-24 2021-03-19 杭州达现科技有限公司 Storage space sharing method and device
CN109656352A (en) * 2018-12-25 2019-04-19 杭州达现科技有限公司 A kind of fast resource exchange method and apparatus of display interface
US20210141913A1 (en) * 2019-11-12 2021-05-13 Accenture Global Solutions Limited System and Method for Management of Policies and User Data during Application Access Sessions
US11995214B2 (en) * 2019-11-12 2024-05-28 Accenture Global Solutions Limited System and method for management of policies and user data during application access sessions
CN111836133A (en) * 2020-07-16 2020-10-27 鸣飞伟业技术有限公司 Voice program-controlled exchange system
CN111836133B (en) * 2020-07-16 2022-03-01 鸣飞伟业技术有限公司 Voice program-controlled exchange system
CN112422325A (en) * 2020-10-30 2021-02-26 蒋光洵 Management method and system based on multi-cloud mixed platform

Similar Documents

Publication Publication Date Title
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN108537027A (en) Resource allocation methods and device, terminal, computer readable storage medium
US9864984B2 (en) Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US20180324166A1 (en) Presence-based credential updating
KR102302350B1 (en) Method and apparatus for providing the security function
CN112491783B (en) User authentication confidence based on multiple devices
CN108521494B (en) Terminal control method and device, readable storage medium and terminal
KR102347827B1 (en) Apparatus and method for secure message transmission
CN104516777A (en) User interface management method and system
US10242167B2 (en) Method for user authentication and electronic device implementing the same
US9891969B2 (en) Method and apparatus for device state based encryption key
CN105960774A (en) Near field communication authentication mechanism
CN104901805B (en) A kind of identification authentication methods, devices and systems
WO2018000370A1 (en) Mobile terminal authentication method and mobile terminal
CN107437009A (en) Authority control method and related product
CN106778130A (en) A kind of display methods of message, display device and mobile terminal
WO2019196693A1 (en) Application control method and device, readable storage medium and terminal
CN108616652A (en) Data guard method and device, terminal, computer readable storage medium
US20190026452A1 (en) Method for Associating Application Program with Biometric Feature, Apparatus, and Mobile Terminal
CN110198301A (en) A kind of service data acquisition methods, device and equipment
CN110941821A (en) Data processing method, device and storage medium
CN107395880A (en) Method for information display, device and terminal
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN105830502B (en) Method and apparatus in intelligent home system for searching for and controlling controlled person
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180914