CN108833690A - authority control method, terminal and computer readable storage medium - Google Patents
authority control method, terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN108833690A CN108833690A CN201810547011.XA CN201810547011A CN108833690A CN 108833690 A CN108833690 A CN 108833690A CN 201810547011 A CN201810547011 A CN 201810547011A CN 108833690 A CN108833690 A CN 108833690A
- Authority
- CN
- China
- Prior art keywords
- application program
- type
- source
- information
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000005516 engineering process Methods 0.000 abstract description 9
- 230000006870 function Effects 0.000 description 17
- 230000006854 communication Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 12
- 238000004891 communication Methods 0.000 description 11
- 238000012545 processing Methods 0.000 description 8
- 238000009434 installation Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 3
- 238000004513 sizing Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000005764 inhibitory process Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011217 control strategy Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000001404 mediated effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 238000009527 percussion Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 239000011800 void material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- Technology Law (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of authority control method, terminal and computer readable storage mediums.The method includes:The authority request in application program installation or operational process is detected, the authority request is parsed;If the authority request is matched with preset target permissions list, the operating status and attribute information of the application program are obtained;The use information in the source-information and preset time period of the application program is obtained according to the attribute information of the application program;According to the operation state, source-information and use information determine the type of the application program;Determined whether to open the authority request according to the type of the application program.Require that user is open-minded manually relative to all permissions in the related technology, the management-control method Automatic sieve that the embodiment of the present invention proposes selects the authority request that can be opened or not open, while giving the certain right to choose of user, more intelligent, humanized.
Description
Technical field
The present invention relates to the authority control methods of field of mobile terminals more particularly to a kind of mobile terminal and computer-readable
Storage medium.
Background technique
Currently, can all have various permissions in smart phone, such as:The power of camera permission, address list, phone etc.
Limit needs user dynamically to authorize it when application is needed using these permissions, and otherwise application will be unable to using this to arrange
Apply the protection for increasing cell phone system to privacy of user.
But in reality often, all permissions require user and authorize manually, and user can't go through this
The particular content of a little application program institutes request permissions, will all authorize, the authority request for needing to pay attention to is ignored, and causes end
The security risk at end.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill
Art.
Summary of the invention
It is a primary object of the present invention to propose a kind of authority control method, terminal and computer readable storage medium, purport
The authority request in solving the problems, such as application program installation or operational process.
To achieve the above object, first aspect of the embodiment of the present invention proposes a kind of authority control method, the authority managing and controlling
Method includes:
The authority request in application program installation or operational process is detected, the authority request is parsed;
If the authority request is matched with preset target permissions list, obtain the operating status of the application program with
And attribute information;
It is obtained in source-information and the preset time period of the application program according to the attribute information of the application program
Use information;
According to the operation state, source-information and use information determine the type of the application program;
Determined whether to open the authority request according to the type of the application program.
Optionally, determine whether that the step of opening the authority request includes according to the type of the application program:
If the type of the application program is safety-type application program, the authority request is opened;
If the type of the application program is undetermined type application program, in current interface setting virtual area to receive use
Family instruction, opens according to the user instruction or does not open the authority request;
If the type of the application program is nonsafety application program, the authority request is not opened.
Optionally, it if the type of the application program is undetermined type application program, is used in current interface setting virtual area
To receive user instructions, the step of opening the authority request according to the user instruction, includes:
Opening the authority request according to the user instruction, effective or single is effective within a preset time.
Optionally, the source-information of the application program includes official source, third party source and unknown source.
Optionally, the use information in the preset time includes after opening the authority request, when described default
In, the opening number of the application program, access times and use duration.
Optionally, the operating status of the application program includes front stage operation and running background.
Optionally, according to the operation state, source-information and use information determine the type of the application program
Step includes:
If the operating status of the application program is front stage operation, and the source-information of the application program is answered for official
With then the type of the application program is safety-type application program;
If the operating status of the application program is front stage operation, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is undetermined type application program;
If the operating status of the application program is running background, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is nonsafety application program;
If the operating status of the application program is running background, and the source-information of the application program comes for official
Source, then the type of the application program is undetermined type application program.
Optionally, according to the operation state, source-information and use information determine the type of the application program
Step further includes:
If the operating status of the application program is front stage operation, and the source-information of the application program is third party
Source and unknown source, when the application program use information be more than preset threshold, then the type of the application program by
Sizing application program is converted into safety-type application program;
If the operating status of the application program is running background, and the source-information of the application program comes for official
Source, then the type of the application program be undetermined type application program, when the application program use information be more than preset threshold,
Then the type of the application program is converted into safety-type application program by undetermined type application program.
In addition, to achieve the above object, second aspect of the present invention also provides a kind of terminal, the terminal includes:Memory,
Processor and it is stored in the authority managing and controlling program that can be run on the memory and on the processor, the authority managing and controlling journey
The step of sequence realizes authority control method as described above when being executed by the processor.
Third aspect present invention also provides a kind of computer readable storage medium, deposits on the computer readable storage medium
Authority managing and controlling program is contained, is realized when the authority managing and controlling program is executed by processor weighed the authority control method as described in going up
Step.
Implement the embodiment of the present invention, has the advantages that:
A kind of authority control method, terminal and the computer readable storage medium that the embodiment of the present invention proposes.Applying journey
In sequence installation or operational process, when detecting authority request, terminal can operating status according to application program, source-information
And use information determines the type of the application program, and for safety-type application program, undetermined type application program and non-security
Property application program, takes corresponding authority managing and controlling strategy.It is open-minded manually that user is required relative to all permissions in the related technology,
The management-control method Automatic sieve that the embodiment of the present invention proposes selects the authority request that can be opened or not open, while giving user
Certain right to choose, it is more intelligent, humanized.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of hardware structural diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of the wireless communication system of mobile terminal provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of authority control method one embodiment of the present invention;
Fig. 4 is to prompt and receive user instructions virtual area schematic diagram in one embodiment of the invention;
Fig. 5 is the block diagram according to the mobile terminal of one embodiment of the present of invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, be conducive to using the suffix for indicating such as " module ", " component " or " unit " of element
Explanation of the invention itself does not have specific meaning.Therefore, " module ", " component " or " unit " can be used mixedly.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move
The fixed terminals such as dynamic terminal, and number TV, desktop computer.It will be said by taking mobile terminal as an example in subsequent descriptions
It is bright, it will be appreciated by those skilled in the art that other than the element for being used in particular for mobile purpose, embodiment party according to the present invention
The construction of formula can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,
Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need
It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or
The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103
Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model.
Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc.
It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system
System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection
Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 is with can providing the IP of UE201
Location distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
Embodiment one
It is the flow diagram of authority control method first embodiment of the present invention referring to Fig. 3, Fig. 3.The authority control method
Include the following steps S301-S305.
In step S301, the authority request in application program installation or operational process is detected, the authority request is parsed;
Specifically, user is installing or running some application program, which can issue corresponding authority request
To guarantee the realization of application program corresponding function, such as when obtaining image, application program needs to request to Image Acquisition
Device is usually camera in mobile terminal, that just needs to transfer camera permission.When the permission for detecting application program sending is asked
After asking, the authority request is parsed, analyzes the requested specific object of the authority request, the hardware device being related to, and be somebody's turn to do
Permission wants the function of realizing.
In step s 302, it if the authority request is matched with preset target permissions list, obtains described using journey
The operating status and attribute information of sequence;
Specifically, the preset target permissions list is application developer setting, it is linked to the application program
It is internal;The preset target permissions list can also be user's self-setting, and the permission for permitting opening is saved as target permission in advance
List is stored in terminal database.When the requested permission of the application program and preset destination application list match, then
Obtain the operating status and attribute information of the application program.In this embodiment, the operating status of the application program
Including front stage operation and running background.The attribute information of the application program, the attribute letter of the application program are transferred to server
Breath includes Application Type, source-information, use information, starting object and program and information etc..
In step S303, according to the attribute information of the application program obtain the application program source-information and
Use information in preset time period;
According to the attribute information of the application program, extract the wherein source-information of the application program and it is default when
Between use information in section;The preset time can be accustomed to sets itself according to user, can also be by default.
The source-information of the application program includes official source, third party source and unknown source, applies journey when described
The source-information of sequence is official source, such as the source of QQ is what official of Tencent provided, while also having the certification using store, can
It is relatively high by property;When the source of application program is third party source or unknown source, the reliability of this kind of application program is lower,
It is likely to be virus.Use information in the preset time includes after opening the authority request, when described default
In, the opening number of the application program, access times and use duration.After authority request is opened, in preset time
Interior, user repeatedly opens the application program, or the application program is used for multiple times, and reaches certain threshold value using duration, then
Think that user permits the application program using the authority request, the application program is in the safe range of user.
In step s 304, according to the operation state, source-information and use information determine the application program
Type;
The type of the application program includes safety-type application program, undetermined type application program and nonsafety application journey
Sequence takes the control strategy of different authority requests for different application types.
If the operating status of the application program is front stage operation, and the source-information of the application program is answered for official
With then the type of the application program is safety-type application program;
If the operating status of the application program is front stage operation, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is undetermined type application program;
If the operating status of the application program is running background, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is nonsafety application program;
If the operating status of the application program is running background, and the source-information of the application program comes for official
Source, then the type of the application program is undetermined type application program.
In step S305, determined whether to open the authority request according to the type of the application program.
Specifically, opening the authority request if the type of the application program is safety-type application program;
If the type of the application program is undetermined type application program, in current interface setting virtual area to receive use
Family instruction, opens according to the user instruction or does not open the authority request;
If the type of the application program is nonsafety application program, the authority request is not opened.
In order to make it easy to understand, for example.If the operating status of the application program is front stage operation, and the application
The source-information of program is official's application, then the type of the application program is safety-type application program, such as current interface is transported
Row QQ requests the permission about camera, then it is assumed that QQ is safety-type application, opens the request about camera permission.
If if the operating status of the application program be running background when, and the source-information of the application program be official
Fang Laiyuan, then the type of the application program is undetermined type application program, such as QQ in running background, requests the power of camera at this time
Limit, and QQ not will use camera permission from the background, then it is assumed that QQ is undetermined type application, need to be for the open-minded of camera permission
A virtual area is arranged in current interface, and referring to Fig. 4, Fig. 4 is to prompt and receive user instructions in one embodiment of the invention virtually
Area's schematic diagram.The virtual area is used to prompt user and receive user instructions, and optionally, the virtual area can be translucent
Rectangle suspended frame is suspended in current interface, and area size, the region shape, region of the virtual area are not limited in the present embodiment
Attribute etc., issuing prompt, " QQ is needing to request camera permission, yes/no from the background?" printed words, receive user instructions simultaneously, when with
Family selects "Yes", then opens camera permission, otherwise, QQ is forbidden to open camera permission from the background.If the operation of the application program
State be front stage operation when, and the source-information of the application program be third party source and unknown source, then it is described apply journey
The type of sequence is undetermined type application program, such as when third party provides QQ software and opens video, can beautify video
The plug-in unit of object, when QQ is in front stage operation, this plug-in request camera permission, QQ is considered as undetermined type application at this time, equally
In current interface, one virtual area is set, the virtual area is used to prompt user and receive user instructions, optionally, the virtual area
It can be translucent rectangle suspended frame and be suspended in current interface, the region that the virtual area is not limited in the present embodiment is big
Small, region shape, area attribute etc., issuing prompt, " QQ is needing to request camera permission, yes/no from the background?" printed words, simultaneously
It receives user instructions, when user's selection "Yes", then opens camera permission, otherwise, QQ is forbidden to open camera permission from the background.
If the operating status of the application program is running background, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is nonsafety application program.For example, QQ is in running background, still
Its source not instead of Tencent, some third party source or unknown unknown source, QQ is considered non-security at this time
The authority request of the QQ is not opened in type application then.
The present embodiment proposes a kind of authority control method.The method includes:The installation of detecting application program was run
Authority request in journey parses the authority request;If the authority request is matched with preset target permissions list, obtain
The operating status and attribute information of the application program;The application program is obtained according to the attribute information of the application program
Source-information and preset time period in use information;According to the operation state, source-information and use information are true
The type of the fixed application program;Determined whether to open the authority request according to the type of the application program.Relative to phase
All permissions require that user is open-minded manually in the technology of pass, and the management-control method Automatic sieve that the embodiment of the present invention proposes is selected and can be opened
Authority request that is logical or not opening, while the certain right to choose of user is given, it is more intelligent, humanized.
Embodiment two
Further, on the basis of authority control method first embodiment of the present invention, authority control method second is proposed
Embodiment, the difference between the second embodiment and first embodiment are, in step s 304, according to the operation shape
State, source-information and use information determine the type of the application program, further include:
If the operating status of the application program is front stage operation, and the source-information of the application program is third party
Source and unknown source, when the application program use information be more than preset threshold, then the type of the application program by
Sizing application program is converted into safety-type application program;
If the operating status of the application program is running background, and the source-information of the application program comes for official
Source, then the type of the application program be undetermined type application program, when the application program use information be more than preset threshold,
Then the type of the application program is converted into safety-type application program by undetermined type application program.
Use information in the preset time includes after opening the authority request, in the preset time, institute
It states the opening number of application program, access times and uses duration.After authority request is opened, within a preset time, user
The application program is repeatedly opened, or the application program is used for multiple times, and reaches certain threshold value using duration, then it is assumed that user
Permit the application program using the authority request, the requested permission of the application program is in the safe range of user.Default
In time, the opening number of the application program is more than the first preset threshold, and/or, access times are more than the second preset threshold,
And/or using duration more than third predetermined threshold value, which is converted into safety-type using journey by undetermined type application program
Sequence, then it is assumed that user permits the application program using the authority request, opens the authority request automatically.The first default threshold
Value, the second preset threshold and third predetermined threshold value are by default.
In order to make it easy to understand, lifting following example.If if when the operating status of the application program were running background, and institute
The source-information for stating application program is official source, then the type of the application program is undetermined type application program, such as QQ exists
Running background requests the permission of camera at this time, and QQ not will use camera permission from the background, then it is assumed that QQ is that undetermined type is answered
With, it, need to be in one virtual area of current interface setting for the open-minded of camera permission, referring to Fig. 4, Fig. 4 is one embodiment of the invention
It is middle to prompt and receive user instructions virtual area schematic diagram.The virtual area is used to prompt user and receive user instructions, optional
, the virtual area can be translucent rectangle suspended frame and be suspended in current interface, not limit the void in the present embodiment
Area size, region shape, the area attribute etc. in quasi- area, issuing prompt, " QQ is needing to request camera permission, yes/no from the background?"
Printed words, receive user instructions simultaneously, when user select "Yes", then open camera permission, otherwise, QQ forbidden to open phase from the background
Machine permission.Within a preset time, such as in a hour, QQ requests the permission of camera in running background at this time, and QQ is on backstage
Camera permission is not will use, then it is assumed that QQ is undetermined type application, for the open-minded of camera permission, need to be arranged one in current interface
Virtual area, issuing prompt, " QQ is needing to request camera permission, yes/no from the background?" printed words, receive user instructions simultaneously, when with
Family selects "Yes", the use of duration is more than third threshold value (half an hour).QQ is converted into safety-type by undetermined type application program at this time
Application program opens its authority request when requesting camera permission again automatically.
If the operating status of the application program is front stage operation, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is undetermined type application program, such as to provide a QQ soft by third party
When part opens video, the plug-in unit of the video object can be beautified, when QQ is in front stage operation, this plug-in request camera permission, this
When QQ be considered as undetermined type application, equally current interface be arranged a virtual area, the virtual area be used to prompt user and connect
User instruction is received, optionally, the virtual area can be translucent rectangle suspended frame and be suspended in current interface, in the present embodiment
Area size, region shape, the area attribute etc. of the virtual area are not limited, issuing prompt, " QQ is needing to request phase from the background
Machine permission, yes/no?" printed words, receive user instructions simultaneously, when user select "Yes", request number of times 20 times more than first
Threshold value (15 times).QQ is converted into safety-type application program by undetermined type application program at this time, when requesting camera permission again, from
It is dynamic to open its authority request.
The present embodiment proposes a kind of authority control method.The method provides a kind of type of application program by undetermined
Type application program is converted into the scheme of safety-type application program, requires user relative to all permissions in the related technology and opens manually
Logical, the management-control method Automatic sieve that the embodiment of the present invention proposes selects the authority request that can be opened or not open, and gives simultaneously
The certain right to choose of user, it is more intelligent, humanized.
Embodiment three
Further, the 3rd embodiment of authority control method of the present invention is proposed based on the above embodiment, referring to Fig. 5,
Fig. 5 show a kind of block diagram of mobile terminal provided in an embodiment of the present invention, those of ordinary skill in the art will appreciate that realizing
The all or part of step of above-described embodiment method is can be completed by the relevant hardware of at least one program instruction, institute
Stating at least one program can store in the memory 501 of server 500 as shown in Figure 5, and being capable of the processor 502
It executes, when at least one described program is executed by the processor 502, realizes each step such as authority control method in embodiment one
Suddenly:
The authority request in application program installation or operational process is detected, the authority request is parsed;
If the authority request is matched with preset target permissions list, obtain the operating status of the application program with
And attribute information;
It is obtained in source-information and the preset time period of the application program according to the attribute information of the application program
Use information;
According to the operation state, source-information and use information determine the type of the application program;
Determined whether to open the authority request according to the type of the application program.
Optionally, the processor 502 determines whether to open the authority request according to the type of the application program
Step includes:
If the type of the application program is safety-type application program, the authority request is opened;
If the type of the application program is undetermined type application program, in current interface setting virtual area to receive use
Family instruction, opens according to the user instruction or does not open the authority request;
If the type of the application program is nonsafety application program, the authority request is not opened.
Optionally, if the type of the application program is undetermined type application program, the processor 502 is in current interface
Virtual area is set to receive user instructions, the step of opening the authority request according to the user instruction includes:
Opening the authority request according to the user instruction, effective or single is effective within a preset time.
Optionally, the source-information of the application program includes official source, third party source and unknown source.
Optionally, the use information in the preset time includes after opening the authority request, when described default
In, the opening number of the application program, access times and use duration.
Optionally, the operating status of the application program includes front stage operation and running background.
Optionally, the processor 502 according to the operation state, source-information and use information determine the application
The step of type of program includes:
If the operating status of the application program is front stage operation, and the source-information of the application program is answered for official
With then the type of the application program is safety-type application program;
If the operating status of the application program is front stage operation, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is undetermined type application program;
If the operating status of the application program is running background, and the source-information of the application program is third party
Source and unknown source, then the type of the application program is nonsafety application program;
If the operating status of the application program is running background, and the source-information of the application program comes for official
Source, then the type of the application program is undetermined type application program.
Optionally, the processor 502 according to the operation state, source-information and use information determine the application
The step of type of program further includes:
If the operating status of the application program is front stage operation, and the source-information of the application program is third party
Source and unknown source, when the application program use information be more than preset threshold, then the type of the application program by
Sizing application program is converted into safety-type application program;
If the operating status of the application program is running background, and the source-information of the application program comes for official
Source, then the type of the application program be undetermined type application program, when the application program use information be more than preset threshold,
Then the type of the application program is converted into safety-type application program by undetermined type application program.
Mobile terminal provided in this embodiment passes through the authority request in the installation of detecting application program or operational process, solution
Analyse the authority request;If the authority request is matched with preset target permissions list, the fortune of the application program is obtained
Row state and attribute information;The source-information of the application program and pre- is obtained according to the attribute information of the application program
If the use information in the period;According to the operation state, source-information and use information determine the application program
Type;Determined whether to open the authority request according to the type of the application program.Relative to all permissions in the related technology
Require that user is open-minded manually, the mobile terminal that the embodiment of the present invention proposes can Automatic sieve select and can open or not open-minded
Authority request, while giving the certain right to choose of user, it is more intelligent, humanized.
The specific embodiment of mobile terminal of the present invention and each specific embodiment of above-mentioned authority control method are essentially identical,
This is not repeated.
The present invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage has one
Perhaps more than one program the one or more programs can also be executed by one or more than one processor with
For:
The authority request in application program installation or operational process is detected, the authority request is parsed;
If the authority request is matched with preset target permissions list, obtain the operating status of the application program with
And attribute information;
It is obtained in source-information and the preset time period of the application program according to the attribute information of the application program
Use information;
According to the operation state, source-information and use information determine the type of the application program;
Determined whether to open the authority request according to the type of the application program.
Computer readable storage medium specific embodiment of the present invention and above-mentioned authority control method and each reality of mobile terminal
It is essentially identical to apply example, details are not described herein.
Computer readable storage medium provided in this embodiment passes through the power in the installation of detecting application program or operational process
Limit request, parses the authority request;If the authority request is matched with preset target permissions list, the application is obtained
The operating status and attribute information of program;The source letter of the application program is obtained according to the attribute information of the application program
Use information in breath and preset time period;According to the operation state, it is answered described in source-information and use information determination
With the type of program;Determined whether to open the authority request according to the type of the application program.Relative in the related technology
All permissions require that user is open-minded manually, the computer readable storage medium that the embodiment of the present invention proposes can Automatic sieve select
The authority request that can be opened or not open, while the certain right to choose of user is given, it is more intelligent, humanized.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of authority control method, it is applied to terminal, which is characterized in that the authority control method includes:
The authority request in application program installation or operational process is detected, the authority request is parsed;
If the authority request is matched with preset target permissions list, the operating status and category of the application program are obtained
Property information;
Being obtained in the source-information and preset time period of the application program according to the attribute information of the application program makes
Use information;
According to the operation state, source-information and use information determine the type of the application program;
Determined whether to open the authority request according to the type of the application program.
2. authority control method as described in claim 1, which is characterized in that determined whether according to the type of the application program
The step of opening the authority request include:
If the type of the application program is safety-type application program, the authority request is opened;
If the type of the application program is undetermined type application program, refer in current interface setting virtual area to receive user
It enables, the authority request is opened or do not opened according to the user instruction;
If the type of the application program is nonsafety application program, the authority request is not opened.
3. authority control method as claimed in claim 2, which is characterized in that if the type of the application program is answered for undetermined type
With program, then the permission is opened according to the user instruction and is asked to receive user instructions in current interface setting virtual area
The step of asking include:
Opening the authority request according to the user instruction, effective or single is effective within a preset time.
4. authority control method as described in claim 1, which is characterized in that the source-information of the application program includes official
Source, third party source and unknown source.
5. authority control method as claimed in claim 4, which is characterized in that the use information in the preset time includes opening
Lead to after the authority request, in the preset time, the opening number of the application program, access times and when using
It is long.
6. authority control method as claimed in claim 5, which is characterized in that the operating status of the application program includes foreground
Operation and running background.
7. terminal as claimed in claim 6, which is characterized in that according to the operation state, source-information and use information
The step of determining the type of the application program include:
If the operating status of the application program is front stage operation, and the source-information of the application program is official's application,
Then the type of the application program is safety-type application program;
If the operating status of the application program is front stage operation, and the source-information of the application program is third party source
With unknown source, then the type of the application program is undetermined type application program;
If the operating status of the application program is running background, and the source-information of the application program is third party source
With unknown source, then the type of the application program is nonsafety application program;
If the operating status of the application program is running background, and the source-information of the application program is official source,
Then the type of the application program is undetermined type application program.
8. terminal as claimed in claim 6, which is characterized in that according to the operation state, source-information and use information
The step of determining the type of the application program further include:
If the operating status of the application program is front stage operation, and the source-information of the application program is third party source
With unknown source, when the use information of the application program is more than preset threshold, then the type of the application program is by undetermined type
Application program is converted into safety-type application program;
If the operating status of the application program is running background, and the source-information of the application program is official source,
Then the type of the application program be undetermined type application program, when the application program use information be more than preset threshold, then
The type of the application program is converted into safety-type application program by undetermined type application program.
9. a kind of terminal, which is characterized in that the terminal includes:It memory, processor and is stored on the memory and can
The authority managing and controlling program run on the processor realizes such as right when the authority managing and controlling program is executed by the processor
It is required that the step of authority control method described in any one of 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that storage has permission pipe on the computer readable storage medium
Program is controlled, such as authority managing and controlling described in any item of the claim 1 to 8 is realized when the authority managing and controlling program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810547011.XA CN108833690B (en) | 2018-05-31 | 2018-05-31 | Authority control method, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810547011.XA CN108833690B (en) | 2018-05-31 | 2018-05-31 | Authority control method, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108833690A true CN108833690A (en) | 2018-11-16 |
CN108833690B CN108833690B (en) | 2021-11-16 |
Family
ID=64145226
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810547011.XA Active CN108833690B (en) | 2018-05-31 | 2018-05-31 | Authority control method, terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833690B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815679A (en) * | 2018-12-26 | 2019-05-28 | 维沃移动通信有限公司 | Right management method and mobile terminal |
CN110188520A (en) * | 2019-05-29 | 2019-08-30 | 维沃移动通信有限公司 | A kind of right management method and mobile terminal of application |
CN110191465A (en) * | 2019-06-03 | 2019-08-30 | 努比亚技术有限公司 | Authority control method, mobile terminal and computer readable storage medium |
CN110275835A (en) * | 2019-06-25 | 2019-09-24 | 努比亚技术有限公司 | Permission prompting interface adding method, device and computer readable storage medium |
CN110995929A (en) * | 2019-12-05 | 2020-04-10 | 北京小米移动软件有限公司 | Terminal control method, device, terminal and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
CN102186167A (en) * | 2011-04-11 | 2011-09-14 | 中兴通讯股份有限公司 | Method and system for monitoring applications |
CN103020515A (en) * | 2012-12-26 | 2013-04-03 | 中国人民解放军国防科学技术大学 | Application program execution permission control method for operating system |
CN103049692A (en) * | 2012-11-19 | 2013-04-17 | 北京小米科技有限责任公司 | Application installation method, device and facility |
CN104766005A (en) * | 2015-04-15 | 2015-07-08 | 小米科技有限责任公司 | Management method and device for application software access authority |
US20150326655A1 (en) * | 2012-10-02 | 2015-11-12 | Nextbit Systems Inc. | In-app application casting |
US9336399B2 (en) * | 2014-04-21 | 2016-05-10 | International Business Machines Corporation | Information asset placer |
CN106886715A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | authority request response method and corresponding device |
CN106886711A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | authority request response method and corresponding device |
CN106934277A (en) * | 2015-12-30 | 2017-07-07 | 北京金山安全软件有限公司 | Application program detection method and device and terminal |
CN107103231A (en) * | 2017-03-29 | 2017-08-29 | 北京小米移动软件有限公司 | To application install the method and device of management |
-
2018
- 2018-05-31 CN CN201810547011.XA patent/CN108833690B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
CN102186167A (en) * | 2011-04-11 | 2011-09-14 | 中兴通讯股份有限公司 | Method and system for monitoring applications |
US20150326655A1 (en) * | 2012-10-02 | 2015-11-12 | Nextbit Systems Inc. | In-app application casting |
CN103049692A (en) * | 2012-11-19 | 2013-04-17 | 北京小米科技有限责任公司 | Application installation method, device and facility |
CN103020515A (en) * | 2012-12-26 | 2013-04-03 | 中国人民解放军国防科学技术大学 | Application program execution permission control method for operating system |
US9336399B2 (en) * | 2014-04-21 | 2016-05-10 | International Business Machines Corporation | Information asset placer |
CN104766005A (en) * | 2015-04-15 | 2015-07-08 | 小米科技有限责任公司 | Management method and device for application software access authority |
CN106886715A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | authority request response method and corresponding device |
CN106886711A (en) * | 2015-12-15 | 2017-06-23 | 北京奇虎科技有限公司 | authority request response method and corresponding device |
CN106934277A (en) * | 2015-12-30 | 2017-07-07 | 北京金山安全软件有限公司 | Application program detection method and device and terminal |
CN107103231A (en) * | 2017-03-29 | 2017-08-29 | 北京小米移动软件有限公司 | To application install the method and device of management |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815679A (en) * | 2018-12-26 | 2019-05-28 | 维沃移动通信有限公司 | Right management method and mobile terminal |
CN109815679B (en) * | 2018-12-26 | 2021-03-23 | 维沃移动通信有限公司 | Authority management method and mobile terminal |
CN110188520A (en) * | 2019-05-29 | 2019-08-30 | 维沃移动通信有限公司 | A kind of right management method and mobile terminal of application |
CN110191465A (en) * | 2019-06-03 | 2019-08-30 | 努比亚技术有限公司 | Authority control method, mobile terminal and computer readable storage medium |
CN110275835A (en) * | 2019-06-25 | 2019-09-24 | 努比亚技术有限公司 | Permission prompting interface adding method, device and computer readable storage medium |
CN110995929A (en) * | 2019-12-05 | 2020-04-10 | 北京小米移动软件有限公司 | Terminal control method, device, terminal and storage medium |
US11204779B2 (en) | 2019-12-05 | 2021-12-21 | Beijing Xiaomi Mobile Software Co., Ltd. | Terminal control method and apparatus, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108833690B (en) | 2021-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108536481A (en) | A kind of application program launching method, mobile terminal and computer storage media | |
CN109800602B (en) | Privacy protection method, mobile terminal and computer readable storage medium | |
CN108833690A (en) | authority control method, terminal and computer readable storage medium | |
CN108733811A (en) | A kind of file access method, terminal and computer readable storage medium | |
CN109151169A (en) | Camera right management method, mobile terminal and computer readable storage medium | |
CN107704766A (en) | Multimedia file access control method, terminal and computer-readable recording medium | |
CN110177177A (en) | Message back method, mobile terminal and computer readable storage medium | |
CN109660973A (en) | Bluetooth control method, mobile terminal and storage medium | |
CN109324730A (en) | Shortcut generation method, terminal and computer readable storage medium | |
CN110191465A (en) | Authority control method, mobile terminal and computer readable storage medium | |
CN109543474A (en) | A kind of method for controlling mobile terminal and mobile terminal | |
CN108829302A (en) | A kind of interaction regulation method, equipment and computer readable storage medium | |
CN110418004A (en) | Screenshot processing method, terminal and computer readable storage medium | |
CN110086925A (en) | A kind of application processing method and mobile terminal | |
CN110347306A (en) | A kind of multi-screen display method, terminal and computer readable storage medium | |
CN109672843A (en) | Video communication method, terminal and computer readable storage medium | |
CN109889651A (en) | A kind of notification message processing method, terminal and computer readable storage medium | |
CN109522276A (en) | Application icon management method, terminal and computer readable storage medium | |
CN109167882A (en) | A kind of association starting control method, terminal and computer readable storage medium | |
CN109948368A (en) | A kind of privacy authority control method, equipment and computer readable storage medium | |
CN110187934A (en) | Application control method, terminal and computer readable storage medium | |
CN110083294A (en) | Screen interception method, terminal and computer readable storage medium | |
CN109683796A (en) | A kind of interaction control method, equipment and computer readable storage medium | |
CN109711198A (en) | Application management method, mobile terminal and storage medium | |
CN109409081A (en) | A kind of authority setting method, mobile terminal and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |