CN109886012B - Application authority management method and system - Google Patents

Application authority management method and system Download PDF

Info

Publication number
CN109886012B
CN109886012B CN201910003540.8A CN201910003540A CN109886012B CN 109886012 B CN109886012 B CN 109886012B CN 201910003540 A CN201910003540 A CN 201910003540A CN 109886012 B CN109886012 B CN 109886012B
Authority
CN
China
Prior art keywords
application
type
user
contact
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910003540.8A
Other languages
Chinese (zh)
Other versions
CN109886012A (en
Inventor
吴亦舜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910003540.8A priority Critical patent/CN109886012B/en
Publication of CN109886012A publication Critical patent/CN109886012A/en
Application granted granted Critical
Publication of CN109886012B publication Critical patent/CN109886012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a management method and a management system for application permission. The method comprises the following steps: when detecting that an application program or a functional module in the application program is installed, displaying an interface to be opened with a first type of application permission; sending a received request for starting the first-class application permission of the user to a server corresponding to an application program so that the server analyzes the call record of the user; responding to an analysis result returned by the server, and displaying a guide interface to guide a user to open the second type of application permission; the first type of application authority is a basic authority for realizing the incoming call protection function, and the second type of application authority is an expansion authority for realizing the incoming call protection function. Through the displayed analysis result, the user can timely and effectively perceive the degree of the demand of the user on the incoming call protection function. The corresponding function after the application permission is opened can be timely and effectively fed back and presented to the user, and the enthusiasm of the user for experiencing the corresponding function in the application program is improved.

Description

Application authority management method and system
Technical Field
The invention relates to the technical field of internet communication, in particular to a method and a system for managing application permission.
Background
When a user uses terminal equipment to carry out convenient and quick communication, harassing calls and the like are also generated, and the communication experience of the user is influenced by the harassing calls and the like. With the rapid development of internet communication technology, applications (APPs) installed in terminal devices can identify nuisance calls and so on, and prompt users. The application program realizes the identification of crank calls and the like by utilizing the acquired application authority.
However, the user does not have a strong sense of granting the corresponding application rights to the application. Wherein some application permissions are authorized by default when the application is installed; or, some application authorities cannot present their roles to the user timely and effectively after being authorized by the user. These all affect the user's experience of authorizing application rights when using an application.
Disclosure of Invention
In order to solve the problems that the corresponding function applied to the application authority after being started in the prior art cannot be timely and effectively fed back and presented to a user, and the enthusiasm of the user for experiencing the corresponding function in an application program is influenced, the invention provides a management method and a management system of the application authority, wherein the management method comprises the following steps:
in one aspect, the present invention provides a method for managing application permissions, where the method includes:
when detecting that an application program or a functional module in the application program is installed, displaying an interface to be opened with a first type of application permission;
sending the received request of the user for opening the first type of application permission to a server corresponding to the application program so that the server analyzes the call record of the user;
responding to an analysis result returned by the server, and displaying a guide interface to guide a user to open the second type of application permission;
the first type of application authority is a basic authority for realizing the incoming call protection function, and the second type of application authority is an expansion authority for realizing the incoming call protection function.
On the other hand, a management system of application permissions is provided, the system includes a client corresponding to an application program and a server corresponding to the application program, the client includes:
a detection module: the interface to be opened is used for displaying the first type of application permission when the application program or the functional module in the application program is detected to be installed;
a sending module: the server is used for sending the received request of the user for opening the first type of application permission to a server corresponding to the application program so as to enable the server to analyze the call record of the user;
a guiding module: the server side is used for responding to the analysis result returned by the server side and displaying a guide interface to guide a user to open the second type of application permission;
the first type of application authority is a basic authority for realizing the incoming call protection function, and the second type of application authority is an expansion authority for realizing the incoming call protection function.
Another aspect provides a service end for managing application permissions, where the service end includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or a set of instructions, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by the processor to implement the management method for application permissions as described above.
Another aspect provides a computer readable storage medium having stored therein at least one instruction, at least one program, set of codes or set of instructions, which is loaded and executed by a processor to implement the method of managing application rights as described above.
The management method and the system for the application authority provided by the invention have the following technical effects:
after the user opens the basic authority related to the incoming call protection function, the server analyzes the call record of the user through the authorization authority, and the client displays the analysis result to the user to guide the user to open the expansion authority related to the incoming call protection function. Through the displayed analysis result, the user can timely and effectively sense the degree of the demand of the user on the incoming call protection function, and therefore whether the expansion permission is opened or not is judged. When the application program or the functional module in the application program is installed, the corresponding function after the application authority is opened can be timely and effectively fed back and presented to the user, the enthusiasm of the user for experiencing the corresponding function in the application program is improved, and the user viscosity of the application program is enhanced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions and advantages of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of an application environment provided by an embodiment of the invention;
fig. 2 is a flowchart illustrating a method for managing application permissions according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a process of sending a received request for opening the first type of application permission from a user to a server corresponding to the application program according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of a process in which the server matches the contact number according to a preset number stored in the database according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of a process of displaying a guidance interface to guide a user to open the second type of application permission in response to an analysis result returned by the server according to the embodiment of the present invention;
6-9 are schematic diagrams of UI interfaces obtained by applying the embodiment of the invention respectively;
FIG. 10 is a block diagram of an application rights management system according to an embodiment of the present invention;
fig. 11 is a block diagram of a server according to an embodiment of the present invention;
FIG. 12 is a block diagram of a boot module according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of this invention and the above-described drawings are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or service that comprises a list of steps or elements is not necessarily limited to those steps or elements explicitly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or service.
Referring to fig. 1, fig. 1 is a schematic diagram of an application environment according to an embodiment of the present invention, as shown in fig. 1, when a user installs a relevant application on a terminal device in the application environment, or when the user installs a function module in an application, a client corresponding to the application shows a to-be-opened interface (an interface shown on the left side of fig. 1) of a first type of application permission to the user; when a user clicks a corresponding position in an interface, a client sends a received request for opening the first type of application permission of the user to a server so that the server analyzes a call record of the user; and the client receives the analysis result returned by the server and displays a guide interface (such as an interface shown on the right side of the figure 1) to guide the user to open the second type of application permission. The first type of application permission is a basic permission for realizing the incoming call protection function, and the second type of application permission is an expansion permission for realizing the incoming call protection function. When the client requests the right of starting the incoming call protection function from the user, the client classifies the right to be requested, first requests the first type of application right from the user, and displays an analysis result and requests the second type of application right from the user based on the analysis and display of the call record by the server through the authorization of the user to the first type of application right. The invention provides a requirement perception scene for opening the second type of application authority for the user, and the user can timely and effectively perceive the requirement degree of the user on the incoming call protection function through the analysis result. It should be noted that fig. 1 is only an example.
In the embodiment of the invention, the first type of application authority comprises a call record access authority; or the first type of application authority comprises call record access authority and address book access authority. The second type of application permission comprises a telephone permission, a floating window permission and a self-starting resident permission. Specifically, the access authority of the call record is as follows: including historical call log access permissions, allowing applications (or functional modules within applications) to obtain, query, and identify which of the contact numbers in the user's call log are nuisance calls, etc. The address book access authority: the application program (or the functional module in the application program) is allowed to access the address book, and the incoming call of the address book can be distinguished. Telephone authority: the application (or a function module in the application) is allowed to listen to the phone to capture incoming events. Suspension window permission: and allowing the application program (or a functional module in the application program) to present a floating window of the incoming call prompt on an interface of the terminal equipment, and giving a telephone type display through the floating window authority under the condition of locking the screen. The self-starting resident authority comprises a self-starting authority and a survival authority, the self-starting resident authority is used for preventing the corresponding process from being terminated, and the self-starting authority allows the process to be restarted after being terminated; the survival authority ensures that the process is not terminated, and is sometimes called as a background protection authority.
In the embodiment of the present invention, the terminal device includes, but is not limited to, a smart phone, a smart wearable device, and a PDA (tablet computer).
In practical application, the user can start the first type of application permission and/or the second type of application permission on the interface of the terminal device by clicking a corresponding position in the interface, and certainly can also trigger through a gesture sliding track, a head action (detection of a camera module of the terminal device), and the like.
The following describes a specific embodiment of a method for managing application rights, and fig. 2 is a flowchart illustrating a method for managing application rights according to an embodiment of the present invention, where the method operation steps described in the embodiment or the flowchart are provided in this specification, but more or fewer operation steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of sequences, and does not represent a unique order of performance. In practice, the system or server products may be executed sequentially or in parallel according to the methods shown in the embodiments or figures (for example, in the context of parallel processors or multi-threaded processing). Specifically, as shown in fig. 2, the method may include:
s201: when detecting that an application program or a functional module in the application program is installed, displaying an interface to be opened with a first type of application permission;
in the embodiment of the present invention, an application is installed on a terminal device (for example, an installation package corresponding to the application is installed for the first time), or a function module in the application is installed on the terminal device (for example, an incremental installation package corresponding to the function module is installed), and at this time, a client corresponding to the application displays an interface to be opened of a first type of application right (as shown in fig. 1 and fig. 6). Permissions are a restriction imposed on the access of code or data on the terminal device to prevent key code and data from being abused and causing a bad experience to the user. In order to realize the incoming call protection function, the application program is used as a party for demanding the authority, and the client requests the first type of application authority (such as call record access authority) from the user.
S202: sending the received request of the user for opening the first type of application permission to a server corresponding to the application program so that the server analyzes the call record of the user;
in this embodiment of the present invention, as shown in fig. 3, the step of sending the received request for opening the first type of application permission from the user to the server corresponding to the application program includes:
s301: reading the corresponding contact number in the call record;
specifically, when the user opens the call record access right, the application program is allowed to access the historical call record, the client corresponding to the application program reads the corresponding contact number (the number having a calling or called relationship with the number of the user) in the call record, and the client can read the corresponding contact number in the preset number of call records closest to the current time. The predetermined number here may be 30, 50, 100, etc. When the preset number is 50 and the number of the corresponding contact persons in the 50 call records repeatedly exceeds the preset value (for example, 10), the number of the call records with a proper amount can be read, so that the authenticity representation of the analysis result on the call records of the user is ensured, and the effective judgment of the user on the second type of application permission for opening the guide interface is realized. For example, before the application program is installed, the user communicates with the operator's phone (e.g., 10086) many times (e.g., 12 times) regarding the cost problem of the traffic, and then there are 10086 duplicates when reading 50 call records closest to the current time, so that an appropriate number of call records are read before according to the reverse order of time, thereby reducing the probability that the analysis result cannot be truly characterized due to the problem of the sample for performing the call record analysis, and simultaneously, not reading all the call records, improving the analysis speed, and ensuring that the client side can more timely and effectively present the analysis result. Of course, the number of call records read by the client is not limited to 50. The server can also read all call records.
S302: sending the contact number and a request for matching the contact number to the server;
and the client side sends the preset number of contact numbers read from the call records and a request for matching the contact numbers to the server side.
In the embodiment of the present invention, the step of analyzing the call record of the user by the server includes:
firstly, matching the contact number according to a preset number stored in a database;
specifically, the preset number at least comprises one of a yellow page (international general business enterprise telephone directory arranged according to enterprise properties and product categories), a house property intermediary telephone, a harassment telephone, a fraud telephone and an advertising promotion telephone. The five types of numbers may have an intersection, for example, company a may exist in both the yellow page type number and the real estate agency type number as the telephone number of the real estate agency company, and may also exist in the harassing type phone and/or the advertisement pushing type phone due to the user's mark. The corresponding number stored in the preset number may be newly added according to the mark of the user exceeding the preset value (for example, 50 times). The preset number can be stored in a cloud database, and the server corresponding to the application program uploads the contact number read from the call record to the cloud database so as to be matched.
As shown in fig. 4, the step of matching the contact number according to the preset number stored in the database includes:
s401: classifying the preset numbers according to the number length, the operator to which the numbers belong and the area code of the numbers;
the preset number may include a fixed telephone number, a mobile phone number, and the like. According to the number length, the fixed telephone number and the mobile phone number can be distinguished in a certain range. The fixed telephone number can be classified by the area code of the number and whether the fixed telephone number is a specified service number. The mobile phone numbers can be classified by the operators to which the numbers belong. After the above classification, the obtained parallel classification categories are: the first category (a-type special service fixed telephone number), the second category (B-type special service fixed telephone number), the third category (fixed telephone number belonging to the C place), the fourth category (mobile phone number of a certain number segment of the D operator), and so on. Of course, the classification reference factor and the classification execution step for classifying the preset number are not limited to the above description.
S402: constructing a ternary tree corresponding to the preset number under each classification category according to the number prefix;
for example, a ternary tree (TST, ternary search tree) corresponding to the preset number in the fourth category (the mobile phone number of a certain number segment of the D operator) is constructed according to the number prefix. The ternary tree can realize prefix matching operation, the query efficiency is high, and the space consumption is small. The ternary tree has 3 word nodes, which are a left node (left), a middle node (mid), and a right node (right). When a new number is added to the preset number, that is, when a keyword (key) is inserted, starting from the tree root as the current node (the tree root is nil when the tree is empty), the following process is executed by recursion of one character by one character: (1) And if the current node is nil, creating a new node, storing the current character in the node, and setting the current character as the current node. (2) And if the current character and the character stored in the current node are both '/0', storing the data in the current node and terminating the calling. If the current character is smaller than the character stored in the current node, the current character is recursively inserted into the left child node of the node, and if the current character is larger than the character stored in the current node, the current character is inserted into the right child node; and the next character is inserted into the middle child node of the current node. The ternary tree can support dynamic addition and deletion of corresponding numbers stored in the preset numbers, so that the condition that the call records are analyzed by the server side aiming at the latest preset numbers is ensured, and the analysis results displayed to the user by the client side are timely and effective in presentation speed and content.
S403: and searching the contact number in the ternary tree, wherein when the contact number is searched in the ternary tree, the contact number is successfully matched with the preset number.
When the contact number is searched and matched in the preset number, the key characters are compared with the characters stored in the nodes in the tree one by one, and the recursive execution is started from the root of the tree. And (1) if the current node is nil, the search fails. (2) If the current character is smaller than the nodes, the left child node is searched recursively, and the current character is still compared. (3) If the current character is larger than the nodes, the right child node is searched recursively, and the current character is still compared. (4) If the current character is equal to the current character in the node and is '0', the value corresponding to the key exists in the node, and the call is terminated. If equal but not '/0', then the recursion looks for the middle child node and compares the character to the next character. The contact number is matched quickly and efficiently by searching the server side in the ternary tree. The searching mode in the ternary tree can be through binary searching.
In practical applications, due to the fact that the preset numbers are marked as numbers of a certain category (such as house agency-type calls, harassing-type calls, fraud-type calls and advertisement promotion-type calls), similarity of certain regular nature may occur sometimes, for example, the first nine digits of the mobile phone number are the same, and only the last two digits are different. Then, when the first nine digits of the contact number (the mobile phone number with eleven) are the same as the first nine digits, it can be determined that the contact number is successfully matched with the preset number. Of course, the manner in which non-number full digit matching is employed is not limited to the above description.
In other embodiments, the preset number under each classification category is partitioned by constructing a fibonacci number series, and both end points of the search interval and the partitioning point are associated with the fibonacci number series. The Fibonacci (Fibonacci) search algorithm utilizes a Fibonacci number sequence to establish a corresponding tree structure to reduce the search range, and the search matching efficiency is higher.
Then, according to the matching state of the contact number, marking the contact number;
the step of marking the contact number according to the matching state of the contact number comprises the following steps:
when the contact number is successfully matched with the property intermediary telephone, marking the contact number as the property intermediary telephone;
when the contact number is successfully matched with the harassing call, marking the contact number as the harassing call;
when the contact number and the fraud-like phone are successfully matched, marking the contact number as the fraud-like phone;
and when the contact number is successfully matched with the advertisement promotion telephone, marking the contact number as the advertisement promotion telephone.
S203: responding to an analysis result returned by the server, and displaying a guide interface to guide a user to open the second type of application permission;
informing the severity of harassment calls and the like in daily received calls through a guide interface, and inquiring the opening of other application authorities of the user. Therefore, the user has stronger cognition on the perception after the application permission is opened, and is more willing to open the subsequent application permission. The user experience with the application is also better.
In this embodiment of the present invention, as shown in fig. 5, the step of displaying a guidance interface to guide a user to open the second type of application right in response to the analysis result returned by the server includes:
s501: counting the analysis result;
and the analysis result is the result of matching and marking the contact phone in the call record with the preset number in the database by the server.
Specifically, firstly, the number of the numbers successfully matched with the preset number in the contact person phone is counted and recorded as the number of the numbers to be calculated. For example, 5 of the 50 contact numbers are successfully matched with the real estate agency class telephone, 6 are successfully matched with the harassing class telephone, 3 are successfully matched with the fraud class telephone, and 10 are successfully matched with the advertisement promotion class telephone.
And then, calculating the proportion of the number to be calculated in the total number of the contact telephones. Then, the number of the real estate agency type telephone accounts for 10% of the total number of the contact telephones, the number of the harassing type telephone accounts for 12% of the total number of the contact telephones, the number of the fraud type telephone accounts for 6% of the total number of the contact telephones, and the number of the advertising promotion type telephone accounts for 20% of the total number of the contact telephones.
When the proportion is larger than a first preset proportion, judging that the call records have a severe harassment condition; or when the proportion is greater than a second preset proportion and less than or equal to the first preset proportion, judging that the call records have a moderate disturbance condition; or when the proportion is less than or equal to the second preset proportion, judging that a light harassment condition exists in the call records; wherein the first preset proportion is greater than the second preset proportion. The first preset proportion and the second preset proportion are the proportion of the total number of the marked 4 types of numbers which are successfully matched with the preset numbers in the total number of the contact phone. For example, if the first preset proportion is 60% and the second preset proportion is 30%, it is determined that there is a moderate disturbance situation (30% <48% < 60%) in the call records according to the calculation. Of course, the harassment situation can be determined by setting the weight for the occupation ratio of each type of number in the 4 types, and then comparing the harassment situation with the preset occupation ratio.
In practical applications, the first type of application permission opened by the user may include address book access permission in addition to call record access permission. The client corresponding to the application program sends the contact number to the server through accessing the call record to obtain: and matching and marking the contact phone number in the call record with the preset number in the database. And the client excludes the contact number which exists in the user address list from the contact number read from the call record through accessing the call record and the address list, and sends the newly generated contact number to the server for matching and marking. The problem of when only reading the contact number through the call record, the personalized experience of marking harassment calls and the like to different users is not good is solved. For example, for a property broker practitioner, his/her call records may include contact numbers from the same party marked as the property broker class, and these would not provide a valid analysis result for the user if they were used as factors in determining a harassment situation without reference to the address book.
S502: displaying the guide interface to guide a user to enable an incoming call protection function;
the content of the guide interface comprises a chart for displaying a statistical result and an incoming call protection function starting interface, so that the interface to be opened for jumping to the second type of application authority is triggered through the incoming call protection function starting interface.
As shown in fig. 7, the statistical result is displayed in a manner including, but not limited to, a circular graph and a histogram. The state of the presentation may be static or dynamic. The main title "you are recently heavily harassed by incoming call" shown in fig. 7 is in response to the determination of harassment situation (setting of the preset ratio) in step S501. The data obtained in step S501 is displayed in the form of a graph, so that the user can more intuitively and more closely know the analysis result obtained after the application permission is opened.
S503: displaying an interface to be opened of a second type of application authority according to a received request of starting the incoming call protection function by a user;
the opening of the first type of application permission enables the user to obtain knowledge of the harassment condition of the user, the user is guided to open the second type of application permission after the analysis result is displayed to the user in a chart mode, and the user is more active in the incoming call protection experience obtained after the application permission is opened.
In practical application, the recent call record analysis is firstly displayed through the interface shown in fig. 7, and when a user triggers the interface "start harassing call protection" in the interface shown in fig. 7; jump to the interface shown in fig. 8, the interface shown in fig. 8 shows disturbance interception, and the current state of one of the second type of application permissions is included above the interface: "the self-starting switch is not turned on" (of course, the current state of the other second type of application right can be presented here as well); after the user triggers the right through the "open authorization" interface, jump to the interface shown in fig. 9, where the interface shows the second type of application right that has not been opened: floating window authority, self-starting authority and survival authority, and correspondingly introduces the effects of the three authorities.
Of course, the basic authority and the expansion authority applied to the realization of the incoming call protection function can be transplanted and applied to the realization of the short message protection function. After the access to the short message record is started, the short message record is analyzed, an analysis result (such as a pseudo base station short message obtained by matching the mark and the like) is displayed, and then a user is guided to start an expansion authority (such as a floating window authority and the like).
As can be seen from the technical solutions provided by the embodiments of the present specification, in the embodiments of the present specification, after a user starts a basic authority related to an incoming call protection function, a server analyzes a call record of the user through an authorization authority, and a client displays an analysis result to the user to guide the user to start an expansion authority related to the incoming call protection function. Through the displayed analysis result, the user can timely and effectively sense the degree of the demand of the user on the incoming call protection function, and therefore whether the expansion permission is opened or not is judged. When the application program or the functional module in the application program is installed, the corresponding function after the application authority is opened can be timely and effectively fed back and presented to the user, the enthusiasm of the user for experiencing the corresponding function in the application program is improved, and the user viscosity of the application program is enhanced.
An embodiment of the present invention further provides a management system for application permissions, as shown in fig. 10, the system includes a client 600 and a server 700, where the client 600 includes:
the detection module 610: and the interface to be opened is used for displaying the first type of application permission when detecting that the application program or the functional module in the application program is installed. The first type of application authority is a basic authority for realizing an incoming call protection function, and the first type of application authority can comprise a call record access authority; alternatively, the first type of application authority may include call record access authority and address book access authority.
The sending module 620: the server side is used for sending the received request of the user for opening the first type of application permission to the server side so as to enable the server side to analyze the call record of the user; the transmitting module 620 includes: a number reading unit: the number reading module is used for reading the corresponding contact number in the call record; and the request sending unit is used for sending the contact number and a request for matching the contact number to the server. In practical application, the number reading unit reads corresponding contact numbers in the latest 50 call records.
The boot module 630: and the server is used for responding to the analysis result returned by the server and displaying a guide interface to guide the user to open the second type of application permission. And the second type of application authority is an expansion authority for realizing the incoming call protection function. The second type of application permissions may include phone permissions, floating window permissions, and self-launch resident permissions. As shown in fig. 11, the guiding module 630 includes: the statistic unit 631: the system is used for counting the analysis result; the function-enabled boot unit 632: the system is used for displaying the guide interface to guide a user to enable an incoming call protection function; opening the interface display unit 633: and the interface to be opened is used for displaying the second type of application permission according to the received request of starting the incoming call protection function by the user. The analysis result is the result of the server terminal matching and marking the contact telephone in the call record with the preset number in the database; the preset numbers comprise house agency type calls, harassing type calls, fraud type calls and advertising promotion type calls. Specifically, the counting unit is used for counting the number of the numbers successfully matched with the preset number in the contact person phone, and recording the number as the number of the numbers to be calculated; calculating the proportion of the number to be calculated in the total number of the contact phone; when the proportion is larger than a first preset proportion, judging that the call records have a severe harassment condition; or when the proportion is larger than a second preset proportion and smaller than or equal to the first preset proportion, judging that the call records have a moderate harassment condition; or when the proportion is less than or equal to the second preset proportion, judging that the call records have a light harassment condition; wherein the first preset proportion is greater than the second preset proportion. The content of the guide interface comprises a chart for displaying a statistical result and an incoming call protection function starting interface, and the incoming call protection function starting interface triggers an interface to be opened which jumps to the second type of application permission.
The server 700 analyzes the call record of the user, as shown in fig. 12, the server 700 includes:
the number matching module 710: and the system is used for matching the contact numbers according to preset numbers stored in a database. The number matching module comprises: a classification unit: the system is used for classifying the preset numbers according to the number length, the operators to which the numbers belong and the area codes of the numbers; a ternary tree construction unit: the method comprises the steps of constructing a ternary tree corresponding to the preset number under each classification category according to the number prefix; a search unit: the contact number matching module is used for searching the contact number in the ternary tree, and when the contact number is searched in the ternary tree, the contact number is successfully matched with the preset number. The preset numbers comprise house agency calls, harassing calls, fraud calls and advertising promotion calls. In practical application, the number matching module uploads the contact number to a cloud-end database for matching.
The number marking module 720: the contact person number is marked according to the matching state of the contact person number; the number marking module comprises: real estate agency telephone marking unit: the system is used for marking the contact number as the real estate agency class telephone when the contact number is successfully matched with the real estate agency class telephone; harassing call marking unit: the mobile phone is used for marking the contact number as the harassing telephone when the contact number is successfully matched with the harassing telephone; fraud-like telephone marking unit: for tagging the contact number as the fraud-like phone when the contact number and the fraud-like phone match successfully; advertisement promotion type telephone tag unit: and the telephone is used for marking the contact number as the advertisement promotion telephone when the contact number is successfully matched with the advertisement promotion telephone.
It should be noted that the system and method embodiments in the system embodiment are based on the same inventive concept.
The embodiment of the present invention provides a management server for application permissions, where the server includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or an instruction set, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement the management method for application permissions provided in the foregoing method embodiment.
The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.
Referring to fig. 13, the server 1300 is configured to implement the management method of the application authority provided in the foregoing embodiment, and specifically, the server structure may include the management system of the application authority. The server 1300 may vary greatly in configuration or performance, and may include one or more Central Processing Units (CPUs) 1310 (e.g., one or more processors) and memory 1330, one or more storage media 1320 (e.g., one or more mass storage devices) storing applications 1323 or data 1322. The memory 1330 and the storage medium 1320 may be, among other things, transient storage or persistent storage. The program stored in the storage medium 1320 may include one or more modules, each of which may include a series of instruction operations for the server. Further, the central processor 1310 may be configured to communicate with the storage medium 1320, and execute a series of instruction operations in the storage medium 1320 on the server 1300. The server 1300 may also include one or more power supplies 1360, one or more wired or wireless network interfaces 1350, one or more input-output interfaces 1340, and/or one or more operating systems 1321 such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, etc.
An embodiment of the present invention further provides a storage medium, where the storage medium may be disposed in a server to store at least one instruction, at least one program, a code set, or a set of instructions related to a method for implementing management of application permissions in the method embodiment, where the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by the processor to implement the method for managing application permissions provided in the method embodiment.
Optionally, in this embodiment, the storage medium may be located at least one network server of a plurality of network servers of a computer network. Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
It should be noted that: the sequence of the above embodiments of the present invention is only for description, and does not represent the advantages or disadvantages of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system and the server-side embodiment, since they are substantially similar to the method embodiment, the description is simple, and reference may be made to part of the description of the method embodiment for relevant points.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (11)

1. A method for managing application rights, the method comprising:
when detecting that an application program or a functional module in the application program is installed, displaying an interface to be opened with a first type of application permission;
sending the received request of the user for opening the first type of application permission to a server corresponding to the application program so that the server analyzes the call record of the user;
responding to an analysis result returned by the server, and displaying a guide interface to guide a user to open the second type of application permission;
the first type of application permission is a basic permission for realizing the incoming call protection function, and the second type of application permission is an expansion permission for realizing the incoming call protection function;
the step of displaying a guide interface to guide the user to open the second type of application permission in response to the analysis result returned by the server side comprises the following steps: counting the analysis result, wherein the analysis result is the result of matching and marking the contact phone number in the call record with the preset number in the database by the server, and the preset number comprises a house property intermediary phone number, a harassing phone number, a fraud phone number and an advertising promotion phone number; displaying the guide interface to guide a user to start the call protection function, wherein the guide interface displays the statistical result of the analysis result and a control used for responding to a request of the user for starting the call protection function; and displaying the interface to be opened of the second type of application permission according to the received request of starting the incoming call protection function by the user.
2. The method according to claim 1, wherein the step of sending the received request for opening the first type of application permission from the user to the server side comprises:
reading the corresponding contact number in the call record;
sending the contact number and a request for matching the contact number to the server;
the step of analyzing the call record of the user by the server includes:
matching the received contact person number according to a preset number stored in a database;
marking the contact number according to the matching state of the contact number;
the preset numbers comprise house property agency type calls, harassing type calls, fraud type calls and advertising promotion type calls.
3. The method of claim 2, wherein the step of matching the contact number according to a preset number stored in a database comprises:
classifying the preset numbers according to the number length, the operator to which the numbers belong and the area code of the numbers;
constructing a ternary tree corresponding to the preset number under each classification category according to the number prefix;
and searching the contact number in the ternary tree, wherein when the contact number is searched in the ternary tree, the contact number is successfully matched with the preset number.
4. The method of claim 3, wherein the step of tagging the contact number according to the matching status of the contact number comprises:
when the contact number is successfully matched with the house property intermediary phone, marking the contact number as the house property intermediary phone;
when the contact number is successfully matched with the harassing phone call, marking the contact number as the harassing phone call;
when the contact number is successfully matched with the fraud-type phone, marking the contact number as the fraud-type phone;
and when the contact number is successfully matched with the advertisement promotion telephone, marking the contact number as the advertisement promotion telephone.
5. The method of claim 1, wherein the step of performing statistics on the analysis results comprises:
counting the number of the numbers successfully matched with the preset number in the contact person telephone, and recording the number as the number to be calculated;
calculating the proportion of the number to be calculated in the total number of the contact telephones;
when the proportion is larger than a first preset proportion, judging that the call records have a severe harassment condition;
or when the proportion is larger than a second preset proportion and smaller than or equal to the first preset proportion, judging that the call records have a moderate harassment condition; or when the proportion is less than or equal to the second preset proportion, judging that a light harassment condition exists in the call records;
wherein the first preset proportion is greater than the second preset proportion.
6. The method according to claim 1, wherein the display content of the guidance interface comprises a chart indicating the statistical result and an incoming call protection function enabling interface, so as to trigger a to-be-opened interface jumping to the second type of application authority through the incoming call protection function enabling interface.
7. The method of claim 2, wherein the step of reading the corresponding contact number in the call record comprises:
reading the corresponding contact numbers in the call records with the latest preset number;
the step of matching the contact number according to the preset number stored in the database comprises the following steps: and uploading the contact number to a cloud database.
8. The method of claim 1, wherein the first type of application rights comprise call record access rights; or the first type of application authority comprises call record access authority and address book access authority;
the second type of application permission comprises a telephone permission, a floating window permission and a self-starting resident permission.
9. The system for managing the application authority is characterized by comprising a client corresponding to an application program and a server corresponding to the application program, wherein the client comprises:
a detection module: the interface to be opened is used for displaying the first type of application permission when the application program or the functional module in the application program is detected to be installed;
a sending module: the server side is used for sending the received request of the user for starting the first type of application permission to the server side corresponding to the application program so as to enable the server side to analyze the call record of the user;
a guiding module: the server side is used for responding to the analysis result returned by the server side, and displaying a guide interface to guide a user to open the second type of application permission;
the first type of application authority is a basic authority for realizing an incoming call protection function, and the second type of application authority is an expansion authority for realizing the incoming call protection function;
the step of displaying a guide interface to guide the user to open the second type of application permission in response to the analysis result returned by the server side comprises the following steps: counting the analysis result, wherein the analysis result is the result of matching and marking the contact phone number in the call record with the preset number in the database by the server, and the preset number comprises a house property intermediary phone number, a harassing phone number, a fraud phone number and an advertising promotion phone number; displaying the guide interface to guide a user to start the call protection function, wherein the guide interface displays the statistical result of the analysis result and a control used for responding to a request of the user for starting the call protection function; and displaying the interface to be opened of the second type of application permission according to the received request of starting the call protection function by the user.
10. A server, characterized in that the server includes a processor and a memory, and the memory stores at least one instruction or at least one program, and the at least one instruction or at least one program is loaded and executed by the processor to implement the method for managing application authority according to any one of claims 1 to 8.
11. A computer-readable storage medium, wherein at least one instruction or at least one program is stored in the computer-readable storage medium, and the at least one instruction or the at least one program is loaded and executed by a processor to implement the method for managing application rights according to any one of claims 1 to 8.
CN201910003540.8A 2019-01-03 2019-01-03 Application authority management method and system Active CN109886012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910003540.8A CN109886012B (en) 2019-01-03 2019-01-03 Application authority management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910003540.8A CN109886012B (en) 2019-01-03 2019-01-03 Application authority management method and system

Publications (2)

Publication Number Publication Date
CN109886012A CN109886012A (en) 2019-06-14
CN109886012B true CN109886012B (en) 2023-03-07

Family

ID=66925572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910003540.8A Active CN109886012B (en) 2019-01-03 2019-01-03 Application authority management method and system

Country Status (1)

Country Link
CN (1) CN109886012B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN103945036A (en) * 2014-04-11 2014-07-23 江苏物联网研究发展中心 Method for allowing user to select head portraits on cell phone and protecting privacy of user during call receiving
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
CN106385483A (en) * 2016-09-05 2017-02-08 北京奇虎科技有限公司 Phone number processing method and mobile terminal and cloud server thereof
CN106993083A (en) * 2017-02-21 2017-07-28 北京奇虎科技有限公司 A kind of method and apparatus of recommendation intelligent terminal operation prompt information
CN107547716A (en) * 2016-06-29 2018-01-05 腾讯科技(深圳)有限公司 A kind of information processing method and terminal

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811202A (en) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 Method and system for preventing harassment calls through cloud computing
CN102694900B (en) * 2012-06-18 2015-07-01 北京奇虎科技有限公司 Phone call intercepting method and device
CN103167500B (en) * 2013-02-01 2016-08-03 杭州东信北邮信息技术有限公司 A kind of realize the method and system that call-in of mobile telephone set is uniformly processed
CN104243727B (en) * 2014-10-15 2017-01-25 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104410700B (en) * 2014-12-04 2018-04-03 北京奇虎科技有限公司 Issue method, harassing call hold-up interception method and the system of harassing call list
CN104486476A (en) * 2014-12-11 2015-04-01 北京奇虎科技有限公司 Crank call interception method and device
CN105162940A (en) * 2015-07-31 2015-12-16 小米科技有限责任公司 Call processing method and call processing device
CN105262876B (en) * 2015-10-30 2019-01-22 百度在线网络技术(北京)有限公司 Call handling method, provide telephone number number information method and apparatus
CN105516464B (en) * 2015-11-26 2018-10-23 厦门美图移动科技有限公司 A kind of caller data method for secret protection, device and mobile terminal
CN106302937A (en) * 2016-08-18 2017-01-04 北京奇虎科技有限公司 The based reminding method of communication harassing and wrecking and device
CN106953989A (en) * 2017-05-17 2017-07-14 努比亚技术有限公司 Incoming call reminding method and device, terminal, computer-readable recording medium
CN107360300B (en) * 2017-08-01 2020-03-13 中国联合网络通信集团有限公司 Crank call interception method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
CN103945036A (en) * 2014-04-11 2014-07-23 江苏物联网研究发展中心 Method for allowing user to select head portraits on cell phone and protecting privacy of user during call receiving
CN107547716A (en) * 2016-06-29 2018-01-05 腾讯科技(深圳)有限公司 A kind of information processing method and terminal
CN106385483A (en) * 2016-09-05 2017-02-08 北京奇虎科技有限公司 Phone number processing method and mobile terminal and cloud server thereof
CN106993083A (en) * 2017-02-21 2017-07-28 北京奇虎科技有限公司 A kind of method and apparatus of recommendation intelligent terminal operation prompt information

Also Published As

Publication number Publication date
CN109886012A (en) 2019-06-14

Similar Documents

Publication Publication Date Title
CN105117544B (en) Android platform App methods of risk assessment and device based on mobile cloud computing
CN109309579B (en) Log record processing method and device, computer equipment and storage medium
CN112640388B (en) Suspicious activity detection in computer networks
CN108229158B (en) Method for protecting user privacy information stored in Android
CN112491602B (en) Behavior data monitoring method and device, computer equipment and medium
CN112149032B (en) Advertisement interception method and device
CN109547426B (en) Service response method and server
CN113489713A (en) Network attack detection method, device, equipment and storage medium
CN107590386B (en) Security event information processing method and device, storage medium and computer equipment
CN105045911B (en) Label generating method and equipment for user to mark
CN106569860A (en) Application management method and terminal
CN111586695B (en) Short message identification method and related equipment
CN111817984A (en) Message sending method, device, equipment and storage medium
CN109525647A (en) Message pushes badge value control method, electronic device and storage medium
CN106301979B (en) Method and system for detecting abnormal channel
CN110245059A (en) A kind of data processing method, equipment and storage medium
CN110191097A (en) Detection method, system, equipment and the storage medium of login page safety
CN112667875A (en) Data acquisition method, data analysis method, data acquisition device, data analysis device, equipment and storage medium
CN109886012B (en) Application authority management method and system
CN110032612B (en) Information pushing method and device
CN111083705A (en) Group-sending fraud short message detection method, device, server and storage medium
US20030162559A1 (en) Mobile communications terminal, information transmitting system and information receiving method
CN108322912B (en) Method and device for distinguishing short messages
CN115544558A (en) Sensitive information detection method and device, computer equipment and storage medium
CN114861076A (en) Information processing method, information processing device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant