CN112073578B - Method and equipment for using or limiting application function in social application - Google Patents

Method and equipment for using or limiting application function in social application Download PDF

Info

Publication number
CN112073578B
CN112073578B CN202010844787.5A CN202010844787A CN112073578B CN 112073578 B CN112073578 B CN 112073578B CN 202010844787 A CN202010844787 A CN 202010844787A CN 112073578 B CN112073578 B CN 112073578B
Authority
CN
China
Prior art keywords
target
user
social
target function
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010844787.5A
Other languages
Chinese (zh)
Other versions
CN112073578A (en
Inventor
潘红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianshang Network Technology Co Ltd
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN202010844787.5A priority Critical patent/CN112073578B/en
Publication of CN112073578A publication Critical patent/CN112073578A/en
Application granted granted Critical
Publication of CN112073578B publication Critical patent/CN112073578B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The application aims to provide a method and a device for using or limiting application functions in social applications, wherein the method comprises the following steps: responding to a trigger operation of a first user in a social application of first terminal equipment, and acquiring a target social object in the social application; responding to the acquisition operation of the first user on a target function related to the target social object, detecting whether the first user meets the verification information condition of the target function, and if so, executing the target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object. The privacy can be prevented from being revealed after the user mistakenly touches the target function.

Description

Method and equipment for using or limiting application function in social application
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for using or limiting application functionality in social applications.
Background
Social interaction is a basic attribute of human beings as a social group, and since birth of human beings, regardless of form, regardless of whether under the control of consciousness or not, the social activities of human beings never stop. With the development of the mobile internet, the social application is used as a propagation carrier for people to perform social activities in the internet, the dependence on the social application is continuously enhanced with the increase of social demands of people, meanwhile, the distance between people and areas is gradually shortened through the development of the social application, and the social application stores or can acquire the privacy information of users at any time.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for using or limiting application functionality in social applications.
According to an aspect of the present application, there is provided a method of using an application function in a social application, the method including:
responding to a trigger operation of a first user in a social application of first terminal equipment, and acquiring a target social object in the social application;
responding to the acquisition operation of the first user on a target function related to the target social object, detecting whether the first user meets the verification information condition of the target function, and if so, executing the target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object.
According to another aspect of the present application, there is provided a method of restricting application functionality in a social application, the method comprising:
responding to a trigger event in a social application, and acquiring one or more social objects selected by a second user in the social application;
and generating first verification setting of the target function based on the setting operation of the second user on the target function corresponding to each social object.
According to an aspect of the present application, there is provided an apparatus for using an application function in a social application, the apparatus including:
the one-to-one module is used for responding to triggering operation of a first user in a social application of first terminal equipment, and acquiring a target social object in the social application;
a second module, configured to detect, in response to an acquisition operation of the first user on a target function related to the target social object, whether the first user satisfies a verification information condition of the target function, and if so, execute a target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object.
According to an aspect of the present application, there is provided an apparatus for restricting application functions in a social application, the apparatus including:
the first module is used for responding to a trigger event in a social application and acquiring one or more social objects selected by a second user in the social application;
and the second module is used for generating first verification setting of the target function based on the setting operation of the second user on the target function corresponding to each social object.
According to an aspect of the present application, there is provided an apparatus for restricting or using application functions in a social application, the apparatus including:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to another aspect of the application, there is provided a computer readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.
Compared with the prior art, the method includes that a first terminal device responds to a trigger event in a social application to acquire a corresponding target social object, responds to an acquisition operation of a first user on a target function related to the target social object, detects whether the first user meets a verification information condition of the target function, and if yes, executes a target operation corresponding to the target function; otherwise, the acquisition operation is ignored. According to the application, on the premise that the first user is not the owner of the first terminal device, the first user is not prevented from using other applications in the first terminal device, and meanwhile, the first user is limited from using any application function (for example, verification information condition detection is required) in the social application, for example, any application function comprises a common function and a function with limited requirements (for example, a privacy function), but the use of other application functions is not prevented, and in some aspects, the user can be prevented from mistakenly clicking the privacy function in the social application to cause privacy disclosure, so that privacy safety is guaranteed, and user experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology according to the present application;
FIG. 2 illustrates a flow diagram of a method for using application functionality in a social application, according to one embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method for limiting application functionality in a social application, according to one embodiment of the present application;
FIG. 4 illustrates a schematic diagram of using application functionality in a social application according to yet another embodiment of the present application;
FIG. 5 illustrates a schematic diagram of using application functionality in a social application, according to another embodiment of the present application;
FIG. 6 shows a schematic diagram of a device for using application functionality in a social application, according to one embodiment of the present application;
FIG. 7 illustrates a schematic diagram of a device for limiting application functionality in a social application, according to an embodiment of the present application;
FIG. 8 illustrates an exemplary system that can be used to implement the various embodiments described in this disclosure.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, Random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The device referred to in the present application includes, but is not limited to, a terminal device, a network device, or a device formed by integrating the terminal device and the network device through a network. The terminal device includes, but is not limited to, any mobile electronic product capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), for example, a smart phone, a tablet computer, and the like, and the mobile electronic product may adopt any operating system, such as an Android operating system, an iOS operating system, and the like. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, multiple network server sets, or a cloud of multiple servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the terminal device, the network device, or a device formed by integrating the terminal device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically defined otherwise.
Fig. 1 shows a typical scenario of the present application, where a first user holds a first terminal device, and a social application is installed in the first terminal device, where the social application includes various applications that can perform online social activities, and the first terminal device and a network device corresponding to the social application establish a communication connection in a wired or wireless manner. The method comprises the steps that a first user obtains a social interaction interface (such as a chat window) of a second user in the social interaction application after opening the social interaction application, and in response to the triggering operation of the first user on a camera function in the social interaction window, a first terminal device presents an authentication window, and the first user inputs authentication information in the authentication window. Based on the communication connection, the network device receives the verification information, and queries in a mapping list of an application function and default verification information according to the camera function to obtain default verification information of the camera function, if the default verification information is consistent with the verification information received by the network device, the network device sends an enabling instruction of the camera function to a first terminal device, based on the instruction, the first user can shoot an image by using the camera function and send the image to a second user, wherein the first terminal device includes but is not limited to a mobile phone, a tablet, a notebook computer and other computing devices (with a touch screen).
Fig. 2 shows a method for using application functionality in a social application according to an embodiment of the present application, the method comprising step S101 and step S102.
Specifically, in step S101, the first terminal device obtains a target social object in a social application of the first terminal device in response to a trigger operation of the first user in the social application. For example, in response to a selection operation of a first user on a target social object in one or more social objects in a social application, a first terminal device determines the target social object selected by the first user, wherein the target social object comprises at least one of a group session or a single chat session (e.g., a friend session or a non-friend session); the first user comprises other users except the user corresponding to the login account currently logging in the social application, and can also comprise other users except the owner of the first terminal equipment; the subsequently related second users comprise users corresponding to the login account currently logged in the social application, and also comprise owners of the first terminal equipment; for example, after the owner of the first terminal device opens the social application, the owner clicks the target social object to perform social interaction with the user corresponding to the target social object, and the first terminal device presents any social function (for example, location sharing) that can be used for the owner to perform selection operation in the session interface to perform social interaction.
In some embodiments, the first terminal device first detects whether the first user has the usage right of the social application. For example, the second user sets the usage right of the social application in the first terminal device, for example, authentication information for entering the application is enabled in a system setting interface of the first terminal device or an application setting interface of the social application (for example, unlocking by a password, a face, a gesture, or the like is required), after the first user obtains the usage right of the social application through the authentication information, or some social applications need to log in for use, the first user obtains the usage right of the social application after logging in, and in response to a trigger operation of the first user in the social application of the first terminal device, the first terminal device may obtain a target social object in the social application. For example, on the basis that the first user obtains the enabling authority of the social application (for example, the first terminal device and the first user perform account login or unlock the social application for use), the first user may perform subsequent trigger operation of the application function.
In step S102, a first terminal device, in response to an operation of obtaining a target function related to the target social object by the first user, detects whether the first user meets a verification information condition of the target function, and if yes, executes a target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object. In some embodiments, in step S102, the first terminal device first detects whether the first user can directly use the target function, and in response to the operation of the first user to obtain the target function related to the target social object, determines whether the target function belongs to a list of functions to be verified; if yes, detecting whether the first user meets the verification information condition of the target function, and if yes, executing target operation corresponding to the target function; otherwise, the fetch operation is ignored. In some embodiments, the method further includes step S104 (not shown), and in step S104, if the target function does not belong to the to-be-verified function list, the first terminal device executes a target operation corresponding to the target function. For example, the first terminal device may determine, by wire, whether the target function belongs to a to-be-verified function list, if the target function does not belong to the to-be-verified function list, the first user may directly use the target function, and if the target function belongs to the to-be-verified function list, the first terminal device may detect, according to subsequent verification information of the user, whether the first user satisfies a verification information condition of the target function, so that the usage right of the target function may be determined more efficiently. In some embodiments, the first terminal device may locally determine whether the target function belongs to the to-be-verified function list, for example, the first terminal device locally stores the to-be-verified function list, and performs matching query on the target function in the to-be-verified function list by the first terminal device, and if the query result is not null, the first terminal device determines that the target function belongs to the to-be-verified function list, and continues to perform subsequent detection. In some embodiments, the determining whether the target function belongs to a list of functions to be verified includes: sending the target function to network equipment corresponding to the social application; receiving a matching result sent by the network equipment after the target function is matched in a function list to be verified; if the matching result is not null, judging that the target function belongs to the list of functions to be verified; otherwise, judging that the target function does not belong to the list of functions to be verified. For example, in response to a triggering operation of a first user on the target function, the first terminal device sends the target function to the network device, the network device performs a matching query on the target function in a to-be-verified function list, and if the matching result is null, the network device determines that the target function does not need to be verified and can be directly enabled by the first user, wherein all application functions stored in the to-be-verified function list need to be verified.
In some embodiments, the detecting whether the first user satisfies the verification information condition of the target function if the first user belongs to the target function includes: if the target function belongs to the social application, sending a verification request about the target function to network equipment corresponding to the social application, wherein the verification request comprises verification information input by the first user; receiving authentication feedback information returned by the network equipment in response to the authentication request; if the verification feedback information is consistent, determining that the first user meets the verification information condition of the target function; otherwise, determining that the first user does not meet the verification information condition of the target function, wherein the verification feedback information is obtained by comparing default verification information of the target function obtained by the network equipment with the verification information. For example, on the premise that the target function belongs to the list of functions to be verified, the first terminal device presents a verification interface for verifying the target function to the first user, where the verification interface includes performing password input, performing fingerprint input, performing face recognition, and the like, and in response to an input operation of the first user in the verification interface, the first terminal device sends a verification request for the target function to the network device, where the verification request includes verification information input by the first user; in some embodiments, the first user-entered verification information includes at least any one of:
1) a password entered by the first user;
2) fingerprint information input by the first user;
3) face information input by the first user;
4) gesture information input by the first user; for example, the first user may perform multiple ways for the first terminal device to detect whether the first user satisfies the verification information condition of the target function, so as to improve the flexibility of detection and the efficiency of detection. The network device receives the verification request about the target function, queries the target function in a mapping relation between a corresponding function to be verified and default verification information to obtain default verification information corresponding to the target function, compares the default verification information with the verification information input by the first user (for example, a password input by the first user is consistent with a password corresponding to the default verification information), and returns a verification feedback result after comparison to the first terminal device, the first terminal device detects whether the first user meets the verification information condition of the target function based on the result, if the verification feedback result includes that the default verification information is consistent with the verification information input by the first user, the first terminal device determines that the first user can obtain the authority to use the target function, and executes the target operation corresponding to the target application based on the obtaining operation, for example, the target function includes location sharing, and if the first user meets the verification information condition of the target function, the first terminal device performs an operation of sending the location information of the first user to a corresponding target social object. On the premise that the network device detects whether the first user meets the verification information condition of the target function, corresponding setting can be reserved if the subsequent social application is installed on other first terminal devices or the social application is reinstalled, and mapping contents of the function to be verified and default verification information do not need to be reset in other first terminal devices, so that the operation of the user is simplified, and the detection efficiency is improved. In some embodiments, if the target operation is satisfied, the executing the target operation corresponding to the target function includes: and if so, executing the target operation corresponding to the target function, wherein the current time accords with the use time period corresponding to the target function. On the premise that the first user meets the verification information condition of the target function, if the current time does not reach the usable time of the target function (for example, the first user meets the verification information adjustment of the location sharing function, but the current time is not in the usable time period of the location sharing function, for example, 21:00-22:00), the first terminal device ignores the obtaining operation of the first user, and if the current time reaches the usable time of the target function, the first terminal device executes the corresponding operation.
For example, a first user holds a first terminal device, a social application is installed in the first terminal device, the first user acquires a target social object (for example, a contact a) in the social application, and in response to an acquisition operation of the first user on a target function (for example, a photo function), the first terminal device detects whether the first user satisfies an authentication information condition of the target function (for example, authentication information input by the first user after clicking the function is consistent with default authentication information of the function), and if not, the first terminal device ignores the acquisition operation; otherwise, the first terminal equipment executes the operation corresponding to the function.
For example, fig. 4 illustrates a schematic diagram of using an application function in a social application according to an embodiment of the present application, where a first user holds a first terminal device, the first terminal device has the social application installed therein, the first user acquires a target social object (e.g., a group chat) in the social application, and in response to an acquisition operation of a target function (e.g., a photo function) performed by the first user in the group chat, the first terminal device detects whether the function is in a function library provided with a password, and if not, the first terminal device performs an operation corresponding to the function after presenting a normal use prompt; otherwise, the first terminal device presents a verification interface (for example, a password input window) for the first user to input, and executes an operation corresponding to the function when the password input by the first user is correct.
In some embodiments, in step S102, a first terminal device enables verification setting of one or more functions corresponding to the target social object, and in response to an operation of the first user to obtain a target function of the one or more functions, detects whether the first user satisfies a verification information condition of the target function, and if so, executes a target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object. For example, on the premise that the first terminal device enables the verification setting of one or more functions corresponding to the target social object, a basis is provided for subsequently detecting whether the first user meets the verification information condition of the target function in the one or more functions, so that a strange user is facilitated to prevent from viewing or mistakenly touching privacy information in a social application.
In some embodiments, the enabling of the verification setting of the one or more functions corresponding to the target social object comprises: and enabling verification setting of one or more functions corresponding to the target social object in response to selection operation of a second user on the one or more functions in the social application. For example, fig. 5 shows a schematic diagram of using application functions in a social application according to another embodiment of the present application, where a second user includes an owner of the first terminal device, and in response to a trigger operation of the second user on a target social object (e.g., a social group) in the social application, the first terminal device presents a privacy setting interface, where the privacy setting interface includes one or more functions (e.g., a red envelope, a camera, a video, etc.) related to the social group to be set for verification, and according to a selection operation of the second user (e.g., the red envelope function), if the red envelope function has been set for verification (e.g., a password setting) before, the second user inputs a password set before the red envelope function to release the verification setting of the red envelope function, if the red envelope function has not been set for verification (e.g., password setting), the second user performs authentication setting (e.g., password setting) for the red packet-sending function, and in the case that the owner of the first terminal device can manually set authentication authority about one or more functions, the owner of the first terminal device is given personalized setting rights, so that the use experience and privacy security of the user are improved. In some embodiments, the enabling of the verification setting of the one or more functions corresponding to the target social object comprises: acquiring image information of the first user through the social application, and sending the image information to network equipment corresponding to the social application; receiving history limited information, in the social application, of the first user, which is returned by the network device and determined according to the image information; enabling verification setting of one or more functions corresponding to the target social object according to the history limited information, wherein the history limited information comprises history verification setting information of the first user in the social application and relevant to the target social object. For example, in a process that the first user enables the social application (for example, when the social application is just opened or in a using process), the social application acquires image information of the first user through a camera device of the first terminal device, and sends the image information to the network device corresponding to the social application. The network device determines history limited information of the first user in the social application according to the image information of the first user, wherein the history limited information includes verification function information that the first user is set in the social application, for example, the network device acquires that verification setting of at least one function of one or more functions related to the target social object exists in the history behavior information of the first user, the network device sends the history limited information related to the target social object to the first terminal device, and the first terminal device can automatically enable the verification setting of the one or more functions corresponding to the target social object based on the history limited information (for example, enable the at least one function related to the target social object according to a plurality of functions of the verification setting enabled in the history limited information), under this situation, the complexity of manual setting of the second user is avoided, the efficiency of starting verification setting is improved, and the user experience is improved. In some embodiments, the first terminal device may automatically enable the verification setting of one or more functions corresponding to the target social object in combination with the manual setting of the second user (e.g., the owner of the first terminal device). For example, the first terminal device enables verification settings of one or more functions corresponding to the target social object according to historical verification setting information of the first user, for example, the historical verification setting information includes a limit on a red packet sending function and a shooting function, the second user selects a sending location function corresponding to the target social object in the social application, the first terminal device enables verification settings for the sending location function, finally, when the first user performs social interaction with the target social object, the red packet sending function, the shooting function and the sending location function need to be verified, and when the verification is passed, the functions can be enabled.
Fig. 3 shows a method for limiting application functions in a social application, applied to a second terminal device, according to an embodiment of the present application, where the method includes step S201 and step S202.
In step S201, the second terminal device, in response to a trigger event in the social application, acquires one or more social objects selected by the second user in the social application. For example, the trigger event includes a selection operation of a second user on one or more social objects in a social application, where the second user includes a user corresponding to a login account currently logged in the social application, and may also include an owner of the second terminal device, and the social object includes at least one of a group session or a single chat session (e.g., a friend session or a non-friend session). For example, the second user may select one or more social objects individually or in batches in the social application.
In step S202, the second terminal device generates a first verification setting of the target function based on a setting operation of the second user on the target function corresponding to each social object. The first verification setting includes password setting, the target function includes any function (e.g., a common function or a privacy function, etc.) presented when a user corresponding to the social object performs a session, for example, in response to a trigger operation of a second user on a setting interface corresponding to the social object (e.g., a group session) in the social application, the second terminal device presents the privacy setting interface, where the interface includes one or more functions (e.g., a red packet, a camera, a video, etc.) related to the group session and to be subjected to verification setting, according to a selection operation (e.g., a red packet sending function) of the second user, the red packet sending function performs verification setting (e.g., password setting) for the red packet sending function by the second user after being selected, and saves the password setting.
For example, the second user opens a friend setting interface of friend a in the social application, and according to the requirement of the second user, the second user selects "chat with friend", "send photo", "send red packet" functions in the friend setting interface and sets an enabling password, for example, the passwords are all set, or different passwords are set for each function, and the password setting is stored.
In some embodiments, the method further comprises step S203 (not shown), in step S203, the second terminal device determines the usage period information available for use by the target function; in step S202, the second terminal device generates a first verification setting of the target function based on a setting operation of the second user on the target function corresponding to each social object and the usage time period information of the target function. For example, the second terminal device determines the available usage time period information of the target function according to the default setting of the target function by the second user, or determines the available usage time period information of the target function based on the usage habit of the second user, for example, the second user performs, at 21: the probability of using the target function in the night time period of 00-8:00 is smaller than a preset probability threshold, in the case of setting operation of the target function corresponding to each social object based on the second user, the target function sets initial verification setting based on the operation of the second user, and generates first verification setting of the target function by combining use time period information, for example, taking the target function as a red packet sending function, on the basis that the red packet sending function is set with an enabled password, the use of the red packet sending function needs to be combined with usable time (for example, 21: 00-8:00), and a user needing to use the red packet sending function of the social application in the second terminal device can use the red packet sending function by unlocking the password within the usable time. Thereby enhancing the restriction of the target function.
In some embodiments, the method further comprises step S204 (not shown), in step S204, the second terminal device determines security level information of the target function; inquiring other functions belonging to the same classification with the security level information of the target function in a security level classification table according to the security level information of the target function; in step S202, the second terminal device generates first verification settings of the target function and the other functions based on a setting operation of the second user on the target function corresponding to each social object. For example, the second terminal device may perform a security level classification on one or more functions in the social application and generate a security level classification table, e.g., with a highest level a, a corresponding to at least one function (e.g., a money-related red parcel or a money transfer function), a next highest level B, B corresponding to at least one function (e.g., location sharing, location sending, etc., related to a person), and so on. It will be understood by those skilled in the art that the foregoing security level classification schemes are merely exemplary, and that other existing or future security level classification schemes may be used and are intended to be encompassed within the scope of the present application and are hereby incorporated by reference. Taking the target function as the red packet sending function as an example, the second terminal device determines other functions (for example, account transfer and card and ticket sharing functions) consistent with the security level classification to which the red packet sending function belongs, and on the premise that the second user performs first verification setting (for example, password setting) on the red packet sending function, the second terminal device automatically performs the account transfer and performs the first verification setting (for example, password setting) on the card and ticket sharing function, so that the efficiency of function setting in social applications is improved, the operation of the user is simplified, and meanwhile, the security of the functions in the social applications is automatically improved.
Fig. 6 shows a first terminal device for using application functions in a social application, according to an embodiment of the present application, the first terminal device comprising a one-module 101 and a two-module 102.
Specifically, the one-to-one module 101 is configured to, in response to a trigger operation of a first user in a social application of a first terminal device, obtain a target social object in the social application. For example, the first user may include other users besides the owner of the first terminal device and the current login user of the social application, and in some embodiments, the first user may be the owner of the first terminal device, and in response to a selection operation of the first user on a target social object in one or more social objects in the social application, the first terminal device determines the target social object selected by the first user, where the target device object includes a social group or a contact in the social application.
In some embodiments, the first terminal device further includes, before the one-to-one module 101, a three-module 103 (not shown), and the three-module 103 is configured to obtain the usage right of the social application by the first user. An example of a specific implementation manner of the third module 103 is the same as or similar to the embodiment related to step S103 in fig. 2, and therefore is not described again, and is included herein by reference.
A second module 102, configured to, in response to an obtaining operation of the first user on a target function related to the target social object, detect whether the first user satisfies a verification information condition of the target function, and if so, execute a target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object. The target function includes a function with social interaction, such as a general red packet in a social application, a camera enablement (audio/video), a location sharing function, a sending function, a viewing function (e.g., a chat record), and a photo selection function, for example, in response to an obtaining operation of a target function related to the target social object by the first user (e.g., a trigger operation is performed after a target function is selected from one or more application functions), the first terminal device first detects whether the first user can directly use the target function, and in some embodiments, the second terminal device is configured to determine whether the target function belongs to a list of functions to be verified in response to the obtaining operation of the target function related to the target social object by the first user; if yes, detecting whether the first user meets the verification information condition of the target function, and if yes, executing target operation corresponding to the target function; otherwise, the acquisition operation is ignored. The operation of determining whether the target function belongs to the list of functions to be verified is the same as or similar to that in the embodiment shown in fig. 2, and therefore is not described again, and is included herein by reference. In some embodiments, the first terminal device further includes a fourth module 104 (not shown), and the fourth module 104 is configured to execute a target operation corresponding to the target function if the target function does not belong to the list of functions to be verified. The specific implementation manner of the four modules 104 is the same as or similar to the embodiment of the step S104, and therefore, the detailed description is omitted, and the detailed implementation manner is included herein by reference. In some embodiments, the determining whether the target function belongs to a list of functions to be verified includes: sending the target function to network equipment corresponding to the social application; receiving a matching result sent by the network equipment after the target function is matched in a function list to be verified; if the matching result is not null, judging that the target function belongs to the function list to be verified; otherwise, judging that the target function does not belong to the list of functions to be verified. The operation of determining whether the target function belongs to the list of functions to be verified is the same as or similar to that in the embodiment shown in fig. 2, and therefore is not described again, and is included herein by reference.
In some embodiments, the detecting whether the first user satisfies the verification information condition of the target function if the first user belongs to the target function includes: if the social application belongs to the target function, sending a verification request about the target function to network equipment corresponding to the social application, wherein the verification request comprises verification information input by the first user; receiving verification feedback information returned by the network equipment in response to the verification request; if the verification feedback information is consistent, determining that the first user meets the verification information condition of the target function; otherwise, determining that the first user does not meet the verification information condition of the target function, wherein the verification feedback information is obtained by comparing default verification information of the target function obtained by the network equipment with the verification information. If the first user is a specific user, the operation of detecting whether the first user satisfies the verification information condition of the target function is the same as or similar to the embodiment shown in fig. 2, and therefore, the detailed description is omitted, and the description is incorporated herein by reference. In some embodiments, the first user-entered verification information includes at least any one of:
1) a password entered by the first user;
2) fingerprint information input by the first user;
3) face information input by the first user;
4) gesture information of the first user input; the operation related to the verification information input by the first user is the same as or similar to that of the embodiment shown in fig. 2, and therefore, the description thereof is omitted, and the description is incorporated herein by reference. In some embodiments, if the target operation is satisfied, the executing the target operation corresponding to the target function includes: and if so, executing the target operation corresponding to the target function, wherein the current time accords with the use time period corresponding to the target function. If so, the operation of executing the target operation corresponding to the target function is the same as or similar to that of the embodiment shown in fig. 2, and therefore, the description is not repeated here, and the description is incorporated herein by reference.
Here, the specific implementation of the above one-module 101 and two-module 102 is the same as or similar to the embodiment of the steps S101 and S102 in fig. 2, and therefore, the detailed description is omitted, and the specific implementation is incorporated herein by reference.
In some embodiments, the second module 102 is configured to enable verification setting of one or more functions corresponding to the target social object, detect, in response to an obtaining operation of a target function of the one or more functions by the first user, whether the first user satisfies a verification information condition of the target function, and if so, execute a target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object. The operation of the related enabling of the verification setting of the one or more functions corresponding to the target social object is the same as or similar to the embodiment shown in fig. 2, and therefore, is not repeated herein, and is included herein by reference.
In some embodiments, the enabling of the verification setting of the one or more functions corresponding to the target social object comprises: and enabling verification setting of one or more functions corresponding to the target social object in response to selection operation of a second user on the one or more functions in the social application. The operation of the related enabling of the verification setting of the one or more functions corresponding to the target social object is the same as or similar to the embodiment shown in fig. 2, and therefore, is not repeated herein, and is included herein by reference. In some embodiments, the enabling of the verification setting of the one or more functions corresponding to the target social object comprises: acquiring image information of the first user through the social application, and sending the image information to network equipment corresponding to the social application; receiving history limited information, which is returned by the network equipment and is determined according to the image information, of the first user in the social application; enabling verification setting of one or more functions corresponding to the target social object according to the history limited information, wherein the history limited information comprises history verification setting information of the first user in the social application and relevant to the target social object. The operation of the related enabling of the verification setting of the one or more functions corresponding to the target social object is the same as or similar to the embodiment shown in fig. 2, and therefore, is not repeated herein, and is included herein by reference.
Fig. 7 shows a second terminal device for limiting application functions in a social application, according to an embodiment of the present application, where the second terminal device includes a first module 201 and a second module 202.
A second module 201, configured to, in response to a trigger event in a social application, obtain one or more social objects selected by a second user in the social application. For example, the trigger event includes a selection operation of a second user on one or more social objects in a social application, where the second user includes a user corresponding to a login account currently logged in the social application, and may also include an owner of the second terminal device, and the social object includes at least one of a group session or a single chat session (e.g., a friend session or a non-friend session). For example, the second user may select one or more social objects individually or in batches in the social application.
A second module 202, configured to generate first verification setting of the target function based on a setting operation of the second user on the target function corresponding to each social object. The first verification setting includes a password setting, the target function includes any function (e.g., a common function or a privacy function) presented when a user corresponding to the social object performs a session, for example, in response to a trigger operation of a second user on a setting interface corresponding to the social object (e.g., a group session) in the social application, the second terminal device presents the privacy setting interface, where the interface includes one or more functions (e.g., a red packet, a camera, a video, etc.) related to the group session and to be verified and set for the red packet function, according to a selection operation (e.g., a red packet sending function) of the second user, the second user performs verification setting (e.g., password setting) for the red packet sending function after the second user is selected, and stores the password setting.
Here, the specific implementation of the two-in-one module 201 and the two-in-two module 202 is the same as or similar to the embodiment of the steps S201 and S202 in fig. 3, and therefore, the detailed description is omitted, and the detailed implementation is incorporated herein by reference.
In some embodiments, the second terminal device further comprises a second-third module 203 (not shown), the second-third module 203 is configured to determine the available usage time period information of the target function; a second module 202, configured to generate first verification setting of the target function based on a setting operation of the second user on the target function corresponding to each social object and the use time period information of the target function. The specific implementation manner of the two or three modules 203 is the same as or similar to the embodiment of the step S203, and thus is not described herein again, and is included herein by reference.
In some embodiments, the second terminal device further comprises a second-fourth module 204 (not shown), the second-fourth module 204 is configured to determine security level information of the target function; inquiring other functions belonging to the same classification with the security level information of the target function in a security level classification table according to the security level information of the target function; a second module 202, configured to generate first verification setting of the target function and the other functions based on a setting operation of the second user on the target function corresponding to each social object. The specific implementation manner of the two-four module 204 is the same as or similar to the embodiment of the step S204, and therefore, the detailed description is omitted, and the detailed implementation manner is included herein by reference.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method as recited in any preceding claim.
FIG. 8 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 8, the system 300 can function as any of the devices in each of the described embodiments. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or to any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may comprise a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controllers of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, as an Application Specific Integrated Circuit (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media whereby communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it will be obvious that the term "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (13)

1. A method for using application functions in a social application is applied to a first terminal device, wherein the method comprises the following steps:
responding to a trigger operation of a first user in a social application of first terminal equipment, and acquiring a target social object in the social application, wherein the trigger operation comprises a selection operation of the first user on the target social object in one or more social objects in the social application;
if the verification setting of the one or more functions corresponding to the target social object is started in the first terminal device, responding to the acquisition operation of the first user on a target function related to the target social object in the one or more functions, detecting whether the first user meets a verification information condition of the target function, and if so, executing the target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function comprises a function for the first user to perform social interaction with the user in the target social object;
if the verification setting of one or more functions corresponding to the target social object is not started in the first terminal device, the first user can use a plurality of application functions in the social application;
detecting whether the first user meets a verification information condition of the target function or not in response to the acquisition operation of the first user on the target function related to the target social object, and if so, executing the target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function includes a function for the first user to perform social interaction with a user in the target social object, and includes:
enabling verification setting of one or more functions corresponding to the target social object, responding to the acquisition operation of the first user on a target function in the one or more functions, detecting whether the first user meets a verification information condition of the target function, and if so, executing the target operation corresponding to the target function; otherwise, ignoring the obtaining operation, where the target function includes a function for the first user to perform social interaction with a user in the target social object, and the enabling of the verification setting of one or more functions corresponding to the target social object includes: acquiring image information of the first user through the social application, and sending the image information to network equipment corresponding to the social application; receiving history limited information, which is returned by the network equipment and is determined according to the image information, of the first user in the social application; enabling verification setting of one or more functions corresponding to the target social object according to the history limited information, wherein the history limited information comprises history verification setting information of the first user in the social application and relevant to the target social object.
2. The method of claim 1, wherein the enabling of the verification settings of the one or more functions corresponding to the target social object comprises:
and enabling verification setting of one or more functions corresponding to the target social object in response to selection operation of a second user on the one or more functions in the social application.
3. The method of claim 1, wherein the executing the target operation corresponding to the target function if satisfied comprises:
and if so, executing the target operation corresponding to the target function, wherein the current time accords with the use time period corresponding to the target function.
4. The method according to claim 1, wherein in response to an obtaining operation of the first user on a target function related to the target social object, detecting whether the first user meets an authentication information condition of the target function, and if so, executing a target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function includes a function for the first user to perform social interaction with a user in the target social object, and includes:
responding to the acquisition operation of the first user on a target function related to the target social object, and judging whether the target function belongs to a list of functions to be verified;
if yes, detecting whether the first user meets the verification information condition of the target function, and if yes, executing target operation corresponding to the target function; otherwise, the acquisition operation is ignored.
5. The method of claim 4, wherein the determining whether the target function belongs to a list of functions to be verified comprises:
sending the target function to network equipment corresponding to the social application;
receiving a matching result sent by the network equipment after the target function is matched in a function list to be verified;
if the matching result is not null, judging that the target function belongs to the list of functions to be verified; otherwise, judging that the target function does not belong to the list of functions to be verified.
6. The method according to claim 4 or 5, wherein the detecting whether the first user satisfies the verification information condition of the target function if the first user belongs to the target function comprises:
if the social application belongs to the target function, sending a verification request about the target function to network equipment corresponding to the social application, wherein the verification request comprises verification information input by the first user;
receiving verification feedback information returned by the network equipment in response to the verification request;
if the verification feedback information is consistent, determining that the first user meets the verification information condition of the target function; otherwise, determining that the first user does not meet the verification information condition of the target function, wherein the verification feedback information is obtained by comparing default verification information of the target function obtained by the network equipment with the verification information.
7. The method of claim 4, wherein the method further comprises:
and if the target function does not belong to the list of the functions to be verified, executing target operation corresponding to the target function.
8. A method for limiting application functions in social applications is applied to a second terminal device, wherein the method comprises the following steps:
responding to a trigger event in a social application, and acquiring one or more social objects selected by a second user in the social application;
generating first verification setting of the target function based on setting operation of the second user on the target function corresponding to each social object, wherein if the first verification setting of the target function corresponding to the target social object in the one or more social objects is enabled in the second terminal device, whether the first user meets the verification information condition of the target function is detected in response to acquisition operation of the first user on the target function related to the target social object, and if so, the target operation corresponding to the target function is executed; otherwise, ignoring the obtaining operation, wherein the target social object is obtained based on a triggering operation of the first user in the social application, the triggering operation comprises a selecting operation of the first user on a target social object in one or more social objects in the social application, and the target function comprises a function for the first user to perform social interaction with a user in the target social object; if the first verification setting of the target function corresponding to the target social object is not started in the second terminal device, the first user can use the target function;
detecting whether the first user meets a verification information condition of the target function or not in response to the acquisition operation of the first user on the target function related to the target social object, and if so, executing the target operation corresponding to the target function; otherwise, ignoring the obtaining operation, wherein the target function includes a function for the first user to perform social interaction with a user in the target social object, and includes:
enabling verification setting of one or more functions corresponding to the target social object, responding to the acquisition operation of the first user on a target function in the one or more functions, detecting whether the first user meets a verification information condition of the target function, and if so, executing the target operation corresponding to the target function; otherwise, ignoring the obtaining operation, where the target function includes a function for the first user to perform social interaction with a user in the target social object, and the enabling of the verification setting of one or more functions corresponding to the target social object includes: acquiring image information of the first user through the social application, and sending the image information to network equipment corresponding to the social application; receiving history limited information, which is returned by the network equipment and is determined according to the image information, of the first user in the social application; enabling verification setting of one or more functions corresponding to the target social object according to the history limited information, wherein the history limited information comprises history verification setting information of the first user in the social application and relevant to the target social object.
9. The method of claim 8, wherein the method further comprises:
determining usage period information for which the target function is available;
generating a first verification setting of the target function based on the setting operation of the second user on the target function corresponding to each social object, including:
and generating first verification setting of the target function based on setting operation of the second user on the target function corresponding to each social object and the use time period information of the target function.
10. The method of claim 8, wherein the method further comprises:
determining security level information of the target function;
inquiring other functions belonging to the same classification with the security level information of the target function in a security level classification table according to the security level information of the target function;
generating a first verification setting of the target function based on the setting operation of the second user on the target function corresponding to each social object, including:
and generating first verification setting of the target function and the other functions based on the setting operation of the second user on the target function corresponding to each social object.
11. An apparatus for using application functionality in a social application, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 1 to 7.
12. An apparatus for restricting application functionality in a social application, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 8 to 10.
13. A computer-readable medium storing instructions that, when executed by a computer, cause the computer to perform operations of any of the methods of claims 1-10.
CN202010844787.5A 2020-08-20 2020-08-20 Method and equipment for using or limiting application function in social application Active CN112073578B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010844787.5A CN112073578B (en) 2020-08-20 2020-08-20 Method and equipment for using or limiting application function in social application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010844787.5A CN112073578B (en) 2020-08-20 2020-08-20 Method and equipment for using or limiting application function in social application

Publications (2)

Publication Number Publication Date
CN112073578A CN112073578A (en) 2020-12-11
CN112073578B true CN112073578B (en) 2022-07-12

Family

ID=73662534

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010844787.5A Active CN112073578B (en) 2020-08-20 2020-08-20 Method and equipment for using or limiting application function in social application

Country Status (1)

Country Link
CN (1) CN112073578B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948142B (en) * 2021-03-03 2023-05-09 上海掌门科技有限公司 Method, apparatus, medium and program product for determining target feedback information
CN114974607B (en) * 2022-06-01 2023-08-25 平安盐野义有限公司 Disease propagation prevention method, social system, server device, and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100034A (en) * 2014-05-23 2015-11-25 阿里巴巴集团控股有限公司 Method and apparatus for an access function in network applications
CN106709322A (en) * 2017-01-04 2017-05-24 北京奇虎科技有限公司 Application encryption method and apparatus, and mobile terminal
CN108513171A (en) * 2018-03-27 2018-09-07 广州视源电子科技股份有限公司 Control method, device and the equipment of terminal content, readable storage medium storing program for executing
CN108647510A (en) * 2018-05-16 2018-10-12 阿里巴巴集团控股有限公司 Application program access method and device
WO2018232659A1 (en) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 Mobile terminal privacy processing method and mobile terminal
CN110096893A (en) * 2019-04-30 2019-08-06 维沃移动通信有限公司 A kind of object method for limiting and terminal device
CN110838010A (en) * 2019-10-30 2020-02-25 腾讯科技(深圳)有限公司 Service processing method, device, terminal, server and storage medium
CN110851802A (en) * 2019-11-06 2020-02-28 腾讯科技(深圳)有限公司 Authority control method, device, equipment and computer readable medium
CN111027030A (en) * 2019-11-26 2020-04-17 维沃移动通信有限公司 Permission setting method and terminal device
CN111507728A (en) * 2020-04-22 2020-08-07 腾讯科技(深圳)有限公司 Payment configuration method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090317A (en) * 2006-06-13 2007-12-19 华为技术有限公司 Method and device for distribution operation management
CN103795849B (en) * 2012-11-01 2017-05-31 广州三星通信技术研究有限公司 The device and method of operation are performed for private contact in portable terminal
JP6158260B2 (en) * 2015-08-24 2017-07-05 京セラ株式会社 Electronic device, control program, and operation method of electronic device
CN106330864B (en) * 2016-08-11 2019-11-29 北京小米支付技术有限公司 The processing method of verification information, apparatus and system
CN106506524B (en) * 2016-11-30 2019-01-11 百度在线网络技术(北京)有限公司 Method and apparatus for verifying user

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100034A (en) * 2014-05-23 2015-11-25 阿里巴巴集团控股有限公司 Method and apparatus for an access function in network applications
CN106709322A (en) * 2017-01-04 2017-05-24 北京奇虎科技有限公司 Application encryption method and apparatus, and mobile terminal
WO2018232659A1 (en) * 2017-06-21 2018-12-27 深圳支点电子智能科技有限公司 Mobile terminal privacy processing method and mobile terminal
CN108513171A (en) * 2018-03-27 2018-09-07 广州视源电子科技股份有限公司 Control method, device and the equipment of terminal content, readable storage medium storing program for executing
CN108647510A (en) * 2018-05-16 2018-10-12 阿里巴巴集团控股有限公司 Application program access method and device
CN110096893A (en) * 2019-04-30 2019-08-06 维沃移动通信有限公司 A kind of object method for limiting and terminal device
CN110838010A (en) * 2019-10-30 2020-02-25 腾讯科技(深圳)有限公司 Service processing method, device, terminal, server and storage medium
CN110851802A (en) * 2019-11-06 2020-02-28 腾讯科技(深圳)有限公司 Authority control method, device, equipment and computer readable medium
CN111027030A (en) * 2019-11-26 2020-04-17 维沃移动通信有限公司 Permission setting method and terminal device
CN111507728A (en) * 2020-04-22 2020-08-07 腾讯科技(深圳)有限公司 Payment configuration method and device

Also Published As

Publication number Publication date
CN112073578A (en) 2020-12-11

Similar Documents

Publication Publication Date Title
US11509485B2 (en) Identity authentication method and system, and computing device
US11126716B2 (en) System security method and apparatus
EP3332372B1 (en) Apparatus and method for trusted execution environment based secure payment transactions
CN108632253B (en) Client data security access method and device based on mobile terminal
US11075761B2 (en) Hypervisor supported secrets compartment
CN108965250B (en) Digital certificate installation method and system
US10642664B2 (en) System and method for securing an inter-process communication via a named pipe
CN110266505B (en) Method and equipment for managing session group
US20210105627A1 (en) Method and a device for authorizing a user equipment to connect to a wireless access point
CN112073578B (en) Method and equipment for using or limiting application function in social application
KR20130113486A (en) User identity attestation in mobile commerce
CN107396364B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
US11475123B2 (en) Temporary removal of software programs to secure mobile device
CN109890024B (en) Method and equipment for determining rescue group information
US11411887B2 (en) Method and device for performing traffic control on user equipment
CN113544665B (en) Execution of measurements of trusted agents in resource-constrained environments using proof of work
US11153387B2 (en) Decentralized network protected IoT query resolution
CN111932230A (en) Method and equipment for modifying red envelope
CN113821841B (en) Resource management method, computing device and readable storage medium
CN110460642B (en) Method and device for managing reading mode
CN113918897A (en) Method, apparatus, and medium for displaying application in application open platform
CN110958315A (en) Method and equipment for presenting message notification
CN111934981A (en) Method and equipment for withdrawing red packet
CN110750162A (en) Input method and equipment
CN110784596A (en) Method and equipment for processing event information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant