CN112287330B - Authority configuration method and device for application program, computer equipment and storage medium - Google Patents

Authority configuration method and device for application program, computer equipment and storage medium Download PDF

Info

Publication number
CN112287330B
CN112287330B CN202011323189.XA CN202011323189A CN112287330B CN 112287330 B CN112287330 B CN 112287330B CN 202011323189 A CN202011323189 A CN 202011323189A CN 112287330 B CN112287330 B CN 112287330B
Authority
CN
China
Prior art keywords
authority
target
terminal
application program
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011323189.XA
Other languages
Chinese (zh)
Other versions
CN112287330A (en
Inventor
吕文辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Beijing Co Ltd
Original Assignee
Tencent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Beijing Co Ltd filed Critical Tencent Technology Beijing Co Ltd
Priority to CN202011323189.XA priority Critical patent/CN112287330B/en
Publication of CN112287330A publication Critical patent/CN112287330A/en
Application granted granted Critical
Publication of CN112287330B publication Critical patent/CN112287330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application relates to a permission configuration method, a permission configuration device, computer equipment and a storage medium of an application program, and relates to the technical field of interface interaction. The method comprises the following steps: acquiring terminal information of a terminal; acquiring the identification of the target authority in the candidate authority set based on the terminal information; responding to the first starting of a target application program, and displaying a default authority interface based on the identification of the target authority; the default authority interface comprises the target authority in a default selected state; and in response to receiving the first permission confirmation operation, configuring the target permission for the target application program. According to the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the interaction efficiency in the authority confirmation process of the application program is improved under the condition that the accuracy of authority configuration is ensured.

Description

Authority configuration method and device for application program, computer equipment and storage medium
Technical Field
The present invention relates to the field of interface interaction technologies, and in particular, to a method and apparatus for configuring rights of an application program, a computer device, and a storage medium.
Background
With the development of computer application technology, more and more application programs are provided to a terminal for installation.
During use, an application typically needs to implement certain functions with the aid of one or more system permissions. In the related technology, when an application program is installed by a terminal and started for the first time, a confirmation prompt box pops up one by one for each required authority, so as to prompt a user to determine whether to grant the corresponding authority to the application program one by one, and when the user clicks one confirmation prompt box to determine, a corresponding authority is configured for the application program.
However, in the above solution, the user is required to confirm each right requested by the terminal one by one, which results in lower interaction efficiency in the right confirmation process of the application program.
Disclosure of Invention
The embodiment of the application provides a permission configuration method, a permission configuration device, computer equipment and a storage medium of an application program, which can improve interaction efficiency in a permission confirmation process of the application program, and the technical scheme is as follows:
in one aspect, a method for configuring rights of an application program is provided, the method including:
acquiring terminal information of a terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
Acquiring an identification of a target authority in a candidate authority set based on the terminal information, wherein the candidate authority set comprises the authority which can be acquired by a target application program;
responding to the first start of the target application program, and displaying a default authority interface based on the identification of the target authority; the default authority interface comprises the target authority in a default selected state;
and in response to receiving the first permission confirmation operation, configuring the target permission for the target application program.
In one aspect, a method for configuring rights of an application program is provided, the method including:
receiving an authority inquiry request sent by a terminal; the permission query request comprises terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
acquiring the identification of the target authority in the candidate authority set based on the terminal information of the terminal and the authority selection condition of each user in the process of installing each application program; the candidate authority set comprises the authority which can be acquired by the target application program;
The identification of the target authority is sent to the terminal, so that the terminal responds to the first starting of the target application program, displays a default authority interface based on the identification of the target authority, responds to the receiving of a first authority confirmation operation, and configures the target authority for the target application program; the default authority interface comprises the target authority in a default selected state.
In one aspect, a method for configuring rights of an application program is provided, the method including:
responding to the first starting of a target application program in the terminal, and displaying a default authority interface; the default authority interface comprises a target authority in a default selected state; the terminals with different terminal information have different target rights; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
and in response to receiving the first permission confirmation operation, configuring the target permission for the target application program.
In yet another aspect, there is provided an authority configuration apparatus of an application program, the apparatus including:
The information acquisition module is used for acquiring terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
the identification acquisition module is used for acquiring the identification of the target authority in the candidate authority set based on the terminal information, wherein the candidate authority set comprises the acquirable authorities of the target application program;
the interface display module is used for responding to the first starting of the target application program and displaying a default authority interface based on the identification of the target authority; the default authority interface comprises the target authority in a default selected state;
and the first permission configuration module is used for responding to the received first permission confirmation operation and configuring the target permission for the target application program.
In a possible implementation manner, the identifier obtaining module is configured to send a permission query request containing the terminal information to a server, where the permission query request is used to instruct the server to determine the target permission from the candidate permission set based on the terminal information and permission selection situations of each user in a process of installing each application program;
And receiving the identification of the target authority sent by the server.
In a possible implementation manner, the identifier obtaining module is configured to send the permission query request to the server during the process that the terminal installs the target application program.
In one possible implementation, the identifier acquisition module is configured to, in response to a request from the user,
responding to the terminal information comprising the application authority information, acquiring a homogeneous program set of the target application program, wherein the homogeneous program set comprises homogeneous application programs of the target application program;
based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal.
In a possible implementation manner, when the identifier of the target authority in the candidate authority set is acquired based on the identifier of the authority of the application program of the same kind installed in the terminal, the identifier acquisition module is configured to,
and obtaining the identification of the target authority by taking the union of the identifications of the authorities of the similar application programs installed in the terminal and the authority identifications contained in the candidate authority sets.
In a possible implementation manner, when the identifier of the authority of the similar application program installed in the terminal and the identifier of the authority contained in the candidate authority set are obtained and combined, the identifier obtaining module is used for obtaining the identifier of the target authority,
sequencing the identifications of the rights of the similar application programs installed in the terminal according to the sequence from big to small of the occurrence times of the identifications of the rights of the similar application programs installed in the terminal, and obtaining an identification sequencing queue;
and obtaining the identification of the target authority by taking the identification of the first n authorities in the identification sequencing queue and the authority identification contained in the candidate authority set as a union set, wherein n is an integer greater than or equal to 1.
In a possible implementation manner, the default authority interface further includes other authorities except the target authority in the candidate authority set, and the other authorities are in a default unselected state in the default authority interface;
the apparatus further comprises:
the adjusting module is used for responding to the received permission adjusting operation and adjusting the permission in the selected state in the default permission interface;
And the second permission configuration module is used for responding to the received second permission confirmation operation and configuring permissions in a selected state in the default permission interface for the target application program.
In yet another aspect, there is provided an authority configuration apparatus of an application program, the apparatus including:
the request receiving module is used for receiving the permission query request sent by the terminal; the permission query request comprises terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
the identification acquisition module is used for acquiring the identification of the target authority in the candidate authority set based on the terminal information of the terminal and the authority selection condition of each user in the process of installing each application program; the candidate authority set comprises the authority which can be acquired by the target application program;
the identification sending module is used for sending the identification of the target authority to the terminal so that the terminal responds to the first starting of the target application program, displays a default authority interface based on the identification of the target authority, and configures the target authority for the target application program in response to the receiving of a first authority confirmation operation; the default authority interface comprises the target authority in a default selected state.
In one possible implementation, the identifier acquisition module is configured to, in response to a request from the user,
responding to the terminal information comprising the application authority information, acquiring a homogeneous program set of the target application program, wherein the homogeneous program set comprises homogeneous application programs of the target application program; the similar program set is obtained by collaborative filtering based on application programs based on the application installation information corresponding to each user;
based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal.
In one possible implementation, the identifier acquisition module is configured to, in response to a request from the user,
responding to the terminal information comprising the application installation information, and carrying out collaborative filtering based on the user based on the application installation information corresponding to each user to obtain similar users corresponding to the terminal; the application installation information corresponding to each user comprises the application installation information of the terminal;
Acquiring the identification of the authority set by the similar users on the target application program;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authority set by the similar users on the target application program.
In yet another aspect, a computer device is provided, the computer device including a processor and a memory, the memory storing at least one computer program, the at least one computer program loaded and executed by the processor to implement the permission configuration method of the application program described above.
In yet another aspect, a computer readable storage medium is provided, in which at least one computer program is stored, the at least one computer program being loaded and executed by a processor to implement the rights configuration method of the application program described above.
In yet another aspect, a computer program product or computer program is provided, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the authority configuration method of the application program.
The technical scheme that this application provided can include following beneficial effect:
the terminal can automatically determine the default configuration permission of the target application program from the permission acquired by the target application program based on the application program installed in the terminal and/or the permission of the application program installed in the terminal, and display the default selected target permission through an interface when the target application program is started for the first time to obtain the confirmation of the user, and then the target permission can be configured for the target application program; in the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the user does not need to be respectively reminded of each authority, the confirmation operation of the user is reduced, and the effect of improving the interaction efficiency in the authority confirmation process of the application program under the condition of ensuring the accuracy of the authority configuration is achieved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a system configuration diagram of a rights configuration system in accordance with various embodiments of the present application;
FIG. 2 is a flow chart illustrating a method of configuring rights of an application according to an exemplary embodiment;
FIG. 3 is a schematic illustration of a default rights interface involved in the embodiment of FIG. 2;
FIG. 4 is a flowchart illustrating a method of configuring rights of an application according to an exemplary embodiment;
FIG. 5 is a flowchart illustrating a method of configuring rights of an application according to an exemplary embodiment;
FIG. 6 is a schematic diagram of a default rights interface involved in the embodiment of FIG. 5;
FIG. 7 is a flow chart framework of a rights configuration involved in the embodiment shown in FIG. 5;
FIG. 8 is a flowchart illustrating a method of configuring rights of an application according to an exemplary embodiment;
FIG. 9 is a block diagram illustrating a configuration of a rights configuration device of an application according to an exemplary embodiment;
FIG. 10 is a block diagram illustrating a configuration of a rights configuration device for an application according to an exemplary embodiment;
fig. 11 is a block diagram illustrating a computer device according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
Before describing the various embodiments shown in this application, several concepts related to this application will be described first:
1) Rights of application programs
In various embodiments subsequent to this application, the rights of the application described above are also referred to as system rights. For example, the rights of the application may include, but are not limited to: access to address books, access to photo albums, access to cameras, access to microphones, use of wireless data, access to geographic locations, message cues, etc.
In use, an application may need to have some system rights or rights based on the requirements of the built-in implementation of the function, e.g., the application needs to obtain rights to access the camera for the function implemented based on photographing/video recording.
When an application is installed and used in a terminal, a user may not assign all rights available to the application, but may selectively configure one or more rights insensitive to the user, in view of the need to protect the privacy of the user. For example, when an application may obtain access to an album, the user may not configure the application with access to the album during installation of the application because the terminal's album stores more private photos.
2) Collaborative filtering
Collaborative filtering recommendation is a scheme for analyzing user interests, finding similar (interested) users/similar items in a user group/item group, and integrating the similar users/similar items to form a preference prediction of a specified user for specified information/content.
Collaborative filtering is applied in many successful recommendation systems. For example, the e-commerce recommendation system may use collaborative filtering technology to recommend goods to the target user according to comment information of other users.
Collaborative filtering algorithms are largely divided into heuristic-based and model-based types.
The collaborative filtering algorithm Based on heuristic can be further divided into a collaborative filtering algorithm Based on users (User-Based) and a collaborative filtering algorithm Based on items (Item-Based).
The heuristic collaborative filtering algorithm mainly comprises 3 steps:
1) Collecting user preference information;
2) Searching similar items or users;
3) A recommendation is generated.
Among these, collaborative filtering based on items has a basic assumption: items that are able to be of interest to the user must be similar to items that were previously scored high. That is, collaborative filtering based on items replaces similarity between users by computing similarity between items.
The project-based collaborative filtering may include the steps of:
1) Collecting user information;
information is collected that may represent user interest. For example, which applications the user installed, which permissions the user set during the installation of the applications, which merchandise the user purchased, which scores/comments the user produced on the merchandise purchased, and so on.
2) Nearest neighbor searching for the item;
the nearest neighbor search may be to calculate the similarity between the evaluated item and the item to be predicted, and weight the score of each evaluated item with the similarity as a weight to obtain the predicted value of the item to be predicted. For example: to calculate the similarity between item A and item B, we first find out the combinations that are used for both A and B, and then calculate the similarity between these combinations. Common Similarity algorithms include Pearson Correlation Coefficient (pearson correlation coefficient), cosine-based Similarity, adjusted Cosine Similarity (adjusted Cosine Similarity), and so forth.
3) A recommendation result is generated.
Collaborative project-based filtering does not require user history data or user identification. For projects, the similarity between the projects is stable, so that the similarity calculation step with the largest workload can be finished offline, the online calculation amount is reduced, and the recommendation efficiency is improved, and particularly, the similarity calculation step is obvious in the case that more users are more than the projects.
User-based collaborative filtering is to obtain neighboring users with similar hobbies or interests by means of similar statistics, so it is also called User-based collaborative filtering or Neighbor-based collaborative filtering (Neighbor-based Collaborative Filtering).
The user-based collaborative filtering step may be as follows:
1) Collecting user information;
2) Searching for nearest neighbors;
the starting point of collaborative filtering based on users is to find another group of users with the same interests as the users, or to calculate the similarity of the two users. For example: n users with similar interests to user a were found and their ratings for M were predicted as ratings for a for M. Generally, different algorithms are selected according to different data, and currently, the Similarity algorithms used in the prior art include Pearson Correlation Coefficient (pearson correlation coefficient), cosine Similarity and Adjusted Cosine Similarity (adjusted Cosine Similarity).
3) A recommendation result is generated.
The collaborative filtering algorithm based on the user firstly searches other users similar to the new user according to the historical behavior information of the user; meanwhile, the items possibly liked by the current new user are predicted according to the evaluation information of other items of the similar users.
For example, in merchandise recommendation, given a user scoring data matrix R, a user-based collaborative filtering algorithm needs to define a similarity function to calculate the similarity between users, and then calculate a recommendation result based on the scoring data and the similarity matrix.
Referring to fig. 1, a system configuration diagram of a rights configuration system according to various embodiments of the present application is shown. As shown in fig. 1, the system includes a server 120 and a number of terminals 160.
The server 120 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, a content delivery network (Content Delivery Network, CDN), basic cloud computing services such as big data and an artificial intelligence platform.
In one possible implementation, the terminal 160 has a function of installing and running the application corresponding to the server 120. For example, the terminal 160 may be a smart phone, a tablet computer, an electronic book reader, a smart glasses, a smart watch, an MP3 player (Moving Picture Experts Group Audio Layer III, moving picture experts compression standard audio layer 3), an MP4 (Moving Picture Experts Group Audio Layer IV, moving picture experts compression standard audio layer 4) player, a notebook or desktop computer, and the like. Alternatively, the terminal 160 may also be referred to as a user device, portable terminal, laptop terminal, desktop terminal, or the like.
In the embodiment of the present application, the application program may include any type of application program, for example, including, but not limited to, a video playing application program, a video live application program, a news class application program, a reading class application program, a music playing class application program, a social class application program, a game class application program, a communication class application program, a browser class application program, a storage class application program, a computing class application program, a security management class application program, and so on.
The terminal 160 is connected to the server 120 via a communication network. Optionally, the communication network is a wired network or a wireless network.
Optionally, the system may further include a management device (not shown in fig. 1) connected to the server 120 through a communication network. Optionally, the communication network is a wired network or a wireless network.
Alternatively, the wireless network or wired network described above uses standard communication techniques and/or protocols. The network is typically the Internet, but may be any network including, but not limited to, a local area network (Local Area Network, LAN), metropolitan area network (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), mobile, wired or wireless network, private network, or any combination of virtual private networks. In some embodiments, data exchanged over the network is represented using techniques and/or formats including HyperText Mark-up Language (HTML), extensible markup Language (Extensible Markup Language, XML), and the like. All or some of the links may also be encrypted using conventional encryption techniques such as secure socket layer (Secure Socket Layer, SSL), transport layer security (Transport Layer Security, TLS), virtual private network (Virtual Private Network, VPN), internet protocol security (Internet Protocol Security, IPsec), and the like. In other embodiments, custom and/or dedicated data communication techniques may also be used in place of or in addition to the data communication techniques described above.
Reference is now made to fig. 2, which is a flowchart illustrating a method for configuring rights of an application, which may be used in a computer device, according to an exemplary embodiment. The computer device may be a terminal, for example, the computer device may be the terminal 160 in the system shown in fig. 1. As shown in fig. 2, the authority configuration method of the application program may include the steps of:
step 21, obtaining terminal information of a terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application right information is used to indicate the right of the installed application.
The above steps may be performed by an application or a program component in the terminal, for example, when the terminal installation target application is completed, or the application or the program component may be triggered to acquire the above terminal information during the process of installing the target application in the terminal.
Alternatively, before the terminal installs the target application, for example, when no application is installed or deleted in the terminal, the application or the program component may be triggered to acquire the terminal information.
Step 22, obtaining the identification of the target authority in the candidate authority set based on the terminal information, wherein the candidate authority set comprises the acquirable authorities of the target application program.
In the embodiment of the application, in the running process of the target application program, certain system permissions need to be acquired to realize certain functions of the target application program, and the permissions required to be acquired by the target application program are the permissions forming the candidate permission set.
Step 23, responding to the first start of the target application program, and displaying a default authority interface based on the identification of the target authority; the default authority interface contains the target authority in a default selected state.
In the embodiment of the application, when the target authority contains a plurality of authorities, the terminal can aggregate and display the plurality of target authorities in the default authority interface so as to realize unified reminding of the plurality of authorities, and users do not need to be reminded one by one.
In this embodiment of the present application, the first start of the target application may refer to the first start of the target application after being installed or updated in the current terminal.
In one possible implementation, the default permission interface is a boot interface that is presented before the main interface of the target application.
And step 24, in response to receiving the first permission confirmation operation, configuring the target permission for the target application program.
According to the scheme, a default authority interface is displayed in response to the first starting of the target application program in the terminal; the default authority interface comprises a target authority in a default selected state; the terminal information of the terminal is different, and the target authority is different; and in response to receiving the first permission confirmation operation, configuring the target permission for the target application.
For example, please refer to fig. 3, which illustrates a default rights interface diagram according to an embodiment of the present application. As shown in fig. 3, when the target application program is started for the first time after being installed, a default authority interface 31 is displayed, one or more target authorities 32 set as selected by default are displayed in an aggregated manner in the default authority interface 31, if the user determines that the target authorities 32 are set for the target application program, the user can trigger to configure the target authorities for the target application program through determining the operation, and in this process, the user does not need to confirm each authority one by one.
In addition, for terminals having different terminal information, when the target application is installed (i.e., a plurality of terminals install the same application), the target rights displayed in the default rights interface may also be different.
For example, if there is a difference between the terminal information of the terminal a and the terminal B, the target rights 32 displayed in the default rights interface 31 are different when the terminal a and the terminal B install the same target application. For example, assume that rights available to the target application include access to the camera, access to the album, access to the address book, access to the geographic location, and message prompting; in fig. 3, the target rights 32 shown in the default rights interface 31 in the terminal a include three items of accessing the camera, accessing the album and accessing the address book, while the target rights 32 shown in the default rights interface 31 in the terminal B may include only two items of accessing the camera and accessing the album.
In summary, according to the scheme shown in the embodiment of the present application, after the terminal installs the target application, the terminal may automatically determine the authority of the default configuration of the target application from the authorities available for the target application based on the installed application in the terminal and/or the authority of the installed application in the terminal, and display the default selected target authority through the interface when the target application is started for the first time, so as to obtain the user confirmation, and then configure the target authority for the target application; in the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the user does not need to be respectively reminded of each authority, the confirmation operation of the user is reduced, and the effect of improving the interaction efficiency in the authority confirmation process of the application program under the condition of ensuring the accuracy of the authority configuration is achieved.
In the above-described embodiments of the present application, the identification of the target rights in the candidate rights set may be performed on the network side by the server when the identification is acquired based on the terminal information.
Reference is now made to fig. 4, which is a flowchart illustrating a method for configuring rights of an application, which may be used in a computer device, according to an exemplary embodiment. The computer device may be a server, for example, the computer device may be the server 120 in the system shown in fig. 1. As shown in fig. 4, the authority configuration method of the application program may include the steps of:
step 41, receiving an authority inquiry request sent by a terminal; the permission query request contains terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application right information is used to indicate the right of the installed application.
Step 42, based on the terminal information of the terminal and the authority selection condition of each user in the process of installing each application program, acquiring the identification of the target authority in the candidate authority set; the set of candidate rights includes rights available to the target application.
In the embodiment of the application, the server may determine the similar application programs of the target application program from the application programs in a collaborative filtering manner based on the terminal information of the terminal and the permission selection condition of each user in the process of installing each application program, and/or determine the similar users of the corresponding users of the current terminal from the users in a collaborative filtering manner; and then, predicting the authority of the user corresponding to the current terminal for the configuration of the target application program by combining the authority configuration of the current user for the similar application program and/or the authority configuration of the similar user for the target application program, and taking the predicted authority as the default configured target authority.
Step 43, sending the identifier of the target authority to the terminal, so that the terminal responds to the first start of the target application program, displays a default authority interface based on the identifier of the target authority, and configures the target authority for the target application program in response to receiving a first authority confirmation operation; the default authority interface contains the target authority in a default selected state.
In summary, according to the scheme shown in the embodiment of the present application, after the terminal installs the target application, the server may automatically determine the authority configured by default of the target application from the authorities available for the target application based on the installed application in the terminal and/or the authority of the installed application in the terminal, and when the target application is started for the first time, the terminal displays the target authority selected by default through the interface, so as to obtain the user confirmation, and then may configure the target authority for the target application; in the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the user does not need to be respectively reminded of each authority, the confirmation operation of the user is reduced, and the effect of improving the interaction efficiency in the authority confirmation process of the application program under the condition of ensuring the accuracy of the authority configuration is achieved.
In the scheme shown in the embodiment of the application, the method and the device can be used for accurately predicting the authority of the user, which is possibly configured by the application program, in any application program needing to configure the system authority, and directly displaying the predicted target authority in an interface for the user to confirm the use scene.
For example, after a user downloads an application program capable of acquiring multiple rights from an application market through a terminal, when the terminal installs the application program, a server of the application program or a server of the application market determines that the user may configure the rights of the application program as target rights, and notifies the terminal of the determined target rights, and when a subsequent application program is started for the first time after installation/update, the target rights can be uniformly prompted in a default rights interface before the main interface of the application program is displayed, and when the user determines that the target rights are to be configured, the terminal uniformly configures the target rights for the application program.
After a user downloads an application program capable of acquiring multiple rights from an application market through a terminal, the terminal automatically determines the rights possibly configured by the user for the application program as target rights when the terminal installs the application program, and the target rights can be uniformly prompted in a default rights interface when a subsequent application program is started for the first time after installation/updating.
Reference is now made to fig. 5, which is a flowchart illustrating a method for configuring permissions of an application according to an exemplary embodiment. The method may be used with a computer device. Wherein the computer device may include a terminal and a server; for example, the terminal may be the terminal 160 in the system shown in fig. 1 and the server may be the server 120 in the system shown in fig. 1. As shown in fig. 5, the authority configuration method of the application program may include the steps of:
in step 501, the terminal obtains an installation package of the target application program.
In the embodiment of the application, the terminal can download the installation package of the target application program from the server. The server may be a server that provides for downloading of the application installation package, or may be a server that provides background support for the target application.
After the terminal downloads the installation package of the target application program, the target application program can be installed.
Step 502, the terminal obtains terminal information.
The terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application right information is used to indicate the right of the installed application.
In the embodiment of the present application, the application installation information of the terminal may indicate which applications have been installed in the terminal, for example, the application installation information may include a name list of applications installed in the terminal.
The application permission information of the terminal may indicate permissions of the applications installed in the terminal, for example, the application installation information may include a name list of the applications installed in the terminal, and a permission list corresponding to each application name in the name list, where the permissions in the permission list are permissions of the corresponding applications in the terminal.
The terminal information may be acquired by requesting an operating system.
The step 502 may be performed before the installation of the target application, or performed when the installation of the target application is completed, or may be performed during the installation of the target application.
Step 503, the terminal sends a permission query request containing the terminal information to the server; the server receives the permission query request.
The permission query request is used for indicating the server to determine target permissions from the candidate permission sets based on the terminal information and permission selection conditions of each user in the process of installing each application program.
Wherein the set of candidate permissions includes permissions that are available to the target application.
In one possible implementation, when sending the permission query request including the terminal information to the server, the terminal may send the permission query request to the server during installation of the target application. Therefore, when the target application program is started for the first time, the target authority can be determined as early as possible, so that the display is performed on the default authority interface in time, and the delay of the display of the default authority interface is reduced.
In one possible implementation manner, when the terminal installs the target application program, firstly, installing an intermediate component corresponding to the target application program, wherein the intermediate component can run independently of the target application program in an operating system and can perform information interaction with the target application program after the installation is completed; in the process of installing a target application program, the terminal requests an operating system of the terminal to acquire the terminal information through an intermediate component, generates a permission query request containing the terminal information, and sends the permission query request to a server.
Step 504, the server obtains the identification of the target authority in the candidate authority set based on the terminal information of the terminal and the authority selection condition of each user in the process of installing each application program.
In one possible implementation manner, when obtaining the identifier of the target authority in the candidate authority set based on the terminal information of the terminal and the authority selection condition of each user in the process of installing each application program, the server may obtain a homogeneous program set of the target application program in response to the terminal information including the application authority information, where the homogeneous program set includes homogeneous application programs of the target application program; the similar program set is obtained by collaborative filtering based on application programs based on the application installation information corresponding to each user; then based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal; and acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal.
In this embodiment of the present application, when the terminal information includes the application permission information, the server may collect, in advance, a collaborative filtering method based on items (i.e., application programs) based on application installation information corresponding to each user (i.e., application programs installed in the terminal of each user), determine similar application programs of a current target application program from each application program, and then obtain, through the application permission information of the terminal, permission of the current user for configuring similar application programs installed in the terminal as a reference, and predict permission of the user for possibly configuring the current target application program as the target permission.
In one possible implementation, if the same type of application is not installed in the terminal, the server may use the rights in the candidate rights set as the target rights.
In one possible implementation manner, when the identifier of the target authority in the candidate authority set is obtained based on the identifier of the authority of the similar application program installed in the terminal, the server may obtain the identifier of the target authority from the identifier of the authority of the similar application program installed in the terminal and the union of the authority identifiers contained in the candidate authority set.
In the embodiment of the application, when the rights of the current user to the current configuration of the similar application program installed in the terminal are taken as references, and the rights of the user to the current configuration of the target application program are predicted, the rights of the user to the configuration of the similar application program installed in the terminal and the rights obtainable by the target application program can be processed in an intersection mode to determine the target rights.
In one possible implementation manner, when the identifiers of the rights of the similar application programs installed in the terminal and the rights identifiers contained in the candidate rights set are combined to obtain the identifiers of the target rights, the server may sort the identifiers of the rights of the similar application programs installed in the terminal according to the order of the occurrence times of the identifiers of the rights of the similar application programs installed in the terminal from large to small, so as to obtain an identifier sorting queue; and the identification of the first n authorities in the identification sequencing queue and the authority identification contained in the candidate authority set are combined to obtain the identification of the target authority, wherein n is an integer greater than or equal to 1.
In this embodiment of the present application, when the user performs intersection processing on the rights configured by the similar application installed in the terminal and the rights that can be acquired by the target application to determine the target rights, if the similar application installed in the terminal includes multiple similar applications, the server may vote on the rights configured by the similar application installed in the terminal according to the occurrence number, and increment the number of votes by 1 without occurrence, and arrange the rights according to the order from large to small of the final number of votes obtained (i.e., the occurrence number), and take the first n (e.g., the first 3) of the arrangement results, and perform intersection processing with the rights that can be acquired by the target application to determine the target rights.
For example, assume that rights available to a target application include access to a camera, access to an album, access to an address book, and message prompting; if the number of the applications of the same kind installed in the terminal is 4, the server votes the authority of the 4 applications of the same kind according to the authority configuration condition of the 3 applications of the same kind in the terminal, the obtained results are an access camera (number of tickets 4), an access album (number of tickets 3), an access geographic position (number of tickets 2) and a message prompt (number of tickets 1), if the number of n is 3, the server takes the 3 authorities (i.e. the access camera, the access album and the access geographic position) with the highest number of tickets, and the server intersects the authority which can be obtained by the target application to obtain two authorities, namely the access camera and the access album, and the server takes the two authorities of the access camera and the access album as predicted target authorities.
In one possible implementation manner, when obtaining the identifier of the target authority in the candidate authority set based on the terminal information of the terminal and the authority selection condition of each user in the process of installing each application program, the server may respond to the terminal information to include the application installation information, and perform collaborative filtering based on the application installation information corresponding to each user to obtain the similar users corresponding to the user of the terminal; the application installation information corresponding to each user comprises the application installation information of the terminal; the identification of the authority set by the same type user on the target application program is obtained; and then based on the identification of the rights set by the similar user for the target application program, acquiring the identification of the target rights in the candidate rights set.
In this embodiment of the present application, when the terminal information includes the application installation information, the server may collect a collaborative filtering method based on the application installation information corresponding to each user (that is, application programs installed in the terminals of each user, respectively), determine similar users corresponding to the current terminal user from each user, and then predict, with the rights of the similar users to the target application configuration as a reference, the rights of the current user to the target application configuration as the target rights.
The server can determine the top n rights with highest vote as the target rights by voting the rights of the same kind of users to the target application, wherein the rights of the same kind of users to the target application are used as references to predict the rights of the current user to the target application, and the server can determine the first n rights with highest vote as the target rights by voting the rights of the same kind of users to the target application.
In one possible implementation, if there is no similar user of the current user of the terminal, the server may use the rights in the candidate rights set as the target rights.
In another possible implementation manner, when the terminal information includes the application permission information and the application installation information, the server may obtain the identifier of the first permission in the candidate permission set based on the identifiers of the permissions of the similar application programs installed in the terminal, obtain the identifier of the second permission in the candidate permission set based on the identifiers of the permissions set by the similar users on the target application program, and then intersect the identifiers of the first permission and the identifiers of the second permission to obtain the identifier of the target permission.
Step 505, the server sends the identification of the target authority to the terminal; correspondingly, the terminal receives the identification of the target authority sent by the server.
In one possible implementation manner, after determining the identifier of the target authority, the server may send the identifier of the target authority to an intermediate component in the terminal, where the intermediate component sends the identifier of the target authority to the target application after the installation of the target application is completed.
In one possible implementation, after the intermediate component sends the identification of the target rights to the target application, the terminal may remove the intermediate component from the operating system to save storage space of the terminal.
Step 506, the terminal responds to the first start of the target application program and displays a default authority interface based on the identification of the target authority; the default authority interface contains the target authority in a default selected state.
For example, please refer to fig. 6, which illustrates a default rights interface diagram according to an embodiment of the present application. As shown in FIG. 6, when the target application is first started after being installed, a default rights interface 61 is displayed, and one or more target rights 62 set in a selected state by default are displayed in an aggregate manner in the default rights interface 61.
In step 507, the terminal configures the target authority for the target application program in response to receiving the first authority confirmation operation.
In the embodiment of the present application, since the target rights are predicted based on the terminal information of the current terminal, that is, the rights that the current user can allow to configure, and the user determines that the target rights are set for the target application, the target rights can be configured for the target application by determining that the operation trigger, for example, directly clicking the determination (for example, clicking the "next" button 63 in the default rights interface 61), and in this process, the user does not need to confirm each of the rights one by one.
And step 508, the terminal responds to the received permission adjustment operation to adjust the permission in the selected state in the default permission interface.
The default authority interface also comprises other authorities except the target authority in the candidate authority set, and the other authorities are in a default unselected state in the default authority interface.
For example, referring to fig. 6, if the other rights exist, the default rights interface 61 also displays the other rights 64 in the unselected state. If the user needs to adjust the permissions for the target application, the selected state of some target permissions may be cancelled in the default permission interface 61 or some other permissions may be set to the selected state.
Step 509, the terminal configures, for the target application, the rights in the selected state in the default rights interface in response to receiving the second rights confirmation operation.
According to the scheme disclosed by the embodiment of the application, statistics can be made on the condition that massive users grant the app rights, an initialized default rights list is provided for the users currently installing the target application program, and when the statistics result and the rights expected by the users are different, the users only need to make personalized adjustment.
In one possible implementation, the statistical result may be a collaborative filtering result based on the item, for example, the server determines the similar apps of the target app in advance through collaborative filtering based on the item; and a user installs a plurality of apps on one terminal, and when the user installs the target app, the user can refer to the permission selection of other similar apps installed by the terminal during installation to perform default permission configuration of the current target app. For example, for a stranding fan, if a user is about to install a stranding software X, and has other stranding software such as YY cis, rich Y, etc. on its terminal, the X software may refer to the authority configuration of the user for other stranding software when installed, and prompt the user to apply for the authority by default software: message hint [ on ], geographical setting [ on ], accessing photos [ on ], etc.
In another possible implementation manner, the statistics result may be a collaborative filtering result based on the user, for example, a manufacturer may obtain, during use of a huge number of users according to the distributed application (for example, which apps are installed by the respective users), and when the current user installs the target app, determine the same kind of users as the current user by using a collaborative filtering manner based on the user, and provide default permission settings for the current user with reference to permission selection of the same kind of users to the current target app, for example, provide default configurations for video entertainment apps such as X view, X sound, X hand, etc.: accessing photos [ on ], accessing cameras [ on ]; for another example, for news information apps such as XX news, XX flash, XX headlines, etc., default configurations are provided: message hint [ on ].
For example, taking an example of implementing default rights prediction for a target application by interaction between a terminal and a server, please refer to fig. 7, which is a flowchart of rights configuration according to an embodiment of the present application. As shown in fig. 7, the server provides a download service of an installation package of a target application, and information of the application installed in the terminal corresponding to each user and authority information of the application installed in the terminal corresponding to each user are stored in a database of the server.
In fig. 7, the server reads information of applications installed in terminals corresponding to respective users from the database in advance, performs collaborative filtering based on items, and obtains a homogeneous application set of a target application (S71).
The terminal downloads the installation package of the target application from the server (S72), and installs the target application.
And in the process of installing the target application program or when the installation of the target application program is completed, the terminal information is sent to the server (S73), and the terminal information comprises at least one of application authority information and application installation information.
And for the case that the terminal information contains the application authority information, the server votes and intersections the authorities of the application programs of the same type in the terminal by the current user indicated by the application authority information (S74), and determines the target authority.
For the case that the terminal information contains application installation information, the server performs collaborative filtering based on the user based on the information of the application program installed in the current terminal indicated by the application installation information and the information of the application program installed in the corresponding terminal of each user read from the database (S75) to obtain the similar users of the corresponding users of the terminal; and then, the authority configuration of the similar users to the target application program is read from the database, and voting is carried out by taking the authority configuration as a reference (S76), so as to determine the target authority.
For the case that the terminal information contains both the application permission information and the application installation information, the server re-acquires the intersection of the target permissions determined in the step S74 and the step S76, and obtains the final target permission.
The server transmits the identification of the determined target authority to the terminal (S77). And when the terminal completes the installation of the target application program and starts the target application program for the first time, displaying a default authority interface based on the identification of the target authority.
In summary, according to the scheme shown in the embodiment of the present application, after the terminal installs the target application, the server may automatically determine the authority configured by default of the target application from the authorities available for the target application based on the installed application in the terminal and/or the authority of the installed application in the terminal, and when the target application is started for the first time, the terminal displays the target authority selected by default through the interface, so as to obtain the user confirmation, and then may configure the target authority for the target application; in the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the user does not need to be respectively reminded of each authority, the confirmation operation of the user is reduced, and the effect of improving the interaction efficiency in the authority confirmation process of the application program under the condition of ensuring the accuracy of the authority configuration is achieved.
In the above-described embodiments of the present application, the identification of the target rights in the candidate rights set may also be performed locally by the terminal when the identification of the target rights in the candidate rights set is acquired based on the terminal information.
Reference is now made to fig. 8, which is a flowchart illustrating a method for configuring permissions of an application according to an exemplary embodiment. The method may be used with a computer device. Wherein the computer device may include a terminal; for example, the terminal may be the terminal 160 in the system shown in fig. 1 described above. As shown in fig. 8, the authority configuration method of the application program may include the steps of:
step 801, obtaining an installation package of a target application program.
Step 802, obtaining terminal information of a terminal.
The terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application right information is used to indicate the right of the installed application.
The steps 801 to 802 are similar to the steps 501 and 502, and are not repeated here.
Step 803, in response to the terminal information including the application permission information, acquiring a homogeneous program set of the target application program, where the homogeneous program set includes homogeneous application programs of the target application program.
The homogeneous program set of the target application program may be information preset in an installation package of the target application program, or the homogeneous program set of the target application program may be information obtained by the terminal in real time from the server.
Step 804, based on the homogeneous program set, obtains the identifier of the authority of the homogeneous application program installed in the terminal.
Step 805, based on the rights identifier of the similar application installed in the terminal, obtains the identifier of the target right in the candidate rights set.
In one possible implementation manner, the obtaining the identifier of the target authority in the candidate authority set based on the identifier of the authority of the similar application program installed in the terminal includes:
and obtaining the identification of the target authority by taking the union set of the authority identifications contained in the candidate authority set and the identifications of the authorities of the similar application programs installed in the terminal.
In one possible implementation manner, the identifying the rights of the similar application program installed in the terminal and the rights identification contained in the candidate rights set are combined to obtain the identification of the target rights, including:
Sequencing the identifications of the rights of the similar application programs installed in the terminal according to the sequence from big to small of the occurrence times of the identifications of the rights of the similar application programs installed in the terminal to obtain an identification sequencing queue;
and obtaining the identification of the target authority by taking the identification of the first n authorities in the identification sequencing queue and the authority identification contained in the candidate authority set as a union set, wherein n is an integer greater than or equal to 1.
The terminal performs 804 and 805 a process similar to the process of the server obtaining the identifier of the target authority in response to the terminal information including the application authority information in the embodiment shown in fig. 5.
Step 806, in response to the first start of the target application, displaying a default rights interface based on the identification of the target rights; the default authority interface contains the target authority in a default selected state.
In response to receiving the first permission validation operation, the target permission is configured for the target application, step 807.
And step 808, in response to receiving the permission adjustment operation, adjusting the permission in the selected state in the default permission interface.
Step 809, in response to receiving the second permission confirmation operation, configures permissions in the selected state in the default permission interface for the target application.
Step 806 to step 809 are similar to step 806 and step 809, and are not repeated here.
In summary, according to the scheme shown in the embodiment of the present application, after the terminal installs the target application, the server may automatically determine the authority configured by default of the target application from the authorities available for the target application based on the installed application in the terminal and/or the authority of the installed application in the terminal, and when the target application is started for the first time, the terminal displays the target authority selected by default through the interface, so as to obtain the user confirmation, and then may configure the target authority for the target application; in the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the user does not need to be respectively reminded of each authority, the confirmation operation of the user is reduced, and the effect of improving the interaction efficiency in the authority confirmation process of the application program under the condition of ensuring the accuracy of the authority configuration is achieved.
Fig. 9 is a block diagram showing a configuration of rights configuration means of an application according to an exemplary embodiment. The rights configuration apparatus of the application may implement all or part of the steps performed by the terminal in the method provided by the embodiments shown in fig. 2, 5 or 8. The apparatus may include:
An information acquisition module 901, configured to acquire terminal information of a terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
an identifier obtaining module 902, configured to obtain, based on the terminal information, an identifier of a target authority in a candidate authority set, where the candidate authority set includes an authority that can be obtained by a target application program;
the interface display module 903 is configured to display, in response to the first start of the target application, a default permission interface based on the identifier of the target permission; the default authority interface comprises the target authority in a default selected state;
the first permission configuration module 904 is configured to configure the target permission for the target application in response to receiving the first permission confirmation operation.
In a possible implementation manner, the identifier obtaining module 902 is configured to send, to a server, a permission query request including the terminal information, where the permission query request is used to instruct the server to determine, from the candidate permission set, the target permission based on the terminal information and permission selection situations of each user during installation of each application program;
And receiving the identification of the target authority sent by the server.
In a possible implementation manner, the identifier obtaining module 902 is configured to send the permission query request to the server during the process that the terminal installs the target application program.
In one possible implementation, the identifier acquisition module 902 is configured to,
responding to the terminal information comprising the application authority information, acquiring a homogeneous program set of the target application program, wherein the homogeneous program set comprises homogeneous application programs of the target application program;
based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal.
In a possible implementation, when the identification of the target authority in the candidate authority set is acquired based on the identifications of the authorities of the applications of the same kind installed in the terminal, the identification acquisition module 902 is configured to,
and obtaining the identification of the target authority by taking the union of the identifications of the authorities of the similar application programs installed in the terminal and the authority identifications contained in the candidate authority sets.
In a possible implementation manner, when the identifier of the authority of the application program of the same kind installed in the terminal and the identifier of the authority contained in the candidate authority set are obtained and combined, the identifier obtaining module 902 is configured to,
sequencing the identifications of the rights of the similar application programs installed in the terminal according to the sequence from big to small of the occurrence times of the identifications of the rights of the similar application programs installed in the terminal, and obtaining an identification sequencing queue;
and obtaining the identification of the target authority by taking the identification of the first n authorities in the identification sequencing queue and the authority identification contained in the candidate authority set as a union set, wherein n is an integer greater than or equal to 1.
In a possible implementation manner, the default authority interface further includes other authorities except the target authority in the candidate authority set, and the other authorities are in a default unselected state in the default authority interface;
the apparatus further comprises:
the adjusting module is used for responding to the received permission adjusting operation and adjusting the permission in the selected state in the default permission interface;
And the second permission configuration module is used for responding to the received second permission confirmation operation and configuring permissions in a selected state in the default permission interface for the target application program.
In summary, in the solution shown in the embodiment of the present application, after the terminal installs the target application, the server may automatically determine the authority configured by default of the target application from the authorities available for the target application based on the installed application in the terminal and/or the authority of the installed application in the terminal, and when the target application is started for the first time, the terminal displays the target authority selected by default through the interface, so that after confirmation by the user is obtained, the target authority may be configured for the target application. In the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the user does not need to be respectively reminded of each authority, the confirmation operation of the user is reduced, and the effect of improving the interaction efficiency in the authority confirmation process of the application program under the condition of ensuring the accuracy of the authority configuration is achieved.
Fig. 10 is a block diagram showing a configuration of a rights configuration apparatus of an application according to an exemplary embodiment. The authority configuration device of the application program may implement all or part of the steps performed by the server in the method provided in the embodiment shown in fig. 4 or fig. 5. The apparatus may include:
a request receiving module 1001, configured to receive a permission query request sent by a terminal; the permission query request comprises terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
the identifier obtaining module 1002 is configured to obtain, based on terminal information of the terminal and permission selection conditions of each user in a process of installing each application program, an identifier of a target permission in a candidate permission set; the candidate authority set comprises the authority which can be acquired by the target application program;
an identifier sending module 1003, configured to send an identifier of the target authority to the terminal, so that the terminal responds to the first start of the target application program, displays a default authority interface based on the identifier of the target authority, and configures the target authority for the target application program in response to receiving a first authority confirmation operation; the default authority interface comprises the target authority in a default selected state.
In one possible implementation, the identifier acquisition module 1002 is configured to,
responding to the terminal information comprising the application authority information, acquiring a homogeneous program set of the target application program, wherein the homogeneous program set comprises homogeneous application programs of the target application program; the similar program set is obtained by collaborative filtering based on application programs based on the application installation information corresponding to each user;
based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal.
In one possible implementation, the identifier acquisition module 1002 is configured to,
responding to the terminal information comprising the application installation information, and carrying out collaborative filtering based on the user based on the application installation information corresponding to each user to obtain similar users corresponding to the terminal; the application installation information corresponding to each user comprises the application installation information of the terminal;
Acquiring the identification of the authority set by the similar users on the target application program;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authority set by the similar users on the target application program.
In summary, according to the scheme shown in the embodiment of the present application, after the terminal installs the target application, the server may automatically determine the authority configured by default of the target application from the authorities available for the target application based on the installed application in the terminal and/or the authority of the installed application in the terminal, and when the target application is started for the first time, the terminal displays the target authority selected by default through the interface, so as to obtain the user confirmation, and then may configure the target authority for the target application; in the scheme, the authority which is possibly configured for the target application program by the user is determined through the terminal information, and the determined authority is unified in the default authority interface for prompting, so that the user does not need to be respectively reminded of each authority, the confirmation operation of the user is reduced, and the effect of improving the interaction efficiency in the authority confirmation process of the application program under the condition of ensuring the accuracy of the authority configuration is achieved.
Fig. 11 is a schematic diagram of a computer device according to an exemplary embodiment. The computer device may be implemented as a server or a terminal in the above-described respective method embodiments. The computer apparatus 1100 includes a central processing unit 1101, a system Memory 1104 including a random access Memory (Random Access Memory, RAM) 1102 and a Read-Only Memory (ROM) 1103, and a system bus 1105 connecting the system Memory 1104 and the central processing unit 1101. The computer device 1100 also includes a basic input/output system 1106, which helps to transfer information between various devices within the computer, and a mass storage device 1107 for storing an operating system 1113, application programs 1114, and other program modules 1115.
The mass storage device 1107 is connected to the central processing unit 1101 through a mass storage controller (not shown) connected to the system bus 1105. The mass storage device 1107 and its associated computer-readable media provide non-volatile storage for the computer device 1100. That is, the mass storage device 1107 may include a computer-readable medium (not shown) such as a hard disk or a compact disk-read Only Memory (CD-ROM) drive.
The computer readable medium may include computer storage media and communication media without loss of generality. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, flash memory or other solid state memory technology, CD-ROM, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will recognize that the computer storage medium is not limited to the one described above. The system memory 1104 and mass storage device 1107 described above may be collectively referred to as memory.
The computer device 1100 may connect to the internet or other network device through a network interface unit 1111 connected to the system bus 1105.
The memory further includes one or more programs stored in the memory, and the central processor 1101 implements all or part of the steps of the methods shown in fig. 2, 4, 5, or 8 by executing the one or more programs.
In exemplary embodiments, a non-transitory computer readable storage medium is also provided, such as a memory, including a computer program (instructions) executable by a processor of a computer device to perform the methods shown in the various embodiments of the present application. For example, the non-transitory computer readable storage medium may be Read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), compact disc Read-Only Memory (CD-ROM), magnetic tape, floppy disk, optical data storage device, and the like.
In an exemplary embodiment, a computer program product or a computer program is also provided, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the methods shown in the above embodiments.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (16)

1. A rights configuration method for an application program, which is applied to a terminal, the method comprising:
acquiring terminal information of a terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
sending a permission query request containing the terminal information to a server, wherein the permission query request is used for indicating the server to acquire the identification of the target permission in a candidate permission set, and the candidate permission set comprises the permission which can be acquired by the target application program; the process of obtaining the identification of the target authority by the server comprises the following steps: based on the terminal information and the authority selection condition of each user in the process of installing each application program, determining the similar application programs of the target application program from the application programs through collaborative filtering to obtain a similar program set of the target application program; determining the same kind of users corresponding to the terminal from the users through collaborative filtering; based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal; acquiring the identification of the authority set by the similar users on the target application program based on the application installation information corresponding to each user; acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal and the identification of the authorities set by the similar users on the application programs;
Receiving the identification of the target authority sent by the server;
responding to the first start of the target application program, and displaying a default authority interface based on the identification of the target authority; the default authority interface comprises the target authority in a default selected state;
and in response to receiving the first permission confirmation operation, configuring the target permission for the target application program.
2. The method of claim 1, wherein the sending, to the server, a permission query request containing the terminal information, comprises:
and in the process of installing the target application program by the terminal, sending the permission query request to the server.
3. The method according to claim 1, wherein the method further comprises:
responding to the terminal information comprising the application authority information, acquiring a homogeneous program set of the target application program, wherein the homogeneous program set comprises homogeneous application programs of the target application program;
based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal.
4. A method according to claim 3, wherein said obtaining the identity of the target rights in the set of candidate rights based on the identity of rights of the homogeneous application installed in the terminal comprises:
and obtaining the identification of the target authority by taking the union of the identifications of the authorities of the similar application programs installed in the terminal and the authority identifications contained in the candidate authority sets.
5. The method according to claim 4, wherein the identifying the rights of the similar application installed in the terminal and the rights identification contained in the candidate rights set are combined to obtain the identification of the target rights, including:
sequencing the identifications of the rights of the similar application programs installed in the terminal according to the sequence from big to small of the occurrence times of the identifications of the rights of the similar application programs installed in the terminal, and obtaining an identification sequencing queue;
and obtaining the identification of the target authority by taking the identification of the first n authorities in the identification sequencing queue and the authority identification contained in the candidate authority set as a union set, wherein n is an integer greater than or equal to 1.
6. The method according to any one of claims 1 to 5, wherein the default rights interface further comprises a set of rights candidates, wherein the rights other than the target rights are in a default unselected state in the default rights interface;
the method further comprises the steps of:
responding to the received permission adjustment operation, and adjusting the permission in the selected state in the default permission interface;
and responding to the received second permission confirmation operation, and configuring the permission in the selected state in the default permission interface for the target application program.
7. A rights configuration method for an application program, applied to a server, the method comprising:
receiving an authority inquiry request sent by a terminal; the permission query request comprises terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
based on terminal information of the terminal and authority selection conditions of each user in the process of installing each application program, determining similar application programs of a target application program from the application programs through collaborative filtering, and obtaining a similar program set of the target application program; determining the same kind of users corresponding to the terminal from the users through collaborative filtering;
Based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal;
acquiring the identification of the authority set by the similar users on the target application program based on the application installation information corresponding to each user;
acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal and the identification of the authorities set by the similar users on the application programs; the candidate authority set comprises the authority which can be acquired by the target application program;
the identification of the target authority is sent to the terminal, so that the terminal responds to the first starting of the target application program, displays a default authority interface based on the identification of the target authority, responds to the receiving of a first authority confirmation operation, and configures the target authority for the target application program; the default authority interface comprises the target authority in a default selected state.
8. An authority configuration apparatus of an application program, which is applied to a terminal, the apparatus comprising:
the information acquisition module is used for acquiring terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
The identification acquisition module is used for sending a permission query request containing the terminal information to a server, wherein the permission query request is used for indicating the server to acquire the identification of the target permission in the candidate permission set, and the candidate permission set comprises the permission which can be acquired by the target application program; receiving the identification of the target authority sent by the server; the process of obtaining the identification of the target authority by the server comprises the following steps: based on the terminal information and the authority selection condition of each user in the process of installing each application program, determining the similar application programs of the target application program from the application programs through collaborative filtering to obtain a similar program set of the target application program; determining the same kind of users corresponding to the terminal from the users through collaborative filtering; based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal; acquiring the identification of the authority set by the similar users on the target application program based on the application installation information corresponding to each user; acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal and the identification of the authorities set by the similar users on the application programs;
The interface display module is used for responding to the first starting of the target application program and displaying a default authority interface based on the identification of the target authority; the default authority interface comprises the target authority in a default selected state;
and the permission configuration module is used for responding to the received first permission confirmation operation and configuring the target permission for the target application program.
9. The apparatus of claim 8, wherein the identity acquisition module is configured to:
and in the process of installing the target application program by the terminal, sending the permission query request to the server.
10. The apparatus of claim 8, wherein the identity acquisition module is configured to:
responding to the terminal information comprising the application authority information, acquiring a homogeneous program set of the target application program, wherein the homogeneous program set comprises homogeneous application programs of the target application program;
based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal;
and acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal.
11. The apparatus of claim 10, wherein the identity acquisition module is configured to:
and obtaining the identification of the target authority by taking the union of the identifications of the authorities of the similar application programs installed in the terminal and the authority identifications contained in the candidate authority sets.
12. The apparatus of claim 10, wherein the identity acquisition module is configured to:
sequencing the identifications of the rights of the similar application programs installed in the terminal according to the sequence from big to small of the occurrence times of the identifications of the rights of the similar application programs installed in the terminal, and obtaining an identification sequencing queue;
and obtaining the identification of the target authority by taking the identification of the first n authorities in the identification sequencing queue and the authority identification contained in the candidate authority set as a union set, wherein n is an integer greater than or equal to 1.
13. The apparatus according to any one of claims 8 to 12, wherein the default rights interface further comprises a set of rights candidates, wherein the rights other than the target rights are in a default unselected state in the default rights interface;
The apparatus further comprises:
the adjusting module is used for responding to the received permission adjusting operation and adjusting the permission in the selected state in the default permission interface;
and the second permission configuration module is used for responding to the received second permission confirmation operation and configuring permissions in a selected state in the default permission interface for the target application program.
14. An authority configuration apparatus of an application program, applied to a server, comprising:
the request receiving module is used for receiving the permission query request sent by the terminal; the permission query request comprises terminal information of the terminal; the terminal information comprises at least one of application installation information and application authority information; the application installation information is used for indicating an installed application program; the application permission information is used for indicating the permission of the installed application program;
the identification acquisition module is used for acquiring a similar program set of the target application program by cooperatively filtering similar application programs of the target application program determined from the application programs based on terminal information of the terminal and authority selection conditions of each user in the process of installing each application program; determining the same kind of users corresponding to the terminal from the users through collaborative filtering; based on the similar program set, acquiring the identification of the authority of the similar application program installed in the terminal; acquiring the identification of the authority set by the similar users on the target application program based on the application installation information corresponding to each user; acquiring the identification of the target authority in the candidate authority set based on the identification of the authorities of the similar application programs installed in the terminal and the identification of the authorities set by the similar users on the application programs; the candidate authority set comprises the authority which can be acquired by the target application program;
The identification sending module is used for sending the identification of the target authority to the terminal so that the terminal responds to the first starting of the target application program, displays a default authority interface based on the identification of the target authority, and configures the target authority for the target application program in response to the receiving of a first authority confirmation operation; the default authority interface comprises the target authority in a default selected state.
15. A computer device comprising a processor and a memory, wherein the memory stores at least one computer program, the at least one computer program being loaded and executed by the processor to implement the method of configuring rights of an application according to any one of claims 1 to 7.
16. A computer readable storage medium, characterized in that at least one computer program is stored in the storage medium, which is loaded and executed by a processor to implement the rights configuration method of an application program according to any one of claims 1 to 7.
CN202011323189.XA 2020-11-23 2020-11-23 Authority configuration method and device for application program, computer equipment and storage medium Active CN112287330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011323189.XA CN112287330B (en) 2020-11-23 2020-11-23 Authority configuration method and device for application program, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011323189.XA CN112287330B (en) 2020-11-23 2020-11-23 Authority configuration method and device for application program, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112287330A CN112287330A (en) 2021-01-29
CN112287330B true CN112287330B (en) 2024-03-01

Family

ID=74425135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011323189.XA Active CN112287330B (en) 2020-11-23 2020-11-23 Authority configuration method and device for application program, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112287330B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115017522B (en) * 2021-09-30 2023-09-29 荣耀终端有限公司 Permission recommendation method and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108427886A (en) * 2018-01-25 2018-08-21 上海掌门科技有限公司 A kind of application program access rights setting method, system, equipment and readable medium
CN108549798A (en) * 2018-04-12 2018-09-18 珠海市魅族科技有限公司 Terminal equipment control method and device, terminal device and computer readable storage medium
CN108664786A (en) * 2018-04-24 2018-10-16 Oppo广东移动通信有限公司 Authority configuring method, mobile terminal, server and the storage medium of application program
CN109359441A (en) * 2018-10-31 2019-02-19 北京小米移动软件有限公司 Authority configuring method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815680B (en) * 2018-12-27 2021-08-31 歌尔股份有限公司 Application authority management method and device, terminal equipment and storage medium
CN110532764B (en) * 2019-08-19 2022-03-11 维沃移动通信有限公司 Authority processing method, mobile terminal and readable storage medium
CN111027030B (en) * 2019-11-26 2022-11-04 维沃移动通信有限公司 Permission setting method and terminal device
CN111222153B (en) * 2020-01-07 2023-04-07 腾讯科技(深圳)有限公司 Application program authority management method and device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108427886A (en) * 2018-01-25 2018-08-21 上海掌门科技有限公司 A kind of application program access rights setting method, system, equipment and readable medium
CN108549798A (en) * 2018-04-12 2018-09-18 珠海市魅族科技有限公司 Terminal equipment control method and device, terminal device and computer readable storage medium
CN108664786A (en) * 2018-04-24 2018-10-16 Oppo广东移动通信有限公司 Authority configuring method, mobile terminal, server and the storage medium of application program
CN109359441A (en) * 2018-10-31 2019-02-19 北京小米移动软件有限公司 Authority configuring method and device

Also Published As

Publication number Publication date
CN112287330A (en) 2021-01-29

Similar Documents

Publication Publication Date Title
US9922360B2 (en) Recommendations system
US9460156B2 (en) Matching a first location profile with at least one other location profile
TWI458310B (en) Collaborative media recommendatin and sharing technique
US20100088187A1 (en) System and method for localized and/or topic-driven content distribution for mobile devices
US20120197979A1 (en) Web-wide content quality crowd sourcing
US20130268679A1 (en) Information processing apparatus, information processing method, and program
CN111125497A (en) Information recommendation method, device, processor and storage medium
US20140006418A1 (en) Method and apparatus for ranking apps in the wide-open internet
US20170078361A1 (en) Method and System for Collecting Digital Media Data and Metadata and Audience Data
JP7284302B2 (en) Method and system for providing rewards based on point of interest list subscriptions and review information
KR20200014416A (en) Recommendation Method Using Contents with Location Data and Its System
CN112868003A (en) Entity-based search system using user interactivity
CN111339183A (en) Data processing method, edge node, data center and storage medium
JP6698728B2 (en) Judgment device, judgment method and judgment program
CN112287330B (en) Authority configuration method and device for application program, computer equipment and storage medium
KR20160017688A (en) Service method and system for recommending post associated appstore with timeline
TWI715549B (en) Behavior-based social id switching mechanism
JP6644922B1 (en) Method and system for filtering images using points of interest
RU2644133C2 (en) System and method for providing object via which service is used
KR102235740B1 (en) Method and system for providing reward based on follow and review information for list of point of interest
KR20190143083A (en) Method, system, and non-transitory computer readable record medium for filtering image using keyword extracted form image
KR102427830B1 (en) Method and system for filtering image using point of interest
US11113723B1 (en) Explicit user history input
KR102244130B1 (en) Method and system for improving user experience in movie search
US20200142937A1 (en) Enrichment of User Specific Information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40037408

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant