CN114491440A - Authority control method and device - Google Patents

Authority control method and device Download PDF

Info

Publication number
CN114491440A
CN114491440A CN202210002187.3A CN202210002187A CN114491440A CN 114491440 A CN114491440 A CN 114491440A CN 202210002187 A CN202210002187 A CN 202210002187A CN 114491440 A CN114491440 A CN 114491440A
Authority
CN
China
Prior art keywords
target
permission
type area
use permission
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210002187.3A
Other languages
Chinese (zh)
Inventor
韦海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202210002187.3A priority Critical patent/CN114491440A/en
Publication of CN114491440A publication Critical patent/CN114491440A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a permission control method and a device thereof, belonging to the field of computer software. The authority control method comprises the following steps: displaying a first permission setting interface under the condition that the identity verification of the first user is successful; receiving first input of the first user to the first permission setting interface, and determining the use permission of a target visitor to a target application in response to the first input; the first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area; the first type area comprises icons of at least one application and a second control corresponding to each application; the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area.

Description

Authority control method and device
Technical Field
The application belongs to the field of computer software, and particularly relates to a permission control method and a permission control device.
Background
With the increasing popularization of terminal devices such as mobile phones, the daily lives of the mobile phones and users are increasingly close. More and more mobile device users communicate through the internet, the life becomes colorful, the application of the terminal device is more and more diversified, and the users can surf the internet, shop, read, play games or chat through mobile phones.
As a result, the terminal devices have more and more user information. However, for some property, chat or private interest content on the terminal device, which is part of the privacy of everyone, the user usually does not want to see others after the terminal device is lent or unlocked.
The current locking scheme is to control the authority of the whole system or the authority of the whole application or file. The specific authority of each application of the terminal cannot be flexibly set according to the requirement, so that part of users are inconvenient to use, and the use requirements of the users in certain scenes cannot be met.
Disclosure of Invention
The embodiment of the application aims to provide an authority control method and an authority control device, which can solve the problem that the existing locking scheme is not flexible enough.
In a first aspect, an embodiment of the present application provides an authority control method, where the method includes:
displaying a first permission setting interface under the condition that the identity verification of the first user is successful;
receiving first input of the first user to the first permission setting interface, and determining the use permission of a target visitor to a target application in response to the first input;
the first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area;
the first type area comprises icons of at least one application and a second control corresponding to each application;
the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area.
In a second aspect, an embodiment of the present application provides a terminal function authorization apparatus, including:
the identity verification module is used for displaying a first authority setting interface under the condition that the identity verification of the first user is successful;
the first permission determination module is used for receiving first input of the first user to the first permission setting interface and determining the use permission of a target visitor to a target application in response to the first input;
the first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area;
the first type area comprises icons of at least one application and a second control corresponding to each application;
the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, the second control is used for controlling the use permission of different visitors to the application corresponding to the second control in the first type area, the first control has an overall control effect on the application in the area, the user can set the permission of multiple applications through one-time operation, the function authorization speed limit is faster, the operation is simpler, in addition, the second area controls the use permission of each application, and the user can give permission to each application, so that the function authorization limit is more flexible.
Drawings
Fig. 1 is a schematic flowchart of an authority control method provided in an embodiment of the present application;
fig. 2 is one of schematic diagrams of a first permission setting interface provided in an embodiment of the present application;
fig. 3 is a second schematic diagram of a first permission setting interface according to an embodiment of the present application;
fig. 4 is a schematic flowchart of determining usage rights of a target application according to an embodiment of the present application;
fig. 5 is a schematic diagram of a second permission setting interface provided in the embodiment of the present application;
fig. 6 is a schematic flowchart of a process for updating the usage right of the target visitor to the target application according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a right control device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 9 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The following describes the authority control method and apparatus provided in the embodiments of the present application in detail through specific embodiments and application scenarios thereof with reference to the accompanying drawings.
The authority control method can be applied to the terminal, and can be specifically executed by hardware or software in the terminal. The execution subject of the authority control method can be a terminal, or a control device of the terminal, and the like.
The terminal includes, but is not limited to, mobile phones, tablets, watches, and other portable communication devices having touch-sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the terminal may not be a portable communication device, but may be a desktop computer, smart screen, car screen, etc. having a touch sensitive surface (e.g., a touch screen display and/or touch pad).
In the following various embodiments, a terminal including a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a touch pad, a physical keyboard, a mouse, and a joystick.
The embodiment of the application provides an authority control method, and an execution main body of the authority control method can be a terminal, including but not limited to a mobile terminal, a non-mobile terminal or a control device of the terminal and the like. The following describes an authority control method provided in the embodiments of the present application, taking a terminal as an execution subject.
Fig. 1 is a schematic flowchart of an authority control method provided in an embodiment of the present application, and as shown in fig. 1, the authority control method includes: step 100 and step 101.
Step 100, displaying a first permission setting interface under the condition that the identity verification of the first user is successful.
In this step, the terminal receives identity verification information of the first user, where the identity verification information includes fingerprint information, password information, face information, or the like, and then determines whether the verification passes according to the received identity verification information, for example, matches the received identity verification information with information in the information base, and if the matching is successful, the verification passes.
The first user is an owner of the electronic device, and it is understood that the first permission setting interface is only visible to the first user.
Optionally, under the condition that the identity verification of the first user is successful, if an operation of requesting permission setting by the first user is received, for example, the first user clicks an icon of a system setting program and then clicks the permission setting icon, a first permission setting interface is displayed.
The first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area;
the first type area comprises icons of at least one application and a second control corresponding to each application;
the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area.
Optionally, the first region is divided in the first permission setting interface according to the type of the application, and the applications of the same type are placed in the same first region, so that uniform permission management can be performed on the applications of the same type. The emphasis of each first region control is different, for example, the first region of finance type is the property, the first region of communication type is the dialog box, etc.
For the application in the system, when entering the authority mode, the corresponding area can be automatically entered according to the type of the application, such as: the wallet automatically enters the finance class. The size, position, number, and the like of the first area may be adjusted based on the user's operation.
Fig. 2 is a schematic view of a first permission setting interface provided in an embodiment of the application, and as shown in fig. 2, four first areas are divided in the first permission setting interface according to an application type, and are respectively a movie entertainment type, a finance type, a communication type and a public type, and a first control corresponding to the first area includes a plus sign icon at an upper right corner of the first area.
Fig. 3 is a second schematic view of the first permission setting interface provided in the embodiment of the present application, and as shown in fig. 3, when a click operation of a plus icon by a user is received, a plurality of target visitors and a plurality of authorized functions of all applications in the first area are displayed.
As shown in fig. 2, the four first areas include icons of at least one application, and the second control corresponding to the application includes a plus icon at the upper right corner of the application.
As shown in fig. 3, in a case where a user's click operation on the plus icon in the upper right corner of the application is received, a plurality of target visitors and a plurality of authorized functions of the application are displayed.
Further, when the number of icons is larger than the number of icons that can be accommodated in the first area, a part of the icons is hidden, and the hidden icons are displayed according to a received user operation, such as a slide operation and a click operation.
The first control may be a permission master switch for all applications in the first type region. The permission master switch controls the permissions of all the applications in the first type area, and the permission set in the permission master switch is effective to all the applications in the first type area.
Step 101, receiving a first input of the first user to the first permission setting interface, and determining the use permission of the target visitor to the target application in response to the first input.
Optionally, the first permission setting interface includes a first control and a second control, and since the first control is used to control the permission of different visitors to all applications in the first type region and the second control is used to control the permission of different visitors to the application corresponding to the second control in the first type region, the permission of the target visitor to the target application may be determined according to the received first input of the first user to the first control or the second control in the first permission setting interface.
The target visitor refers to other users except the first user who can access the electronic equipment, and the target visitor comprises a user limiter or a visitor.
The target application refers to an application that the first user can perform authority control.
According to the permission control method provided by the embodiment of the application, the first permission setting interface comprises a plurality of first type areas, each first type area comprises at least one application icon, the first control is used for controlling the use permission of different visitors to all applications in the first type area, the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area, the first control has an integral control effect on the applications in the areas, the permission of the plurality of applications can be set through one-time operation of a user, the function authorization speed limit degree is faster, the operation is simpler, in addition, the use permission of each application is controlled by the second area, the user can give the function permission to each application, and the function authorization limit is more flexible.
Optionally, the first input comprises at least one of:
performing first operation on a first control corresponding to a target first type area in the first permission setting interface;
and performing second operation on a second control corresponding to the target application in the target first type area in the first permission setting interface.
In one embodiment, the first input is a first operation on a first control corresponding to a target first type region in the first permission setting interface.
In one embodiment, the first input is a second operation on a second control corresponding to a target application in a target first type region in the first permission setting interface.
In one embodiment, the first input includes a first operation on a first control corresponding to a target first type region in the first permission setting interface and a second operation on a second control corresponding to a target application in the target first type region in the first permission setting interface.
It should be noted that the authorized function in the first control corresponding to the target first type region may be the same as or different from the authorized function in the second control corresponding to the target application in the target first type region.
Under the condition that the authorized function in the first control corresponding to the target first type area is the same as the authorized function in the second control corresponding to the target application in the target first type area, if the first user opens the authorized function in the first control corresponding to the target first type area through a first operation or the authorized function in the first control corresponding to the target first type area is in a default open state, the authorized function corresponding to the second control corresponding to the target application in the target first type area is acquiescently in an open state, and the first user can adjust the open state to a closed state through a second operation.
If the first user closes the authorized function in the first control corresponding to the target first-type region through the first operation or the authorized function in the first control corresponding to the target first-type region is in a default closed state, default closing of the authorized function corresponding to the second control corresponding to the target application in the target first-type region is achieved.
For example, the authorized function in the first control corresponding to the target first type region is the same as the authorized function in the second control corresponding to the target application in the target first type region, and includes clicking, long pressing, logging in, uninstalling and sharing, and under the condition that the first user closes the uninstalling permission of the user a in the first control corresponding to the target first type region through the first operation, the uninstalling permissions of the user a in the second controls corresponding to all applications in the target first type region are all in a closed state.
Under the condition that the authorized function in the first control corresponding to the target first type area is different from the authorized function in the second control corresponding to the target application in the target first type area, for the overlapped part of the authorized function in the first control and the authorized function in the second control, if the authorized function in the first control corresponding to the target first type area is opened, the authorized function corresponding to the second control corresponding to the target application in the target first type area is acquiescently determined to be in an open state, and the first user can adjust the open state to be in a closed state through first input; and if the authorized function in the first control corresponding to the target first type area is closed, defaulting the authorized function corresponding to the second control corresponding to the target application in the target first type area to a closed state. For non-overlapping portions of the authorizeable function in the first control and the authorizeable function in the second control, the state of the authorizeable function in the second control is not affected by the state of the authorizeable function in the first control.
In the permission control method provided by the embodiment of the application, the first input includes at least one of a first operation on the first control and a second operation on the second control, and compared with the case that the first operation is required on the first control and the second operation is required on the second control, the permission setting mode in the embodiment of the application is more flexible.
Optionally, the determining, in response to the first input, the usage right of the target visitor to the target application includes one of:
in response to the first operation, determining first use permission of a target visitor to all applications in the target first type area, and determining the use permission of the target visitor to the target application according to the first use permission;
in response to the second operation, determining second use permission of a target visitor to the target application in the target first type area, and determining the use permission of the target visitor to the target application according to the second use permission;
and determining first use permission of a target visitor to all applications in the target first-type area in response to the first operation, determining second use permission of the target visitor to the target applications in the target first-type area in response to the second operation, and determining the use permission of the target visitor to the target applications according to the first use permission and the second use permission.
Alternatively, the first input received by the terminal may have three cases: the first input includes only the first operation, the first input includes only the second operation, and the first input includes the first operation and the second operation.
In a first case, the terminal receives a first operation of a first user on a first control corresponding to a target first type area in the first permission setting interface, where the first operation may be a closing or opening operation on an authorized function in the target first type area, determines, in response to the first operation, first permission of a target visitor to use all applications in the target first type area, determines permission of the target visitor to use the target application according to the first permission, or determines permission of the target visitor to use the target application according to the first permission and a default second permission.
Under a second condition, the terminal receives a second operation of a first user on a second control corresponding to a target application in a target first type area in the first permission setting interface, wherein the second operation can be a closing or opening operation on an authorized function of the target application, determines a second permission of a target visitor on the target application in the target first type area in response to the second operation, determines permission of the target visitor on the target application according to the second permission, or determines permission of the target visitor on the target application according to the second permission and a default first permission.
In a third case, the terminal receives a first operation of a first user on a first control corresponding to a target first type area in the first permission setting interface, the first operation may be a closing or opening operation on an authorized function in the target first type area, determines a first permission of a target visitor on all applications in the target first type area in response to the first operation, receives a second operation of a second control corresponding to a target application in the target first type area in the first permission setting interface by the first user, the second operation may be a closing or opening operation on an authorized function of the target application, determines a second permission of the target visitor on the target application in the target first type area in response to the second operation, and determines a second permission of the target visitor on the target application in the target first type area according to the first permission and the second permission, and determining the use right of the target visitor to the target application.
Optionally, when the first usage right and the second usage right conflict with each other, the last set right of the first usage right and the second usage right may be taken as the usage right of the target visitor to the target application. For example, the first user first closes the payment authority of the a user for all applications in the first type area of the financial class, and opens the payment authority of the a user for the first application in the first type area, in this case, the authority set last time in the first usage authority and the second usage authority is used as the usage authority of the target visitor for the target application, that is, the a user has the payment authority for the first application.
According to the permission control method provided by the embodiment of the application, the use permission of the target visitor to the target application is determined according to at least one of the first use permission and the second use permission, and compared with the case that the use permission of the target visitor to the target application can be determined only according to the first use permission and the second use permission, the permission determination method in the embodiment of the application is more flexible.
Optionally, the method for controlling authority further includes:
and under the condition that the identity recognition of the target visitor is successful, adjusting the display modes of all applications on the desktop according to the use permission of the target visitor to all applications.
Optionally, the target visitor includes users and visitors, the terminal receives entry of identity verification information of the users by the first user, for example, entry of fingerprints, passwords or face information of each user, and the entered identity verification information of the users is stored in a local memory of the terminal or an identity library in the cloud. When the terminal receives the identity verification information input by the user, the identity verification information is compared with the information in the identity library, and whether the identity identification of the target visitor is successful is determined. And under the condition that the identity verification information is not input or the input identity verification information is not matched with the user limitation in the identity library, determining the identity of the user as the visitor.
And determining whether the icon of each application is displayed or not according to the use permission of the target visitor to all the applications, for example, when the use permission of the target visitor to a certain application is completely closed, the icon of the application is not displayed, and adjusting the display modes of all the applications on the desktop according to the displayed icon of the application and the number of the displayed applications.
According to the permission control method provided by the embodiment of the application, the display modes of all the applications on the desktop are adjusted according to the use permission of the target visitor to all the applications, and compared with the method that the use permission of the target visitor to the applications is not considered, all the applications are directly displayed, the desktop space is saved, icons of the applications which cannot be used are not displayed for the visitor, and the safety is improved.
Optionally, the method for controlling permission provided in the embodiment of the present application further includes setting permission for a target visitor to use some functions, icons, or operations of the target application, fig. 4 is a schematic flow chart illustrating determining permission for use of the target application provided by the present application, and as shown in fig. 4, the determining permission for use of the target application includes the following steps:
step 400, receiving a second input of the first user to the target application in the target first type area, and responding to the second input to display a second permission setting interface.
The second permission setting interface comprises a plurality of second type areas and a third control corresponding to each second type area;
the second type area comprises at least one icon of a function item and a fourth control corresponding to each function item;
the third control is used for controlling the use permission of different visitors to all the function items in the second type area, and the fourth control is used for controlling the use permission of different visitors to the corresponding function items in the second type area.
The third control may be a master switch for all functional items in the second type of area. The authority master switch controls the authority of all the functional items in the second type area, and the authority set in the authority master switch takes effect on all the functional items in the second type area.
Optionally, the second input is a click operation of the first user on the target application in the target first type region, and in response to the second input, a second permission setting interface is displayed, where the second permission setting interface is obtained based on an internal interface of the target application and includes a main interface and each sub-interface of the target application. The second type region is formed on an internal interface of the application, and the second type region is resizable.
The function item refers to an icon, a function, or an operation in the second type area, and the icon, the function, or the operation authority in the second type area is disassembled, such as clicking, long pressing, up and down, sliding up, down, left, right, copying, forwarding, deleting, and the like, to form an icon of the function item, where it is to be noted that the function item icon may be an icon on an internal interface of the target application, or an icon generated according to the icon, the function, or the operation authority in the second type area.
Fig. 5 is a schematic diagram of a second permission setting interface provided in an embodiment of the present application, and as shown in fig. 5, the second permission setting interface includes an icon of a camera function item, an icon of an input box function item, an icon of a sent message function item, and the like.
And the fourth control corresponding to the icon of the sent message function item is used for controlling the use permission of different visitors to the corresponding function item in the second type area, wherein the use permission comprises click permission, copy permission, reference permission, withdrawing permission, deleting permission and the like.
Step 401, receiving a third input of the first user to the second permission setting interface, and determining, in response to the third input, a usage permission of a target visitor to a target function item in the target application.
Optionally, the second permission setting interface includes a third control and a fourth control, the third control is used to control the permission of different visitors to all the function items in the second type region, and the fourth control is used to control the permission of different visitors to the corresponding function items in the second type region, so that the permission of a target visitor to use a target function item in the target application may be determined according to a received third input of the first user to the third control or the fourth control in the second permission setting interface.
For example, in an unlimited state, the dialog box can be deleted by long-pressing on the WeChat dialog box, the first user can limit the long-pressing operation of the target visitor, and the user B cannot delete the dialog box when the long-pressing permission of the user B is closed on the third control corresponding to the second area where the dialog box is located; in the non-limited state, when the WeChat main page is pulled down, the small program which is used recently is displayed, and the first user can limit the pull-down operation or the use record after the pull-down.
According to the permission control method provided by the embodiment of the application, the second permission setting interface comprises a plurality of second type areas, the second type areas comprise at least one icon of a function item, the third control is used for controlling the use permission of different visitors to all the function items in the second type areas, the fourth control is used for controlling the use permission of different visitors to the corresponding function items in the second type areas, and the disassembly and authorization are carried out corresponding to internal functions, so that the first user can flexibly control and control the function permission of the application local area, and the flexibility of authorization limitation is further improved.
Optionally, the third input comprises at least one of:
performing third operation on a third control element corresponding to the target second type area in the second permission setting interface;
and performing fourth operation on a fourth control corresponding to the target function item in the target second type area in the second permission setting interface.
In one embodiment, the third input is a third operation on a third control corresponding to a target second type region in the second permission setting interface.
In one embodiment, the third input is a fourth operation on a fourth control corresponding to a target function item in a target second type region in the second permission setting interface.
In one embodiment, the third input is a third operation on a third control corresponding to a target second type region in the second permission setting interface, and a fourth operation on a fourth control corresponding to a target function item in the target second type region in the second permission setting interface.
It should be noted that the authorized function in the third control corresponding to the target second-type region may be the same as or different from the authorized function in the fourth control corresponding to the target function item in the target second-type region.
Under the condition that the authorized function in the third control corresponding to the target second type area is the same as the authorized function in the fourth control corresponding to the target function item in the target second type area, if the user opens the authorized function in the third control corresponding to the target second type area through a third operation or the authorized function in the third control corresponding to the target second type area is in a default open state, the authorized function in the fourth control corresponding to the target function item in the target second type area is acquiescently recognized as an open state, and the first user can adjust the open state to a closed state through the fourth operation; if the user closes the authorized function in the third control corresponding to the target second type region through the third operation or the authorized function in the third control corresponding to the target second type region is in the default closed state, the authorized function in the fourth control corresponding to the target function item in the target second type region defaults to be in the closed state.
Under the condition that the authorized function in the third control corresponding to the target second type area is different from the authorized function in the fourth control corresponding to the target function item in the target second type area, for the overlapped part of the authorized function in the third control and the authorized function in the fourth control, if the authorized function in the third control corresponding to the target second type area is opened, the authorized function corresponding to the fourth control corresponding to the target function item in the target second type area is acquiescently in an open state, and the first user can adjust the open state to a closed state through third input; if the authorized function in the third control corresponding to the target second type area is closed, the authorized function corresponding to the fourth control corresponding to the target function item in the target second type area defaults to a closed state, and the first user can adjust the closed state to an open state through third input; for non-overlapping portions of the authorizeable function in the third control and the authorizeable function in the fourth control, the state of the authorizeable function in the fourth control is not affected by the state of the authorizeable function in the third control.
In the permission control method provided by the embodiment of the application, the second input includes at least one of a third operation on the third control and a fourth operation on the fourth control, and compared with a case that the third operation needs to be performed on the third control and the fourth operation needs to be performed on the fourth control, the permission setting mode in the embodiment of the application is more flexible.
Optionally, the determining, in response to the third input, the usage right of the target visitor to the target function item in the target application includes one of:
responding to the third operation, determining third use permission of a target visitor to all function items in the target second type area, and determining the use permission of the target visitor to the target function items in the target application according to the third use permission;
responding to the fourth operation, determining a fourth use permission of a target visitor to the target function item in the target second type area, and determining the use permission of the target visitor to the target function item in the target application according to the fourth use permission;
and determining third use permission of the target visitor to all the function items in the target second type area in response to the third operation, determining fourth use permission of the target visitor to the target function items in the target second type area in response to the fourth operation, and determining the use permission of the target visitor to the target function items according to the third use permission and the fourth use permission.
Optionally, the third input received by the terminal may have three situations: the third input includes only the third operation, the third input includes only the fourth operation, and the third input includes the third operation and the fourth operation.
Under the first condition, the terminal receives a third operation of a third control corresponding to a target second type area in the second permission setting interface by a first user, wherein the third operation can be a closing or opening operation of an authorized function in the target second type area, in response to the third operation, a third permission of a target visitor to use all function items in the target second type area is determined, and a permission of the target visitor to use a target function item in the target application is determined according to the third permission, or a permission of the target visitor to use the target function item in the target application is determined according to the third permission and a default fourth permission.
Under a second condition, the terminal receives a fourth operation of a fourth control corresponding to a target function item in a target second type area in the second permission setting interface by the first user, wherein the fourth operation can be a closing or opening operation of an authorized function of the target function item in the target second type area, determines a fourth permission of the target visitor to use the target function item in response to the fourth operation, determines the permission of the target visitor to use the target function item in the target application according to the fourth permission, or determines the permission of the target visitor to use the target function item in the target application according to the fourth permission and a default third permission.
Under a third condition, the terminal receives a third operation of the first user on a third control corresponding to the target second type area in the second permission setting interface, wherein the third operation can be an operation of closing or opening an authorized function in the target second type area, and in response to the third operation, third use permissions of the target visitor on all function items in the target second type area are determined; the terminal receives a fourth operation of the first user on a fourth control corresponding to the target function item in the target second type area in the second permission setting interface, wherein the fourth operation can be a closing or opening operation on an authorized function of the target function item in the target second type area, and a fourth permission of the target visitor to use the target function item is determined in response to the fourth operation; and determining the use authority of the target visitor to the target function item according to the third use authority and the fourth use authority. Optionally, in a case where there is a conflict between the third usage right and the fourth usage right, a right set last time in the third usage right and the fourth usage right may be taken as the usage right of the target visitor to the target function item.
According to the permission control method provided by the embodiment of the application, the use permission of the target visitor to the target function item is determined according to at least one of the third use permission and the fourth use permission, and compared with the case that the use permission of the target visitor to the target function item can be determined only according to the third use permission and the fourth use permission, the permission determination method provided by the embodiment of the application is more flexible.
Optionally, the method for controlling authority further includes:
and under the condition that the target visitor uses the target application, adjusting the layout of all functional items in a display interface of the target application according to the use permission of the target visitor to all functional items in the target application.
Optionally, in a case that the identification of the target visitor is successful, an icon of an application visible to the target visitor is displayed on the desktop, and in a case that the target visitor uses the target application, for example, in a case that the target visitor clicks the target application, an internal interface of the target application is displayed. Since the target visitor may not have all the usage rights of the target application, the layout of all the function items in the display interface of the target application needs to be adjusted according to the usage rights of the target visitor to all the function items in the target application, and then the function items are displayed.
In the case of a span in the display area, the layout display mode is adjusted, for example, ten dialog boxes in the chat application are authorized to be visible to the target visitor, and at this time, the positions of the dialog boxes need to be adjusted to make the two dialog boxes adjacent to each other.
In addition, the application function needs to be clicked in layer by layer, a target visitor can log in to use the function of the next layer, but the privacy content exists in the previous layer, so that the interface level display of the application function needs to be adjusted, for example, the interface level in the target application is as follows: payment → wallet → help center, the target visitor can use the help center, but at the "wallet" level, the fund balance has been revealed, at which time the application function interface level is adjusted to payment → help center.
According to the authority control method provided by the embodiment of the application, under the condition that a target visitor uses the target application, the layout of all functional items in the display interface of the target application is adjusted, the leakage of privacy information is prevented, and the displayed interface is more attractive.
Optionally, the authority control method further includes updating the usage authority of the target visitor to the target application, fig. 6 is a schematic flow chart of updating the usage authority of the target visitor to the target application provided by the present application, and as shown in fig. 6, the updating the usage authority of the target visitor to the target application includes the following steps:
step 600, receiving a fourth input that the first user moves the target application in the source first type area to the destination first type area.
Optionally, the first user moves the target application in the source first type region to the destination first type region through a fourth input, for example, the first user drags the target application in the source first type region to the destination first type region, or adds the target application in a corresponding control in the destination first type region.
Step 601, responding to the fourth input, and updating the use permission of the target visitor to the target application according to the use permission of the target visitor to the target application and the use permission of the target visitor to all applications in the target first type area.
Optionally, in response to the fourth input, overlapping the usage right of the target application by the target visitor and the usage right of all applications in the target first type area by the target visitor, and updating the usage right of the target application by the target visitor.
Alternatively, the first user may make a new setting for the usage right of the target application by the target visitor in the target first type area.
According to the authority control method provided by the embodiment of the application, the use authority of the target application is updated by the target visitor according to the fourth input of the user moving the target application in the source first type area to the target first type area, so that the use authority of the target application can be quickly superposed, and the flexibility and the efficiency of authority control are improved.
It should be noted that, in the authority control method provided in the embodiment of the present application, the execution subject may be an authority control device, or a control unit in the authority control device for executing the authority control method. In the embodiment of the present application, an authority control device executes an authority control method as an example, and the authority control device provided in the embodiment of the present application is described.
Fig. 7 is a schematic structural diagram of an authority control device according to an embodiment of the present application, and as shown in fig. 7, the authority control device includes: an identity verification module 710 and a first permission determination module 720.
The identity verification module 710 is configured to display a first permission setting interface when the identity verification of the first user is successful;
a first permission determination module 720, configured to receive a first input of the first user to the first permission setting interface, and determine, in response to the first input, a usage permission of a target application by a target visitor;
the first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area;
the first type area comprises icons of at least one application and a second control corresponding to each application;
the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the application corresponding to the second control in the first type area.
Optionally, the first input comprises at least one of:
performing first operation on a first control corresponding to a target first type area in the first permission setting interface;
and performing second operation on a second control corresponding to the target application in the target first type area in the first permission setting interface.
Optionally, the determining, in response to the first input, the usage right of the target visitor to the target application includes one of:
in response to the first operation, determining first use permission of a target visitor to all applications in the target first type area, and determining the use permission of the target visitor to the target application according to the first use permission;
in response to the second operation, determining second use permission of a target visitor to the target application in the target first type area, and determining the use permission of the target visitor to the target application according to the second use permission;
and determining first use permission of a target visitor to all applications in the target first-type area in response to the first operation, determining second use permission of the target visitor to the target applications in the target first-type area in response to the second operation, and determining the use permission of the target visitor to the target applications according to the first use permission and the second use permission.
Optionally, the right control apparatus further includes:
the first display module is used for receiving second input of the first user to the target application in the target first type area and responding to the second input to display a second permission setting interface;
the second permission determining module is used for receiving third input of the first user to the second permission setting interface and determining the use permission of a target visitor to a target function item in the target application in response to the third input;
the second permission setting interface comprises a plurality of second type areas and a third control corresponding to each second type area;
the second type area comprises at least one icon of a function item and a fourth control corresponding to each function item;
the third control is used for controlling the use permission of different visitors to all the function items in the second type area, and the fourth control is used for controlling the use permission of different visitors to the corresponding function items in the second type area.
Optionally, the third input comprises at least one of:
performing third operation on a third control element corresponding to the target second type area in the second permission setting interface;
and performing fourth operation on a fourth control corresponding to the target function item in the target second type area in the second permission setting interface.
Optionally, the determining, in response to the third input, the usage right of the target visitor to the target function item in the target application includes one of:
responding to the third operation, determining third use permission of a target visitor to all function items in the target second type area, and determining the use permission of the target visitor to the target function items in the target application according to the third use permission;
responding to the fourth operation, determining a fourth use permission of a target visitor to the target function item in the target second type area, and determining the use permission of the target visitor to the target function item in the target application according to the fourth use permission;
and determining third use permission of the target visitor to all the function items in the target second type area in response to the third operation, determining fourth use permission of the target visitor to the target function items in the target second type area in response to the fourth operation, and determining the use permission of the target visitor to the target function items according to the third use permission and the fourth use permission.
Optionally, the right control apparatus further includes:
and the second display module is used for adjusting the display modes of all the applications on the desktop according to the use permission of the target visitor to all the applications under the condition that the identification of the target visitor is successful.
Optionally, the right control apparatus further includes:
and the third display module is used for adjusting the layout of all functional items in a display interface of the target application according to the use permission of the target visitor to all functional items in the target application under the condition that the target visitor uses the target application.
Optionally, the right control apparatus further includes:
the receiving module is used for receiving fourth input of the first user for moving the target application in the source first type area to the target first type area;
and the permission updating module is used for responding to the fourth input and updating the use permission of the target visitor to the target application according to the use permission of the target visitor to the target application and the use permission of the target visitor to all applications in the target first type area.
The authority control device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a personal computer (personal computer, PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not limited in particular.
The authority control device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The permission control device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 to fig. 6, and is not described here again to avoid repetition.
Optionally, as shown in fig. 8, an electronic device 800 is further provided in this embodiment of the present application, and includes a processor 801, a memory 802, and a program or an instruction stored in the memory 802 and executable on the processor 801, where the program or the instruction implements each process of the above-mentioned authorization control method embodiment when executed by the processor 801, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 900 includes, but is not limited to: a radio frequency unit 901, a network unit 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, and a processor 910.
Those skilled in the art will appreciate that the electronic device 900 may further include a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 910 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The processor 910 is configured to display a first permission setting interface when the identity verification of the first user is successful;
wherein the user input unit 907 is configured to receive a first input of the first user to the first permission setting interface, and the processor 910 is further configured to: in response to the first input, determining usage rights of the target visitor to the target application;
the first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area;
the first type area comprises icons of at least one application and a second control corresponding to each application;
the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area.
In the embodiment of the application, the first permission setting interface comprises a plurality of first type areas, each first type area comprises at least one application icon, the first control is used for controlling the use permission of different visitors to all applications in the first type area, the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area, the first control has an overall control effect on the applications in the areas, the permission of the plurality of applications can be set through one-time operation of a user, the function authorization speed limit is faster, the operation is simpler, in addition, the use permission of each application is controlled by the second area, the user can give the function permission to each application, and the function authorization limit is more flexible.
Optionally, the first input comprises at least one of:
performing first operation on a first control corresponding to a target first type area in the first permission setting interface;
and performing second operation on a second control corresponding to the target application in the target first type area in the first permission setting interface.
In the embodiment of the application, the first input includes at least one of a first operation on the first control and a second operation on the second control, and compared with a case that the first operation needs to be performed on the first control and the second operation needs to be performed on the second control, the permission setting mode in the embodiment of the application is more flexible.
Optionally, the determining, in response to the first input, the usage right of the target visitor to the target application includes one of:
in response to the first operation, determining first use permission of a target visitor to all applications in the target first type area, and determining the use permission of the target visitor to the target application according to the first use permission;
in response to the second operation, determining second use permission of a target visitor to the target application in the target first type area, and determining the use permission of the target visitor to the target application according to the second use permission;
and determining first use permission of a target visitor to all applications in the target first-type area in response to the first operation, determining second use permission of the target visitor to the target applications in the target first-type area in response to the second operation, and determining the use permission of the target visitor to the target applications according to the first use permission and the second use permission.
In the embodiment of the application, the usage right of the target application by the target visitor is determined according to at least one of the first usage right and the second usage right, and compared with the case that the usage right of the target application by the target visitor is determined only according to the first usage right and the second usage right, the permission determination method in the embodiment of the application is more flexible.
Optionally, the user input unit 907 is further configured to: receiving a second input of the first user to a target application in a target first type area, the processor 910 is further configured to: displaying a second permission setting interface in response to the second input;
the user input unit 907 is also used for: receiving a third input to the second permission setting interface from the first user, the processor 910 is further configured to: in response to the third input, determining the use authority of the target visitor to the target function item in the target application;
the second permission setting interface comprises a plurality of second type areas and a third control corresponding to each second type area;
the second type area comprises at least one icon of a function item and a fourth control corresponding to each function item;
the third control is used for controlling the use permission of different visitors to all the function items in the second type area, and the fourth control is used for controlling the use permission of different visitors to the corresponding function items in the second type area.
In the embodiment of the application, the second permission setting interface comprises a plurality of second type areas, each second type area comprises at least one icon of a function item, the third control is used for controlling the use permission of different visitors to all the function items in the second type area, the fourth control is used for controlling the use permission of different visitors to the corresponding function items in the second type area, and the disassembly and authorization are performed corresponding to the internal functions, so that the first user can flexibly control and apply the function permission of the local area, and the flexibility of authorization and use is further improved.
Optionally, the third input comprises at least one of:
performing third operation on a third control element corresponding to the target second type area in the second permission setting interface;
and performing fourth operation on a fourth control corresponding to the target function item in the target second type area in the second permission setting interface.
In this embodiment of the application, the second input includes at least one of a third operation on the third control and a fourth operation on the fourth control, and compared with a case where the third operation needs to be performed on the third control and the fourth operation needs to be performed on the fourth control, the permission setting manner in this embodiment of the application is more flexible.
Optionally, the determining, in response to the third input, the usage right of the target visitor to the target function item in the target application includes one of:
responding to the third operation, determining third use permission of a target visitor to all function items in the target second type area, and determining the use permission of the target visitor to the target function items in the target application according to the third use permission;
responding to the fourth operation, determining a fourth use permission of a target visitor to the target function item in the target second type area, and determining the use permission of the target visitor to the target function item in the target application according to the fourth use permission;
and determining third use permission of the target visitor to all the function items in the target second type area in response to the third operation, determining fourth use permission of the target visitor to the target function items in the target second type area in response to the fourth operation, and determining the use permission of the target visitor to the target function items according to the third use permission and the fourth use permission.
In the embodiment of the application, the usage right of the target function item by the target visitor is determined according to at least one of the third usage right and the fourth usage right, and compared with the case that the usage right of the target function item by the target visitor is determined only according to the third usage right and the fourth usage right, the right determining method in the embodiment of the application is more flexible.
Optionally, the processor 910 is further configured to, when the identification of the target visitor is successful, adjust display modes of all applications on the desktop according to the usage rights of the target visitor to all applications.
Compared with the method that the use permission of the target visitor to the application is not considered, the display method of all the applications on the desktop is adjusted, all the applications are directly displayed, desktop space is saved, icons of the applications which cannot be used are not displayed for the visitor, and safety is improved.
Optionally, the processor 910 is further configured to, in a case that the target visitor uses the target application, adjust a layout of all function items in a display interface of the target application according to the usage rights of the target visitor to all function items in the target application.
And under the condition that the target visitor uses the target application, the layout of all functional items in the display interface of the target application is adjusted, so that the leakage of privacy information is prevented, and the displayed interface is more attractive.
Optionally, the user input unit 907 is further configured to: receiving a fourth input that the first user moves a target application in a source first type area to a destination first type area;
the processor 910 is further configured to update the usage right of the target visitor to the target application in response to the fourth input according to the usage right of the target application by the target visitor and the usage right of all applications in the target first type area by the target visitor.
In the embodiment of the application, according to the fourth input that the user moves the target application in the source first type area to the target first type area, the use permission of the target application is updated by the target visitor, so that the use permission of the target application can be quickly superposed, and the flexibility and the efficiency of permission control are improved.
It should be understood that, in the embodiment of the present application, the input Unit 904 may include a Graphics Processing Unit (GPU) 9041 and a microphone 9042, and the Graphics Processing Unit 9041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 906 may include a display panel 9061, and the display panel 9061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 907 includes a touch panel 9071 and other input devices 9072. A touch panel 9071 also referred to as a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. Memory 909 can be used to store software programs as well as various data including, but not limited to, application programs and operating systems. The processor 910 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 910.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned method for controlling an authority, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above-mentioned permission control method embodiment, and can achieve the same technical effect, and is not described here again to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatuses in the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions recited, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the present embodiments are not limited to those precise embodiments, which are intended to be illustrative rather than restrictive, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope of the appended claims.

Claims (10)

1. An authority control method, comprising:
displaying a first permission setting interface under the condition that the identity verification of the first user is successful;
receiving first input of the first user to the first permission setting interface, and determining the use permission of a target visitor to a target application in response to the first input;
the first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area;
the first type area comprises icons of at least one application and a second control corresponding to each application;
the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area.
2. The entitlement control method of claim 1, wherein the first input comprises at least one of:
performing first operation on a first control corresponding to a target first type area in the first permission setting interface;
and performing second operation on a second control corresponding to the target application in the target first type area in the first permission setting interface.
3. The rights control method of claim 2, wherein said determining the usage rights of the target visitor to the target application in response to the first input comprises one of:
in response to the first operation, determining first use permission of a target visitor to all applications in the target first type area, and determining the use permission of the target visitor to the target application according to the first use permission;
in response to the second operation, determining second use permission of a target visitor to the target application in the target first type area, and determining the use permission of the target visitor to the target application according to the second use permission;
and determining first use permission of a target visitor to all applications in the target first-type area in response to the first operation, determining second use permission of the target visitor to the target applications in the target first-type area in response to the second operation, and determining the use permission of the target visitor to the target applications according to the first use permission and the second use permission.
4. The entitlement control method according to any of claims 1 to 3, characterized in that the method further comprises:
receiving second input of the first user to a target application in a target first type area, and responding to the second input to display a second permission setting interface;
receiving a third input of the first user to the second permission setting interface, and determining the use permission of a target visitor to a target function item in the target application in response to the third input;
the second permission setting interface comprises a plurality of second type areas and a third control corresponding to each second type area;
the second type area comprises at least one icon of a function item and a fourth control corresponding to each function item;
the third control is used for controlling the use permission of different visitors to all the function items in the second type area, and the fourth control is used for controlling the use permission of different visitors to the corresponding function items in the second type area.
5. The entitlement control method of claim 4, wherein the third input comprises at least one of:
performing third operation on a third control element corresponding to the target second type area in the second permission setting interface;
performing fourth operation on a fourth control corresponding to the target function item in the target second type area in the second permission setting interface;
the determining of the usage right of the target visitor to the target function item in the target application in response to the third input comprises one of:
responding to the third operation, determining third use permission of a target visitor to all function items in the target second type area, and determining the use permission of the target visitor to the target function items in the target application according to the third use permission;
responding to the fourth operation, determining a fourth use permission of a target visitor to the target function item in the target second type area, and determining the use permission of the target visitor to the target function item in the target application according to the fourth use permission;
and determining third use permission of the target visitor to all the function items in the target second type area in response to the third operation, determining fourth use permission of the target visitor to the target function items in the target second type area in response to the fourth operation, and determining the use permission of the target visitor to the target function items according to the third use permission and the fourth use permission.
6. An authorization control device, comprising:
the identity verification module is used for displaying a first authority setting interface under the condition that the identity verification of the first user is successful;
the first permission determination module is used for receiving first input of the first user to the first permission setting interface and determining the use permission of a target visitor to a target application in response to the first input;
the first permission setting interface comprises a plurality of first type areas and a first control corresponding to each first type area;
the first type area comprises icons of at least one application and a second control corresponding to each application;
the first control is used for controlling the use permission of different visitors to all applications in the first type area, and the second control is used for controlling the use permission of different visitors to the applications corresponding to the second control in the first type area.
7. The permission control apparatus of claim 6, wherein the first input comprises at least one of:
performing first operation on a first control corresponding to a target first type area in the first permission setting interface;
and applying a second operation of a corresponding second control to a target in a target first type area in the first permission setting interface.
8. The permission control apparatus of claim 7, wherein the determining of the usage permission of the target visitor to the target application in response to the first input comprises one of:
in response to the first operation, determining first use permission of a target visitor to all applications in the target first type area, and determining the use permission of the target visitor to the target application according to the first use permission;
in response to the second operation, determining second use permission of a target visitor to the target application in the target first type area, and determining the use permission of the target visitor to the target application according to the second use permission;
and determining first use permission of a target visitor to all applications in the target first-type area in response to the first operation, determining second use permission of the target visitor to the target applications in the target first-type area in response to the second operation, and determining the use permission of the target visitor to the target applications according to the first use permission and the second use permission.
9. The apparatus according to any one of claims 6 to 8, characterized by further comprising:
the first display module is used for receiving second input of the first user to the target application in the target first type area and responding to the second input to display a second permission setting interface;
the second permission determining module is used for receiving third input of the first user to the second permission setting interface and determining the use permission of a target visitor to a target function item in the target application in response to the third input;
the second permission setting interface comprises a plurality of second type areas and a third control corresponding to each second type area;
the second type area comprises at least one icon of a function item and a fourth control corresponding to each function item;
the third control is used for controlling the use permission of different visitors to all the function items in the second type area, and the fourth control is used for controlling the use permission of different visitors to the corresponding function items in the second type area.
10. The entitlement control method of claim 9, wherein the third input comprises at least one of:
performing third operation on a third control element corresponding to the target second type area in the second permission setting interface;
performing fourth operation on a fourth control corresponding to the target function item in the target second type area in the second permission setting interface;
the determining of the usage right of the target visitor to the target function item in the target application in response to the third input comprises one of:
responding to the third operation, determining third use permission of a target visitor to all function items in the target second type area, and determining the use permission of the target visitor to the target function items in the target application according to the third use permission;
responding to the fourth operation, determining a fourth use permission of a target visitor to the target function item in the target second type area, and determining the use permission of the target visitor to the target function item in the target application according to the fourth use permission;
and determining third use permission of the target visitor to all the function items in the target second type area in response to the third operation, determining fourth use permission of the target visitor to the target function items in the target second type area in response to the fourth operation, and determining the use permission of the target visitor to the target function items according to the third use permission and the fourth use permission.
CN202210002187.3A 2022-01-04 2022-01-04 Authority control method and device Pending CN114491440A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210002187.3A CN114491440A (en) 2022-01-04 2022-01-04 Authority control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210002187.3A CN114491440A (en) 2022-01-04 2022-01-04 Authority control method and device

Publications (1)

Publication Number Publication Date
CN114491440A true CN114491440A (en) 2022-05-13

Family

ID=81509909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210002187.3A Pending CN114491440A (en) 2022-01-04 2022-01-04 Authority control method and device

Country Status (1)

Country Link
CN (1) CN114491440A (en)

Similar Documents

Publication Publication Date Title
CN104321778B (en) The auto-associating of Service Ticket and biometric information
US9716706B2 (en) Systems and methods for providing a covert password manager
US11175929B2 (en) User interfaces for enabling an activity
US20230237448A1 (en) Payment interface display method and apparatus and electronic device
US20230385426A1 (en) Encryption Method and Apparatus, Electronic Device, and Medium
EP4276595A1 (en) Content display method and apparatus, and device and storage medium
KR20130082979A (en) User personalized recommendation system based on fingerprint identification
CN112764614B (en) Data isolation method and electronic equipment
WO2023160640A1 (en) Application identifier control method and apparatus
WO2023103901A1 (en) Application management method and apparatus, and electronic device
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
CN114491440A (en) Authority control method and device
CN111279339B (en) Application locking method, terminal equipment and computer readable medium
McGrath Windows 10 in easy steps–Special Edition
Iqbal et al. Potential security and privacy issues in zero UI touchless technology
EP4028869B1 (en) User interfaces for enabling an activity
Sieger Perceived security and usage of a mobile payment application
CN117195192A (en) Application unlocking method and device, electronic equipment and readable storage medium
CN113032738A (en) Application authority management method and device and electronic equipment
CN117540400A (en) File processing method, device, electronic equipment and readable storage medium
CN116842539A (en) File management method and terminal thereof
CN106295274A (en) A kind of application control method and device
CN115964744A (en) Display method and device and electronic equipment
CN116257154A (en) Display control method and device and electronic equipment
CN115700446A (en) Application management method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination