CN103812866B - The management method and device and mobile terminal of operation layer - Google Patents

The management method and device and mobile terminal of operation layer Download PDF

Info

Publication number
CN103812866B
CN103812866B CN201410042092.XA CN201410042092A CN103812866B CN 103812866 B CN103812866 B CN 103812866B CN 201410042092 A CN201410042092 A CN 201410042092A CN 103812866 B CN103812866 B CN 103812866B
Authority
CN
China
Prior art keywords
user
access
identity
operation layer
access rights
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410042092.XA
Other languages
Chinese (zh)
Other versions
CN103812866A (en
Inventor
杨文峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201410042092.XA priority Critical patent/CN103812866B/en
Publication of CN103812866A publication Critical patent/CN103812866A/en
Application granted granted Critical
Publication of CN103812866B publication Critical patent/CN103812866B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of management method of operation layer and device and mobile terminal, the management method of the operation layer includes step:Access rights are set to an at least operation layer;When user is intended to access the operation layer there is provided access rights, determine whether that user accesses according to the access rights.A kind of management method of operation layer provided by the present invention; by setting access rights to operation layer; the operation layer could be accessed only after the checking by access rights; so as to which different data can be positioned over corresponding operation layer by user according to the importance of data; without setting access rights one by one to various data; facilitate unified management of the user to data, be effectively protected the significant data and individual privacy of user, improve Consumer's Experience.

Description

The management method and device and mobile terminal of operation layer
Technical field
The present invention relates to communication technical field, and management method and device and movement more particularly, to a kind of operation layer are eventually End.
Background technology
With developing rapidly for science and technology, people's acquisition information data is more and more convenient and quick, particularly along with communication The progress of technology, people only just can obtain and handle various data by portable mobile termianl, complete foreign exchanges and personal joy The affairs such as happy.However, while quick obtaining data, also along with the leakage of user's significant data and individual privacy, and use The consciousness that family is protected to individual privacy is also more and more stronger.
Existing terminal device such as mobile terminal generally includes multiple operation layers, and multiple applications are placed with each operation layer Or file, generally once only show that an operation layer be free to for user's operation, user in the operation interface of terminal device Any operation layer is switched to, the free various applications accessed on operation layer and file.At present, people are to important in terminal device The measure that the protection of data is taken is typically that various data are set with password respectively, i.e., to the various applications on operation layer or file Password is set to be protected respectively.But the data in terminal device are various, the data such as various applications, file are innumerable, one One sets password, very cumbersome, and password is also easy to forget too much.Therefore, management and its inconvenience of the user to data, it is unfavorable In the significant data and individual privacy of protection user.
The content of the invention
It is a primary object of the present invention to provide the management method and device and mobile terminal of a kind of operation layer, it is intended to convenient Management of the user to data, the significant data and individual privacy of user are protected, lift Consumer's Experience.
To achieve these objectives, the present invention proposes a kind of management method of operation layer, including step:
Access rights are set to an at least operation layer;
When user is intended to access the operation layer there is provided access rights, user is determined whether according to the access rights Access.
Preferably, it is described there is provided the operation layer at least two of access rights, it is described that visit is set to an at least operation layer Ask that authority includes:
Access rights are separately provided to each operation layer or at least two operation layers are set with common access rights.
Preferably, the access rights are:Need authentication-access password;It is described to be determined whether according to the access rights User, which accesses, to be included:
It is required that user, which inputs, accesses password;
Judge whether the access password of user's input is correct;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
Preferably, the access rights are:The user of keeper's identity can free access, the user of non-administrator's identity needs Authentication-access password;It is described to determine whether that user's access includes according to the access rights:
Judge whether user identity is keeper's identity;
If so, then user is allowed to access;
If it is not, then requiring that user inputs accesses password;
Judge whether the access password of user's input is correct;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
Preferably, the access rights are:The user of keeper's identity can free access, the user of non-administrator's identity refuses Access absolutely;It is described to determine whether that user's access includes according to access rights:
Judge whether user identity is keeper's identity;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
The present invention proposes a kind of mobile terminal, including setting unit and processing unit simultaneously, wherein:
Setting unit, for setting access rights to an at least operation layer;
Processing unit, for according to the access rights, determining whether that user accesses the behaviour there is provided access rights Make layer.
It is preferably, described that there is provided the operation layer at least two of access rights, the setting unit to be used for:To each operation Layer is separately provided access rights or at least two operation layers is set with common access rights.
Preferably, the access rights are:Need authentication-access password;The processing unit is used for:
When user is intended to access the operation layer there is provided access rights, it is desirable to which user, which inputs, accesses password;
Judge whether the access password of user's input is correct;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
Preferably, the access rights are:The user of keeper's identity can free access, the user of non-administrator's identity needs Authentication-access password;The processing unit is used for:
When user is intended to access the operation layer there is provided access rights, judge whether user identity is keeper's identity;
If so, then user is allowed to access;
If it is not, then requiring that user inputs accesses password;
Judge whether the access password of user's input is correct;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
Preferably, the access rights are:The user of keeper's identity can free access, the user of non-administrator's identity refuses Access absolutely;The processing unit is used for:
When user is intended to access the operation layer there is provided access rights, judge whether user identity is keeper's identity;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
The present invention also proposes a kind of managing device of operation layer, including setting unit and processing unit, wherein:
Setting unit, for setting access rights to an at least operation layer;
Processing unit, for according to the access rights, determining whether that user accesses the behaviour there is provided access rights Make layer.
The management method of a kind of operation layer provided by the present invention, by setting access rights to operation layer, only logical The operation layer could be accessed after crossing the checking of access rights, so as to which user can put different data according to the importance of data Corresponding operation layer is placed in, without setting access rights one by one to various data, facilitates unified management of the user to data, effectively The significant data and individual privacy that protect user, improve Consumer's Experience.
Especially for the terminal device of public permission multi-user login, it is allowed to which each user, which is set, oneself can only visit The operation layer asked, realize the purpose that respective significant data and individual privacy are protected in public terminals equipment.
Brief description of the drawings
Fig. 1 is the management method first embodiment of the operation layer of the present invention;
Fig. 2 is the management method second embodiment of the operation layer of the present invention;
Fig. 3 is the management method 3rd embodiment of the operation layer of the present invention;
Fig. 4 is the structured flowchart of the embodiment of mobile terminal one of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig. 1, the management method first embodiment of the operation layer of the present invention, the management method bag of the operation layer are proposed Include following steps:
Step S101, access rights are set to operation layer
Terminal device includes at least two operation layers, some icons of having been arranged on operation layer.Generally, operation circle of terminal device An operation layer is only shown on face every time, and the operation layer being only shown in the operation interface can be just user-operably.It is some The data such as application or file on operation layer may be important or be related to privacy of user, therefore allow user at least one Operation layer sets access rights, so as to which user by important data or can be related to the data of individual privacy and uniformly be positioned over There is provided on the operation layer of access rights, without setting access rights one by one to various data, system of the user to data is facilitated One management.The present embodiment set access rights be:Need authentication-access password.Needing to input correctly access password could visit Ask the operation layer;For allow multi-user login terminal device, then the user of any identity be required to input correct password The operation layer could be accessed., then can be to each operation layer list if necessary to be respectively provided with access rights to more than two operation layers Access rights are solely set or at least two operation layers are set with common access rights, for example, can be set respectively to each operation layer Different password sets same password to each operation layer.Operation layer for being separately provided access rights, access every Authentication-access password is required to during one operation layer;For there is provided the operation layer of common access rights, it is crossed in successful access In in preset time after an operation layer, authentication-access password is then no longer required for when visiting again other operation layers.
Step S102, user is intended to access the operation layer there is provided access rights
Step S103, require that user inputs and access password
Access operation layer described in the present embodiment, including access operation bed boundary and access the application on operation layer or text Part.It can just be switched to there is provided the operation layer of access rights and before having not been entered into operation bed boundary, just eject close in user Code inputting interface, it is desirable to which user, which inputs, accesses password;Or allow user to enter operation bed boundary, only in user's clicking operation layer When icon on interface desires access to a certain application or file, interface for password input is just ejected, it is desirable to which user, which inputs, accesses password.
Step S104, judge whether the access password of user's input is correct
The access password set when the access password that terminal device inputs to user is with setting access rights carries out matching and tested Card, judge whether both are consistent.If consistent, judge that the access password of input is correct, into step S105;If differ Cause, then the access code error of input is judged, into step S106.
Step S105, user is allowed to access
If the access password of user's input is correct, user is allowed to enter operation bed boundary and access on operation bed boundary Application or file, or allow user to complain to the higher authorities about an injustice and request fair settlement in operation bed boundary and ask any application or file.
Step S106, refuse user to access
If the access code error of user's input, refusal user want to enter into the request of operation bed boundary, or refuse Exhausted user desires access to the application on the operation bed boundary or the request of file.
Referring to Fig. 2, the management method second embodiment of the operation layer of the present invention, the management method bag of the operation layer are proposed Include following steps:
Step S201, access rights are set to operation layer
Mainly for the terminal device for allowing multi-user login, the access rights that the present embodiment is set are the present embodiment:Pipe The user of reason person's identity can free access, user's denied access of non-administrator's identity.The user of keeper's identity, can be with The user of traditional keeper's identity, i.e. each terminal device only has the user of keeper's identity, if User then regards the user as the user with keeper's identity with keeper's identity logs;Or the operation layer will be set and visited Ask that the user of authority is considered as the user with keeper's identity, then now a terminal device may just have and multiple have keeper The user of identity, the user of keeper's identity corresponding to each operation layer are possibly different from, and this defines method and is applied to public affairs Terminal device, each user can set the operation layer that only oneself can be accessed.
Step S202, user is intended to access the operation layer there is provided access rights
Step S203, judge whether user identity is keeper's identity
Access operation layer described in the present embodiment, including access operation bed boundary and access the application on operation layer or text Part.Can just it be switched to there is provided the operation layer of access rights and before having not been entered into operation bed boundary, just to user in user Identity is judged;Or allowing user to enter operation bed boundary, the only icon on user's clicking operation bed boundary is wanted to visit When asking a certain application or file, just user identity is judged.If it is determined that user identity is keeper's identity, then enter step Rapid S204;If it is determined that user identity is non-administrator's identity, then into step S205.
Step S204, user is allowed to access
If user is the user with keeper's identity, allows user to enter operation bed boundary and access operation stratum boundary Application or file on face, or allow user to be complained to the higher authorities about an injustice and request fair settlement in operation bed boundary and ask any application or file.
Step S205, refuse user to access
If user is the user of non-administrator's identity, refusal user wants to enter into the request of operation bed boundary, or Refusal user desires access to the application on the operation bed boundary or the request of file.
Referring to Fig. 3, the management method 3rd embodiment of the operation layer of the present invention, the management method bag of the operation layer are proposed Include following steps:
Step S301, access rights are set to operation layer
Mainly for the terminal device for allowing multi-user login, the access rights that the present embodiment is set are the present embodiment:Pipe The user of reason person's identity can free access, the user of non-administrator's identity needs authentication-access password.
The user of keeper's identity, can be the user of traditional keeper's identity, i.e. each terminal Equipment only has the user of keeper's identity, if user regards the user as with keeper with keeper's identity logs The user of identity;Or the user of access rights will be set to be considered as the user with keeper's identity the operation layer, then now One terminal device may just have multiple users with keeper's identity, the use of keeper's identity corresponding to each operation layer Family is possibly different from, and this defines method and is applied to public terminal device, and each user, which can be set, oneself can only access Operation layer.
For the user of non-administrator's identity, then the operation layer could be accessed by needing to input correct password.If desired Access rights are respectively provided with to more than two operation layers, then access rights can be separately provided to each operation layer or are grasped at least two Make layer and common access rights are set.Operation layer for being separately provided access rights, the user of non-administrator's identity access Authentication-access password is required to during each operation layer;For there is provided the operation layer of common access rights, non-administrator's identity User in the preset time after successful access crosses a wherein operation layer, be then no longer required for verifying when visiting again other operation layers Access password.
Step S302, user is intended to access the operation layer there is provided access rights
Step S303, judge whether user identity is keeper's identity
Access operation layer described in the present embodiment, including access operation bed boundary and access the application on operation layer or text Part.Can just it be switched to there is provided the operation layer of access rights and before having not been entered into operation bed boundary, just to user in user Identity is judged;Or allowing user to enter operation bed boundary, the only icon on user's clicking operation bed boundary is wanted to visit When asking a certain application or file, just user identity is judged.If it is determined that user identity is keeper's identity, then enter step Rapid S306;If it is determined that user identity is non-administrator's identity, then into step S304.
Step S304, require that user inputs password
If user is the user of non-administrator's identity, interface for password input is ejected, it is desirable to which user, which inputs, accesses password.
Step S305, judge whether the password of user's input is correct
The access password set when the access password that terminal device inputs to user is with setting access rights carries out matching and tested Card, judge whether both are consistent.If consistent, judge that the access password of input is correct, into step S306;If differ Cause, then the access code error of input is judged, into step S307.
Step S306, user is allowed to access
If user is keeper's identity, although or user be non-administrator's identity input access password it is correct, Then allow user to enter operation bed boundary and access the application on operation bed boundary or file, or allow user in operation stratum boundary Any application or file are accessed on face.
Step S307, refuse user to access
If user is the access code error of non-administrative users and input, refusal user wants to enter into operation stratum boundary The request in face, or refusal user desire access to the application on the operation bed boundary or the request of file.
Above three embodiment lists the setting of three kinds of access rights respectively, and those skilled in the art can be according to this hair Bright spirit carries out the setting that equivalent or equivalence replacement obtains other access rights, similarly in protection scope of the present invention It is interior.One kind in above-mentioned access rights can be arbitrarily selected to be configured different operation layers.In addition, it is suitable for The terminal device of only one operation layer, user can set access rights to the operation layer as described above.
Accordingly, the management method of operation layer of the invention, by setting access rights to operation layer, only access is being passed through The operation layer could be accessed after the checking of authority, so as to which different data can be positioned over phase by user according to the importance of data The operation layer answered, without setting access rights one by one to various data, facilitate unified management of the user to data, be effectively protected The significant data and individual privacy of user, improves Consumer's Experience.
Especially for the terminal device of public permission multi-user login, it is allowed to which each user, which is set, oneself can only visit The operation layer asked, realize the purpose that respective significant data and individual privacy are protected in public terminals equipment.
Referring to Fig. 4, the embodiment of mobile terminal one of the present invention is proposed, the mobile terminal can be mobile phone, tablet personal computer Deng it includes setting unit and processing unit.
Setting unit 100:For setting access rights to an at least operation layer.
The access rights can be:Need authentication-access password.This could be accessed by needing to input correctly access password Operation layer;For allow multi-user login managing device, then the user of any identity be required to input correct password ability Access the operation layer.If necessary to be respectively provided with access rights to more than two operation layers, then each operation layer can individually be set Put access rights or at least two operation layers are set with common access rights.Operation layer for being separately provided access rights, Authentication-access password is required to when accessing each operation layer;For there is provided the operation layer of common access rights, successfully visiting Asked in the preset time after a wherein operation layer, authentication-access password is then no longer required for when visiting again other operation layers.
Managing device for allowing multi-user login, the access rights can also be:The user of keeper's identity can Free access, user's denied access of non-administrator's identity.The user of keeper's identity, can be traditional pipe The user of reason person's identity, i.e. each terminal device only have the user of keeper's identity, if user is with keeper's identity Log in, then regard the user as the user with keeper's identity;Or the user of access rights will be set to be considered as the operation layer User with keeper's identity, then now a terminal device may just have multiple users with keeper's identity, each The user of keeper's identity corresponding to operation layer is possibly different from, and this defines method and is applied to public terminal device, often Individual user can set the operation layer that only oneself can be accessed.
Managing device for allowing multi-user login, the access rights can also be:The user of keeper's identity can Free access, the user of non-administrator's identity need authentication-access password.The definition of the user of keeper's identity with it is above-mentioned fixed Justice is identical, and it can be with the free access operation layer.For the user of non-administrator's identity, then need to input correct password ability Access the operation layer.If necessary to be respectively provided with access rights to more than two operation layers, then each operation layer can individually be set Put access rights or at least two operation layers are set with common access rights.Operation layer for being separately provided access rights, The user of non-administrator's identity is required to authentication-access password when accessing each operation layer;For there is provided common access rights Operation layer, the user of non-administrator's identity visits again other in the preset time after successful access crosses a wherein operation layer Authentication-access password is then no longer required for during operation layer.
Processing unit 200:For according to the access rights, determining whether that user accesses and being provided with access rights Operation layer.
That is processing unit 200 conducts interviews the checking of authority to user, if being proved to be successful, allows user to access the operation Layer;If authentication failed, refusal user accesses the operation layer.Access operation layer described in the present embodiment, including access operation layer Interface and the application on access operation layer or file.Processing unit 200 can just be switched to that there is provided access rights in user Operation layer and have not been entered into operation bed boundary before, the checking for the authority that just conducted interviews to user;Or user is allowed to enter behaviour Make bed boundary, only when the icon on user's clicking operation bed boundary desires access to a certain application or file, just user is carried out The checking of access rights.
When user is intended to access the operation layer there is provided access rights, if the access rights of the operation layer are that " need to verify visit Ask password ", processing unit 200 then ejects interface for password input, it is desirable to and user, which inputs, accesses password, and to the access of user's input The access password set when password is with setting access rights carries out matching checking, judges whether both are consistent.If consistent, sentence Surely the access password inputted is correct, it is allowed to which user accesses the operation layer;If it is inconsistent, judge that the access password of input is wrong By mistake, refusal user accesses the operation layer.
When user is intended to access the operation layer there is provided access rights, if the access rights of the operation layer are " keeper's body Part user can free access, user's denied access of non-administrator's identity ", processing unit 200 then judges the body of active user Whether part is keeper's identity.If it is determined that active user is the user with keeper's identity, then active user is allowed to access The operation layer;If it is determined that active user is the user of non-administrator's identity, then refuses active user and access the operation layer.
When user is intended to access the operation layer there is provided access rights, if the access rights of the operation layer are " keeper's body Part user can free access, the user of non-administrator's identity needs authentication-access password ", processing unit 200 first determines whether currently Whether the identity of user is keeper's identity.If it is determined that active user is the user with keeper's identity, then allow current User accesses the operation layer.If it is determined that active user is the user of non-administrator's identity, then interface for password input is ejected, it is desirable to User, which inputs, accesses password, and the access password of user's input is matched with the access password set during setting access rights Checking, judge whether both are consistent;If consistent, judge that the access password of input is correct, it is allowed to which user accesses the operation layer; If it is inconsistent, judging the access code error of input, refusal user accesses the operation layer.
Accordingly, mobile terminal of the invention, by setting access rights to operation layer, only in testing by access rights The operation layer could be accessed after card, so as to which different data can be positioned over corresponding operation by user according to the importance of data Layer, without setting access rights one by one to various data, facilitates unified management of the user to data, is effectively protected user's Significant data and individual privacy, improve Consumer's Experience.
Especially for the managing device of public permission multi-user login, it is allowed to which each user, which is set, oneself can only visit The operation layer asked, realize the purpose that respective significant data and individual privacy are protected in public managing device.
The present invention also proposes a kind of managing device of operation layer, and the managing device can be that mobile phone, tablet personal computer etc. move The non-moving terminal device of dynamic terminal or desktop computer etc., the managing device include setting unit and processing unit. Wherein:Setting unit, for setting access rights to an at least operation layer;Processing unit, for according to the access rights, sentencing It is disconnected whether to allow user to access the operation layer there is provided access rights.The managing device and the mobile terminal in previous embodiment Equally, the management method of aforementioned operation layer can be realized, will not be repeated here.
It should be appreciated that it these are only the preferred embodiments of the present invention, it is impossible to therefore the scope of the claims of the limitation present invention, Every equivalent structure made using description of the invention and accompanying drawing content or equivalent flow conversion, or be directly or indirectly used in Other related technical areas, it is included within the scope of the present invention.

Claims (10)

1. a kind of management method of operation layer, it is characterised in that including step:
Access rights are set to an at least operation layer, wherein the access rights are set according to user identity, the user identity Including keeper's identity and non-administrator's identity, the user of keeper's identity corresponding to each operation layer is identical or not phase Together, each operation layer sets different passwords or same password respectively;
When user is intended to access the operation layer there is provided access rights, determine whether that user visits according to the access rights Ask;
When setting common access rights at least two operation layers, when user's successful access crosses default after a wherein operation layer In, then it is no longer required for authentication-access password accessing other operation layers.
2. the management method of operation layer according to claim 1, it is characterised in that described there is provided the operation of access rights Layer at least two, it is described to set access rights to include an at least operation layer:
Access rights are separately provided to each operation layer or at least two operation layers are set with common access rights.
3. the management method of operation layer according to claim 1 or 2, it is characterised in that the access rights are:Need to verify Access password;It is described to determine whether that user's access includes according to the access rights:
It is required that user, which inputs, accesses password;
Judge whether the access password of user's input is correct;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
4. the management method of operation layer according to claim 1 or 2, it is characterised in that the access rights are:Keeper The user of identity can free access, the user of non-administrator's identity needs authentication-access password;It is described to be sentenced according to the access rights It is disconnected whether to allow user's access to include:
Judge whether user identity is keeper's identity;
If so, then user is allowed to access;
If it is not, then requiring that user inputs accesses password;
Judge whether the access password of user's input is correct;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
5. the management method of operation layer according to claim 1, it is characterised in that the access rights are:Keeper's body Part user can free access, user's denied access of non-administrator's identity;It is described to determine whether to use according to access rights Family, which accesses, to be included:
Judge whether user identity is keeper's identity;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
A kind of 6. mobile terminal, it is characterised in that including setting unit and processing unit, wherein:
Setting unit, for setting access rights to an at least operation layer, wherein the access rights are set according to user identity, The user identity includes keeper's identity and non-administrator's identity, user's phase of keeper's identity corresponding to each operation layer Together or differ, each operation layer sets different passwords or same password respectively;
Processing unit, for according to the access rights, determining whether that user accesses the operation layer there is provided access rights;
When the setting unit sets common access rights at least two operation layers, user's successful access crosses wherein one operation In preset time after layer, authentication-access password is then no longer required for accessing other operation layers.
7. mobile terminal according to claim 6, it is characterised in that described there is provided the operation layer of access rights to be at least Two, the setting unit is used for:Access rights are separately provided to each operation layer or at least two operation layers are set with common visit Ask authority.
8. the mobile terminal according to claim 6 or 7, it is characterised in that the access rights are:Need authentication-access close Code;The processing unit is used for:
When user is intended to access the operation layer there is provided access rights, it is desirable to which user, which inputs, accesses password;
Judge whether the access password of user's input is correct;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
9. mobile terminal according to claim 6, it is characterised in that the access rights are:The user of keeper's identity Can free access, user's denied access of non-administrator's identity;The processing unit is used for:
When user is intended to access the operation layer there is provided access rights, judge whether user identity is keeper's identity;
If so, then user is allowed to access;
Accessed if it is not, then refusing user.
A kind of 10. managing device of operation layer, it is characterised in that including setting unit and processing unit, wherein:
Setting unit, for setting access rights to an at least operation layer, wherein the access rights are set according to user identity, The user identity includes keeper's identity and non-administrator's identity, user's phase of keeper's identity corresponding to each operation layer Together or differ, each operation layer sets different passwords or same password respectively;
Processing unit, for according to the access rights, determining whether that user accesses the operation layer there is provided access rights;
When the setting unit sets common access rights at least two operation layers, user's successful access crosses wherein one operation In preset time after layer, authentication-access password is then no longer required for accessing other operation layers.
CN201410042092.XA 2014-01-28 2014-01-28 The management method and device and mobile terminal of operation layer Active CN103812866B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410042092.XA CN103812866B (en) 2014-01-28 2014-01-28 The management method and device and mobile terminal of operation layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410042092.XA CN103812866B (en) 2014-01-28 2014-01-28 The management method and device and mobile terminal of operation layer

Publications (2)

Publication Number Publication Date
CN103812866A CN103812866A (en) 2014-05-21
CN103812866B true CN103812866B (en) 2018-03-09

Family

ID=50709067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410042092.XA Active CN103812866B (en) 2014-01-28 2014-01-28 The management method and device and mobile terminal of operation layer

Country Status (1)

Country Link
CN (1) CN103812866B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302416A (en) * 2018-11-13 2019-02-01 深圳市华师兄弟文化传播有限公司 From brand share system
CN111258689A (en) * 2020-01-09 2020-06-09 成都市新筑路桥机械股份有限公司 Tramcar man-machine interaction interface page management method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8166067B2 (en) * 2008-12-26 2012-04-24 Sandisk Il Ltd. Method and apparatus for providing access to files based on user identity
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN103023649A (en) * 2012-11-29 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for protecting privacy information
CN103067404B (en) * 2013-01-10 2018-09-28 上海斐讯数据通信技术有限公司 A kind of method that user accesses embedded web server
CN103108082B (en) * 2013-01-24 2014-06-04 北京航空航天大学 Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal

Also Published As

Publication number Publication date
CN103812866A (en) 2014-05-21

Similar Documents

Publication Publication Date Title
CN102880820B (en) Mobile terminal application program access method and mobile terminal
Ahmed et al. " Everyone Has Some Personal Stuff" Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh
CN103793636B (en) A kind of method of equipment and protection equipment privacy
US7992190B2 (en) Authorization scheme to simplify security configurations
CN103324893B (en) The method and apparatus of secret protection
Hayashi et al. Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications
Mare et al. Consumer smart homes: Where we are and where we need to go
WO2017045386A1 (en) Fingerprint recognition method and device for touch screen, and touch screen
Micallef et al. Why aren't users using protection? investigating the usability of smartphone locking
GB2562563A (en) Session-limited, manually-entered user authentication information
CN109076087A (en) It is shared to the outside based on group of electronic data
Barbosa et al. UniPass: design and evaluation of a smart device-based password manager for visually impaired users
CN104866752B (en) A kind of application guard method and user terminal
CN103377332A (en) Application program accessing method and device
CN103813334A (en) Right control method and right control device
CN102710847A (en) Method for managing access of multiple visitors to mobile terminal
CN105069333A (en) User domain access method, access system and terminal
US8881268B2 (en) Secure area for apps
CN103324874A (en) Verification method and electronic device
CN106203174A (en) Application information processing method and device and electronic equipment
CN106055941A (en) Terminal method and apparatus
Wijesekera et al. Dynamically regulating mobile application permissions
CN103812866B (en) The management method and device and mobile terminal of operation layer
WO2016059564A1 (en) Partial access screen lock
Ausloos et al. Guidelines for privacy-friendly default settings

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant after: Nubian Technologies Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 floor 10

Applicant before: Shenzhen ZTE Mobile Tech Co., Ltd.

GR01 Patent grant
GR01 Patent grant