CN105354489B - Permission giving method and device - Google Patents

Permission giving method and device Download PDF

Info

Publication number
CN105354489B
CN105354489B CN201510719740.5A CN201510719740A CN105354489B CN 105354489 B CN105354489 B CN 105354489B CN 201510719740 A CN201510719740 A CN 201510719740A CN 105354489 B CN105354489 B CN 105354489B
Authority
CN
China
Prior art keywords
permission
system permission
app
safety
authorization options
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510719740.5A
Other languages
Chinese (zh)
Other versions
CN105354489A (en
Inventor
王硕
王广健
卢旭辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510719740.5A priority Critical patent/CN105354489B/en
Publication of CN105354489A publication Critical patent/CN105354489A/en
Application granted granted Critical
Publication of CN105354489B publication Critical patent/CN105354489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

Present disclose provides a kind of permission giving method and devices, belong to field of terminal technology.Method includes: to authorize the first system permission to the APP, the first system permission refers to that safety meets the system permission of default safety standard in the installation process of any application APP;In the APP use process, when receiving the APP to the application of any system permission in second system permission, display is applied system permission and the permission authorization options for being applied system permission and forbids authorization options, the second system permission refers in the system permission that the APP needs, the system permission in addition to the first system permission;When detecting to the trigger action for allowing authorization options, the APP is authorized and described is applied system permission.The disclosure is measured by the authorized user of each system permission and determines the first system permission, and in APP installation process, authorizes the first system permission to the APP, improve the continuity of operation.

Description

Permission giving method and device
Technical field
This disclosure relates to field of terminal technology more particularly to a kind of permission giving method and device.
Background technique
With the continuous development of terminal technology, the function of terminal is also more and more abundant and perfect, the tool provided by third party There is the APP (Application, application program) of different function also more and more, user can be by installing these APP in terminal Use its corresponding function;However, some APP need to obtain the right to use of system corresponding function when realizing its function Limit for example, service for life class APP may need to obtain the positioning permission of system, and then can provide week by positioning for user The related lifes such as dining room, sight spot, hotel service category information is enclosed, to facilitate user to select;Social category APP may need to obtain access The permission of address list enables social category APP to get the contact information in address list.
Currently, permission giving method can be with are as follows: detecting that user executes trigger action to any APP confirmation Installation Options Before, terminal is from the installation kit of the APP, and obtaining the APP in use needs system permission to be used, and in the APP Confirmation installation interface on show that the APP needs system permission to be used, when detecting user to the trigger action of Installation Options When, which is installed;In the use process of the APP, when needing using a certain system function, it is corresponding to terminal to trigger the APP The application of system permission, when terminal receives this application, display needs the system permission that authorizes, and allow to authorize simultaneously with Forbid authorization options, when detecting user to the trigger action for allowing authorization options, authorizes corresponding system permission to the APP.
Above-mentioned authorization method, although can make user before installing APP, know the APP need in use using System permission still in order to guarantee the safety of system, directly the APP can not be authorized in the installation process of the APP and be System permission, and then cause in the use process of the APP, application of the APP to different system permissions is frequently triggered, so that operation Continuity it is poor.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of permission giving method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of permission giving method is provided, comprising:
In the installation process of any application APP, the first system permission is authorized to the APP, the first system permission Refer to that safety meets the system permission of default safety standard;
In the APP use process, when receiving the APP to the application of any system permission in second system permission, Display is applied system permission and this is applied the permission authorization options of system permission and forbids authorization options, second system System permission refer to the APP need system permission in, the system permission in addition to the first system permission;
When detecting the trigger action to the permission authorization options, this is authorized to the APP and is applied system permission.
In the first possible implementation of the first aspect of the disclosure, in the installation process of any application APP In, before authorizing the first system permission to the APP, this method further include:
Obtain the installation kit of the APP;
From the installation kit of the APP, the system permission of APP needs is obtained;
In the system permission that the APP needs, the first system permission is determined, the first system permission is according to each system The safety of permission determines.
In second of possible implementation of the first aspect of the disclosure, in the system permission that the APP needs, determine The first system permission includes:
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server determines the first system permission in the system permission that the APP needs, and receives the first system of server transmission Permission;Or,
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server returns to the safety data of each system permission in the system permission of APP needs, receives each system permission Safety data, and according to the safety data of each system permission, the permission that safety is met default safety standard is true It is set to the first system permission.
In the third possible implementation of the first aspect of the disclosure, according to the safety number of each system permission According to the permission that safety meets default safety standard, which is determined as the first system permission, includes:
It is measured according to the authorized user of each system permission, the safety of each system permission is determined, by safety The permission for meeting default safety standard is determined as the first system permission.
In the 4th kind of possible implementation of the first aspect of the disclosure, in the installation process of any application APP In, after authorizing the first system permission to the APP, this method further include:
The end message of the first system permission and the local terminal that local terminal has authorized is sent to server, so that the server By the first kind system permission and the corresponding storage of the end message.
In the 5th kind of possible implementation of the first aspect of the disclosure, this method further include:
System permission is applied in display and this is applied the permission authorization options of system permission and forbids authorization options When, show each system permission that this in the second system permission is applied other than system permission and this be applied system power The permission authorization options of each system permission other than limit and forbid authorization options;
According to the permission authorization options for each system permission being applied other than system permission to this or forbid authorization options Trigger action, determine third system permission;
The third system permission is authorized to the APP.
In the 6th kind of possible implementation of the first aspect of the disclosure, this method further include:
System permission is applied in display and this is applied the permission authorization options of system permission and forbids authorization options When, show each system permission and all allow to authorize choosing that this in the second system permission is applied other than system permission Item forbids authorization options with whole;
When detecting allows the trigger action of authorization options to the whole, the second system permission is authorized to the APP.
According to the second aspect of an embodiment of the present disclosure, a kind of permission is provided and authorizes device, comprising:
Authorization module, for authorizing the first system permission to the APP in the installation process of any application APP, The first system permission refers to that safety meets the system permission of default safety standard;
Display module, in the APP use process, when receiving the APP to any in second system permission When the application of system permission, display is applied system permission and the permission authorization options and taboo for being applied system permission Only authorization options, the second system permission refers in the system permission that the APP needs, in addition to the first system permission System permission;
The authorization module is also used to award the APP when detecting to the trigger action for allowing authorization options System permission is applied described in giving.
In the first possible implementation of the second aspect of the disclosure, described device further include:
Installation kit obtains module, for obtaining the installation kit of the APP;
System permission obtains module, for from the installation kit of the APP, obtaining the system permission of APP needs;
The first system permission determining module, in the system permission that the APP needs, determining the first system permission, The first system permission is determined according to the safety of each system permission.
In second of possible implementation of the second aspect of the disclosure, which is used for:
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server determines the first system permission in the system permission that the APP needs, and receives the first system of server transmission Permission;Or,
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server returns to the safety data of each system permission in the system permission of APP needs, receives each system permission Safety data, and according to the safety data of each system permission, the permission that safety is met default safety standard is true It is set to the first system permission.
In the third possible implementation of the second aspect of the disclosure, which is used for:
It is measured according to the authorized user of each system permission, the safety of each system permission is determined, by safety The permission for meeting default safety standard is determined as the first system permission.
In the 4th kind of possible implementation of the second aspect of the disclosure, the device further include:
The end message of sending module, the first system permission and the local terminal for having authorized local terminal is sent to service Device, so that the first kind system permission and the end message are corresponded to storage by the server.
In the 5th kind of possible implementation of the second aspect of the disclosure, the device further include:
The display module be also used to display be applied system permission and this be applied system permission allow authorize select And when forbidding authorization options, show each system permission that this in the second system permission be applied other than system permission, with And this is applied the permission authorization options of each system permission other than system permission and forbids authorization options;
Third system permission determining module, for permitting according to each system permission being applied to this other than system permission Perhaps authorization options or forbid the trigger actions of authorization options, determine third system permission;
The authorization module is also used to authorize the APP third system permission.
In the 6th kind of possible implementation of the second aspect of the disclosure, the device further include:
The display module be also used to display be applied system permission and this be applied system permission allow authorize select And when forbidding authorization options, show each system permission that this in the second system permission be applied other than system permission, with And all allows authorization options and all forbid authorization options;
The authorization module is also used to authorize the APP when detecting allows the trigger action of authorization options to the whole The second system permission.
The third aspect additionally provides a kind of permission and authorizes device, comprising:
Processor;
Memory for the instruction that storage processor can be performed;
Wherein, which is configured as:
In the installation process of any application APP, the first system permission is authorized to the APP, the first system permission Refer to that safety meets the system permission of default safety standard;
In the APP use process, when receiving the APP to the application of any system permission in second system permission, Display is applied system permission and this is applied the permission authorization options of system permission and forbids authorization options, second system System permission refer to the APP need system permission in, the system permission in addition to the first system permission;
When detecting the trigger action to the permission authorization options, this is authorized to the APP and is applied system permission.
The technical solution that the embodiment of the present disclosure provides has the benefit that
The disclosure is measured by the authorized user of each system permission and determines the first system permission, and in APP installation process, The first system permission is authorized to the APP, the continuity of operation can be improved under the premise of not reducing security of system.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of permission giving method shown according to an exemplary embodiment.
Fig. 2A is a kind of flow chart of permission giving method shown according to an exemplary embodiment.
Fig. 2 B is a kind of display schematic diagram for confirming installation interface shown according to an exemplary embodiment.
Fig. 2 C is the display schematic diagram of another confirmation installation interface shown according to an exemplary embodiment.
Fig. 2 D is the display schematic diagram that interface is reminded in a kind of authorization shown according to an exemplary embodiment.
Fig. 2 E is the display schematic diagram that interface is reminded in another authorization shown according to an exemplary embodiment.
Fig. 3 is that a kind of permission shown according to an exemplary embodiment authorizes device block diagram.
Fig. 4 is the block diagram that a kind of permission shown according to an exemplary embodiment authorizes device 400.
Specific embodiment
To keep the purposes, technical schemes and advantages of the disclosure clearer, below in conjunction with attached drawing to disclosure embodiment party Formula is described in further detail.
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of permission giving method shown according to an exemplary embodiment, as shown in Figure 1, permission Giving method is for including the following steps in terminal.
In a step 101, in the installation process of any application APP, the first system permission is authorized to the APP, it should The first system permission refers to that safety meets the system permission of default safety standard.
In a step 102, in the APP use process, any system in second system permission is weighed when receiving the APP When the application of limit, display is applied system permission and this is applied the permission authorization options of system permission and authorization is forbidden to select , which refers in the system permission that the APP needs, the system permission in addition to the first system permission.
In step 103, when detecting the trigger action to the permission authorization options, this is authorized to the APP and is applied System permission.
The method that the embodiment of the present disclosure provides is measured by the authorized user of each system permission and determines the first system permission, And in APP installation process, the first system permission is authorized to the APP, can be improved under the premise of not reducing security of system The continuity of operation.
In the first possible implementation of the disclosure, in the installation process of any application APP, to the APP Before authorizing the first system permission, this method further include:
Obtain the installation kit of the APP;
From the installation kit of the APP, the system permission of APP needs is obtained;
In the system permission that the APP needs, the first system permission is determined, the first system permission is according to each system The safety of permission determines.
In second of possible implementation of the disclosure, in the system permission that the APP needs, the first system is determined Permission includes:
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server determines the first system permission in the system permission that the APP needs, and receives the first system of server transmission Permission;Or,
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server returns to the safety data of each system permission in the system permission of APP needs, receives each system permission Safety data, and according to the safety data of each system permission, the permission that safety is met default safety standard is true It is set to the first system permission.
It, will be safe according to the safety data of each system permission in the third possible implementation of the disclosure The permission that property meets default safety standard is determined as the first system permission and includes:
It is measured according to the authorized user of each system permission, the safety of each system permission is determined, by safety The permission for meeting default safety standard is determined as the first system permission.
In the 4th kind of possible implementation of the disclosure, in the installation process of any application APP, to the APP After authorizing the first system permission, this method further include:
The end message of the first system permission and the local terminal that local terminal has authorized is sent to server, so that the server By the first kind system permission and the corresponding storage of the end message.
In the 5th kind of possible implementation of the disclosure, this method further include:
System permission is applied in display and this is applied the permission authorization options of system permission and forbids authorization options When, show each system permission that this in the second system permission is applied other than system permission and this be applied system power The permission authorization options of each system permission other than limit and forbid authorization options;
According to the permission authorization options for each system permission being applied other than system permission to this or forbid authorization options Trigger action, determine third system permission;
The third system permission is authorized to the APP.
In the 6th kind of possible implementation of the disclosure, this method further include:
System permission is applied in display and this is applied the permission authorization options of system permission and forbids authorization options When, show each system permission and all allow to authorize choosing that this in the second system permission is applied other than system permission Item forbids authorization options with whole;
When detecting allows the trigger action of authorization options to the whole, the second system permission is authorized to the APP.
All the above alternatives can form the alternative embodiment of the disclosure, herein no longer using any combination It repeats one by one.
Fig. 2A is a kind of flow chart of permission giving method shown according to an exemplary embodiment.The execution of the embodiment Main body can be terminal, and referring to Fig. 2A, which is specifically included:
In step 201, the installation kit for obtaining any APP obtains the system that the APP needs from the installation kit of the APP Permission.
Currently, the installation of APP is realized by obtaining APP installation kit, which not only includes installation APP institute The installation file needed, can also include the specified file of system permission required for for stating the APP.
In the installation initial stage of the APP, terminal obtains and shows the system that the APP needs from the installation kit of the APP Permission enables a user to the system permission for understanding APP needs.For example, the APP exists when the APP is shopping class APP The system permission needed in use may include positioning, reading address list etc..
It, can be using classification display mode and Folding display mode, the APP's in order to keep display interface apparent clean and tidy Confirm on installation interface, shows the system permission that the APP needs, as shown in Figure 2 B.
Wherein, it is safety-related to refer to that the system permission for needing the APP obtained from APP installation kit is divided into for classification display System permission, privacy related system permission and other systems permission, and show that every class system permission is included in corresponding position System permission number;Wherein, safety-related permission may include: complete internet access permission and allow to change network connection The system permissions such as attribute;Privacy related system permission may include: system positioning function, read contact information, short message reading The system permissions such as content.
Folding display, which refers to, shows folded/expanded option in the corresponding position of every class system permission, and user is led to It crosses and trigger action is executed to folded/expanded option, check the particular content that corresponding category system permission is included.
Certainly, the system permission needed in use for APP can be shown by above-mentioned display mode, can also To be shown that the embodiment of the present disclosure is not construed as limiting this using other display modes.
For the step of simplifying frequently application authorization, safety can be selected higher from the system permission that APP needs Permission is as the first system permission, so that directly the first system permission is authorized in initial installation stage, correspondingly, In the system permission that the APP needs, the first system permission is determined, the first system permission is according to the safety of each system permission Property determine.The acquisition methods of the first system permission can have following two:
The first, to server sending permission inquiry instruction, the permission inquiry instruction carry the APP needs system power Limit receives being somebody's turn to do for server transmission so that the server determines the first system permission in the system permission that the APP needs The first system permission.It that is to say, by server from the system permission that the APP needs, determine the first system permission.
Second, to server sending permission inquiry instruction, which carries the system power of APP needs Limit receives each system so that the server returns to the safety data of each system permission in the system permission of APP needs The safety data for permission of uniting, and according to the safety data of each system permission, safety is met into default safety standard Permission be determined as the first system permission.
Wherein, the safety data of each system permission can be in the system permission which needs are as follows: each system permission Authorized user amount account for the APP installation user volume ratio, be also possible to each system permission authorized user amount and the APP Installation user volume, certainly, the safety data of each system permission can also be other can indicate system permission safety The data of property, the embodiment of the present disclosure are not construed as limiting this.
In addition, terminal is in the system permission for showing that the APP needs according to the query result obtained by permission inquiry instruction When, authorized user's amount of each system permission in the system permission for showing APP needs can also be corresponded to and the use of the APP is installed Family amount enables a user to the safety for understanding each system permission in the system permission of APP needs.
The safety of each system permission as required for the APP is different, in order to make user understand safety compared with High system permission, on the confirmation installation interface of the APP, the system permission needed in addition to showing the APP can also show the One system permission, the first system permission are the higher system permission of safety in the system permission of APP needs, specific aobvious Show that interface is as shown in Figure 2 C.
It should be noted that the determination method of the first system permission can be with are as follows: according to the safety of each system permission Property data, are determined as the first system permission for the permission that safety meets default safety standard;Specifically, according to each system The amount of authorized user for permission of uniting, determines the safety of each system permission, safety is met to the power of default safety standard Limit is determined as the first system permission.
Wherein, the setting method of the default safety standard can be following two:
The first, system permission that the APP needs is ranked up from high to low according to authorized user's amount, by the default peace Full standard setting is any specified numerical value, which is greater than 1, and is less than the number for the system permission that the APP needs.
Correspondingly, safety standard is preset according to this and determines that the method for the first system permission can be with are as follows:
The system permission that numerical value is specified before after sorting from high to low according to authorized user's amount, is determined as meeting default peace The system permission of full standard.
Second, this is preset into safety standard and is set as specified threshold, which can be greater than 0 less than 1 to be any Percentages, it is any specified numerical value that this can also be preset to safety standard, which is greater than 0, and is less than the APP User volume is installed.
Correspondingly, safety standard is preset according to this and determines that the method for the first system permission can be with are as follows:
If the safety data of each system is that authorized user's amount of each system permission accounts for the installation user volume of the APP Ratio, when the APP need system permission in any system permission authorized user amount account for the APP installation user volume ratio When example is greater than specified threshold, which is determined as the first system permission;If the safety data of each system is each The authorized user of a system permission measures and the installation user volume of the APP, when any system permission in the system permission that the APP needs Authorized user's amount when being greater than specified numerical value, which is determined as the first system permission.
The determination method of default safety standard can be any one of both the above, can also be true using other methods Fixed, the embodiment of the present disclosure is not construed as limiting this;Similarly, the determination method of the first system permission can be appointing in the above method One kind can also determine that the first system permission, the embodiment of the present disclosure are not construed as limiting this by other methods.
In the another embodiment of the disclosure, in order to avoid in APP use process, authorization is reminded due to frequently triggering and User is impacted, while further increasing security of system, security system permissions list can also be arranged in terminal in advance, should Security system permissions list is for storing not the system permission for influencing present terminal system safety, so that any to be installed In the installation process of APP, system permission can be authorized in batches.It that is to say, even if not obtaining from server for determining that system is weighed The data for limiting safety, can also during the installation process authorize APP to be installed.
According to the security system permissions list, determine that the method for the system permission authorized during the installation process can be with are as follows: base In the APP system permission needed and the security system permissions list, the safety will be belonged in system permission that the APP needs is The system permission of system permissions list, is determined as the first system permission;It can also be based on the system permission and the peace that server returns Total system permissions list compares, and the system of the security system permissions list will be belonged in system permission that the server returns Permission is determined as the first system permission;It is, of course, also possible to according to the security system permissions list, it can by other methods determination With the system permission authorized in APP installation process, the embodiment of the present disclosure is not construed as limiting this.
In step 202, in the installation process of the APP, the first system permission is authorized to the APP, the first system power Limit refers to that safety meets the system permission of default safety standard.
In order to avoid frequently triggering application of the APP to different system permissions in the use process of APP, pacify in the APP The initial stage is filled, the first system permission can also be shown in APP confirmation installation interface, so that user is when installing APP, directly It connects and authorizes the first system permission to the APP.
When detecting trigger action of the user to installation and authorization options, which is installed, and in the installation of the APP The first system permission is authorized to the APP in journey;Wherein, installation and authorization options are used to further install the APP.Further, After the APP is installed successfully, the end message of the first system permission and the local terminal that local terminal has authorized is sent to server, is made The server is obtained by the first kind system permission and the corresponding storage of the end message, so that server can be for after the APP Installation user system permission safety information is provided, or provide the related data for determining system permission safety.
In step 203, in the APP use process, when receiving the APP to any system permission in second system permission Application when, display is applied system permission and this is applied the permission authorization options of system permission and forbids authorization options, The second system permission refer to the APP need system permission in, the system permission in addition to the first system permission.
In the use process of the APP, when needing using any system function, the Shen to corresponding system permission can be triggered Please, for example, after starting the APP, which needs the geographical location current according to user if the APP is shopping class APP Information provides corresponding merchant information, therefore can trigger the application to system positioning function permission, when receiving this application, eventually End shows the permission authorization options of the system positioning function permission and the permission and forbids authorization options.
In another embodiment of the present disclosure, system permission is applied in display and this is applied permitting for system permission Perhaps authorization options show that this in the second system permission is applied each system other than system permission with when forbidding authorization options Permission and whole allow authorization options and all forbid authorization options;When detect to the whole allow authorization options touching When hair operation, the second system permission is authorized to the APP.
For example, after starting the APP, which needs the geography current according to user if the APP is shopping class APP Location information provides corresponding merchant information, therefore can trigger the application to system positioning function permission, when receiving this application When, show all system permissions in the second system permission including the system positioning function permission, while showing whole Allow authorization options and all forbids authorization options;Display interface is as shown in Figure 2 D.
It is above-mentioned that the display methods of second system permission can repeatedly be triggered to avoid in APP use process to system permission Application, and then can be improved the continuity of operation.
In the another embodiment of the disclosure, system permission is applied in display and this is applied permitting for system permission Perhaps authorization options show that this in the second system permission is applied each system other than system permission with when forbidding authorization options Permission and this be applied the permission authorization options of each system permission other than system permission and forbid authorization options;According to It is applied the permission authorization options of each system permission other than system permission to this or forbids the trigger action of authorization options, really Determine third system permission;The third system permission is authorized to the APP.
It is above-mentioned that the display methods of second system permission can be described further with Fig. 2 E, wherein according to second system Permission display methods is different, and correspondingly, the method for determining third system permission can be following two:
The first, the corresponding position of each system permission shows Option Box in second system permission, when detecting user When to the trigger action of any Option Box, correspondence system permission is determined as third system permission.
Second, the corresponding position display of each system permission allows authorization options and forbids awarding in second system permission Option is weighed, third system permission will be determined as to allowing authorization options to execute the corresponding system permission of trigger action.
Certainly, for the determination of third system permission, other methods can also be used, the embodiment of the present disclosure does not limit this It is fixed.
By the above-mentioned display methods to second system permission, so that terminal is while guaranteeing continuity of operation, moreover it is possible to According to the selection of different user, part second system permission is authorized to the APP, is authorized so as to targetedly improve permission Safety.
Display for second system permission can also use other display sides other than using above-mentioned display method Method, the embodiment of the present disclosure are not construed as limiting this.
In step 204, when detecting the trigger action to the permission authorization options, this is authorized to the APP and is applied System permission.
According to, to the different display methods of second system permission, being authorized to the APP in step 203 and be applied system permission Method can have following three kinds:
If the first, only display be applied system permission and this be applied system permission permission authorization options and Forbid authorization options, when detecting to the trigger action of operation authorization options for being applied system permission, authorizes this to the APP It is applied system permission.
If second, showing all system permissions in second system permission and all allowing authorization options and complete Portion forbids authorization options, when detecting to the trigger action for all allowing authorization options, authorizes second system power to the APP Limit.
The third, if all system permissions in display second system permission and each system permission allow to award It weighs option and forbids authorization options, according to the determination of third system permission as a result, authorizing third system permission to the APP.
In the use process of the APP, in addition to authorizing second system permission to the APP using the above method, it can also adopt Xi Er system permission is authorized to the APP with other methods, the embodiment of the present disclosure is not construed as limiting this.
The method that the embodiment of the present disclosure provides is measured by the authorized user of each system permission and determines the first system permission, And in APP installation process, the first system permission is authorized to the APP, can be improved under the premise of not reducing security of system The continuity of operation;Further, by selectively being awarded in batches to second system permission in the use process of APP Power can targetedly improve the safety of the permission giving method of disclosure offer.
Fig. 3 is that a kind of permission shown according to an exemplary embodiment authorizes device block diagram.Referring to Fig. 3, which includes Authorization module 301, display module 302.
Authorization module 301, for authorizing the first system power to the APP in the installation process of any application APP Limit, the first system permission refer to that safety meets the system permission of default safety standard;
Display module 302, in the APP use process, when receiving the APP to any system in second system permission When the application for permission of uniting, display is applied system permission and this is applied the permission authorization options of system permission and forbids awarding Option is weighed, which refers in the system permission that the APP needs, the system power in addition to the first system permission Limit;
The authorization module 301 is also used to when detecting the trigger action to the permission authorization options, authorizes this to the APP It is applied system permission.
In the first possible implementation that the disclosure provides, the device further include:
Installation kit obtains module, for obtaining the installation kit of the APP;
System permission obtains module, for from the installation kit of the APP, obtaining the system permission of APP needs;
The first system permission determining module, in the system permission that the APP needs, determining the first system permission, The first system permission is determined according to the safety of each system permission.
In second of possible implementation that the disclosure provides, which is used for:
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server determines the first system permission in the system permission that the APP needs, and receives the first system of server transmission Permission;Or,
To server sending permission inquiry instruction, which carries the system permission of APP needs, so that should Server returns to the safety data of each system permission in the system permission of APP needs, receives each system permission Safety data, and according to the safety data of each system permission, the permission that safety is met default safety standard is true It is set to the first system permission.
In the third possible implementation that the disclosure provides, which is used for:
It is measured according to the authorized user of each system permission, the safety of each system permission is determined, by safety The permission for meeting default safety standard is determined as the first system permission.
In the 4th kind of possible implementation that the disclosure provides, the device further include:
The end message of sending module, the first system permission and the local terminal for having authorized local terminal is sent to service Device, so that the first kind system permission and the end message are corresponded to storage by the server.
In the 5th kind of possible implementation that the disclosure provides, the device further include:
The display module 302 is also used to be applied system permission in display and this is applied system permission and allows to award Power option and each system power for when forbidding authorization options, showing that this in the second system permission is applied other than system permission It limits and this is applied the permission authorization options of each system permission other than system permission and forbids authorization options;
Third system permission determining module, for permitting according to each system permission being applied to this other than system permission Perhaps authorization options or forbid the trigger actions of authorization options, determine third system permission;
The authorization module 301 is also used to authorize the APP third system permission.
In the 6th kind of possible implementation that the disclosure provides, the device further include:
The display module 302 is also used to be applied system permission in display and this is applied system permission and allows to award Power option and each system power for when forbidding authorization options, showing that this in the second system permission is applied other than system permission It limits and all allows authorization options and all forbid authorization options;
The authorization module 301 is also used to award the APP when detecting allows the trigger action of authorization options to the whole Give the second system permission.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 4 is the block diagram that a kind of permission shown according to an exemplary embodiment authorizes device 400.For example, device 400 can To be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices are good for Body equipment, personal digital assistant etc..
Referring to Fig. 4, device 400 may include following one or more components: processing component 402, memory 404, power supply Component 406, multimedia component 404, audio component 410, input/output (I/O) interface 412, sensor module 414, Yi Jitong Believe component 416.
The integrated operation of the usual control device 400 of processing component 402, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 402 may include that one or more processors 420 refer to execute It enables, to perform all or part of the steps of the methods described above.In addition, processing component 402 may include one or more modules, just Interaction between processing component 402 and other assemblies.For example, processing component 402 may include multi-media module, it is more to facilitate Interaction between media component 408 and processing component 402.
Memory 404 is configured as storing various types of data to support the operation in device 400.These data are shown Example includes the instruction of any application or method for operating on device 400, contact data, and telephone book data disappears Breath, picture, video etc..Memory 404 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 406 provides electric power for the various assemblies of device 400.Power supply module 406 may include power management system System, one or more power supplys and other with for device 400 generate, manage, and distribute the associated component of electric power.
Multimedia component 408 includes the screen of one output interface of offer between described device 400 and user.One In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers Body component 408 includes a front camera and/or rear camera.When device 400 is in operation mode, such as screening-mode or When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 410 is configured as output and/or input audio signal.For example, audio component 410 includes a Mike Wind (MIC), when device 400 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 404 or via communication set Part 416 is sent.In some embodiments, audio component 410 further includes a loudspeaker, is used for output audio signal.
I/O interface 412 provides interface between processing component 402 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 414 includes one or more sensors, and the state for providing various aspects for device 400 is commented Estimate.For example, sensor module 414 can detecte the state that opens/closes of device 400, and the relative positioning of component, for example, it is described Component is the display and keypad of device 400, and sensor module 414 can be with 400 1 components of detection device 400 or device Position change, the existence or non-existence that user contacts with device 400,400 orientation of device or acceleration/deceleration and device 400 Temperature change.Sensor module 414 may include proximity sensor, be configured to detect without any physical contact Presence of nearby objects.Sensor module 414 can also include optical sensor, such as CMOS or ccd image sensor, at As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 416 is configured to facilitate the communication of wired or wireless way between device 400 and other equipment.Device 400 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 416 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 416 further includes near-field communication (NFC) module, to promote short range communication.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 400 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing above-mentioned permission giving method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 404 of instruction, above-metioned instruction can be executed by the processor 420 of device 400 to complete the above method.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium is additionally provided, when the storage is situated between When instruction in matter is executed by the processor of mobile terminal, so that mobile terminal is able to carry out above-mentioned permission giving method.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (16)

1. a kind of permission giving method, which is characterized in that the described method includes:
In the installation process of any application APP, the first system permission, the first system permission are authorized to the APP Refer to that safety meets the system permission of default safety standard, the first system permission is according to the safety of each system permission It determines, the safety is measured according to the authorized user of each system permission and determined;
In the APP use process, when receiving the APP to the application of any system permission in second system permission, Display is applied system permission and the permission authorization options for being applied system permission and forbids authorization options, and described the Two system permission refers in the system permission that the APP needs, the system permission in addition to the first system permission;
When detecting to the trigger action for allowing authorization options, the APP is authorized and described is applied system permission.
2. the method according to claim 1, wherein in the installation process of any application APP, to described Before APP authorizes the first system permission, the method also includes:
Obtain the installation kit of the APP;
From the installation kit of the APP, the system permission that the APP needs is obtained;
In the system permission that the APP needs, the first system permission is determined.
3. according to the method described in claim 2, it is characterized in that, determining described the in the system permission that the APP needs One system permission includes:
To server sending permission inquiry instruction, the permission inquiry instruction carries the system permission that the APP needs, so that institute It states server and determines the first system permission in the system permission that the APP needs, receive the institute that the server is sent State the first system permission;Or,
To server sending permission inquiry instruction, the permission inquiry instruction carries the system permission that the APP needs, so that institute The safety data that server returns to each system permission in the system permission that the APP needs is stated, each system is received The safety data of permission, and according to the safety data of each system permission, safety is met into default safety standard Permission be determined as the first system permission.
4. according to the method described in claim 3, it is characterized in that, being incited somebody to action according to the safety data of each system permission The permission that safety meets default safety standard is determined as the first system permission
It is measured according to the authorized user of each system permission, the safety of each system permission is determined, by safety The permission for meeting default safety standard is determined as the first system permission.
5. the method according to claim 1, wherein in the installation process of any application APP, to described After APP authorizes the first system permission, the method also includes:
The end message of the first system permission and the local terminal that local terminal has authorized is sent to server, so that the server By the first system permission and the corresponding storage of the end message.
6. the method according to claim 1, wherein the method also includes:
System permission and the permission authorization options for being applied system permission are applied in display and forbid authorization options When, it shows each system permission being applied other than system permission described in the second system permission and described is applied The permission authorization options of each system permission other than system permission and forbid authorization options;
According to the permission authorization options to each system permission being applied other than system permission or forbid authorization options Trigger action determines third system permission;
The third system permission is authorized to the APP.
7. the method according to claim 1, wherein the method also includes:
System permission and the permission authorization options for being applied system permission are applied in display and forbid authorization options When, it shows each system permission being applied other than system permission described in the second system permission and all allows to award Power option forbids authorization options with whole;
When detecting to the trigger action for all allowing authorization options, the second system permission is authorized to the APP.
8. a kind of permission authorizes device, which is characterized in that described device includes:
Authorization module, it is described for authorizing the first system permission to the APP in the installation process of any application APP The first system permission refers to that safety meets the system permission of default safety standard, and the first system permission is according to each system Safety determine, the safety according to the authorized user of each system permission measure determine;
Display module, in the APP use process, when receiving the APP to any system in second system permission When the application of permission, display is applied system permission and the permission authorization options for being applied system permission and forbids awarding Option is weighed, the second system permission refers in the system permission that the APP needs that in addition to the first system permission is System permission;
The authorization module is also used to authorize institute to the APP when detecting to the trigger action for allowing authorization options It states and is applied system permission.
9. device according to claim 8, which is characterized in that described device further include:
Installation kit obtains module, for obtaining the installation kit of the APP;
System permission obtains module, the system permission needed for from the installation kit of the APP, obtaining the APP;
The first system permission determining module, for determining the first system permission in the system permission that the APP needs.
10. device according to claim 9, which is characterized in that the first system permission determining module is used for:
To server sending permission inquiry instruction, the permission inquiry instruction carries the system permission that the APP needs, so that institute It states server and determines the first system permission in the system permission that the APP needs, receive the institute that the server is sent State the first system permission;Or,
To server sending permission inquiry instruction, the permission inquiry instruction carries the system permission that the APP needs, so that institute The safety data that server returns to each system permission in the system permission that the APP needs is stated, each system is received The safety data of permission, and according to the safety data of each system permission, safety is met into default safety standard Permission be determined as the first system permission.
11. device according to claim 10, which is characterized in that the first system permission determining module is used for:
It is measured according to the authorized user of each system permission, the safety of each system permission is determined, by safety The permission for meeting default safety standard is determined as the first system permission.
12. device according to claim 8, which is characterized in that described device further include:
The end message of sending module, the first system permission and the local terminal for having authorized local terminal is sent to server, So that the first system permission and the end message are corresponded to storage by the server.
13. device according to claim 8, which is characterized in that described device further include:
The display module be also used to display be applied system permission and it is described be applied system permission allow authorize select And when forbidding authorization options, show each system power being applied other than system permission described in the second system permission Limit and each system permission being applied other than system permission permission authorization options and forbid authorization options;
Third system permission determining module, for according to the permission to each system permission being applied other than system permission Authorization options or the trigger action for forbidding authorization options, determine third system permission;
The authorization module is also used to authorize the APP third system permission.
14. device according to claim 8, which is characterized in that described device further include:
The display module be also used to display be applied system permission and it is described be applied system permission allow authorize select And when forbidding authorization options, show each system power being applied other than system permission described in the second system permission It limits and all allows authorization options and all forbid authorization options;
The authorization module is also used to award the APP when detecting to the trigger action for all allowing authorization options Give the second system permission.
15. a kind of permission authorizes device characterized by comprising
Processor;
Memory for the instruction that storage processor can be performed;
Wherein, the processor is configured to:
In the installation process of any application APP, the first system permission, the first system permission are authorized to the APP Refer to that safety meets the system permission of default safety standard, the first system permission is according to the safety of each system permission It determines, the safety is measured according to the authorized user of each system permission and determined;
In the APP use process, when receiving the APP to the application of any system permission in second system permission, Display is applied system permission and the permission authorization options for being applied system permission and forbids authorization options, and described the Two system permission refers in the system permission that the APP needs, the system permission in addition to the first system permission;
When detecting to the trigger action for allowing authorization options, the APP is authorized and described is applied system permission.
16. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage at least one refers to It enables, permission giving method as claimed in claim 1 to 7 is realized when described instruction is executed by processor.
CN201510719740.5A 2015-10-29 2015-10-29 Permission giving method and device Active CN105354489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510719740.5A CN105354489B (en) 2015-10-29 2015-10-29 Permission giving method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510719740.5A CN105354489B (en) 2015-10-29 2015-10-29 Permission giving method and device

Publications (2)

Publication Number Publication Date
CN105354489A CN105354489A (en) 2016-02-24
CN105354489B true CN105354489B (en) 2019-05-10

Family

ID=55330460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510719740.5A Active CN105354489B (en) 2015-10-29 2015-10-29 Permission giving method and device

Country Status (1)

Country Link
CN (1) CN105354489B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778117B (en) * 2016-09-18 2019-04-30 腾讯科技(深圳)有限公司 Permission open method, apparatus and system
CN106529279A (en) * 2016-10-13 2017-03-22 维沃移动通信有限公司 Permission application prompting method and mobile terminal
CN106506621A (en) * 2016-11-02 2017-03-15 广东聚联电子商务股份有限公司 A kind of method according to customer location recommended entity shop
CN107145273A (en) * 2017-04-28 2017-09-08 努比亚技术有限公司 Application program authority configuring method and computer equipment
CN107368335A (en) * 2017-07-24 2017-11-21 奇酷互联网络科技(深圳)有限公司 A kind of method and apparatus and mobile terminal of Quick Response Code identification
CN109981873B (en) * 2017-12-27 2021-01-12 珠海市君天电子科技有限公司 Address book permission opening method and device and electronic equipment
CN108334261A (en) * 2018-01-12 2018-07-27 口碑(上海)信息技术有限公司 The open method and device of miscellaneous function
CN108875354A (en) * 2018-05-31 2018-11-23 上海连尚网络科技有限公司 Permission open method, terminal device and computer-readable medium
CN109446822B (en) * 2018-09-30 2022-07-26 联想(北京)有限公司 Authority management method and system
CN109740343A (en) * 2018-12-29 2019-05-10 百度在线网络技术(北京)有限公司 The authority control method and device of application
CN113496039B (en) * 2020-04-08 2024-06-25 青岛海信移动通信技术有限公司 Authority management method and terminal
CN114065229A (en) * 2020-07-31 2022-02-18 华为技术有限公司 Authority management method and terminal equipment
CN114817939A (en) * 2021-01-29 2022-07-29 华为技术有限公司 Authority control method and electronic equipment
CN116049799B (en) * 2022-07-14 2023-11-07 荣耀终端有限公司 System authority management method, system and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116716A (en) * 2013-01-25 2013-05-22 复旦大学 Immediate access conferring method aiming at low interference of mobile platform
CN103761471A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program installation method and device based on intelligent terminal
CN104850779A (en) * 2015-06-04 2015-08-19 北京奇虎科技有限公司 Safe application program installing method and safe application program installing device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5069359B2 (en) * 2008-03-04 2012-11-07 アップル インコーポレイテッド System and method for allowing execution of software code based on at least one installed profile

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103116716A (en) * 2013-01-25 2013-05-22 复旦大学 Immediate access conferring method aiming at low interference of mobile platform
CN103761471A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program installation method and device based on intelligent terminal
CN104850779A (en) * 2015-06-04 2015-08-19 北京奇虎科技有限公司 Safe application program installing method and safe application program installing device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
如何在安装APP时就限制其获取隐私的权限;无;《百度贴吧》;20150326;正文第一页

Also Published As

Publication number Publication date
CN105354489A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
CN105354489B (en) Permission giving method and device
KR102325418B1 (en) How notifications are handled and electronic devices
US10129044B2 (en) Method and apparatus for controlling smart device
RU2632160C2 (en) Method, device and terminal for displaying application messages
US9495093B2 (en) Mobile terminal and control method based on body parts signals
CN105607834B (en) Screen control method, device and terminal
CN105337747B (en) Group history message treatment method and device
EP3151507A1 (en) Methods and apparatuses for controlling device
CN106547663B (en) Key management method and device
EP2683145A1 (en) Mobile terminal and control method thereof
US9351256B2 (en) Mobile terminal and control method thereof
CN104063655A (en) Child mode processing method and device
CN106095220B (en) Notification message reminding method and device
CN106781242B (en) The method for early warning and device of danger zone
CN107071862B (en) Account number binding method and device and intelligent equipment
EP2690547A1 (en) Terminal and method of sharing a handwriting therein
CN105224174B (en) The display methods and device of Paste
CN106095401A (en) Informing message treatment method and device
EP3322227B1 (en) Methods and apparatuses for controlling wireless connection, computer program and recording medium
CN104270727A (en) Information transmission method and device
KR20170038178A (en) Method, apparatus, and mobile terminal for identificating fingerprint
CN104063654A (en) Monitoring method and device for application program
CN105392141A (en) Device control method and device
CN106453774B (en) Contact information methods of exhibiting and device
CN105188024B (en) Access the method, apparatus and system of network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant