CN105404802A - Authority configuration method and apparatus - Google Patents

Authority configuration method and apparatus Download PDF

Info

Publication number
CN105404802A
CN105404802A CN201510847812.4A CN201510847812A CN105404802A CN 105404802 A CN105404802 A CN 105404802A CN 201510847812 A CN201510847812 A CN 201510847812A CN 105404802 A CN105404802 A CN 105404802A
Authority
CN
China
Prior art keywords
unlocking pin
authority configuration
configuration mode
authority
mapping table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510847812.4A
Other languages
Chinese (zh)
Other versions
CN105404802B (en
Inventor
宫鲁津
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510847812.4A priority Critical patent/CN105404802B/en
Publication of CN105404802A publication Critical patent/CN105404802A/en
Application granted granted Critical
Publication of CN105404802B publication Critical patent/CN105404802B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiments of the present invention disclose an authority configuration method and apparatus. The method comprises: acquiring a target unlock password, and identifying the target unlock password according to a preset password authority mapping table, wherein the password authority mapping table comprises multiple unlock passwords and multiple authority configuration modes; when identifying that the target unlock password is a legal unlock password, searching the authority configuration mode with a mapping relationship with the target unlock password in the password authority mapping table; and performing authority configuration on an application in a terminal according to the searched authority configuration mode. By using the authority configuration method and apparatus provided by the present invention, security of the intelligent terminal can be improved, so that leakage of personal privacy in the lending process is avoided.

Description

A kind of authority configuring method and device
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of authority configuring method and device.
Background technology
In current intelligent terminal, in order to safer use intelligent terminal, usually all can when lighting screen, input unlocking pin, and when unlocking pin is legal, user could use intelligent terminal, current unlocking pin is generally finger-print cipher, graphical passwords, numerical ciphers etc.Although existing start unlocking manner can make intelligent terminal possess certain security under normal circumstances, but still can reveal individual privacy accidentally when time in the process of intelligent terminal in public use, such as, when friend borrows mobile phone to make a phone call or sees individual webpage, lucky some application programs eject a private information, then can cause the leakage of individual privacy, thus cause intelligent terminal not possess enough securities in this case.
Summary of the invention
Embodiment of the present invention technical matters to be solved is, provides a kind of authority configuring method and device, can improve the security of intelligent terminal, to avoid the leakage causing individual privacy in the process of public use.
Embodiments provide a kind of authority configuring method, comprising:
Obtain target unlocking pin, and according to the password permissions mapping table preset, described target unlocking pin is identified; Described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode;
When to identify described target unlocking pin be legal unlocking pin, in described password permissions mapping table, search the authority configuration mode with described target unlocking pin with mapping relations;
Described authority configuration mode according to finding carries out authority configuration to the application program in terminal.
Correspondingly, the embodiment of the present invention additionally provides a kind of authority inking device, comprising:
Obtaining identification module, for obtaining target unlocking pin, and according to the password permissions mapping table preset, described target unlocking pin being identified; Described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode;
Search module, for when to identify described target unlocking pin be legal unlocking pin, in described password permissions mapping table, search the authority configuration mode with described target unlocking pin with mapping relations;
Configuration module, for carrying out authority configuration according to the described authority configuration mode found to the application program in terminal.
The embodiment of the present invention is by obtaining target unlocking pin, and when according to the password permissions mapping table preset, to identify described target unlocking pin be legal unlocking pin, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table, and according to the described authority configuration mode found, authority configuration be carried out to the application program in terminal.Because described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode, so by inputting different unlocking pins, it can be the authority that application deployment in terminal is different, make user can according to the security of scene, select the unlocking pin that input is corresponding, the security of current authority configuration mode is consistent with security needed for current scene, thus the security of intelligent terminal can be improved, to avoid the leakage causing individual privacy in the process of public use.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of authority configuring method that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the another kind of authority configuring method that the embodiment of the present invention provides;
Fig. 3 is the structural representation of a kind of authority inking device that the embodiment of the present invention provides;
Fig. 4 is a kind of structural representation obtaining identification module that the embodiment of the present invention provides;
Fig. 5 is the structural representation of a kind of configuration module that the embodiment of the present invention provides;
Fig. 6 is the structural representation of the another kind of authority inking device that the embodiment of the present invention provides;
Fig. 7 is the structural representation of a kind of mobile terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1, be the schematic flow sheet of a kind of authority configuring method that the embodiment of the present invention provides, described method can comprise:
S101, obtains target unlocking pin, and identifies described target unlocking pin according to the password permissions mapping table preset; Described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode;
Concrete, mobile terminal can obtain the target unlocking pin that user inputs, and the form of described target unlocking pin can be any one in the forms such as fingerprint, figure, numeral, iris, face.Described mobile terminal identifies described target unlocking pin according to the password permissions mapping table preset again, and concrete identifying is: identify in the multiple unlocking pins in described password permissions mapping table whether there is the unlocking pin identical with described target unlocking pin.Described password permissions mapping table can comprise multiple unlocking pin and multiple authority configuration mode, and a unlocking pin maps an authority configuration mode.Such as, described password permissions mapping table comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, wherein, unlocking pin A and primary user's authority configuration mode have mapping relations, unlocking pin B and visitor's authority configuration mode have mapping relations, and unlocking pin C and children's authority configuration mode have mapping relations; Therefore, when after described acquisition for mobile terminal to described target unlocking pin, namely whether target unlocking pin described in identifiable design is identical with unlocking pin A, unlocking pin B or unlocking pin C.
S102, when to identify described target unlocking pin be legal unlocking pin, searches the authority configuration mode with described target unlocking pin with mapping relations in described password permissions mapping table;
Concrete, when there is the unlocking pin identical with described target unlocking pin in multiple unlocking pins that S101 identifies in described password permissions mapping table, can determine that described target unlocking pin is legal unlocking pin, now, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table.
S103, the described authority configuration mode according to finding carries out authority configuration to the application program in terminal;
Concrete, after described mobile terminal finds corresponding authority configuration mode, authority configuration can be carried out to the application program in terminal according to the described authority configuration mode found, different authority configuration modes application programs can carry out different authority configurations, authority configuration mode as the highest in authority can for all to open rights of using to all application programs in terminal, and the authority configuration mode belonging to guest levels only can open the rights of using of base application in terminal and the rights of using of the comparatively application program of secret in closing a terminal.Such as, the described password permissions mapping table pre-set comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, when the target unlocking pin of user's input is identical with unlocking pin A, described mobile terminal will open the rights of using of all application programs in terminal according to described primary user's authority configuration mode, when this user described mobile terminal to be lent child play games time, this user can re-enter the target unlocking pin identical with unlocking pin C in unlock interface, described mobile terminal is made to switch to described children's authority configuration mode from described primary user's authority configuration mode, described mobile terminal can close the rights of using of other application programs except game application according to described children's authority configuration mode, namely the rights of using of game application are only opened, thus can avoid because child to cause the leakage of individual privacy to the maloperation of the application program compared with secret, and the rights of using of major applications program can be closed by the mode that start unlocks, make user without the need to being set using authority to application program one by one respectively, thus the convenience also improved when operating terminal.
The embodiment of the present invention is by obtaining target unlocking pin, and when according to the password permissions mapping table preset, to identify described target unlocking pin be legal unlocking pin, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table, and according to the described authority configuration mode found, authority configuration be carried out to the application program in terminal.Because described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode, so by inputting different unlocking pins, it can be the authority that application deployment in terminal is different, make user can according to the security of scene, select the unlocking pin that input is corresponding, the security of current authority configuration mode is consistent with security needed for current scene, thus the security of intelligent terminal can be improved, to avoid the leakage causing individual privacy in the process of public use.
Refer to Fig. 2, be the schematic flow sheet of the another kind of authority configuring method that the embodiment of the present invention provides, described method can comprise:
S201, creates password permissions mapping table, in described password permissions mapping table, arranges multiple unlocking pin, and is respectively the authority configuration mode that the setting of each unlocking pin has mapping relations;
Concrete, user is before the function using start to unlock, first can create password permissions mapping table by mobile terminal, described mobile terminal obtains the multiple unlocking pins inputted by user again, make described mobile terminal can arrange described multiple unlocking pin in described password permissions mapping table, the form of the unlocking pin that user inputs can be any one in the forms such as fingerprint, figure, numeral, iris, face.Wherein, user often inputs a unlocking pin, can be that it selects corresponding authority configuration mode by button, namely described mobile terminal can be respectively each unlocking pin and arrange the authority configuration mode with mapping relations, make described password permissions mapping table can comprise multiple unlocking pin and multiple authority configuration mode, and a unlocking pin map an authority configuration mode.Such as, described password permissions mapping table comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, wherein, unlocking pin A and primary user's authority configuration mode have mapping relations, unlocking pin B and visitor's authority configuration mode have mapping relations, and unlocking pin C and children's authority configuration mode have mapping relations.
S202, obtains the target unlocking pin inputted, and identifies described target unlocking pin;
Concrete, described mobile terminal is creating and after setting described password permissions mapping table, starting shooting in unlock interface, can obtain the target unlocking pin inputted by user, and identifying described target unlocking pin.Such as, if described target unlocking pin is finger-print cipher, then the finger print information of this finger-print cipher can be identified; If described target unlocking pin is numerical ciphers, then can identify each numeral in this numerical ciphers.
S203, judges whether there is the unlocking pin identical with the described target unlocking pin identified in described password permissions mapping table;
Concrete, described mobile terminal, after identifying described target unlocking pin, can judge whether there is the unlocking pin identical with the described target unlocking pin identified in described password permissions mapping table further.
S204, determines that described target unlocking pin is illegal unlocking pin;
Concrete, if S203 is judged as NO, illustrate in described password permissions mapping table there is not described target unlocking pin, now, can determine that described target unlocking pin is illegal unlocking pin, and show code error information.Optionally, when judging that inputted target unlocking pin is all illegal unlocking pin continuously, screen locking can be carried out to described mobile terminal.
S205, determines that described target unlocking pin is legal unlocking pin;
Concrete, if S203 is judged as YES, illustrate in described password permissions mapping table to there is described target unlocking pin, now, can determine that described target unlocking pin is legal unlocking pin.Such as, described password permissions mapping table comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, when the described target unlocking pin inputted is identical with unlocking pin A, can determine that described target unlocking pin is legal unlocking pin; When the described target unlocking pin inputted is not identical with unlocking pin A, unlocking pin B and unlocking pin C, can determine that described target unlocking pin is illegal unlocking pin.
S206, searches the authority configuration mode with described target unlocking pin with mapping relations in described password permissions mapping table;
Concrete, after described mobile terminal determines that described target unlocking pin is legal unlocking pin, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table.
S207, reads the privileges configuration information corresponding with found described authority configuration mode;
S208, according to read described privileges configuration information, opens the rights of using of the rights of using of at least one application program in terminal or all application programs in closing a terminal;
Concrete, after described mobile terminal finds corresponding authority configuration mode, the privileges configuration information corresponding with found described authority configuration mode can be read, according to read described privileges configuration information, open the rights of using of the rights of using of at least one application program in terminal or all application programs in closing a terminal, namely different authority configuration modes application programs can carry out different authority configurations, authority configuration mode as the highest in authority can for all to open rights of using to all application programs in terminal, and the authority configuration mode belonging to guest levels only can open the rights of using of base application in terminal and the rights of using of the comparatively application program of secret in closing a terminal.Wherein, described privileges configuration information comprises the information of the application program can opening rights of using, and needs the information of the application program of closing rights of using.Such as, the described password permissions mapping table pre-set comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, when the target unlocking pin of user's input is identical with unlocking pin A, described mobile terminal will open the rights of using of all application programs in terminal by the privileges configuration information corresponding according to described primary user's authority configuration mode, when this user described mobile terminal to be lent child play games time, this user can re-enter the target unlocking pin identical with unlocking pin C in unlock interface, described mobile terminal is made to switch to described children's authority configuration mode from described primary user's authority configuration mode, described mobile terminal can close the rights of using of other application programs except game application according to privileges configuration information corresponding to described children's authority configuration mode, namely the rights of using of game application are only opened, thus can avoid because child to cause the leakage of individual privacy to the maloperation of the application program compared with secret, and the rights of using of major applications program can be closed by the mode that start unlocks, make user without the need to being set using authority to application program one by one respectively, thus the convenience also improved when operating terminal.
Optionally, when receiving the modify instruction be associated with described password permissions mapping table, described mobile terminal can detect presently used authority configuration mode;
When described presently used authority configuration mode is the highest authority configuration mode of authority, according to described modify instruction, described password permissions mapping table is modified;
When described presently used authority configuration mode is not the highest authority configuration mode of authority, send illegal operation information.
Such as, the described password permissions mapping table pre-set comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, wherein, described primary user's authority configuration mode is the authority configuration mode that authority is the highest, therefore, if current authority configuration mode is described primary user's authority configuration mode, then can modify to described password permissions mapping table according to described modify instruction, specifically can revise any one unlocking pin in described password permissions mapping table or any one authority configuration mode or the mapping relations between unlocking pin and authority configuration mode, if current authority configuration mode is visitor's authority configuration mode or children's authority configuration mode, then will send illegal operation information to display screen, further, start unlock interface can also be again shown at display screen, if user's input and described primary user's authority configuration mode have the unlocking pin A of mapping relations, then described mobile terminal will switch to described primary user's authority configuration mode again, and starts to modify to described password permissions mapping table according to described modify instruction.
The embodiment of the present invention is by obtaining target unlocking pin, and when according to the password permissions mapping table preset, to identify described target unlocking pin be legal unlocking pin, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table, and according to the described authority configuration mode found, authority configuration be carried out to the application program in terminal.Because described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode, so by inputting different unlocking pins, it can be the authority that application deployment in terminal is different, make user can according to the security of scene, select the unlocking pin that input is corresponding, the security of current authority configuration mode is consistent with security needed for current scene, thus the security of intelligent terminal can be improved, to avoid the leakage causing individual privacy in the process of public use.
Refer to Fig. 3, it is the structural representation of a kind of authority inking device that the embodiment of the present invention provides, described authority inking device 1 can be applied in mobile terminal, and described authority inking device 1 can comprise: obtain identification module 10, search module 20, configuration module 30;
Described acquisition identification module 10, for obtaining target unlocking pin, and identifies described target unlocking pin according to the password permissions mapping table preset; Described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode;
Concrete, described acquisition identification module 10 can obtain the target unlocking pin that user inputs, and the form of described target unlocking pin can be any one in the forms such as fingerprint, figure, numeral, iris, face.Described acquisition identification module 10 identifies described target unlocking pin according to the password permissions mapping table preset again, and concrete identifying is: identify in the multiple unlocking pins in described password permissions mapping table whether there is the unlocking pin identical with described target unlocking pin.Described password permissions mapping table can comprise multiple unlocking pin and multiple authority configuration mode, and a unlocking pin maps an authority configuration mode.Such as, described password permissions mapping table comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, wherein, unlocking pin A and primary user's authority configuration mode have mapping relations, unlocking pin B and visitor's authority configuration mode have mapping relations, and unlocking pin C and children's authority configuration mode have mapping relations; Therefore, after described acquisition identification module 10 gets described target unlocking pin, namely whether target unlocking pin described in identifiable design is identical with unlocking pin A, unlocking pin B or unlocking pin C.
Describedly search module 20, for when to identify described target unlocking pin be legal unlocking pin, in described password permissions mapping table, search the authority configuration mode with described target unlocking pin with mapping relations;
Concrete, when there is the unlocking pin identical with described target unlocking pin in multiple unlocking pins that described acquisition identification module 10 identifies in described password permissions mapping table, can determine that described target unlocking pin is legal unlocking pin, now, search module 20 described in and can search the authority configuration mode with described target unlocking pin with mapping relations in described password permissions mapping table.
Described configuration module 30, for carrying out authority configuration according to the described authority configuration mode found to the application program in terminal;
Concrete, describedly search after module 20 finds corresponding authority configuration mode, described configuration module 30 can carry out authority configuration according to the described authority configuration mode found to the application program in terminal, different authority configuration modes application programs can carry out different authority configurations, authority configuration mode as the highest in authority can for all to open rights of using to all application programs in terminal, and the authority configuration mode belonging to guest levels only can open the rights of using of base application in terminal and the rights of using of the comparatively application program of secret in closing a terminal.Such as, the described password permissions mapping table pre-set comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, when the target unlocking pin of user's input is identical with unlocking pin A, described configuration module 30 will open the rights of using of all application programs in terminal according to described primary user's authority configuration mode, when this user described mobile terminal to be lent child play games time, this user can re-enter the target unlocking pin identical with unlocking pin C in unlock interface, described mobile terminal is made to switch to described children's authority configuration mode from described primary user's authority configuration mode, described configuration module 30 can close the rights of using of other application programs except game application according to described children's authority configuration mode, namely the rights of using of game application are only opened, thus can avoid because child to cause the leakage of individual privacy to the maloperation of the application program compared with secret, and the rights of using of major applications program can be closed by the mode that start unlocks, make user without the need to being set using authority to application program one by one respectively, thus the convenience also improved when operating terminal.
Further, then refer to Fig. 4, be a kind of structural representation obtaining identification module 10 that the embodiment of the present invention provides, described acquisition identification module 10 can comprise: obtain recognition unit 101, judging unit 102, determining unit 103;
Described acquisition recognition unit 101, for obtaining inputted target unlocking pin, and identifies described target unlocking pin;
Concrete, described acquisition recognition unit 101 in start unlock interface, can obtain the target unlocking pin inputted by user, and identifies described target unlocking pin.Such as, if described target unlocking pin is finger-print cipher, then described acquisition recognition unit 101 can identify the finger print information of this finger-print cipher; If described target unlocking pin is numerical ciphers, then described acquisition recognition unit 101 can identify each numeral in this numerical ciphers.
Described judging unit 102, for judging whether there is the unlocking pin identical with the described target unlocking pin identified in described password permissions mapping table;
Concrete, described acquisition recognition unit 101, after identifying described target unlocking pin, can judge whether there is the unlocking pin identical with the described target unlocking pin identified in described password permissions mapping table by described judging unit 102 further.
Described determining unit 103, if be judged as YES for described judging unit 102, then determines that described target unlocking pin is legal unlocking pin;
Concrete, if described judging unit 102 is judged as YES, illustrate in described password permissions mapping table there is not described target unlocking pin, now, described determining unit 103 can determine that described target unlocking pin is illegal unlocking pin, and shows code error information.Optionally, when judging that inputted target unlocking pin is all illegal unlocking pin continuously, described determining unit 103 can also carry out screen locking to described mobile terminal.
Described determining unit 103, if be also judged as NO for described judging unit 102, then determines that described target unlocking pin is illegal unlocking pin.
Concrete, if described judging unit 102 is judged as NO, illustrate in described password permissions mapping table to there is described target unlocking pin, now, described determining unit 103 can determine that described target unlocking pin is legal unlocking pin.Such as, described password permissions mapping table comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, when the described target unlocking pin inputted is identical with unlocking pin A, described determining unit 103 can determine that described target unlocking pin is legal unlocking pin; When the described target unlocking pin inputted is not identical with unlocking pin A, unlocking pin B and unlocking pin C, described determining unit 103 can determine that described target unlocking pin is illegal unlocking pin.
Further, then refer to Fig. 5, be the structural representation of a kind of configuration module 30 that the embodiment of the present invention provides, described configuration module 30 can comprise: reading unit 301, dispensing unit 302;
Described reading unit 301, for reading the privileges configuration information corresponding with found described authority configuration mode;
Described dispensing unit 302, for according to read described privileges configuration information, opens the rights of using of the rights of using of at least one application program in terminal or all application programs in closing a terminal;
Concrete, described reading unit 301 can read the privileges configuration information corresponding with found described authority configuration mode, again by described dispensing unit 302 according to read described privileges configuration information, open the rights of using of the rights of using of at least one application program in terminal or all application programs in closing a terminal, namely different authority configuration modes application programs can carry out different authority configurations, authority configuration mode as the highest in authority can for all to open rights of using to all application programs in terminal, and the authority configuration mode belonging to guest levels only can open the rights of using of base application in terminal and the rights of using of the comparatively application program of secret in closing a terminal.Wherein, described privileges configuration information comprises the information of the application program can opening rights of using, and needs the information of the application program of closing rights of using.
The embodiment of the present invention is by obtaining target unlocking pin, and when according to the password permissions mapping table preset, to identify described target unlocking pin be legal unlocking pin, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table, and according to the described authority configuration mode found, authority configuration be carried out to the application program in terminal.Because described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode, so by inputting different unlocking pins, it can be the authority that application deployment in terminal is different, make user can according to the security of scene, select the unlocking pin that input is corresponding, the security of current authority configuration mode is consistent with security needed for current scene, thus the security of intelligent terminal can be improved, to avoid the leakage causing individual privacy in the process of public use.
Refer to Fig. 6 again, it is the structural representation of the another kind of authority inking device that the embodiment of the present invention provides, described authority inking device 1 can be applied in mobile terminal, described authority inking device 1 can comprise acquisition identification module 10 in the corresponding embodiment of above-mentioned Fig. 3, search module 20, configuration module 30, further, described authority inking device 1 can also comprise: create and arrange module 40, mode detection module 50, modified module 60, prompting sending module 70;
Described establishment arranges module 40, for creating password permissions mapping table, in described password permissions mapping table, arranges multiple unlocking pin, and is respectively the authority configuration mode that the setting of each unlocking pin has mapping relations;
Concrete, user is before the function using start to unlock, first module 40 can be set by described establishment and create password permissions mapping table, and obtain the multiple unlocking pins inputted by user, in described password permissions mapping table, arrange described multiple unlocking pin again, the form of the unlocking pin that user inputs can be any one in the forms such as fingerprint, figure, numeral, iris, face.Wherein, user often inputs a unlocking pin, can be that it selects corresponding authority configuration mode by button, namely described establishment arranges module 40 and can be respectively the authority configuration mode that the setting of each unlocking pin has mapping relations, make described password permissions mapping table can comprise multiple unlocking pin and multiple authority configuration mode, and a unlocking pin map an authority configuration mode.Such as, described password permissions mapping table comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, wherein, unlocking pin A and primary user's authority configuration mode have mapping relations, unlocking pin B and visitor's authority configuration mode have mapping relations, and unlocking pin C and children's authority configuration mode have mapping relations.
Described mode detection module 50, for when receiving the modify instruction be associated with described password permissions mapping table, detects presently used authority configuration mode;
Described modified module 60, during for being the highest authority configuration mode of authority when described presently used authority configuration mode, modifies to described password permissions mapping table according to described modify instruction;
Described prompting sending module 70, during for not being the highest authority configuration mode of authority when described presently used authority configuration mode, sends illegal operation information.
Concrete, if the described password permissions mapping table pre-set comprises 3 unlocking pins, be respectively unlocking pin A, unlocking pin B and unlocking pin C, and have 3 kinds of authority configuration modes, be respectively primary user's authority configuration mode, visitor's authority configuration mode and children's authority configuration mode, wherein, described primary user's authority configuration mode is the authority configuration mode that authority is the highest, then when described mode detection module 50 detects that current authority configuration mode is described primary user's authority configuration mode, then described modified module 60 can be modified to described password permissions mapping table according to described modify instruction, specifically can revise any one unlocking pin in described password permissions mapping table or any one authority configuration mode or the mapping relations between unlocking pin and authority configuration mode, if described mode detection module 50 detects that current authority configuration mode is visitor's authority configuration mode or children's authority configuration mode, then described prompting sending module 70 will send illegal operation information to display screen, further, described prompting sending module 70 can also control display screen and again show start unlock interface, if user's input and described primary user's authority configuration mode have the unlocking pin A of mapping relations, then current authority configuration mode will switch to described primary user's authority configuration mode again, and start to be modified to described password permissions mapping table according to described modify instruction by described modified module 60.
The embodiment of the present invention is by obtaining target unlocking pin, and when according to the password permissions mapping table preset, to identify described target unlocking pin be legal unlocking pin, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table, and according to the described authority configuration mode found, authority configuration be carried out to the application program in terminal.Because described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode, so by inputting different unlocking pins, it can be the authority that application deployment in terminal is different, make user can according to the security of scene, select the unlocking pin that input is corresponding, the security of current authority configuration mode is consistent with security needed for current scene, thus the security of intelligent terminal can be improved, to avoid the leakage causing individual privacy in the process of public use.
Referring to Fig. 7, is the structural representation of a kind of mobile terminal that the embodiment of the present invention provides.As shown in Figure 7, described mobile terminal 1000 can comprise: at least one processor 1001, such as CPU, at least one network interface 1004, user interface 1003, storer 1005, at least one communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these assemblies.Wherein, user interface 1003 can comprise display screen (Display), keyboard (Keyboard), and optional user interface 1003 can also comprise wireline interface, the wave point of standard.Network interface 1004 optionally can comprise wireline interface, the wave point (as WI-FI interface) of standard.Storer 1005 can be high-speed RAM storer, also can be non-labile storer (non-volatilememory), such as at least one magnetic disk memory.Storer 1005 can also be optionally that at least one is positioned at the memory storage away from aforementioned processor 1001.As shown in Figure 7, operating system, network communication module, Subscriber Interface Module SIM and equipment controlling application program can be comprised as in a kind of storer 1005 of computer-readable storage medium.
In the mobile terminal 1000 shown in Fig. 7, user interface 1003 is mainly used in, for user provides the interface of input, obtaining the data that user exports; And processor 1001 may be used for calling the equipment controlling application program stored in storer 1005, and specifically perform following steps:
Obtain target unlocking pin, and according to the password permissions mapping table preset, described target unlocking pin is identified; Described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode;
When to identify described target unlocking pin be legal unlocking pin, in described password permissions mapping table, search the authority configuration mode with described target unlocking pin with mapping relations;
Described authority configuration mode according to finding carries out authority configuration to the application program in terminal.
In one embodiment, described processor 1001 obtains target unlocking pin in execution, and before identifying described target unlocking pin according to the password permissions mapping table preset, also performs following steps:
Create password permissions mapping table, multiple unlocking pin is set in described password permissions mapping table, and be respectively the authority configuration mode that the setting of each unlocking pin has mapping relations.
In one embodiment, described processor 1001 obtains target unlocking pin in execution, and when identifying described target unlocking pin according to the password permissions mapping table preset, specifically performs following steps:
Obtain the target unlocking pin inputted, and described target unlocking pin is identified;
Judge whether there is the unlocking pin identical with the described target unlocking pin identified in described password permissions mapping table;
If be judged as YES, then determine that described target unlocking pin is legal unlocking pin;
If be judged as NO, then determine that described target unlocking pin is illegal unlocking pin.
In one embodiment, described processor 1001, when execution carries out authority configuration according to the described authority configuration mode found to the application program in terminal, specifically performs following steps:
Read the privileges configuration information corresponding with found described authority configuration mode;
According to read described privileges configuration information, open the rights of using of the rights of using of at least one application program in terminal or all application programs in closing a terminal.
In one embodiment, described processor 1001 also performs following steps:
When receiving the modify instruction be associated with described password permissions mapping table, detect presently used authority configuration mode;
When described presently used authority configuration mode is the highest authority configuration mode of authority, according to described modify instruction, described password permissions mapping table is modified;
When described presently used authority configuration mode is not the highest authority configuration mode of authority, send illegal operation information.
The embodiment of the present invention is by obtaining target unlocking pin, and when according to the password permissions mapping table preset, to identify described target unlocking pin be legal unlocking pin, the authority configuration mode with described target unlocking pin with mapping relations can be searched in described password permissions mapping table, and according to the described authority configuration mode found, authority configuration be carried out to the application program in terminal.Because described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode, so by inputting different unlocking pins, it can be the authority that application deployment in terminal is different, make user can according to the security of scene, select the unlocking pin that input is corresponding, the security of current authority configuration mode is consistent with security needed for current scene, thus the security of intelligent terminal can be improved, to avoid the leakage causing individual privacy in the process of public use.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. an authority configuring method, is characterized in that, comprising:
Obtain target unlocking pin, and according to the password permissions mapping table preset, described target unlocking pin is identified; Described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode;
When to identify described target unlocking pin be legal unlocking pin, in described password permissions mapping table, search the authority configuration mode with described target unlocking pin with mapping relations;
Described authority configuration mode according to finding carries out authority configuration to the application program in terminal.
2. the method for claim 1, is characterized in that, at described acquisition target unlocking pin, and before the step identified described target unlocking pin according to the password permissions mapping table preset, also comprises:
Create password permissions mapping table, multiple unlocking pin is set in described password permissions mapping table, and be respectively the authority configuration mode that the setting of each unlocking pin has mapping relations.
3. the method for claim 1, is characterized in that, described acquisition target unlocking pin, and identifies described target unlocking pin according to the password permissions mapping table preset, and comprising:
Obtain the target unlocking pin inputted, and described target unlocking pin is identified;
Judge whether there is the unlocking pin identical with the described target unlocking pin identified in described password permissions mapping table;
If be judged as YES, then determine that described target unlocking pin is legal unlocking pin;
If be judged as NO, then determine that described target unlocking pin is illegal unlocking pin.
4. the method for claim 1, is characterized in that, the described authority configuration mode that described basis finds carries out authority configuration to the application program in terminal, comprising:
Read the privileges configuration information corresponding with found described authority configuration mode;
According to read described privileges configuration information, open the rights of using of the rights of using of at least one application program in terminal or all application programs in closing a terminal.
5. the method for claim 1, is characterized in that, also comprises:
When receiving the modify instruction be associated with described password permissions mapping table, detect presently used authority configuration mode;
When described presently used authority configuration mode is the highest authority configuration mode of authority, according to described modify instruction, described password permissions mapping table is modified;
When described presently used authority configuration mode is not the highest authority configuration mode of authority, send illegal operation information.
6. an authority inking device, is characterized in that, comprising:
Obtaining identification module, for obtaining target unlocking pin, and according to the password permissions mapping table preset, described target unlocking pin being identified; Described password permissions mapping table comprises multiple unlocking pin and multiple authority configuration mode;
Search module, for when to identify described target unlocking pin be legal unlocking pin, in described password permissions mapping table, search the authority configuration mode with described target unlocking pin with mapping relations;
Configuration module, for carrying out authority configuration according to the described authority configuration mode found to the application program in terminal.
7. device as claimed in claim 6, is characterized in that, also comprise:
Establishment arranges module, for creating password permissions mapping table, in described password permissions mapping table, arranges multiple unlocking pin, and is respectively the authority configuration mode that the setting of each unlocking pin has mapping relations.
8. device as claimed in claim 6, it is characterized in that, described acquisition identification module comprises:
Obtaining recognition unit, for obtaining inputted target unlocking pin, and described target unlocking pin being identified;
Judging unit, for judging whether there is the unlocking pin identical with the described target unlocking pin identified in described password permissions mapping table;
Determining unit, if be judged as YES for described judging unit, then determines that described target unlocking pin is legal unlocking pin;
Described determining unit, if be also judged as NO for described judging unit, then determines that described target unlocking pin is illegal unlocking pin.
9. device as claimed in claim 6, it is characterized in that, described configuration module comprises:
Reading unit, for reading the privileges configuration information corresponding with found described authority configuration mode;
Dispensing unit, for according to read described privileges configuration information, opens the rights of using of the rights of using of at least one application program in terminal or all application programs in closing a terminal.
10. device as claimed in claim 6, is characterized in that, also comprise:
Mode detection module, for when receiving the modify instruction be associated with described password permissions mapping table, detects presently used authority configuration mode;
Modified module, during for being the highest authority configuration mode of authority when described presently used authority configuration mode, modifies to described password permissions mapping table according to described modify instruction;
Prompting sending module, during for not being the highest authority configuration mode of authority when described presently used authority configuration mode, transmission illegal operation information.
CN201510847812.4A 2015-11-26 2015-11-26 A kind of authority configuring method and device Active CN105404802B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510847812.4A CN105404802B (en) 2015-11-26 2015-11-26 A kind of authority configuring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510847812.4A CN105404802B (en) 2015-11-26 2015-11-26 A kind of authority configuring method and device

Publications (2)

Publication Number Publication Date
CN105404802A true CN105404802A (en) 2016-03-16
CN105404802B CN105404802B (en) 2019-01-29

Family

ID=55470287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510847812.4A Active CN105404802B (en) 2015-11-26 2015-11-26 A kind of authority configuring method and device

Country Status (1)

Country Link
CN (1) CN105404802B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250741A (en) * 2016-07-22 2016-12-21 北京珠穆朗玛移动通信有限公司 A kind of system switching method and mobile terminal
CN106599649A (en) * 2016-11-10 2017-04-26 Tcl数码科技(深圳)有限责任公司 Camera-based terminal device user identity verification method and system
CN106951066A (en) * 2017-02-07 2017-07-14 深圳市魔眼科技有限公司 Access rights management method and headset equipment
CN107360314A (en) * 2017-06-29 2017-11-17 胡玥莹 The unlocking method and mobile phone of a kind of mobile phone screen
CN107770378A (en) * 2017-10-19 2018-03-06 佛山市章扬科技有限公司 A kind of method based on finger print information unblock mobile phone
CN109377766A (en) * 2018-12-04 2019-02-22 湖北文理学院 The monitoring method of vehicle and removable license plate recognition device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855426A (en) * 2012-08-03 2013-01-02 广东欧珀移动通信有限公司 User management method based on Android
CN103577739A (en) * 2013-11-15 2014-02-12 青岛尚慧信息技术有限公司 Intelligent mobile terminal and setting and accessing control method thereof
CN103793636A (en) * 2012-11-01 2014-05-14 华为技术有限公司 Equipment and method for protecting privacy thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855426A (en) * 2012-08-03 2013-01-02 广东欧珀移动通信有限公司 User management method based on Android
CN103793636A (en) * 2012-11-01 2014-05-14 华为技术有限公司 Equipment and method for protecting privacy thereof
CN103577739A (en) * 2013-11-15 2014-02-12 青岛尚慧信息技术有限公司 Intelligent mobile terminal and setting and accessing control method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250741A (en) * 2016-07-22 2016-12-21 北京珠穆朗玛移动通信有限公司 A kind of system switching method and mobile terminal
CN106599649A (en) * 2016-11-10 2017-04-26 Tcl数码科技(深圳)有限责任公司 Camera-based terminal device user identity verification method and system
CN106951066A (en) * 2017-02-07 2017-07-14 深圳市魔眼科技有限公司 Access rights management method and headset equipment
CN107360314A (en) * 2017-06-29 2017-11-17 胡玥莹 The unlocking method and mobile phone of a kind of mobile phone screen
CN107360314B (en) * 2017-06-29 2020-01-03 江苏金亿达能科技有限公司 Unlocking method of mobile phone screen and mobile phone
CN107770378A (en) * 2017-10-19 2018-03-06 佛山市章扬科技有限公司 A kind of method based on finger print information unblock mobile phone
CN109377766A (en) * 2018-12-04 2019-02-22 湖北文理学院 The monitoring method of vehicle and removable license plate recognition device

Also Published As

Publication number Publication date
CN105404802B (en) 2019-01-29

Similar Documents

Publication Publication Date Title
CN105404802A (en) Authority configuration method and apparatus
EP3206150B1 (en) Fingerprint input information processing method, system and mobile terminal
TWI628944B (en) Methods for enabling an esim on an euicc of a mobile device and related non-transitory computer readable storage medium
CN105701420B (en) A kind of management method and terminal of user data
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
WO2016015448A1 (en) Multi-system entering method, apparatus and terminal
US9455985B2 (en) Method for secure key injection with biometric sensors
US20160366588A1 (en) User mode control method and system based on iris recognition technology for mobile terminal
CN106886692A (en) Application program using method and device and electronic equipment
CN105760737A (en) Control method for applications and terminal
CN105550591A (en) Security protection device and method for user data in mobile terminal
CN106681717B (en) Terminal application program management method and device and electronic equipment
CN105574392B (en) A kind of display mode switching method and mobile terminal
CN102880820A (en) Method for accessing application program of mobile terminal and mobile terminal
CN104899490A (en) Terminal positioning method and user terminal
CN105045085A (en) Control method of smart watch and the smart watch
EP3403210B1 (en) User interface for a mobile device
EP3403211B1 (en) User interface for a mobile device
CN104408344A (en) System switching method, system switching device and terminal
CN104021358A (en) Anti-theft control method and device for mobile terminal
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN105046133A (en) Image display method and vehicle-mounted terminal
WO2015184894A2 (en) Method and device for implementing multi-user login mode
CN111027077B (en) Encryption method and device for storage equipment and storage medium
CN106529232A (en) Startup method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant