CN106897629A - The control method and terminal of terminal applies - Google Patents

The control method and terminal of terminal applies Download PDF

Info

Publication number
CN106897629A
CN106897629A CN201510965301.2A CN201510965301A CN106897629A CN 106897629 A CN106897629 A CN 106897629A CN 201510965301 A CN201510965301 A CN 201510965301A CN 106897629 A CN106897629 A CN 106897629A
Authority
CN
China
Prior art keywords
user
application program
identity information
access right
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510965301.2A
Other languages
Chinese (zh)
Inventor
杨飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510965301.2A priority Critical patent/CN106897629A/en
Publication of CN106897629A publication Critical patent/CN106897629A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the present invention provides a kind of control method and terminal of terminal applies, wherein, the method includes:Receive application program enables request, and according to the identity information for enabling acquisition request user;Identity information according to the user determines the access right grade of user's correspondence application program;Access right grade according to the user, function corresponding with the access right grade in the application program is opened to the user, locks the function beyond the access right grade.The control method and terminal of terminal applies provided in an embodiment of the present invention, while ensure that the personal secrets of user, improve the use value of application program, improve the experience of user.

Description

The control method and terminal of terminal applies
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of terminal applies control method and Terminal.
Background technology
With the popularization of intelligent terminal, the application based on intelligent terminal is also more and more.These apply to While the life of people brings enjoyment and facility, the personal secrets for also giving people bring threat.
The safety problem that the privacy given people for application is brought, prior art is by being answering in terminal Solved with setting Authentication mechanism, such as when user starts album function, user needs Prompting according to terminal is input into corresponding identity information, and could start phase after identity information is verified Volume.Although this method ensure that the privacy of photograph album, but also to have impact on and be not related to privacy of user in photograph album Photo check and share that therefore although prior art ensure that the privacy of user, but also limit In some are not related to the use of the function of privacy of user, reduce use value and the user of application Experience.
The content of the invention
The embodiment of the present invention provides a kind of control method and terminal of terminal applies, is used to solve prior art In, the use value of application program is relatively low, the poor problem of user experience.
The one side of the embodiment of the present invention is to provide a kind of control method of terminal applies, and this includes:
Receive application program enables request, and according to the identity information for enabling acquisition request user;
Identity information according to the user determines access right of user's correspondence application program etc. Level;
Access right grade according to the user, to the user open in the application program with it is described The corresponding function of access right grade, locks the function beyond the access right grade.
The other side of the embodiment of the present invention is to provide a kind of terminal, and the terminal includes:
Receiver module, request is enabled for receive application program;
Acquisition module, the identity information for enabling acquisition request user according to;
Determining module, for determining user's correspondence application program according to the identity information of the user Access right grade;
Performing module, for the access right grade according to the user, described answering is opened to the user With function corresponding with the access right grade in program, the work(beyond the access right grade is locked Energy.
The control method and terminal of terminal applies provided in an embodiment of the present invention, by according to user input Identity information determines the access right grade of user in application program to be enabled, and according to the use of user Permission Levels, open function corresponding with the access right grade in the application program, lock the right to use Function beyond limit grade, so that while ensure that the personal secrets of user, and do not influence to apply journey Meet the use of the function of user's access right grade in sequence, improve the use value and use of application program The experience at family.
Brief description of the drawings
The schematic flow sheet of the control method of the terminal applies that Fig. 1 is provided for one embodiment of the invention;
The schematic flow sheet of the control method of the terminal applies that Fig. 2 is provided for another embodiment of the present invention;
The structural representation of the terminal that Fig. 3 is provided for one embodiment of the invention;
The structural representation of the terminal that Fig. 4 is provided for another embodiment of the present invention.
Specific embodiment
The schematic flow sheet of the control method of the terminal applies that Fig. 1 is provided for one embodiment of the invention, such as schemes Shown in 1, the method that the present embodiment is provided can be used in being controlled the application program in terminal, specifically , the method comprises the following steps:
Step S101, receive application program and enable request, and enable acquisition request user's according to described Identity information.
Specifically, the terminal described in the present embodiment can be but be not limited only to be mobile phone, panel computer etc. Equipment.
By taking touch-screen mobile phone as an example, when user clicks on the icon of a certain application program on mobile phone screen, should Request is enabled with programming automatic generation, and the mark carrying of itself is sent to mobile phone in this enables request, Mobile phone receive this enable request after, according to this enable request to user return require user input identity The prompting message of information so that user is input into identity letter corresponding with the application program according to the prompting message Breath, so that mobile phone obtains the identity information of user according to the input of user.
Step S102, the user correspondence application program is determined according to the identity information of the user Access right grade.
Specifically, in the present embodiment, terminal after receiving and enabling request, also this is enabled ask into Row parsing, and from this please with the mark that the application program for wherein carrying is obtained in request, and in obtaining user After the identity information of input, according to the mark of the application program, obtained and the application program from local Identify the access right grade of corresponding application program and the corresponding relation list of subscriber identity information;And root According to the identity information of the user for getting, the user is searched in the corresponding relation list corresponding to the application The access right grade of program.
Step S103, the access right grade according to the user, the application journey is opened to the user Function corresponding with the access right grade in sequence, locks the function beyond the access right grade.
By taking photograph album application program as an example, user can be according to photo in different photos folders in same photograph album Privacy level, be that each photos folder sets different Permission Levels, and preset different user The corresponding access right grade of identity information, when a user will check to the photograph album, terminal can be with According to the identity information of user input, determine the user to should photograph album access right grade, so as to be The user opens photos folder corresponding with user's access right grade, locks user's access right Photos folder beyond grade.Allow users to enter the photos folder that access right grade is allowed Row is checked, and the photos folder that access right grade is not allowed can not be checked, so as in not shadow While sound user is normally used photograph album application program, the privacy of user is ensure that again.Improve should With the use value and the experience of user of program.
The control method of the terminal applies that the present embodiment is provided, it is true by the identity information according to user input Surely the access right grade of user in application program to be enabled, and according to the access right grade of user, Function corresponding with the access right grade in the application program is opened, is locked beyond the access right grade Function, so as to while ensure that the personal secrets of user, and do not influence to meet use in application program The use of the function of family access right grade, improves the use value of application program and the use body of user Test.
The schematic flow sheet of the control method of the terminal applies that Fig. 2 is provided for another embodiment of the present invention, such as Shown in Fig. 2, the method that the present embodiment is provided is specifically included as follows on the basis of embodiment illustrated in fig. 1 Step:
Step S201, receive application program and enable request.
Request is enabled described in step S202, basis determine whether the application program needs authentication, if desired, Step S203 is then performed, if need not, perform step S210.
Specifically, terminal receive application program enable request after, from enable request in obtain the application The mark of program, and according to the mark of the application program, the application program authenticated the need for prestore Identification list in search the application program whether need authentication, if desired, then perform step S203, no Need, perform step S210.
The identity information of user described in acquisition request is enabled described in step S203, basis.
Step S204, the identity information to the user are authenticated, and determine whether the user has institute The access rights of application program are stated, if authentication passes through, step S205- step S206 is performed, if authentication Do not pass through, then perform step S207.
Specifically, after the identity information for getting user, it is corresponding from the application program for prestoring Search whether there is the identity information of the user in white list, if in the presence of, it is determined that the user has should With the access rights of program, and further execution step S205- steps S206.If not existing, it is determined that Access rights of the user without the application program, and further perform step S207.
Step S205, the user correspondence application program is determined according to the identity information of the user Access right grade.
Step S206, the access right grade according to the user, the application journey is opened to the user Function corresponding with the access right grade in sequence, locks the function beyond the access right grade.
Step S207, determine whether the number of times of the user input identity information exceedes pre-determined number, if super Pre-determined number is crossed, then performs step S209;If not less than pre-determined number, performing step S208.
Specifically, in once-through operation, terminal is all entered automatically after prompting user input identity information every time Row is counted, and before prompting user input identity information next time, to the secondary of user input identity information Number is judged, when the number of times for counting exceedes pre-determined number, execution step S209;If the number of times for counting During not less than pre-determined number, step S208 is performed.Wherein, above-mentioned pre-determined number be those skilled in the art according to Need what is voluntarily set, do not do specific restriction herein.
Step S208, the prompting message that identity information is re-entered to user return, so that the use Identity information is re-entered at family, and performs step S204.
Step S209, the application program is locked, and terminate this behaviour and done.
Step S210, the startup application program, and terminate this operation.
Specifically, terminal opens the repertoire of the application program, i.e. user's energy to user in this step It is functional using the institute in the application.
Further, after function corresponding with user's access right grade is opened to user, this implementation The method that example is provided, download behavior that can also be further to user during using application program is entered Row judges.
Specifically, after terminal opens function corresponding with user's access right grade to user, terminal Operation behavior to user carries out monitor in real time, and judges whether active user will perform installation application program Operation, when user perform install application program operation when, the application journey that terminal judges user to be installed Whether sequence has been installed, if having installed, judges whether user has the access right of the application program, if Have, then the application program is directly supplied to user, if access right of the user without the application, Then shield the download of the application program.Further, if not installing the application program, basis in terminal The Permission Levels of user determine whether the download of the application.
The control method of the terminal applies that the present embodiment is provided, it is true by the identity information according to user input Surely the access right grade of user in application program to be enabled, and according to the access right grade of user, Function corresponding with the access right grade in the application program is opened, is locked beyond the access right grade Function, so as to while ensure that the personal secrets of user, and do not influence to meet use in application program The use of the function of family access right grade, improves the use value of application program and the use body of user Test.
The structural representation of the terminal that Fig. 3 is provided for one embodiment of the invention, as shown in figure 3, this implementation The terminal that example is provided is included with lower module:
Receiver module 10, request is enabled for receive application program;
Acquisition module 11, the identity information for enabling acquisition request user according to;
Determining module 12, for determining user's correspondence application according to the identity information of the user The access right grade of program;
Performing module 13, for the access right grade according to the user, opens described to the user Function corresponding with the access right grade in application program, locks beyond the access right grade Function.
Wherein, the determining module 12, specifically for:
Access right of the application program prestored according to the mark of the application program, acquisition etc. Level and the corresponding relation list of subscriber identity information;
According to the identity information of the user, user's correspondence institute is obtained from the corresponding relation list State the access right grade of application program.
The terminal that the present embodiment is provided can be used in performing technical method as shown in Figure 1, and it is specifically held Line mode and beneficial effect are similar with the technical method shown in Fig. 1, repeat no more herein.
The structural representation of the terminal that Fig. 4 is provided for another embodiment of the present invention, as shown in figure 4, this reality The terminal of example offer is provided, on the basis of structure shown in Fig. 3, can also be included:
Judge module 14, determines whether the application program needs authentication for enabling request according to;
If need not, the performing module 13 directly initiates the application program;
If desired, then the acquisition module 11 according to the identity information for enabling acquisition request user.
Whether authentication module 15, authenticates for the identity information to the user, determines the user Access rights with the application program;
If authentication does not pass through, the performing module 13 is returned to the user and re-enters identity information Prompting message;
Wherein, if authentication passes through, the determining module 12 determines institute according to the identity information of the user State the access right grade of user's correspondence application program.
Further, in the present embodiment, the judge module 14 is additionally operable to determine the user input body Whether the number of times of part information exceedes pre-determined number;
If exceeding the pre-determined number, the performing module is additionally operable to lock the application program;
If the number of times is returned again not less than the pre-determined number, the performing module to the user The prompting message of identity information is input into, so that the user re-enters identity information.
The judge module, is additionally operable to:
Judge whether active user performs the operation for installing application program;Application program is such as installed, is then judged Whether this application program has been installed, and has such as installed, then basis has this application program highest access right The mandate of user, directly provides this application program to active user;Otherwise, according to the authority of active user Grade determines whether the download of the application.
The terminal that the present embodiment is provided can be used in performing technical method as shown in Figure 2, its specific execution Mode and beneficial effect are similar with the technical method shown in Fig. 2, repeat no more herein.
In several embodiments provided by the present invention, it should be understood that disclosed terminal and method, Can realize by another way.For example, terminal embodiment described above is only schematical, For example, the division of the module, only a kind of division of logic function, can have in addition when actually realizing Dividing mode, such as multiple module or components can combine or be desirably integrated into another system, or Some features can be ignored, or not perform.It is another, shown or discussed coupling each other or Direct-coupling or communication connection can be the coupling or communication connection of intermodule by some interfaces, can be with It is electrical, mechanical or other forms.
It is described as separating component illustrate module can be or may not be it is physically separate, make For the part that module shows can be or may not be physical module.Can select according to the actual needs Some or all of module therein is selected to realize the purpose of this embodiment scheme.
In addition, during each functional module in each embodiment of the invention can be integrated in a processing module, Can also be that modules are individually physically present, it is also possible to which two or more modules are integrated in a mould In block.Above-mentioned integrated module can both be realized in the form of hardware, it would however also be possible to employ hardware adds software The form of functional module is realized.
The above-mentioned integrated module realized in the form of software function module, can store in a computer In read/write memory medium.Above-mentioned software function module storage is in a storage medium, including some fingers Order is used to so that a computer equipment (can be personal computer, server, or network equipment etc.) Or processor (processor) performs the part steps of each embodiment methods described of the invention.And it is foregoing Storage medium include:USB flash disk, mobile hard disk, read-only storage (Read-Only Memory, ROM), Random access memory (Random Access Memory, RAM), magnetic disc or CD etc. are various can be with The medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each The division of functional module is carried out for example, in practical application, as needed can divide above-mentioned functions With being completed by different functional module, will the internal structure of terminal be divided into different functional modules, with Complete all or part of function described above.The specific work process of the terminal of foregoing description, can be with With reference to the corresponding process in preceding method embodiment, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than right Its limitation;Although being described in detail to the present invention with reference to foregoing embodiments, this area it is common Technical staff should be understood:It can still modify to the technical scheme described in foregoing embodiments, Or equivalent is carried out to which part or all technical characteristic;And these modifications or replacement, and The scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution is not made.

Claims (10)

1. a kind of control method of terminal applies, it is characterised in that including:
Receive application program enables request, and according to the identity information for enabling acquisition request user;
Identity information according to the user determines access right of user's correspondence application program etc. Level;
Access right grade according to the user, to the user open in the application program with it is described The corresponding function of access right grade, locks the function beyond the access right grade.
2. method according to claim 1, it is characterised in that enable request described in the basis and obtain Before taking the identity information of user input, also include:
Enable whether the request determination application program needs authentication according to described;
If need not, directly initiate the application program;
Wherein, if desired, the identity information of user described in acquisition request is then enabled according to.
3. method according to claim 2, it is characterised in that the identity according to the user Before information determines the access right grade of user's correspondence application program, also include:
Identity information to the user is authenticated, and determines whether the user has the application program Access rights;
If authentication does not pass through, the prompting message for re-entering identity information is returned to the user;
Wherein, if authentication passes through, the identity information according to the user is determined described in user's correspondence The access right grade of application program.
4. method according to claim 3, it is characterised in that described to be returned again to the user Before being input into the prompting message of identity information, methods described also includes:
Determine whether the number of times of the user input identity information exceedes pre-determined number, if exceeding described predetermined Number of times, then lock the application program;
Wherein, if not less than the pre-determined number, being returned to the user and re-entering identity information Prompting message, so that the user re-enters identity information.
5. method according to claim 1, it is characterised in that judge whether active user performs peace Fill the operation of application program;Application program is such as installed, then judges whether this application program has been installed, such as Install, then according to the mandate of the user with this application program highest access right, directly provide this application Program is to active user;Otherwise, under the Permission Levels according to active user determine whether the application Carry.
6. a kind of terminal, it is characterised in that including:
Receiver module, request is enabled for receive application program;
Acquisition module, the identity information for enabling acquisition request user according to;
Determining module, for determining user's correspondence application journey according to the identity information of the user The access right grade of sequence;
Performing module, for the access right grade according to the user, described answering is opened to the user With function corresponding with the access right grade in program, the work(beyond the access right grade is locked Energy.
7. terminal according to claim 6, it is characterised in that the terminal also includes:
Judge module, determines whether the application program needs authentication for enabling request according to;
If need not, the performing module directly initiates the application program;
If desired, then the acquisition module enables the identity information of acquisition request user according to.
8. terminal according to claim 7, it is characterised in that the terminal also includes:
Authentication module, authenticates for the identity information to the user, determines whether the user has There are the access rights of the application program;
If authentication does not pass through, the performing module is returned to the user and re-enters carrying for identity information Show message;
Wherein, if authentication passes through, the determining module is according to the identity information of the user determines The access right grade of user's correspondence application program.
9. terminal according to claim 8, it is characterised in that the judge module, is additionally operable to really Whether the number of times of the fixed user input identity information exceedes pre-determined number;
If exceeding the pre-determined number, the performing module is additionally operable to lock the application program;
If the number of times is returned again not less than the pre-determined number, the performing module to the user The prompting message of identity information is input into, so that the user re-enters identity information.
10. terminal according to claim 6, it is characterised in that the judge module, is additionally operable to:
Judge whether active user performs the operation for installing application program;Application program is such as installed, is then judged Whether this application program has been installed, and has such as installed, then basis has this application program highest access right The mandate of user, directly provides this application program to active user;Otherwise, according to the authority of active user Grade determines whether the download of the application.
CN201510965301.2A 2015-12-21 2015-12-21 The control method and terminal of terminal applies Pending CN106897629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510965301.2A CN106897629A (en) 2015-12-21 2015-12-21 The control method and terminal of terminal applies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510965301.2A CN106897629A (en) 2015-12-21 2015-12-21 The control method and terminal of terminal applies

Publications (1)

Publication Number Publication Date
CN106897629A true CN106897629A (en) 2017-06-27

Family

ID=59191153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510965301.2A Pending CN106897629A (en) 2015-12-21 2015-12-21 The control method and terminal of terminal applies

Country Status (1)

Country Link
CN (1) CN106897629A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815735A (en) * 2019-01-23 2019-05-28 浙江安点科技有限责任公司 To the management-control method and system of different user access same asset file permission
CN109885707A (en) * 2019-02-01 2019-06-14 北京字节跳动网络技术有限公司 The method for refreshing of picture, device, terminal device and storage medium in picture library
WO2019134171A1 (en) * 2018-01-08 2019-07-11 青岛海信电器股份有限公司 Program playback control method and terminal
CN110012354A (en) * 2019-02-22 2019-07-12 广州视源电子科技股份有限公司 Obtain method, system and the television terminal of FVP service agreement
CN110990798A (en) * 2019-12-02 2020-04-10 珠海格力电器股份有限公司 Application program permission configuration method and device, electronic equipment and storage medium
CN112765582A (en) * 2021-01-22 2021-05-07 维沃移动通信(杭州)有限公司 Application program authority management method and device and electronic equipment
CN116934068A (en) * 2023-09-19 2023-10-24 江铃汽车股份有限公司 Office flow node management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102436565A (en) * 2012-01-12 2012-05-02 浪潮(北京)电子信息产业有限公司 Method and device for realizing software user authority management
CN102467642A (en) * 2010-11-17 2012-05-23 北大方正集团有限公司 Permission control method and device for application software
CN104751030A (en) * 2013-12-31 2015-07-01 中国科学院信息工程研究所 User access permission control method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467642A (en) * 2010-11-17 2012-05-23 北大方正集团有限公司 Permission control method and device for application software
CN102436565A (en) * 2012-01-12 2012-05-02 浪潮(北京)电子信息产业有限公司 Method and device for realizing software user authority management
CN104751030A (en) * 2013-12-31 2015-07-01 中国科学院信息工程研究所 User access permission control method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019134171A1 (en) * 2018-01-08 2019-07-11 青岛海信电器股份有限公司 Program playback control method and terminal
CN109815735A (en) * 2019-01-23 2019-05-28 浙江安点科技有限责任公司 To the management-control method and system of different user access same asset file permission
CN109885707A (en) * 2019-02-01 2019-06-14 北京字节跳动网络技术有限公司 The method for refreshing of picture, device, terminal device and storage medium in picture library
CN110012354A (en) * 2019-02-22 2019-07-12 广州视源电子科技股份有限公司 Obtain method, system and the television terminal of FVP service agreement
CN110012354B (en) * 2019-02-22 2021-11-16 广州视源电子科技股份有限公司 Method, system and television terminal for acquiring FVP service protocol
CN110990798A (en) * 2019-12-02 2020-04-10 珠海格力电器股份有限公司 Application program permission configuration method and device, electronic equipment and storage medium
CN110990798B (en) * 2019-12-02 2021-07-20 珠海格力电器股份有限公司 Application program permission configuration method and device, electronic equipment and storage medium
CN112765582A (en) * 2021-01-22 2021-05-07 维沃移动通信(杭州)有限公司 Application program authority management method and device and electronic equipment
CN112765582B (en) * 2021-01-22 2024-05-03 维沃移动通信(杭州)有限公司 Authority management method and device for application program and electronic equipment
CN116934068A (en) * 2023-09-19 2023-10-24 江铃汽车股份有限公司 Office flow node management method and system

Similar Documents

Publication Publication Date Title
CN106897629A (en) The control method and terminal of terminal applies
US11637824B2 (en) Multi-factor authentication devices
CN103686722B (en) Access control method and device
US9942755B2 (en) Enforcing service policies in embedded UICCs
CN104205721B (en) The adaptive authentication method of context aware and device
CN104025539B (en) The method and apparatus for promoting single-sign-on services
CN109815683B (en) Authority verification method and related device
JP6074516B2 (en) Method, apparatus, facility, program and recording medium for adding plug-in to address book
US20150288676A1 (en) Mobile terminal-based automatic logon processing method and system
CN109033857B (en) Method, device and equipment for accessing data and readable storage medium
CN101542497A (en) Extensible bios interface to a preboot authentication module
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN107533596B (en) Fingerprint identification method and mobile terminal
US20140150055A1 (en) Data reference system and application authentication method
CN109829277A (en) Terminal unlock method, device, computer equipment and storage medium
CN103888408A (en) Method for uploading data to social networking platform and device thereof
CN105354459B (en) Information processing method and device and electronic equipment
CN112464214A (en) Authority detection method and device, electronic equipment and readable storage medium
CN105721425A (en) Information processing method and electronic device
KR101808215B1 (en) User authentication method, authentication apparatus, and terminal
CN103873439B (en) The method and electronic equipment of a kind of networking
CN103618767A (en) Virtual machine configuration method and related equipment
CN105760729A (en) Login method and electronic equipment
CN104518871A (en) Network platform and method for performing self-service authentication on mobile storage equipment
CN105871840B (en) A kind of certificate management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170627