CN107341378A - For the method for the access right for setting application - Google Patents

For the method for the access right for setting application Download PDF

Info

Publication number
CN107341378A
CN107341378A CN201710508474.0A CN201710508474A CN107341378A CN 107341378 A CN107341378 A CN 107341378A CN 201710508474 A CN201710508474 A CN 201710508474A CN 107341378 A CN107341378 A CN 107341378A
Authority
CN
China
Prior art keywords
user
application
access right
intelligent terminal
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710508474.0A
Other languages
Chinese (zh)
Inventor
张志勇
王凯丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201710508474.0A priority Critical patent/CN107341378A/en
Publication of CN107341378A publication Critical patent/CN107341378A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

This application discloses a kind of method for being used to set the access right of application, it is related to security technology area, this method includes:Statistics records the identity information of each user there is a possibility that with the user of intelligent terminal;When installing application on intelligent terminal, one or more user that can use the application is selected from the user of statistics;When opening the application, the identity information of user is verified, and is decided whether according to the result to run the application.Compared to prior art, what the application provided is used for the method for the access right of setting application, first collects the information of possible user, and when installation is applied, therefrom selection has the user of access right, has the advantages of simple operation;The user only chosen can run the application, avoid user from contacting inappropriate application, prevent the situation that similar children beat reward main broadcaster.

Description

For the method for the access right for setting application
Technical field
The application is related to security technology area, more particularly to a kind of method for being used to set the access right of application.
Background technology
With the development of the communication technology, intelligent terminal is increasingly popularized, now, almost people of each age group Skillfully using intelligent terminals such as smart mobile phone, tablet personal computers.At the same time, the service that intelligent terminal can provide is increasingly Comprehensively, do not only have the communication related to closing privacy, social interaction server, also relate to the payment of money, play the service such as reward.This is resulted in Minor or people without GL perform inappropriate operation to intelligent terminal, for example, minor utilizes father and mother Mobile phone beat reward main broadcaster, and the amount of money is larger.
Therefore, a kind of can effectively limit using the incorrect method used is needed in the prior art.
The content of the invention
In order to one of solve the above problems, this application provides a kind of method for being used to set the access right of application, bag Include:
Statistics records the identity information of each user there is a possibility that with the user of intelligent terminal;
When installing application on intelligent terminal, can be used by being selected from the user of statistics by one of the application or more Individual user;
When opening the application, the identity information of user is verified, and is decided whether according to the result to run the application.
In the above-mentioned technical solutions, further, the user there is a possibility that with intelligent terminal is counted by following manner:
When user carries out authentication to unlock intelligent terminal, record unlocks successful identity information, and labeled as one Individual user.
In the above-mentioned technical solutions, further, the user there is a possibility that with intelligent terminal is counted by following manner:
The photo in intelligent terminal is gathered, using image recognition technology, selects figure information therein;
Using image polymerization technique, the photo of same people is condensed together and forms one group, labeled as a user.
In the above-mentioned technical solutions, further, the identity information of user is verified by following manner:
The face-image of user is gathered, extracts the characteristic point of face-image, and is compared with all groups of photo, is entered And determine whether the user has access right.
In the above-mentioned technical solutions, further, gather the iris information of user, and with the rainbow in all groups of photo Film information is compared, and then determines whether the user has access right.
In the above-mentioned technical solutions, further, white name is set there is a possibility that after user with intelligent terminal in statistics It is single;One or more users are selected to add white lists, the user in white list can use all applications.
In the above-mentioned technical solutions, further, black name is set there is a possibility that after user with intelligent terminal in statistics It is single;One or more users are selected to add blacklists, the user in blacklist can not use any application.
In the above-mentioned technical solutions, further, a label is generated to the user of each statistics, applied in installation When, there is provided label selects for user.When installing new opplication, the label that system can refer to similar application selects, for the new of installation Using recommendation corresponding label.
In the above-mentioned technical solutions, further, the similar application is that applicating category is identical, it is identical or suitable to be applicable the age It is identical with sex.
In the above-mentioned technical solutions, further, for each user, all applications that it can be used are placed on In one virtual group;After authentication is carried out, the application in virtual group corresponding to the user is only shown.
Compared to prior art, what the application provided is used for the method for the access right of setting application, first collects possible The information of user, when installing application, therefrom user of the selection with access right, has the advantages of simple operation;Only The user chosen can run the application, avoid user from contacting inappropriate application, prevent similar children and beat reward main broadcaster's Situation.
The additional aspect and advantage of the application will become obvious in following description section, or the practice for passing through the application Recognize.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the application embodiment or technical scheme of the prior art The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below Accompanying drawing is some embodiments of the application, for those of ordinary skill in the art, before creative work is not paid Put, other accompanying drawings can also be obtained according to these accompanying drawings.
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of accompanying drawing reference implementation example, In the drawings, same digital number indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram of the electronic functionalities configuration shown in Fig. 1.
Fig. 3 is the exemplary of the method for the access right for being used for setting application provided according to some embodiments of the present application Flow chart.
Embodiment
Description below with reference to accompanying drawing is had the right the application defined in requirement and its equivalent for ease of Integrated Understanding Various embodiments.These embodiments include various specific details in order to understand, but these be considered only as it is exemplary.Cause This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described here The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure Description.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that, there is provided to the various implementations of the application The description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the accompanying drawing in the application some embodiments, the technical scheme in the embodiment of the present application is carried out clear Chu, it is fully described by, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments. Based on the embodiment in the application, those of ordinary skill in the art are obtained all under the premise of creative work is not made Other embodiment, belong to the scope of the application protection.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment , and it is not intended to be limiting the application." one " of singulative used in the embodiment of the present application and appended claims, "one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other implications.Also It should be appreciated that term "and/or" used herein refer to and list items purposes comprising one or more mutually bindings it is any or It is possible to combine.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without examining Worry order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone, PC (PC, such as tablet personal computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device And one or more of combinations in wearable device etc. (VR).According to some embodiments of the present application, the wearable device Including type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics clothes Dress), decorated type (such as pad skin, tatoo or built in electronic device) etc. in one or more of combinations.The application's In some embodiments, the electronic equipment can be flexible, be not limited to the said equipment, or can be in above-mentioned various equipment One or more of combinations.In this application, term " user " may indicate that using the people of electronic equipment or using electronic equipment Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of method for being used to set the access right of application.For the ease of understanding the application Embodiment, the embodiment of the present application is described in detail below with reference to accompanying drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1 Shown, Environment System 100 can include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics Key 117 etc..In some embodiments of the present application, electronic equipment 110 can omit one or more elements, or can enter one Step includes one or more other elements.
Bus 111 can include circuit.The circuit can be with one or more element (examples in interconnection electronics 110 Such as, bus 111, processor 112, memory 113, input/output module 114, display 115 and communication module 116).It is described Circuit can also realize communication (for example, obtaining and/or sending number between one or more elements in electronic equipment 110 According to).
Processor 112 can include one or more coprocessors (Co-processor), application processor (AP, Application Processor) and communication processor (Communication Processor).As an example, processor 112 can perform the control and/or data processing with one or more elements of electronic equipment 110.For example, processor 12 can be with Associated rights are set, and identifying procedure can be started, to judge whether user possesses authority.
Memory 113 can be with data storage.The data can include other with one or more of electronic equipment 110 The related instruction of element or data.For example, the data can include the initial data of the before processing of processor 112, intermediate data And/or the data after processing.Specifically, memory 113 can store photo, image, iris information etc..Memory 113 can With including impermanent memory memory and/or permanent memory memory.
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap Include kernel, middleware, API (API, Application Programming Interface) and/or using journey Sequence.At least a portion of the kernel, the middleware or the API can include operating system (OS, Operating System).As an example, the kernel can be controlled or managed for performing other programs (for example, middle Part, API and application program) in realize operation or function system resource (for example, bus 111, processor 112nd, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, it is described should One or more elements of electronic equipment 110 are accessed with DLL or the application program to control or management system resource.
The middleware can be as the intermediate layer of data transfer.The data transfer can allow API or Application program is with the kernel communication exchanging data.As an example, the middleware can be handled from the application program One or more task requests of acquisition.For example, the middleware can be to one or more application assigned electronic equipments The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or Multiple tasks are asked.The API can be that the application program is used to control from the kernel or the middleware The interface of function is provided.The API can also include one or more interfaces or function.The function can be used In security control, Control on Communication, document control, window control, text control, image procossing, signal transacting etc..
Input/output module 114 can send what is inputted from user or external equipment to the other elements of electronic equipment 110 Instruction or data.Input/output module 114 can also be defeated by the instruction of the other elements acquisition from electronic equipment 110 or data Go out to user or external equipment.
Display 115 can be with display content.The content can to user show all kinds (for example, text, image, Video, icon and/or symbol).Display 115 can include liquid crystal display (LCD, Liquid Crystal Display), Light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode (OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro Mechanical Systems) display Device or electric paper display etc., or several combinations.Display 115 can include touch-screen.In certain embodiments, display 115 can show virtual key.The touch-screen can obtain the input of the virtual key.Display 115 can be touched by described Touch screen and obtain input.The input can include touch input, gesture input, action input, close input, electronic pen or user The input (for example, hovering input) of body part.In certain embodiments, display 115 can show application icon.
Communication module 116 can configure the communication between equipment.In certain embodiments, network environment 100 can enter one Step includes electronic equipment 140.As an example, the communication between the equipment can include electronic equipment 110 and other equipment (example Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can pass through radio communication or cable modem Letter is connected to network 120, realizes and communicates with other equipment (for example, server 130 or electronic equipment 140).
The radio communication can include microwave communication and/or satellite communication etc..The radio communication can include honeycomb Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA (CDMA, Code Division Multiple Access), 3G (Third Generation) Moblie (3G, The 3rd Generation Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE, Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), WCDMA (WCDMA, Wideband Code Division Multiple Access), UMTS (UMTS, Universal Mobile Telecommunications System), WiMAX (WiBro, Wireless Broadband) etc., or several combinations.According to some embodiments of the present application, the radio communication can include wireless local Net (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol (ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN, Body Area Network) etc., or several combinations.According to some embodiments of the present application, the wire communication can include GLONASS (Glonass/GNSS, Global Navigation Satellite System), global positioning system System (GPS, Global Position System), Beidou navigation satellite system or Galileo (European GPS) Deng.The wire communication can include USB (USB, Universal Serial Bus), high-definition media interface (HDMI, High-Definition Multimedia Interface), proposed standard 232 (RS-232, Recommend Standard 232), and/or plain old telephone service (POTS, Plain Old Telephone Service) etc. in one Kind, or several combinations.
Secondary or physical bond 117 can be used for user mutual.Secondary or physical bond 117 can include one or more entity keys.In some realities Apply in example, user can be with the function of self-defined secondary or physical bond 117.As an example, secondary or physical bond 117 can be used for starting authentication procedure.
Network 120 can include communication network.The communication network can include computer network (for example, LAN (LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone network Deng, or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes Business device 130, electronic equipment 140 etc.) send information.Described information can include the pattern template of cue mark and control panel Deng.
Server 130 can be by the other equipment in the connection Environment System 100 of network 120 (for example, electronic equipment 110th, electronic equipment 140 etc.).
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application, The part or all of operation performed in electronic equipment 110 can be in another equipment or multiple equipment (for example, electronic equipment 140 And/or server 130) in perform.In certain embodiments, when electronic equipment 110 be automatically or in response to request perform it is a kind of or When multiple functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server 130) perform function and/or service are substituted.In certain embodiments, electronic equipment 110 is in addition to perform function or service, further Perform relative one or more functions.In certain embodiments, other equipment is (for example, electronic equipment 140 and/or clothes Business device 130) asked function or other related one or more functions can be performed, implementing result can be sent to electricity Sub- equipment 110.Electronic equipment 110 can repeat result or further handle implementing result, to provide asked function Or service.As an example, electronic equipment 110 can use cloud computing, distributed computing technology and/or client-server end to calculate meter Calculate etc., or several combinations.
It should be noted that the description for Environment System 100 above, only for convenience of description, can not be this Shen It please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system can Each element can be combined on the premise of without departing substantially from the principle, or forms subsystem and be connected with other elements, To implementing the various modifications and variations on the above method and systematic difference field progress form and details.For example, network environment System 100 may further include database.Such deformation, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram that the electronic functionalities provided according to some embodiments of the present application configure.Such as Shown in Fig. 2, processor 112 can include processing module 200, and the processing module 200 can include acquiring unit 210, analysis Unit 220, control unit 230.
According to some embodiments of the present application, acquiring unit 210 can obtain information.Described information can include but unlimited In word, picture, audio, video, action, gesture etc., or several combinations.In certain embodiments, acquiring unit 210 can be with Input information is obtained by input/output module 114, the touch-screen of display 115 and/or secondary or physical bond 117.As an example, obtain Unit 210 is taken to obtain the information of the memory storage of memory 113, such as photo, image etc..As an example, acquiring unit 210 can To obtain the input information of electronic equipment 110.It is described input information can include key-press input, touch-control input, gesture input, move Input, remote input, transmission input etc., or several combination.Specifically, inputting information can include that user can be represented The information such as the fingerprint of identity, iris, facial characteristics.
In certain embodiments, acquiring unit 210 may further include sensor, and acquiring unit 210 can pass through institute State sensor and obtain information, for example, obtaining trigger signal by the sensor.The sensor can include but is not limited to light Dependent sensor, acoustic sensor, gas sensor, chemical sensor, voltage sensitive sensor, temp-sensitive sensor, fluid sensor, life Thing sensor, laser sensor, Hall sensor, intelligence sensor etc., or several combinations.
In certain embodiments, acquiring unit 210 may further include image acquisition unit, such as iris camera, RGB Camera, Momo cameras etc..
According to some embodiments of the present application, information that analytic unit 220 can at least obtain to acquiring unit 210 and The information stored in electronic equipment is analyzed.In certain embodiments, analytic unit 220 can carry out pattern analysis, from each Figure information is identified in kind image;And facial characteristics or iris feature in figure information can be analyzed.In some implementations In example, analytic unit 220 has identification verification function, can analyze the subscriber identity information of the acquisition of acquiring unit 210, to judge Judge whether user possesses associated rights.
According to some embodiments of the present application, control unit 230 can be with control electronics.The control electronics can To perform action including control electronics 110.In certain embodiments, control unit 230 is according to the analysis of analytic unit 220 As a result, carry out control electronics 110 and perform action.For example, the user identity letter that analytic unit 220 obtains to acquiring unit 210 Breath is analyzed, that is, starts identifying procedure, if the analysis result of analytic unit 210 is controlled to judge that user possesses authority Unit 230 processed starts the program application of correlation;Conversely, then not perform startup program application.
It should be noted that described above for the unit in processing module 200, only for convenience of description, can not be this Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, Unit may be combined on the premise of without departing substantially from the principle, or form submodule and connect with other units Connect, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned module and unit.For example, electronic equipment 110 may further include sensor etc., and acquiring unit 210 can obtain information by sensor.In another example processing unit 220 may further include division subelement etc..Such deformation, within the protection domain of the application.
Fig. 3 is the exemplary of the method for the access right for being used for setting application provided according to some embodiments of the present application Flow chart.As shown in figure 3, flow 300 can be realized by processing module 200.
In the step 310, statistics is there is a possibility that with the user of intelligent terminal, and records the identity letter of each user Breath.User or potential user are counted, and obtain the relevant information for being capable of representative capacity respectively, herein Identity information can be the information such as facial characteristics, iris feature, fingerprint, sound, password.
In some embodiments of the present application, the user there is a possibility that with intelligent terminal is counted by following manner:With Family is when carrying out the verification modes such as face recognition, fingerprint recognition, iris recognition unblock mobile phone, the above-mentioned identity information for being used to unlock It can be recorded, and be labeled as a user.
In some embodiments of the present application, the user there is a possibility that with intelligent terminal is counted by following manner:
The photo in intelligent terminal is gathered, using image recognition technology, selects figure information therein;
Using image polymerization technique, the photo of same people is condensed together and forms one group, labeled as a user;And The characteristic information of user is extracted as standard identity information.
Using the photo of the photo stored in intelligent terminal or collection in worksite as resources bank, occur repeatedly in resources bank Personage, i.e., associated with the owner of intelligent terminal stronger, it is more likely that be the possibility user of intelligent terminal.Therefore, this is utilized Method more can comprehensively count possible user.
It should be noted that although the people not associated statistics is user there may be erroneous judgement by this method, During the authority of follow-up setting application, above-mentioned people is not selected, does not interfere with the realization of function.
In step 320, when installing application on intelligent terminal, the application can be used by being selected from the user of statistics One or more user.
In the prior art, when being set using authority, authority setting program is being introduced into for application, then typing has permission User identity information, for each installation application be both needed to repeat said process, operation it is relatively complicated.
And the method for the access right for the setting application that the application provides, using the information for first collecting possible user, Install apply when, the method that selects corresponding user, because for a station terminal equipment, the quantity of user is remote Less than the quantity of application, therefore, this method is more convenient.
In certain embodiments, a label is generated to the user of each statistics, when installing application, there is provided label supplies User selects.The marking users in a manner of selection, it can avoid inputting user's name, operation is more convenient, and Consumer's Experience is more It is good.
In addition, when installing new opplication, the label that system can refer to similar application selects, for the new opplication recommendation pair of installation Answer label.Herein, the similar application is that applicating category is identical, being applicable the age, identical or applicable sex is identical.
It can further improve the convenience of label setting.It is also possible to provide to automatically enter, the mode of manual modification.
In certain embodiments, white list is set there is a possibility that after user with intelligent terminal in statistics;Selection one Or multiple users add white lists, the user in white list can use all applications.
In addition, blacklist is set there is a possibility that after user with intelligent terminal in statistics;Selection is one or more to be used Person adds blacklist, and the user in blacklist can not use any application.
By the setting of blacklist and white list, the method for priority assignation can be further enriched, disclosure satisfy that client The demand of property;Also the inaccuracy of statistics user's information can be made up.
In a step 330, when opening the application, the identity information of user is verified, and be according to the result decision No operation application.
The identity information of user is verified by following manner:
The face-image of user is gathered, extracts the characteristic value of face-image as identity information to be detected;Counting During user, the face feature information in photo is extracted as standard identity information;By identity information to be detected with it is all Standard identity information is contrasted, and then verifies the identity of user, determines its authority.
Certainly, this be only the application some specific embodiments, the application verify user's identity information method not This is confined to, for example, in the other embodiment of the application, the iris information for gathering user is believed as identity to be detected Breath;When counting user, the iris information in photo is extracted as standard identity information;And with the rainbow in all groups of photo Film information is compared, and then determines whether the user has access right.
In certain embodiments, for each user, all applications that it can be used are placed in a virtual group; After authentication is carried out, the application in virtual group corresponding to the user is only shown.
By distinctly displaying, user can only see the application for oneself having permission opening, save invalid operation.
In summary, the method for being used to set the access right of application that the application provides, first collects possible user Information, install apply when, therefrom selection with access right user, the user only chosen can run should answer With avoiding user from contacting inappropriate application, prevent similar children and beat the situation for appreciating main broadcaster.Compared to similar technique, have The advantages of simple operation.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Other identical element also be present in process, method, article or equipment including the key element.
Finally, it is to be noted that, a series of above-mentioned processing are not only included with order described here in temporal sequence The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with To be completed by the related hardware of computer program instructions, described program can be stored in a computer-readable recording medium, The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, CD, read-only storage (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) Deng.
Above disclosed is only some preferred embodiments of the application, it is impossible to the right model of the application is limited with this Enclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to the application right Made equivalent variations are sought, still falls within and invents covered scope.

Claims (10)

  1. A kind of 1. method for being used to set the access right of application, it is characterised in that including:
    Statistics records the identity information of each user there is a possibility that with the user of intelligent terminal;
    When installing application on intelligent terminal, being selected from the user of statistics can be made using one or more of the application User;
    When opening the application, the identity information of user is verified, and is decided whether according to the result to run the application.
  2. 2. the method according to claim 1 for being used to set the access right of application, it is characterised in that pass through following manner Count the user there is a possibility that with intelligent terminal:
    When user carries out authentication to unlock intelligent terminal, record unlocks successful identity information, and makes labeled as one User.
  3. 3. the method according to claim 1 for being used to set the access right of application, it is characterised in that pass through following manner Count the user there is a possibility that with intelligent terminal:
    The photo in intelligent terminal is gathered, using image recognition technology, selects figure information therein;
    Using image polymerization technique, the photo of same people is condensed together and forms one group, labeled as a user.
  4. 4. the method according to claim 3 for being used to set the access right of application, it is characterised in that pass through following manner Verify the identity information of user:
    The face-image of user is gathered, extracts the characteristic point of face-image, and is compared with all groups of photo, and then really Whether the fixed user has access right.
  5. 5. the method according to claim 3 for being used to set the access right of application, it is characterised in that gather user's Iris information, and be compared with the iris information in all groups of photo, and then determine whether the user has access right.
  6. 6. the method according to claim 1 for being used to set the access right of application, it is characterised in that be possible in statistics After the user of intelligent terminal, white list is set;Select one or more users to add white lists, make in white list User can use all applications.
  7. 7. the method for being used to set the access right of application according to claim 1 or 5, it is characterised in that have in statistics After the user that intelligent terminal may be used, blacklist is set;One or more users are selected to add blacklists, in blacklist User can not use any application.
  8. 8. the method according to claim 1 for being used to set the access right of application, it is characterised in that to each statistics User generates a label, when installing application, there is provided label selects for user;When installing new opplication, system can refer to The label selection of similar application, recommend corresponding label for the new opplication of installation.
  9. 9. the method according to claim 8 for being used to set the access right of application, it is characterised in that the similar application For applicating category it is identical, be applicable that the age is identical or applicable sex is identical.
  10. 10. the method according to claim 1 for being used to set the access right of application, it is characterised in that for each User, all applications that it can be used are placed in a virtual group;After authentication is carried out, the user is only shown Application in corresponding virtual group.
CN201710508474.0A 2017-06-28 2017-06-28 For the method for the access right for setting application Pending CN107341378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710508474.0A CN107341378A (en) 2017-06-28 2017-06-28 For the method for the access right for setting application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710508474.0A CN107341378A (en) 2017-06-28 2017-06-28 For the method for the access right for setting application

Publications (1)

Publication Number Publication Date
CN107341378A true CN107341378A (en) 2017-11-10

Family

ID=60220202

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710508474.0A Pending CN107341378A (en) 2017-06-28 2017-06-28 For the method for the access right for setting application

Country Status (1)

Country Link
CN (1) CN107341378A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992733A (en) * 2017-12-13 2018-05-04 王东红 A kind of intelligent terminal and its safe unlocking method
CN108509783A (en) * 2018-04-09 2018-09-07 陈静 A kind of intelligent terminal application management system
CN109408087A (en) * 2018-10-08 2019-03-01 宁波大学 A kind of mobile intelligent terminal registration center upgrade method
CN110908728A (en) * 2018-09-15 2020-03-24 Oppo广东移动通信有限公司 Authority configuration method and related product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402364A (en) * 2010-09-10 2012-04-04 北京创新方舟科技有限公司 Method and device for scheduling application according to touch screen operation of user
CN103560883A (en) * 2013-10-30 2014-02-05 南京邮电大学 Safety identification method, between android application programs, based on user right
CN103973503A (en) * 2014-05-29 2014-08-06 北京中电普华信息技术有限公司 Method and system for controlling mobile application permission
CN105933327A (en) * 2016-06-08 2016-09-07 北京奇虎科技有限公司 Application unlocking method, device and facility
CN106557679A (en) * 2016-11-25 2017-04-05 北京小米移动软件有限公司 Terminal control method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402364A (en) * 2010-09-10 2012-04-04 北京创新方舟科技有限公司 Method and device for scheduling application according to touch screen operation of user
CN103560883A (en) * 2013-10-30 2014-02-05 南京邮电大学 Safety identification method, between android application programs, based on user right
CN103973503A (en) * 2014-05-29 2014-08-06 北京中电普华信息技术有限公司 Method and system for controlling mobile application permission
CN105933327A (en) * 2016-06-08 2016-09-07 北京奇虎科技有限公司 Application unlocking method, device and facility
CN106557679A (en) * 2016-11-25 2017-04-05 北京小米移动软件有限公司 Terminal control method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992733A (en) * 2017-12-13 2018-05-04 王东红 A kind of intelligent terminal and its safe unlocking method
CN107992733B (en) * 2017-12-13 2021-04-02 广西邕城云科技有限公司 Intelligent terminal and safety unlocking method thereof
CN108509783A (en) * 2018-04-09 2018-09-07 陈静 A kind of intelligent terminal application management system
CN110908728A (en) * 2018-09-15 2020-03-24 Oppo广东移动通信有限公司 Authority configuration method and related product
CN110908728B (en) * 2018-09-15 2021-04-09 Oppo广东移动通信有限公司 Authority configuration method and related product
CN109408087A (en) * 2018-10-08 2019-03-01 宁波大学 A kind of mobile intelligent terminal registration center upgrade method
CN109408087B (en) * 2018-10-08 2021-10-26 宁波大学 Mobile intelligent terminal registration center upgrading method

Similar Documents

Publication Publication Date Title
CN107609914A (en) A kind of intelligent menu design method and system
CN107425579A (en) A kind of intelligent charging method and system
CN107341378A (en) For the method for the access right for setting application
CN107704849A (en) The face identification method and system of double verification function
CN109472122A (en) A kind of multimedia messages reminding method and system
CN109492412A (en) The encryption storage method and system of file
CN107315681A (en) Application program self-starting test system, medium and method
CN107358179A (en) A kind of living management system, medium and method based on iris verification
CN107256353A (en) Possesses the display methods of privacy protection function
CN108040167A (en) The method that limiting terminal uses
CN108009140A (en) A kind of end message edit methods and system
CN107862518A (en) A kind of method of payment and system based on terminal location
CN107506721A (en) A kind of more method for collecting iris and system
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN107590276A (en) A kind of article map-indication method and system
CN107368793A (en) A kind of colored method for collecting iris and system
CN109379431A (en) A kind of contact person information updating method, cloud server and terminal
CN107944245A (en) A kind of eyeball tracking iris unlocking method and system
CN206908680U (en) Intelligent terminal with secure log function
CN108010519A (en) A kind of information search method and system
CN107623736A (en) A kind of equipment connection method and system
CN108897479A (en) A kind of terminal touch control method and system
CN107592398A (en) A kind of intelligent information storage method and system
CN108428455A (en) The acquisition method and system of vocal print feature
CN107704843A (en) A kind of simple eye iris verification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171110

WD01 Invention patent application deemed withdrawn after publication