CN108712561A - Right management method, device, mobile terminal and storage medium - Google Patents
Right management method, device, mobile terminal and storage medium Download PDFInfo
- Publication number
- CN108712561A CN108712561A CN201810349295.1A CN201810349295A CN108712561A CN 108712561 A CN108712561 A CN 108712561A CN 201810349295 A CN201810349295 A CN 201810349295A CN 108712561 A CN108712561 A CN 108712561A
- Authority
- CN
- China
- Prior art keywords
- permission
- target
- levels
- corresponding operation
- predetermined level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The embodiment of the present application discloses a kind of right management method, device, mobile terminal and storage medium, is related to technical field of mobile terminals.The method includes:After the equipment management permission of application is activated, monitor the acquisition request of the equipment management permission, when listening to the request of the acquisition to target permission, obtain the Permission Levels of the target permission, and judge whether the Permission Levels are higher than predetermined level, wherein, the target permission is the permission in equipment management permission, when Permission Levels are higher than predetermined level, display whether the prompt message for allowing the corresponding operation of performance objective permission, when receive instruction allow to execute the instruction of the target permission when, run the corresponding operation of target permission.Right management method, device, mobile terminal and storage medium provided by the embodiments of the present application avoid rogue program from directly using equipment management permission, lifting system performance and stability to increase prompt message according to Permission Levels.
Description
Technical field
This application involves technical field of mobile terminals, eventually more particularly, to a kind of right management method, device, movement
End and storage medium.
Background technology
Mobile terminal, such as mobile phone have become one of most common consumer electronic product in people's daily life.And
And user often installs various third-party applications, and these third-party applications often guide user by various modes
The equipment manager function of opening mobile terminal, is unfavorable for the operating experience of user and the safety of mobile terminal.
Invention content
In view of the above problems, present applicant proposes a kind of right management method, device, mobile terminal and storage medium,
To increase prompt message according to Permission Levels, rogue program is avoided directly to use equipment management permission, lifting system performance and steady
It is qualitative.
In a first aspect, the embodiment of the present application provides a kind of right management method, the method includes:In the equipment of application
After administration authority is activated, the acquisition request of the equipment management permission is monitored;It is asked when listening to the acquisition to target permission
When, the Permission Levels of the target permission are obtained, and judge whether the Permission Levels are higher than predetermined level, wherein the mesh
It is the permission in the equipment management permission to mark permission;When the Permission Levels are higher than the predetermined level, display whether to permit
Perhaps the prompt message of the corresponding operation of the target permission is executed;Allow the instruction for executing the target permission when receiving instruction
When, run the corresponding operation of the target permission.
Second aspect, the embodiment of the present application provide a kind of rights management device, and described device includes:It monitors and starts mould
Block, the acquisition for after the equipment management permission of application is activated, monitoring the equipment management permission are asked;Permission Levels are sentenced
Disconnected module, for when monitoring the acquisition request to target permission, obtaining the Permission Levels of the target permission, and described in judgement
Whether Permission Levels are higher than predetermined level, wherein the target permission is the permission in the equipment management permission;Prompt message
Display module, for when the Permission Levels are higher than the predetermined level, displaying whether to allow to execute the target permission pair
The prompt message for the operation answered;Limiting operation runs module, for working as the finger for receiving and indicating to allow to execute the target permission
When enabling, the corresponding operation of the target permission is run.
The third aspect, the embodiment of the present application provide a kind of mobile terminal, including touch screen, memory and processor,
The touch screen is couple to the processor, the memory store instruction, when described instruction is by described with the memory
It manages processor when device executes and executes the above method.
Fourth aspect, the embodiment of the present application provide it is a kind of with processor can perform program code it is computer-readable
Take storage medium, said program code that the processor is made to execute the above method.
A kind of right management method, device, mobile terminal and storage medium provided by the embodiments of the present application, in application
After equipment management permission is activated, the acquisition request of the equipment management permission is monitored, the acquisition of target permission is asked when listening to
When asking, the Permission Levels of the target permission are obtained, and judge whether the Permission Levels are higher than predetermined level, wherein the target is weighed
The permission being limited in equipment management permission displays whether to allow performance objective permission pair when Permission Levels are higher than predetermined level
The prompt message for the operation answered, when receive instruction allow to execute the instruction of the target permission when, run the target permission correspondence
Operation, with according to Permission Levels increase prompt message, avoid rogue program directly use equipment management permission, lifting system
Energy and stability.
These aspects or other aspects of the application can more straightforward in the following description.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present application, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 shows the flow diagram for the right management method that the application first embodiment provides;
Fig. 2 shows a kind of display schematic diagrams of mobile terminal provided by the embodiments of the present application;
Fig. 3 shows the flow diagram for the right management method that the application second embodiment provides;
Fig. 4 shows another display schematic diagram of mobile terminal provided by the embodiments of the present application;
Fig. 5 shows a kind of module frame chart for the rights management device that the application 3rd embodiment provides;
Fig. 6 shows another module frame chart for the rights management device that the application 3rd embodiment provides;
Fig. 7 shows a kind of structural schematic diagram of mobile terminal provided by the embodiments of the present application;
Fig. 8 shows the block diagram of the mobile terminal for executing the right management method according to the embodiment of the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, those of ordinary skill in the art are obtained all other without creative efforts
Embodiment shall fall in the protection scope of this application.
Currently, intelligence system has been the maximum mobile terminal operating system platform of user group, mobile terminal is to be permitted at present
The most frequently used most important electronic equipment of multi-user, user often install various third-party applications, and these third-party applications
Often compare rogue, guiding user can open equipment manager function by various modes, user may not know what is
Equipment manager will be guided to open equipment manager.Wherein, by the equipment manager function of Android, using can be with
The application permission of take over mobile terminal makes critically important many operations courageously, dangerous, permission is high to mobile terminal, such as
Remove all data, change screen-lock password, setting password rule, monitor screen unlock number of attempt, lock-screen, setting equipment
The part work(that overall situation agency, the term of validity of setting screen-lock password, setting storage device encrypt, deactivate camera, deactivating screen locking
The operations such as energy, are unfavorable for the operating experience and safety of user.In view of the above-mentioned problems, inventor is by studying and proposing for a long time
Right management method, device, mobile terminal and storage medium provided by the embodiments of the present application, carry according to Permission Levels increase
Show information, rogue program is avoided directly to use equipment management permission, lifting system performance and stability.Wherein, specific permission
Management method is described in detail in subsequent embodiment.
First embodiment
Referring to Fig. 1, Fig. 1 shows the flow diagram for the right management method that the application first embodiment provides.Institute
It states right management method to be used to increase prompt message according to Permission Levels, rogue program is avoided directly to use equipment management permission,
Lifting system performance and stability.In the particular embodiment, the right management method is applied to permission pipe as shown in Figure 5
Manage device 200 and the mobile terminal (Fig. 7) configured with the rights management device 200.It will be said by taking mobile terminal as an example below
The detailed process of bright the present embodiment, it will of course be understood that, the mobile terminal that the present embodiment is applied can be smart mobile phone,
Tablet computer, wearable electronic equipment etc. do not do specific restriction herein.Flow shown in FIG. 1 will be directed to below to carry out in detail
Elaboration, shown right management method can specifically include following steps:
Step S110:After the equipment management permission of application is activated, the acquisition request of the equipment management permission is monitored.
Wherein, Android SDK provide an Application Programming Interface (Application that can manage operation equipment
Programming Interface, API) it is DevicePolicyManager (equipment manager management class), pass through this API
Using can take over mobile terminal application permission, to mobile terminal make it is critically important and it is many courageously, dangerous, permission is high
Operation, such as remove all data, change screen-lock password, setting password rule, monitor screen unlock number of attempt, locking screen
Curtain, the setting equipment overall situation are acted on behalf of, the term of validity of setting screen-lock password, setting storage device are encrypted, are deactivated camera, deactivated screen lock
The operations such as fixed partial function.
Further, application can use DevicePolicyManager classes to system registry, be become mobile terminal
Equipment manager, specifically, using DevicePolicyManager classes application after mounting, in the setting-of mobile terminal
Other setting-security and privacy-equipment manager interfaces will show that in lists showing to be activated when the application becomes
The application of the equipment manager of mobile terminal.It can show which equipment the application has applied at activation interface as a kind of mode
Administration authority and correspondence show activator button, when mobile terminal receives the command information of instruction triggering activator button,
It then responds the command information and activates the application, wherein the command information can be that mobile terminal is detecting that user singly hit by indication
It generates, can be generated when detecting that user gives more directions and hits activator button when activator button, being swashed detecting user's pressing
It generates, can also be generated when detecting that user presses activator button preset duration when button living, do not do specific restriction herein.
It should be understood that after the equipment management permission of application is activated, which can use shown equipment
Administration authority is activated correspondingly, being previously provided with monitoring starting module in mobile terminal in the equipment management permission of application
Afterwards, which starts and monitors the acquisition request of the equipment management permission.As a kind of mode, which starts mould
Block can monitor the acquisition request of the equipment management permission in real time, can also be spaced preset duration (such as 3s) and monitor the equipment management
The acquisition of permission is asked, and does not do specific restriction herein.In the present embodiment, after the equipment management permission of application is activated,
When being intended to use a certain item limiting operation in the permission being activated, the acquisition which can send this permission is asked to mobile whole
The system at end, then the system of the mobile terminal can listen to the application transmission acquisition request.
Step S120:When listening to the request of the acquisition to target permission, the Permission Levels of the target permission are obtained, and
Judge whether the Permission Levels are higher than predetermined level, wherein the target permission is the permission in the equipment management permission.
In the present embodiment, the target permission is the permission in equipment management permission, for example, the target permission can be
Remove all data, change screen-lock password, setting password rule, monitor screen unlock number of attempt, lock-screen, setting equipment
Overall situation agency, the term of validity of setting screen-lock password, setting storage device encrypt, deactivate camera or deactivated screen locking etc.,
This does not do specific restriction.Further, when the monitoring starting module of mobile terminal is listened to using the acquisition to target permission
When request, characterizes the application and be intended to use the corresponding limiting operation of target permission, then the acquisition for mobile terminal target permission
Permission Levels.
As a kind of mode, the grade of the permission in the equipment management permission can be divided by A, B, C, wherein A
It indicates that high-grade permission, B indicate that middle grade permission, C indicate inferior grade permission, such as removes all data, change screen-lock password
Etc. corresponding As grade, call camera correspond to C grades.It should be understood that when listening to the request of the acquisition to target permission, it is right
The grade that the target permission should be searched in A, B, C, to identify the grade of the target permission.Alternatively, described to set
The grade of permission in standby administration authority can be divided by fractional value, wherein the higher grade for indicating the permission of fractional value
Higher, such as remove that all data are 98 points, change screen-lock password is 95 points, it is 75 to grade to call camera, it is possible to understand that,
When listening to the request of the acquisition to target permission, the corresponding fractional value for obtaining the target permission, to identify the target permission
Grade.
Further, the mobile terminal pre-sets and is stored with predetermined level, and the predetermined level is used to be used as institute
The basis for estimation for stating the grade of target permission, as a kind of mode, when the permission in the equipment management permission grade by A,
B, when C is divided, which can be B grades, at this point, judge whether the grade of the target permission is higher than B grades,
When the grade of the target permission is higher than B grades, the grade for characterizing the target permission is met the requirements, when the target permission
Grade be not higher than B grades when, the grade for characterizing the target permission is unsatisfactory for requiring.Alternatively, it is set when described
The grade of permission in standby administration authority is divided by fractional value, which can be 85 points, at this point, judging the mesh
Mark permission fractional value whether be higher than 85 points, when the target permission fractional value be higher than 85 timesharing, characterize the target permission
Grade meet the requirements, when the fractional value of the target permission is not higher than 85 timesharing, the grade for characterizing the target permission is discontented
Foot requires.
Step S130:When the Permission Levels are higher than the predetermined level, display whether to allow to execute the target power
Limit the prompt message of corresponding operation.
Referring to Fig. 2, in the present embodiment, when the grade of the permission is higher than the predetermined level, then mobile terminal
Display reminding information, wherein the prompt message is for prompting the user whether to allow to execute the corresponding operation of target permission, specifically
Ground, the prompt message can be that "Yes" and "No" characterize the touch control operation when detecting that user is directed to the touch control operation of "Yes"
Allow to execute the corresponding operation of the target permission for instruction, when detecting that user is directed to the touch control operation of "No", characterization should
Touch control operation, which is instruction, not to be allowed to execute the corresponding operation of the target permission.
It can display whether to permit in the form of playing frame when the acquisition for listening to target permission is asked as a kind of mode
Perhaps it executes the prompt message of the corresponding operation of target permission, can display whether to allow to execute target power in the form of card
The prompt message of corresponding operation is limited, can also display whether to allow to execute the corresponding operation of target permission in the form of suspension
Prompt message, do not do specific restriction herein.It should be understood that pop-up is shown, card is shown or the display that suspends, and obtain
After getting the selection of user, it is further continued for executing subsequent step.
Step S140:When receive instruction allow to execute the instruction of the target permission when, run the target permission pair
The operation answered.
As a kind of mode, when receiving instruction and allowing to execute the instruction of the target permission, then instruction fortune is responded
The corresponding operation of the row target permission, so as to increase prompt message according to Permission Levels, and in the premise for allowing to execute
Lower operation corresponding operation of target permission avoids rogue program from directly using equipment management permission, lifting system performance and steady
It is qualitative.
The right management method that the application first embodiment provides is monitored after the equipment management permission of application is activated
The acquisition of the equipment management permission is asked, and when listening to the request of the acquisition to target permission, obtains the permission of the target permission
Grade, and judge whether the Permission Levels are higher than predetermined level, wherein the target permission is the permission in equipment management permission,
When Permission Levels are higher than predetermined level, display whether the prompt message for allowing the corresponding operation of performance objective permission, work as reception
When allowing to execute the instruction of the target permission to instruction, the corresponding operation of target permission is run, to increase according to Permission Levels
Prompt message avoids rogue program from directly using equipment management permission, lifting system performance and stability.
Second embodiment
Referring to Fig. 3, Fig. 3 shows the flow diagram for the right management method that the application second embodiment provides.Under
Face will be explained in detail for flow shown in Fig. 3, and the method can specifically include following steps:
Step S210:After the equipment management permission of application is activated, the acquisition request of the equipment management permission is monitored.
Step S220:When listening to the request of the acquisition to the target permission, lookup includes the target permission and institute
State the mapping table of Permission Levels.
In the present embodiment, the mobile terminal pre-sets and is stored with mapping table, wherein the mapping table
For the mapping table between the permission and Permission Levels in equipment management permission, it is possible to understand that, the mapping table packet
The target permission and the corresponding Permission Levels of the target permission are included, for example, the mapping table may include:×× is weighed
Limit-×× grade.
Step S230:The Permission Levels of the target permission are obtained based on the mapping table.
It is possible to further search Permission Levels corresponding with the target permission from the mapping table, to obtain
Take the Permission Levels of the target permission.
Step S240:Judge whether the Permission Levels are higher than the predetermined level.
Step S250:When the Permission Levels are not higher than the predetermined level, the corresponding behaviour of the target permission is run
Make.
Wherein, when judging that the Permission Levels are not higher than the predetermined level, the Permission Levels of the target permission are characterized
It is low, to which its danger coefficient is low, therefore, can not prompt directly to run the corresponding operation of the target permission.
Step S260:When the Permission Levels are higher than the predetermined level, the corresponding operation of the target permission is shown
And whether execute the prompt message of the corresponding operation of the target permission.
Referring to Fig. 4, in the present embodiment, when judging that the Permission Levels are higher than predetermined level, the mobile terminal
In addition to the prompt message for displaying whether to allow to execute the corresponding operation of the target permission, the corresponding behaviour of the target permission is also shown
Make, it is possible to understand that, by the corresponding operation of display target permission, user will be seen that the corresponding concrete operations of the permission, from
And the foundation of selection can be carried out based on the prompt message as user.
Further, when the grade for judging the permission is higher than predetermined level, the mobile terminal is in addition to displaying whether
Except the prompt message and the corresponding operation of target permission that allow to execute the corresponding operation of the target permission, the target is also shown
The harm of the corresponding operation of permission, it is possible to understand that, by the corresponding operation of display target permission, user can be made to understand the power
The harm for limiting corresponding operation allows to execute the corresponding operation of the target permission so as to further remind user with caution.
Wherein, as a kind of mode, the corresponding operation of the target permission, the corresponding operation of target permission harm and
Whether executing the prompt message of the corresponding operation of the target permission can show in same bullet frame, can also be in different bullet frames
It is middle to show respectively, do not do specific restriction herein.
Step S270:When receive instruction allow to execute the instruction of the target permission when, run the target permission pair
The operation answered.
Step S280:When receive instruction do not allow to execute the instruction of the target permission when, forbid running the target
The corresponding operation of permission and display suppression activate the operating procedure of the equipment management permission.
As a kind of mode, when receiving instruction and not allowing to execute the instruction of the target permission, then the instruction is responded
Forbid running the corresponding operation of the target permission and display suppression activates the operating procedure of the equipment management permission, from
And it can instruct user that the equipment management permission of the application is cancelled activation, lifting system performance and stability.It should be understood that
The activation of the equipment management permission of the application needs to return to the setting-of mobile terminal other setting-security and privacy-equipment managements
Device interface, and when mobile terminal receives instruction and cancels the command information of activation, responding command information cancellation activation, this is answered
With, wherein the command information can be mobile terminal generation, Ke Yi when detecting that cancellation activator button is hit in user's list indication
Detect user give more directions hit cancel activator button when generate, can detect user press cancel activator button when generate,
It can also be generated when detecting that user presses cancellation activator button preset duration, not do specific restriction herein.
The right management method that the application second embodiment provides is monitored after the equipment management permission of application is activated
The acquisition of equipment management permission is asked, and when the acquisition for listening to target permission is asked, lookup includes target permission and permission etc.
The mapping table of grade is obtained the Permission Levels of target permission based on the mapping table, judges whether the Permission Levels are higher than
Predetermined level, when Permission Levels are not higher than predetermined level, the corresponding operation of operational objective permission, when Permission Levels are higher than default
When grade, the corresponding operation of display target permission and the prompt message of the corresponding operation of target permission whether is executed, when connecing
When receiving instruction allows the instruction of performance objective permission, the corresponding operation of target permission is run, is not allowed when receiving instruction
When the instruction of performance objective permission, forbid the corresponding operation of operational objective permission and display suppression activation equipment administration authority
Operating procedure is further avoided rogue program and is directly weighed using equipment management to increase multiple prompt messages according to Permission Levels
Limit, lifting system performance and stability.
3rd embodiment
Referring to Fig. 5, Fig. 5 shows the module frame chart for the rights management device 200 that the application 3rd embodiment provides.Under
Face will be illustrated for block diagram shown in fig. 5, and the rights management device 200 includes:Monitor starting module 210, permission etc.
Grade judgment module 220, prompt message display module 230 and limiting operation run module 240, wherein:
Starting module 210 is monitored, for after the equipment management permission of application is activated, monitoring the equipment management permission
Acquisition request.
Permission Levels judgment module 220, for when monitoring the acquisition request to target permission, obtaining the target permission
Permission Levels, and judge the Permission Levels whether be higher than predetermined level, wherein the target permission be the equipment management
Permission in permission.Referring to Fig. 6, further, the Permission Levels judgment module 220 includes:Mapping relations table search
Module 221, Permission Levels acquisition submodule 222 and Permission Levels judging submodule 223, wherein:
Mapping relations table search submodule 221, for when listening to the request of the acquisition to the target permission, searching packet
Include the mapping table of the target permission and the Permission Levels.
Permission Levels acquisition submodule 222, the permission etc. for obtaining the target permission based on the mapping table
Grade.
Permission Levels judging submodule 223, for judging whether the Permission Levels are higher than the predetermined level.
Prompt message display module 230, for when the Permission Levels are higher than the predetermined level, displaying whether to allow
Execute the prompt message of the corresponding operation of the target permission.Further, the prompt message display module 230 includes:The
One prompt message display sub-module 231 and the second prompt message display sub-module 232, wherein:
First prompt message display sub-module 231, for when the Permission Levels are higher than the predetermined level, showing institute
It states the corresponding operation of target permission and whether executes the prompt message of the corresponding operation of the target permission.Further, institute
Prompt message display sub-module 231 is stated, including:
Prompt message display unit, for when the Permission Levels are higher than the predetermined level, showing the target power
Limit corresponding operation, the corresponding harm of the operation and the prompt message for whether executing the corresponding operation of the target permission.
Second prompt message display sub-module 232, for when the Permission Levels are higher than the predetermined level, it is aobvious to play frame
Whether show allows to execute the prompt message of the corresponding operation of the target permission.
Limiting operation run module 240, for when receive instruction allow to execute the instruction of the target permission when, operation
The corresponding operation of the target permission.
Further, the rights management device 200 further includes limiting operation execution module 250 and limiting operation inhibited mode
Block 260, wherein:
Limiting operation execution module 250, for when the Permission Levels are not higher than the predetermined level, running the mesh
Mark the corresponding operation of permission.
Limiting operation disabled module 260, for when receive instruction do not allow to execute the instruction of the target permission when, prohibit
It only runs the corresponding operation of the target permission and display suppression activates the operating procedure of the equipment management permission.
In conclusion a kind of right management method provided by the embodiments of the present application, device, mobile terminal and storage are situated between
Matter is monitored the acquisition request of the equipment management permission, is weighed to target when listening to after the equipment management permission of application is activated
When the acquisition request of limit, the Permission Levels of the target permission are obtained, and judge whether the Permission Levels are higher than predetermined level,
In, which is the permission in equipment management permission, when Permission Levels are higher than predetermined level, displays whether to allow to execute
The prompt message of the corresponding operation of target permission, when receive instruction allow to execute the instruction of the target permission when, run the mesh
The corresponding operation of permission is marked, to increase prompt message according to Permission Levels, rogue program is avoided directly to use equipment management permission,
Lifting system performance and stability.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment weight
What point illustrated is all the difference with other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so fairly simple, the related place ginseng of description
See the part explanation of embodiment of the method.For arbitrary processing mode described in embodiment of the method, in device reality
It applies in example and no longer can be one by one repeated in device embodiment by corresponding processing modules implement.
Referring to Fig. 7, based on above-mentioned right management method, device, the embodiment of the present application also provides a kind of movement
Terminal 100 comprising electronic body portion 10, the electronic body portion 10 include shell 12 and the master being arranged on the shell 12
Display screen 120.Metal can be used in the shell 12, such as steel, aluminium alloy are made.In the present embodiment, the main display 120 is logical
Often include display panel 111, may also comprise for responding the circuit etc. for carrying out touch control operation to the display panel 111.It is described
Display panel 111 can be a liquid crystal display panel (Liquid Crystal Display, LCD), in some embodiments,
The display panel 111 is a touch screen 109 simultaneously.
Please refer to Fig. 8, in actual application scenarios, the mobile terminal 100 can be used as intelligent mobile phone terminal into
It exercises and uses, the electronic body portion 10 also typically includes one or more (only showing one in figure) processors in this case
102, memory 104, RF (Radio Frequency, radio frequency) module 106, voicefrequency circuit 110, sensor 114, input module
118, power module 122.It will appreciated by the skilled person that structure shown in Fig. 8 is only to illustrate, not to described
The structure in electronic body portion 10 causes to limit.For example, the electronic body portion 10 may also include than shown in Fig. 8 more or more
Few component, or with the configuration different from shown in Fig. 8.
It will appreciated by the skilled person that for the processor 102, all other component belongs to
It is coupled by multiple Peripheral Interfaces 124 between peripheral hardware, the processor 102 and these peripheral hardwares.The Peripheral Interface 124 can
Based on following standard implementation:Universal Asynchronous Receive/sending device (Universal Asynchronous Receiver/
Transmitter, UART), universal input/output (General Purpose Input Output, GPIO), serial peripheral connect
Mouthful (Serial Peripheral Interface, SPI), internal integrated circuit (Inter-Integrated Circuit,
I2C), but it is not limited to above-mentioned standard.In some instances, the Peripheral Interface 124 can only include bus;In other examples
In, the Peripheral Interface 124 may also include other elements, such as one or more controller, such as connecting the display
The display controller of panel 111 or storage control for connecting memory.In addition, these controllers can also be from described
Detached in Peripheral Interface 124, and be integrated in the processor 102 or corresponding peripheral hardware in.
The memory 104 can be used for storing software program and module, and the processor 102 is stored in institute by operation
The software program and module in memory 104 are stated, to perform various functions application and data processing.The memory
104 may include high speed random access memory, may also include nonvolatile memory, and such as one or more magnetic storage device dodges
It deposits or other non-volatile solid state memories.In some instances, the memory 104 can further comprise relative to institute
The remotely located memory of processor 102 is stated, these remote memories can pass through network connection to the electronic body portion 10
Or the main display 120.The example of above-mentioned network includes but not limited to internet, intranet, LAN, mobile communication
Net and combinations thereof.
The RF modules 106 are used to receive and transmit electromagnetic wave, realize the mutual conversion of electromagnetic wave and electric signal, to
It is communicated with communication network or miscellaneous equipment.The RF modules 106 may include various existing for executing these functions
Circuit element, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module
(SIM) card, memory etc..The RF modules 106 can be carried out with various networks such as internet, intranet, wireless network
Communication is communicated by wireless network and miscellaneous equipment.Above-mentioned wireless network may include cellular telephone networks, wireless
LAN or Metropolitan Area Network (MAN).Above-mentioned wireless network can use various communication standards, agreement and technology, including but not limited to
Global system for mobile communications (Global System for Mobile Communication, GSM), enhanced mobile communication skill
Art (Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code
Division multiple access, W-CDMA), Code Division Multiple Access (Code division access, CDMA), time-division
Multiple access technology (time division multiple access, TDMA), adopting wireless fidelity technology (Wireless, Fidelity,
WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.10A, IEEE 802.11b, IEEE802.11g and/
Or IEEE 802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses
It is (Worldwide Interoperability for Microwave Access, Wi-Max), other for mail, Instant Messenger
Agreement and any other suitable communications protocol of news and short message, or even may include that those are not developed currently yet
Agreement.
Voicefrequency circuit 110, receiver 101, sound jack 103, microphone 105 provide user and the electronic body portion jointly
Audio interface between 10 or described main displays 120.Specifically, the voicefrequency circuit 110 receives from the processor 102
Voice data is converted to electric signal by voice data, by electric signal transmission to the receiver 101.The receiver 101 is by electric signal
Be converted to the sound wave that human ear can be heard.The voicefrequency circuit 110 receives electric signal also from the microphone 105, by electric signal
Voice data is converted to, and gives the processor 102 to be further processed data transmission in network telephony.Audio data can be with
It is obtained from the memory 104 or by the RF modules 106.In addition, audio data can also be stored to the storage
It is sent in device 104 or by the RF modules 106.
The setting of the sensor 114 is in the electronic body portion 10 or in the main display 120, the sensor
114 example includes but is not limited to:Optical sensor, operation sensor, pressure sensor, gravity accelerometer and
Other sensors.
Specifically, the optical sensor may include light sensor 114F, pressure sensor 114G.Wherein, pressure sensing
Device 114G can detect the sensor by pressing the pressure generated in mobile terminal 100.That is, pressure sensor 114G detection by with
The pressure that contact between family and mobile terminal or pressing generate, for example, by between the ear and mobile terminal of user contact or
Press the pressure generated.Therefore, whether pressure sensor 114G may be used to determine occurs between user and mobile terminal 100
Contact or the size of pressing and pressure.
Referring to Fig. 8, specifically in the embodiment shown in fig. 8, the light sensor 114F and the pressure
Sensor 114G is arranged adjacent to the display panel 111.The light sensor 114F can have object close to the main display
When shielding 120, such as when the electronic body portion 10 is moved in one's ear, the processor 102 closes display output.
As a kind of motion sensor, gravity accelerometer can detect in all directions (generally three axis) and accelerate
The size of degree can detect that size and the direction of gravity, can be used to identify the application of 100 posture of the mobile terminal when static
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc..
In addition, the electronic body portion 10 can also configure other sensors such as gyroscope, barometer, hygrometer, thermometer, herein no longer
It repeats,
In the present embodiment, the input module 118 may include being arranged the touch screen on the main display 120
109, the touch screen 109 collect user on it or neighbouring touch operation (for example user is any using finger, stylus etc.
Operation of the suitable object or attachment on the touch screen 109 or near the touch screen 109), and according to presetting
The corresponding attachment device of driven by program.Optionally, the touch screen 109 may include touch detecting apparatus and touch controller.
Wherein, the touch orientation of the touch detecting apparatus detection user, and the signal that touch operation is brought is detected, it transmits a signal to
The touch controller;The touch controller receives touch information from the touch detecting apparatus, and by the touch information
It is converted into contact coordinate, then gives the processor 102, and order that the processor 102 is sent can be received and executed.
Furthermore, it is possible to realize touching for the touch screen 109 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Touch detection function.In addition to the touch screen 109, in other change embodiments, the input module 118 can also include it
Its input equipment, such as button 107.The button 107 for example may include the character keys for inputting character, and for triggering
The control button of control function.The example of the control button includes " returning to main screen " button, on/off button etc..
The information and the electronics that the main display 120 is used to show information input by user, is supplied to user
The various graphical user interface of body part 10, these graphical user interface can by figure, text, icon, number, video and its
Arbitrary to combine to constitute, in an example, the touch screen 109 may be disposed on the display panel 111 thus with described
Display panel 111 constitutes an entirety.
The power module 122 is used to provide supply of electric power to the processor 102 and other each components.Specifically,
The power module 122 may include power-supply management system, one or more power supply (such as battery or alternating current), charging circuit,
Power-fail detection circuit, inverter, indicator of the power supply status and it is other arbitrarily with the electronic body portion 10 or the master
The generation, management of electric power and the relevant component of distribution in display screen 120.
The mobile terminal 100 further includes locator 119, and the locator 119 is for determining 100 institute of the mobile terminal
The physical location at place.In the present embodiment, the locator 119 realizes the positioning of the mobile terminal 100 using positioning service,
The positioning service, it should be understood that the location information of the mobile terminal 100 is obtained by specific location technology (as passed through
Latitude coordinate), it is marked on the electronic map by the technology of the position of positioning object or service.
It should be understood that above-mentioned mobile terminal 100 is not limited to intelligent mobile phone terminal, should refer to can move
The computer equipment used in dynamic.Specifically, mobile terminal 100, refers to the mobile computer for being equipped with intelligent operating system
Equipment, mobile terminal 100 include but not limited to smart mobile phone, smartwatch, tablet computer, etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process or the method description described in other ways in flow chart or herein is construed as, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discuss suitable
Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be by the application
Embodiment person of ordinary skill in the field understood.
The logic and/or step for indicating or describing in other ways herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
(system of such as computer based system including processor other can be held from instruction for instruction execution system, device or equipment
The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set
It is standby and use., " for the purpose of this specification;Ji Suanjikedujiezhi "Can any can include, store, communicating, propagating or passing
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring
Interconnecting piece (mobile terminal), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable
Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it
Its suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.In addition, in each embodiment of the application
In each functional unit can be integrated in a processing module, can also be that each unit physically exists alone, can also two
A or more than two units are integrated in a module.The form that hardware had both may be used in above-mentioned integrated module is realized, also may be used
It is realized in the form of using software function module.If the integrated module realized in the form of software function module and as
Independent product sale in use, can also be stored in a computer read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application
System, those skilled in the art can be changed above-described embodiment, change, replace and become within the scope of application
Type.
Finally it should be noted that:Above example is only to illustrate the technical solution of the application, rather than its limitations;Although
The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding:It still can be with
Technical scheme described in the above embodiments is modified or equivalent replacement of some of the technical features;And
These modifications or replacements, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and
Range.
Claims (10)
1. a kind of right management method, which is characterized in that the method includes:
After the equipment management permission of application is activated, the acquisition request of the equipment management permission is monitored;
When listening to the request of the acquisition to target permission, the Permission Levels of the target permission are obtained, and judge the permission
Whether grade is higher than predetermined level, wherein the target permission is the permission in the equipment management permission;
When the Permission Levels are higher than the predetermined level, display whether to allow to execute the corresponding operation of the target permission
Prompt message;
When receive instruction allow to execute the instruction of the target permission when, run the corresponding operation of the target permission.
2. according to the method described in claim 1, it is characterized in that, it is described when listen to the acquisition to target permission request when,
The Permission Levels of the target permission are obtained, and judge whether the Permission Levels are higher than predetermined level, including:
When listening to the request of the acquisition to the target permission, it includes the target permission to search and the Permission Levels are reflected
Penetrate relation table;
The Permission Levels of the target permission are obtained based on the mapping table;
Judge whether the Permission Levels are higher than the predetermined level.
3. according to the method described in claim 1, it is characterized in that, described when the Permission Levels are higher than the predetermined level
When, display whether the prompt message for allowing to execute the corresponding operation of the target permission, including:
When the Permission Levels are higher than the predetermined level, show the corresponding operation of the target permission and whether execute institute
State the prompt message of the corresponding operation of target permission.
4. according to the method described in claim 3, it is characterized in that, described when the Permission Levels are higher than the predetermined level
When, it shows the corresponding operation of the target permission and whether executes the prompt message of the corresponding operation of the target permission, packet
It includes:
When the Permission Levels are higher than the predetermined level, show that the corresponding operation of the target permission, the operation correspond to
Harm and whether execute the prompt message of the corresponding operation of the target permission.
5. according to the method described in claim 1, it is characterized in that, described when the Permission Levels are higher than the predetermined level
When, display whether the prompt message for allowing to execute the corresponding operation of the target permission, including:
When the Permission Levels are higher than the predetermined level, play frame and display whether to allow to execute the corresponding behaviour of the target permission
The prompt message of work.
6. according to claim 1-5 any one of them methods, which is characterized in that the method further includes:
When the Permission Levels are not higher than the predetermined level, the corresponding operation of the target permission is run.
7. according to claim 1-5 any one of them methods, which is characterized in that the method further includes:
When receive instruction do not allow to execute the instruction of the target permission when, forbid running the corresponding behaviour of the target permission
Make;And
Display suppression activates the operating procedure of the equipment management permission.
8. a kind of rights management device, which is characterized in that described device includes:
Starting module is monitored, for after the equipment management permission of application is activated, monitoring the acquisition of the equipment management permission
Request;
Permission Levels judgment module, for when monitoring the acquisition request to target permission, obtaining the permission of the target permission
Grade, and judge whether the Permission Levels are higher than predetermined level, wherein the target permission is in the equipment management permission
Permission;
Prompt message display module allows to execute institute for when the Permission Levels are higher than the predetermined level, displaying whether
State the prompt message of the corresponding operation of target permission;
Limiting operation run module, for when receive instruction allow to execute the instruction of the target permission when, run the mesh
Mark the corresponding operation of permission.
9. a kind of mobile terminal, which is characterized in that including touch screen, memory and processor, the touch screen is deposited with described
Reservoir is couple to the processor, the memory store instruction, the when executed by the processor processing
Device executes such as claim 1-7 any one of them methods.
10. a kind of computer read/write memory medium for the program code that can perform with processor, which is characterized in that the journey
Sequence code makes the processor execute such as claim 1-7 any one of them methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810349295.1A CN108712561B (en) | 2018-04-18 | 2018-04-18 | Authority management method, device, mobile terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810349295.1A CN108712561B (en) | 2018-04-18 | 2018-04-18 | Authority management method, device, mobile terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108712561A true CN108712561A (en) | 2018-10-26 |
CN108712561B CN108712561B (en) | 2020-05-19 |
Family
ID=63866736
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810349295.1A Active CN108712561B (en) | 2018-04-18 | 2018-04-18 | Authority management method, device, mobile terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108712561B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110062106A (en) * | 2019-03-27 | 2019-07-26 | 努比亚技术有限公司 | A kind of call method of application program, mobile terminal and storage medium |
CN110334500A (en) * | 2019-06-28 | 2019-10-15 | 百度在线网络技术(北京)有限公司 | Authority control method, device, intelligent sound box and the storage medium of intelligent sound box |
CN110928467A (en) * | 2019-11-19 | 2020-03-27 | 广东欢太科技有限公司 | Connection option display method and device and computer readable storage medium |
CN111444497A (en) * | 2020-04-13 | 2020-07-24 | Oppo广东移动通信有限公司 | Application program detection method and device and electronic equipment |
CN112118611A (en) * | 2020-09-22 | 2020-12-22 | 上海连尚网络科技有限公司 | Method and device for connecting wireless hotspots |
CN112863150A (en) * | 2021-01-11 | 2021-05-28 | Tcl通讯(宁波)有限公司 | Prompting method, prompting device, storage medium and mobile terminal |
CN113343304A (en) * | 2021-06-29 | 2021-09-03 | 挂号网(杭州)科技有限公司 | Permission application method and device, electronic equipment and storage medium |
CN113992369A (en) * | 2021-10-18 | 2022-01-28 | 北京天融信网络安全技术有限公司 | Network security device topology management method and system |
CN115017485A (en) * | 2022-08-08 | 2022-09-06 | 北京永洪商智科技有限公司 | Data authority management and control method and system |
CN117098134A (en) * | 2023-10-17 | 2023-11-21 | 湖北星纪魅族集团有限公司 | Security control method, terminal, and non-transitory computer-readable storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
CN102404727A (en) * | 2011-11-24 | 2012-04-04 | 中兴通讯股份有限公司 | Method and device for safety control of mobile terminal |
CN102420902A (en) * | 2011-11-24 | 2012-04-18 | 中兴通讯股份有限公司 | Method for classification management over right of using functions and mobile terminal |
CN102523330A (en) * | 2011-12-21 | 2012-06-27 | 广东步步高电子工业有限公司 | Cell phone privilege management and verification method based on three-dimensional privilege level model |
CN103686722A (en) * | 2012-09-13 | 2014-03-26 | 中兴通讯股份有限公司 | Access control method and device |
CN104392176A (en) * | 2014-12-12 | 2015-03-04 | 北京奇虎科技有限公司 | Mobile terminal and method for intercepting device manager authority thereof |
CN105631338A (en) * | 2014-10-31 | 2016-06-01 | 重庆重邮信科通信技术有限公司 | Application security authentication method and terminal |
CN106055973A (en) * | 2016-05-30 | 2016-10-26 | 深圳市永兴元科技有限公司 | Application permission management method and application apparatus |
US9521134B2 (en) * | 2015-05-13 | 2016-12-13 | Atto Research Co., Ltd. | Control apparatus in software defined network and method for operating the same |
CN106469270A (en) * | 2015-08-17 | 2017-03-01 | 中国移动通信集团公司 | A kind of management method of application permission, equipment and system |
-
2018
- 2018-04-18 CN CN201810349295.1A patent/CN108712561B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102110220A (en) * | 2011-02-14 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Application program monitoring method and device |
CN102404727A (en) * | 2011-11-24 | 2012-04-04 | 中兴通讯股份有限公司 | Method and device for safety control of mobile terminal |
CN102420902A (en) * | 2011-11-24 | 2012-04-18 | 中兴通讯股份有限公司 | Method for classification management over right of using functions and mobile terminal |
CN102523330A (en) * | 2011-12-21 | 2012-06-27 | 广东步步高电子工业有限公司 | Cell phone privilege management and verification method based on three-dimensional privilege level model |
CN103686722A (en) * | 2012-09-13 | 2014-03-26 | 中兴通讯股份有限公司 | Access control method and device |
CN105631338A (en) * | 2014-10-31 | 2016-06-01 | 重庆重邮信科通信技术有限公司 | Application security authentication method and terminal |
CN104392176A (en) * | 2014-12-12 | 2015-03-04 | 北京奇虎科技有限公司 | Mobile terminal and method for intercepting device manager authority thereof |
US9521134B2 (en) * | 2015-05-13 | 2016-12-13 | Atto Research Co., Ltd. | Control apparatus in software defined network and method for operating the same |
CN106469270A (en) * | 2015-08-17 | 2017-03-01 | 中国移动通信集团公司 | A kind of management method of application permission, equipment and system |
CN106055973A (en) * | 2016-05-30 | 2016-10-26 | 深圳市永兴元科技有限公司 | Application permission management method and application apparatus |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110062106B (en) * | 2019-03-27 | 2021-10-15 | 努比亚技术有限公司 | Calling method of application program, mobile terminal and storage medium |
CN110062106A (en) * | 2019-03-27 | 2019-07-26 | 努比亚技术有限公司 | A kind of call method of application program, mobile terminal and storage medium |
CN110334500A (en) * | 2019-06-28 | 2019-10-15 | 百度在线网络技术(北京)有限公司 | Authority control method, device, intelligent sound box and the storage medium of intelligent sound box |
CN110334500B (en) * | 2019-06-28 | 2022-04-12 | 百度在线网络技术(北京)有限公司 | Authority control method and device of intelligent sound box, intelligent sound box and storage medium |
CN110928467A (en) * | 2019-11-19 | 2020-03-27 | 广东欢太科技有限公司 | Connection option display method and device and computer readable storage medium |
CN110928467B (en) * | 2019-11-19 | 2021-07-27 | 广东欢太科技有限公司 | Connection option display method and device and computer readable storage medium |
CN111444497A (en) * | 2020-04-13 | 2020-07-24 | Oppo广东移动通信有限公司 | Application program detection method and device and electronic equipment |
CN111444497B (en) * | 2020-04-13 | 2024-03-08 | Oppo广东移动通信有限公司 | Application program detection method and device and electronic equipment |
CN112118611A (en) * | 2020-09-22 | 2020-12-22 | 上海连尚网络科技有限公司 | Method and device for connecting wireless hotspots |
CN112863150B (en) * | 2021-01-11 | 2022-09-02 | Tcl通讯(宁波)有限公司 | Prompting method, prompting device, storage medium and mobile terminal |
CN112863150A (en) * | 2021-01-11 | 2021-05-28 | Tcl通讯(宁波)有限公司 | Prompting method, prompting device, storage medium and mobile terminal |
CN113343304A (en) * | 2021-06-29 | 2021-09-03 | 挂号网(杭州)科技有限公司 | Permission application method and device, electronic equipment and storage medium |
CN113992369A (en) * | 2021-10-18 | 2022-01-28 | 北京天融信网络安全技术有限公司 | Network security device topology management method and system |
CN115017485A (en) * | 2022-08-08 | 2022-09-06 | 北京永洪商智科技有限公司 | Data authority management and control method and system |
CN115017485B (en) * | 2022-08-08 | 2022-10-25 | 北京永洪商智科技有限公司 | Data authority management and control method and system |
CN117098134A (en) * | 2023-10-17 | 2023-11-21 | 湖北星纪魅族集团有限公司 | Security control method, terminal, and non-transitory computer-readable storage medium |
CN117098134B (en) * | 2023-10-17 | 2024-01-26 | 湖北星纪魅族集团有限公司 | Security control method, terminal, and non-transitory computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108712561B (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108712561A (en) | Right management method, device, mobile terminal and storage medium | |
CN109699059B (en) | Cell reselection method and terminal equipment | |
CN108632460A (en) | Right management method, device, mobile terminal and storage medium | |
CN108763892A (en) | Right management method, device, mobile terminal and storage medium | |
CN108243282A (en) | Message display method, device, mobile terminal and storage medium | |
WO2019141058A1 (en) | Sensing indication method, terminal and network device | |
CN110035546B (en) | Transmission method, mobile terminal and network equipment | |
CN108710456A (en) | Application icon processing method, device and mobile terminal | |
CN110674490B (en) | Application permission display method and device and mobile terminal | |
CN108134838A (en) | data reporting method, device, mobile terminal and computer-readable medium | |
CN108235308A (en) | data reporting method, device, mobile terminal and computer-readable medium | |
CN108777731A (en) | Key configurations method, apparatus, mobile terminal and storage medium | |
CN108345422A (en) | Application control method, apparatus, mobile terminal and computer-readable medium | |
CN108737254A (en) | Display control method, terminal and the computer storage media of application chat component | |
CN108769299A (en) | Screen control method, device and mobile terminal | |
CN108712555B (en) | Method and device for sending alarm information | |
CN107908939A (en) | Terminal alarms method, apparatus and mobile terminal | |
CN111107223B (en) | Message processing method and electronic equipment | |
CN108737640A (en) | False-touch prevention method, apparatus, mobile terminal and storage medium | |
CN108650335A (en) | The method, apparatus and test equipment being communicatively coupled with mobile terminal to be tested | |
CN108647070B (en) | Information reminding method and device, mobile terminal and computer readable medium | |
CN109815679B (en) | Authority management method and mobile terminal | |
CN108769366A (en) | Right management method, device, mobile terminal and storage medium | |
CN110221736A (en) | Icon processing method, device, mobile terminal and storage medium | |
CN110221882A (en) | Display methods, device, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |