CN108712561B - Authority management method, device, mobile terminal and storage medium - Google Patents

Authority management method, device, mobile terminal and storage medium Download PDF

Info

Publication number
CN108712561B
CN108712561B CN201810349295.1A CN201810349295A CN108712561B CN 108712561 B CN108712561 B CN 108712561B CN 201810349295 A CN201810349295 A CN 201810349295A CN 108712561 B CN108712561 B CN 108712561B
Authority
CN
China
Prior art keywords
authority
level
target
permission
operation corresponding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810349295.1A
Other languages
Chinese (zh)
Other versions
CN108712561A (en
Inventor
林志泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810349295.1A priority Critical patent/CN108712561B/en
Publication of CN108712561A publication Critical patent/CN108712561A/en
Application granted granted Critical
Publication of CN108712561B publication Critical patent/CN108712561B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses a permission management method, a permission management device, a mobile terminal and a storage medium, and relates to the technical field of mobile terminals. The method comprises the following steps: after the applied device management authority is activated, monitoring an acquisition request of the device management authority, acquiring the authority level of the target authority when the acquisition request of the target authority is monitored, and judging whether the authority level is higher than a preset level, wherein the target authority is the authority in the device management authority, when the authority level is higher than the preset level, displaying prompt information of whether the operation corresponding to the target authority is allowed to be executed, and when an instruction indicating that the target authority is allowed to be executed is received, operating the operation corresponding to the target authority. The permission management method, the permission management device, the mobile terminal and the storage medium are used for increasing the prompt information according to the permission level, preventing malicious programs from directly using the device management permission, and improving the system performance and stability.

Description

Authority management method, device, mobile terminal and storage medium
Technical Field
The present application relates to the field of mobile terminal technologies, and in particular, to a method and an apparatus for managing permissions, a mobile terminal, and a storage medium.
Background
Mobile terminals, such as mobile phones, have become one of the most common consumer electronics products in people's daily life. Moreover, the user often installs various third-party applications, and the third-party applications often guide the user to open the device manager function of the mobile terminal in various ways, which is not favorable for the operation experience of the user and the security of the mobile terminal.
Disclosure of Invention
In view of the above problems, the present application provides an authority management method, apparatus, mobile terminal and storage medium, so as to add prompt information according to an authority level, avoid malicious programs from directly using device management authority, and improve system performance and stability.
In a first aspect, an embodiment of the present application provides a rights management method, where the method includes: monitoring an acquisition request of the device management authority after the device management authority of the application is activated; when an acquisition request of a target authority is monitored, acquiring the authority level of the target authority, and judging whether the authority level is higher than a preset level, wherein the target authority is the authority in the equipment management authority; when the authority level is higher than the preset level, displaying prompt information for judging whether to allow the operation corresponding to the target authority to be executed; and when an instruction indicating that the target authority is allowed to be executed is received, operating the operation corresponding to the target authority.
In a second aspect, an embodiment of the present application provides a rights management device, where the device includes: the monitoring starting module is used for monitoring an acquisition request of the equipment management authority after the equipment management authority of the application is activated; the permission level judging module is used for acquiring the permission level of the target permission and judging whether the permission level is higher than a preset level or not when monitoring an acquisition request of the target permission, wherein the target permission is the permission in the equipment management permission; the prompt information display module is used for displaying prompt information for judging whether to allow the operation corresponding to the target authority to be executed or not when the authority level is higher than the preset level; and the authority operation running module is used for running the operation corresponding to the target authority when receiving an instruction indicating that the target authority is allowed to be executed.
In a third aspect, an embodiment of the present application provides a mobile terminal, including a touch screen, a memory, and a processor, where the touch screen and the memory are coupled to the processor, and the memory stores instructions, and when the instructions are executed by the processor, the processor performs the above method.
In a fourth aspect, the present application provides a computer readable storage medium having program code executable by a processor, the program code causing the processor to execute the above method.
According to the authority management method, the authority management device, the mobile terminal and the storage medium, after the applied device management authority is activated, an acquisition request of the device management authority is monitored, when the acquisition request of a target authority is monitored, the authority level of the target authority is acquired, whether the authority level is higher than a preset level or not is judged, wherein the target authority is the authority in the device management authority, when the authority level is higher than the preset level, prompt information of whether the operation corresponding to the target authority is allowed to be executed or not is displayed, and when an instruction indicating that the target authority is allowed to be executed is received, the operation corresponding to the target authority is operated, so that the prompt information is increased according to the authority level, a malicious program is prevented from directly using the device management authority, and system performance and stability are improved.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a rights management method according to a first embodiment of the present application;
fig. 2 is a schematic display diagram of a mobile terminal according to an embodiment of the present application;
FIG. 3 is a flow chart illustrating a rights management method according to a second embodiment of the present application;
fig. 4 is a schematic diagram illustrating another display of a mobile terminal according to an embodiment of the present application;
fig. 5 shows a block diagram of a rights management device according to a third embodiment of the present application;
fig. 6 shows another block diagram of a rights management device according to a third embodiment of the present application;
fig. 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
fig. 8 illustrates a block diagram of a mobile terminal for performing a rights management method according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, an intelligent system is a mobile terminal operating system platform with the largest user group, a mobile terminal is the most important electronic device used by many users, the users often install various third-party applications, and the third-party applications are often relatively rogue, the users are guided to open the device manager function through various ways, and the users may not know what is the device manager and then are guided to open the device manager. Through the Android device manager function, the application can take over the application authority of the mobile terminal, and a lot of important operations such as clearing all data, changing a screen locking password, setting a password rule, monitoring screen unlocking attempt times, locking a screen, setting a device global agent, setting the validity period of the screen locking password, setting storage device encryption, disabling a camera, disabling partial functions of screen locking and the like are performed on the mobile terminal, so that the operation experience and safety of a user are not facilitated. In view of the above problems, the inventors have studied for a long time and proposed a method, an apparatus, a mobile terminal, and a storage medium for managing permissions, which are provided in the embodiments of the present application, to increase a prompt according to a permission level, so as to prevent a malicious program from directly using device management permissions, and improve system performance and stability. The specific rights management method is described in detail in the following embodiments.
First embodiment
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a rights management method according to a first embodiment of the present application. The authority management method is used for increasing prompt information according to the authority level, preventing malicious programs from directly using equipment management authority, and improving system performance and stability. In a specific embodiment, the rights management method is applied to the rights management device 200 shown in fig. 5 and a mobile terminal (fig. 7) configured with the rights management device 200. The following will describe a specific process of this embodiment by taking a mobile terminal as an example, and it is understood that the mobile terminal applied in this embodiment may be a smart phone, a tablet computer, a wearable electronic device, and the like, which is not limited specifically herein. As will be described in detail with respect to the flow shown in fig. 1, the rights management method may specifically include the following steps:
step S110: and after the device management authority of the application is activated, monitoring an acquisition request of the device management authority.
The Android SDK provides an Application Programming Interface (API) for managing the operating device, which is a device manager management class, and through the API, the application can take over the application authority of the mobile terminal, and perform very important, many bold, dangerous, and extremely high-authority operations on the mobile terminal, such as clearing all data, changing a lock screen password, setting a password rule, monitoring the number of screen unlock attempts, locking a screen, setting a device global proxy, setting a validity period of the lock screen password, setting a storage device encryption, disabling a camera, disabling partial functions of screen lock, and the like.
Further, an application may register with the system using the DevicePolicyManager class to become the device manager of the mobile terminal, and in particular, after installation of an application using the DevicePolicyManager class, a settings-other settings-security and privacy-device manager interface of the mobile terminal may be displayed in a list indicating that the application may be activated as an application to become the device manager of the mobile terminal. As a mode, on an activation interface, it may be shown which device management permissions are applied by the application and an activation button is correspondingly displayed, and when the mobile terminal receives instruction information indicating that the activation button is triggered, the application is activated in response to the instruction information, where the instruction information may be generated when the mobile terminal detects that a single finger of a user clicks the activation button, may be generated when a multi-finger of the user clicks the activation button, may be generated when the user presses the activation button, or may be generated when the user presses the activation button for a preset time, which is not specifically limited herein.
It can be understood that after the device management authority of the application is activated, the application can use the displayed device management authority, and correspondingly, a monitoring starting module is preset in the mobile terminal, and after the device management authority of the application is activated, the monitoring starting module starts and monitors the acquisition request of the device management authority. As a manner, the monitoring start module may monitor the request for acquiring the management authority of the device in real time, or may monitor the request for acquiring the management authority of the device at intervals of a preset duration (e.g., 3s), which is not limited herein. In this embodiment, after the device management authority of the application is activated, when an operation is to be performed using a certain authority in the activated authority, the application may send an acquisition request of the authority to the system of the mobile terminal, and the system of the mobile terminal may monitor the acquisition request sent by the application.
Step S120: when an acquisition request of a target authority is monitored, acquiring the authority level of the target authority, and judging whether the authority level is higher than a preset level, wherein the target authority is the authority in the device management authority.
In this embodiment, the target permission is a permission in the device management permission, for example, the target permission may be to clear all data, change a lock screen password, set a password rule, monitor the number of screen unlocking attempts, lock a screen, set a device global proxy, set a validity period of the lock screen password, set a storage device encryption, deactivate a camera or deactivate a screen lock, and the like, and is not limited specifically herein. Further, when the monitoring start module of the mobile terminal monitors the request of the application for acquiring the target permission, the permission operation corresponding to the target permission to be used by the application is represented, and then the mobile terminal acquires the permission level of the target permission.
As one way, the level of the authority in the device management authority may be divided according to A, B, C, where a represents a high-level authority, B represents a medium-level authority, and C represents a low-level authority, for example, all data is cleared, a lock screen password is changed, and the like corresponds to the level a, and a camera is called to correspond to the level C. It is understood that when the request for obtaining the target right is monitored, the level of the target right is searched A, B, C to identify the level of the target right. As another way, the level of the authority in the device management authority may be divided according to a score value, where a higher score value indicates a higher level of the authority, for example, 98 scores for clearing all data, 95 scores for changing a screen locking password, 75 scores for calling a camera, and the like.
Further, the mobile terminal presets and stores a preset grade, where the preset grade is used as a basis for judging the grade of the target authority, and as a mode, when the grade of the authority in the device management authority is divided by A, B, C, the preset grade may be a grade B, at this time, it is judged whether the grade of the target authority is higher than the grade B, when the grade of the target authority is higher than the grade B, the grade representing the target authority meets the requirement, and when the grade of the target authority is not higher than the grade B, the grade representing the target authority does not meet the requirement. As another mode, when the level of the authority in the device management authority is divided according to a score value, where the preset level may be 85 points, at this time, it is determined whether the score value of the target authority is higher than 85 points, when the score value of the target authority is higher than 85 points, the level representing the target authority meets the requirement, and when the score value of the target authority is not higher than 85 points, the level representing the target authority does not meet the requirement.
Step S130: and when the authority level is higher than the preset level, displaying prompt information for judging whether to allow the operation corresponding to the target authority to be executed.
Referring to fig. 2, in this embodiment, when the level of the authority is higher than the preset level, the mobile terminal displays a prompt message, where the prompt message is used to prompt the user whether to allow the operation corresponding to the target authority to be executed, specifically, the prompt message may be "yes" and "no", when the touch operation directed to "yes" by the user is detected, the touch operation is represented as an operation indicating that the execution of the operation corresponding to the target authority is allowed, and when the touch operation directed to "no" by the user is detected, the touch operation is represented as an operation indicating that the execution of the operation corresponding to the target authority is not allowed.
As a manner, when the request for acquiring the target authority is monitored, the prompt information indicating whether to allow the operation corresponding to the target authority to be executed may be displayed in a form of a pop-up box, the prompt information indicating whether to allow the operation corresponding to the target authority to be executed may be displayed in a form of a card, or the prompt information indicating whether to allow the operation corresponding to the target authority to be executed may be displayed in a floating form, which is not limited specifically herein. It can be understood that after the popup display, the card display or the floating display is performed and the selection of the user is obtained, the subsequent steps are continuously performed.
Step S140: and when an instruction indicating that the target authority is allowed to be executed is received, operating the operation corresponding to the target authority.
As a way, when an instruction indicating that the target permission is allowed to be executed is received, the operation corresponding to the target permission is executed in response to the instruction, so that prompt information can be added according to the permission level, the operation corresponding to the target permission is executed on the premise that the execution is allowed, a malicious program is prevented from directly using the device management permission, and the system performance and stability are improved.
The authority management method provided in the first embodiment of the present application monitors an acquisition request of an apparatus management authority after the apparatus management authority of an application is activated, acquires an authority level of a target authority when the acquisition request of the target authority is monitored, and determines whether the authority level is higher than a preset level, where the target authority is an authority in the apparatus management authority, and when the authority level is higher than the preset level, displays a prompt message indicating whether to allow execution of an operation corresponding to the target authority, and when an instruction indicating that the target authority is allowed to be executed is received, runs the operation corresponding to the target authority, so as to increase the prompt message according to the authority level, avoid a malicious program from directly using the apparatus management authority, and improve system performance and stability.
Second embodiment
Referring to fig. 3, fig. 3 is a flowchart illustrating a rights management method according to a second embodiment of the present application. As will be explained in detail with respect to the flow shown in fig. 3, the method may specifically include the following steps:
step S210: and after the device management authority of the application is activated, monitoring an acquisition request of the device management authority.
Step S220: and when the acquisition request of the target authority is monitored, searching a mapping relation table comprising the target authority and the authority level.
In this embodiment, the mobile terminal sets and stores a mapping table in advance, where the mapping table is a correspondence table between rights and rights levels in device management rights, and as can be understood, the mapping table includes the target right and the rights level corresponding to the target right, for example, the mapping table may include: xxx authority-xxx rating.
Step S230: and acquiring the authority level of the target authority based on the mapping relation table.
Further, the authority level corresponding to the target authority may be searched from the mapping relationship table to obtain the authority level of the target authority.
Step S240: and judging whether the permission level is higher than the preset level.
Step S250: and when the permission level is not higher than the preset level, operating the operation corresponding to the target permission.
When the authority level is judged not to be higher than the preset level, the authority level representing the target authority is low, so that the danger coefficient is low, and therefore, the operation corresponding to the target authority can be directly operated without prompting.
Step S260: and when the authority level is higher than the preset level, displaying the operation corresponding to the target authority and prompt information for judging whether to execute the operation corresponding to the target authority.
Referring to fig. 4, in this embodiment, when the permission level is determined to be higher than the preset level, the mobile terminal displays, in addition to the prompt information indicating whether to allow the operation corresponding to the target permission to be executed, the operation corresponding to the target permission, and it can be understood that by displaying the operation corresponding to the target permission, the user can know the specific operation corresponding to the permission, so that the specific operation can be used as a basis for the user to select based on the prompt information.
Further, when the level of the authority is judged to be higher than the preset level, the mobile terminal displays the prompt information of whether to allow the operation corresponding to the target authority to be executed and the operation corresponding to the target authority, and also displays the harm of the operation corresponding to the target authority.
As a mode, the operation corresponding to the target authority, the harm of the operation corresponding to the target authority, and the prompt information whether to execute the operation corresponding to the target authority may be displayed in the same bullet frame, or may be displayed in different bullet frames, which is not limited specifically herein.
Step S270: and when an instruction indicating that the target authority is allowed to be executed is received, operating the operation corresponding to the target authority.
Step S280: and when an instruction indicating that the target authority is not allowed to be executed is received, operation corresponding to the target authority is forbidden to be executed, and the operation step of canceling the activation of the equipment management authority is displayed.
As a mode, when an instruction indicating that the target authority is not allowed to be executed is received, operation corresponding to the target authority is prohibited to be executed in response to the instruction, and an operation step of deactivating the device management authority is displayed, so that a user can be guided to deactivate the device management authority of the application, and system performance and stability are improved. It is understood that activation of the device management authority of the application needs to return to the setting-other setting-security and privacy-device manager interface of the mobile terminal, and when the mobile terminal receives instruction information indicating deactivation, the application is deactivated in response to the instruction information, where the instruction information may be generated when the mobile terminal detects that the user clicks the deactivation button with one finger, may be generated when detecting that the user clicks the deactivation button with multiple fingers, may be generated when detecting that the user presses the deactivation button, or may be generated when detecting that the user presses the deactivation button for a preset time, which is not specifically limited herein.
The authority management method provided in the second embodiment of the present application monitors the acquisition request of the device management authority after the device management authority of the application is activated, searches the mapping relation table including the target authority and the authority level when the acquisition request of the target authority is monitored, acquires the authority level of the target authority based on the mapping relation table, determines whether the authority level is higher than a preset level, runs the operation corresponding to the target authority when the authority level is not higher than the preset level, displays the operation corresponding to the target authority and prompt information of whether to execute the operation corresponding to the target authority when the authority level is higher than the preset level, runs the operation corresponding to the target authority when receiving an instruction indicating that the target authority is allowed to be executed, prohibits running the operation corresponding to the target authority and displays an operation step of canceling the activation of the device management authority when receiving an instruction indicating that the target authority is not allowed to be executed, a plurality of prompt messages are added according to the permission level, so that malicious programs are further prevented from directly using the equipment management permission, and the system performance and stability are improved.
Third embodiment
Referring to fig. 5, fig. 5 is a block diagram illustrating a rights management device 200 according to a third embodiment of the present application. As will be explained below with respect to the block diagram shown in fig. 5, the rights management device 200 includes: a monitoring starting module 210, an authority level judging module 220, a prompt information display module 230 and an authority operation running module 240, wherein:
the monitoring starting module 210 is configured to monitor an acquisition request of the device management authority after the device management authority of the application is activated.
The permission level determining module 220 is configured to, when monitoring an acquisition request for a target permission, acquire a permission level of the target permission, and determine whether the permission level is higher than a preset level, where the target permission is a permission in the device management permission. Referring to fig. 6, further, the permission level determining module 220 includes: a mapping relation table lookup sub-module 221, a permission level acquisition sub-module 222, and a permission level determination sub-module 223, wherein:
the mapping relation table lookup sub-module 221 is configured to, when an acquisition request for the target permission is monitored, lookup a mapping relation table including the target permission and the permission level.
And the permission level obtaining submodule 222 is configured to obtain a permission level of the target permission based on the mapping relation table.
And the permission level judging submodule 223 is configured to judge whether the permission level is higher than the preset level.
A prompt information display module 230, configured to display, when the authority level is higher than the preset level, a prompt information indicating whether to allow execution of an operation corresponding to the target authority. Further, the prompt information display module 230 includes: a first prompt information display submodule 231 and a second prompt information display submodule 232, wherein:
the first prompt information display sub-module 231 is configured to display, when the authority level is higher than the preset level, a prompt information indicating whether to execute an operation corresponding to the target authority or not. Further, the prompt information display sub-module 231 includes:
and the prompt information display unit is used for displaying the operation corresponding to the target authority, the harm corresponding to the operation and prompt information of whether to execute the operation corresponding to the target authority or not when the authority level is higher than the preset level.
And a second prompt information display sub-module 232, configured to display, when the permission level is higher than the preset level, a prompt information indicating whether to allow execution of an operation corresponding to the target permission in a pop-up box.
And the authority operation running module 240 is configured to run an operation corresponding to the target authority when receiving an instruction indicating that the target authority is allowed to be executed.
Further, the rights management device 200 further comprises a rights operation executing module 250 and a rights operation prohibiting module 260, wherein:
and the permission operation executing module 250 is configured to, when the permission level is not higher than the preset level, execute an operation corresponding to the target permission.
And the permission operation inhibiting module 260 is used for inhibiting the operation corresponding to the target permission from being operated and displaying an operation step of canceling the activation of the device management permission when receiving an instruction indicating that the target permission is not allowed to be executed.
To sum up, according to the method, the apparatus, the mobile terminal, and the storage medium for managing the device, after the device management permission of an application is activated, an acquisition request of the device management permission is monitored, when the acquisition request of a target permission is monitored, a permission level of the target permission is acquired, and whether the permission level is higher than a preset level is determined, where the target permission is a permission in the device management permission, when the permission level is higher than the preset level, a prompt message indicating whether to allow execution of an operation corresponding to the target permission is displayed, and when an instruction indicating that the target permission is allowed is received, an operation corresponding to the target permission is run, so that the prompt message is added according to the permission level, thereby preventing a malicious program from directly using the device management permission, and improving system performance and stability.
It should be noted that, in the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. For any processing manner described in the method embodiment, all the processing manners may be implemented by corresponding processing modules in the apparatus embodiment, and details in the apparatus embodiment are not described again.
Referring to fig. 7 again, based on the above rights management method and apparatus, the embodiment of the present application further provides a mobile terminal 100, which includes an electronic body 10, where the electronic body 10 includes a housing 12 and a main display 120 disposed on the housing 12. The housing 12 may be made of metal, such as steel or aluminum alloy. In this embodiment, the main display 120 generally includes a display panel 111, and may also include a circuit or the like for responding to a touch operation performed on the display panel 111. The Display panel 111 may be a Liquid Crystal Display (LCD) panel, and in some embodiments, the Display panel 111 is a touch screen 109.
Referring to fig. 8, in an actual application scenario, the mobile terminal 100 may be used as a smart phone terminal, in which case the electronic body 10 generally further includes one or more processors 102 (only one is shown in the figure), a memory 104, an RF (Radio Frequency) module 106, an audio circuit 110, a sensor 114, an input module 118, and a power module 122. It will be understood by those skilled in the art that the structure shown in fig. 8 is merely illustrative and is not intended to limit the structure of the electronic body 10. For example, the electronics body section 10 may also include more or fewer components than shown in FIG. 8, or have a different configuration than shown in FIG. 8.
Those skilled in the art will appreciate that all other components are peripheral devices with respect to the processor 102, and the processor 102 is coupled to the peripheral devices through a plurality of peripheral interfaces 124. The peripheral interface 124 may be implemented based on the following criteria: universal Asynchronous Receiver/Transmitter (UART), General Purpose Input/Output (GPIO), Serial Peripheral Interface (SPI), and Inter-Integrated Circuit (I2C), but the present invention is not limited to these standards. In some examples, the peripheral interface 124 may comprise only a bus; in other examples, the peripheral interface 124 may also include other elements, such as one or more controllers, for example, a display controller for interfacing with the display panel 111 or a memory controller for interfacing with a memory. These controllers may also be separate from the peripheral interface 124 and integrated within the processor 102 or a corresponding peripheral.
The memory 104 may be used to store software programs and modules, and the processor 102 executes various functional applications and data processing by executing the software programs and modules stored in the memory 104. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the electronic body portion 10 or the primary display 120 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The RF module 106 is used for receiving and transmitting electromagnetic waves, and implementing interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices. The RF module 106 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The RF module 106 may communicate with various networks such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. The Wireless network may use various Communication standards, protocols, and technologies, including, but not limited to, Global System for Mobile Communication (GSM), Enhanced Mobile Communication (Enhanced Data GSM Environment, EDGE), wideband Code division multiple Access (W-CDMA), Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Wireless Fidelity (WiFi) (e.g., Institute of Electrical and Electronics Engineers (IEEE) standard IEEE 802.10A, IEEE802.11 b, IEEE802.1 g, and/or IEEE802.11 n), Voice over internet protocol (VoIP), world wide mail Access (Microwave for Wireless Communication), Wi-11 Wireless Access (Max), and any other suitable protocol for instant messaging, and may even include those protocols that have not yet been developed.
The audio circuitry 110, earpiece 101, sound jack 103, microphone 105 collectively provide an audio interface between a user and the electronic body portion 10 or the main display 120. Specifically, the audio circuit 110 receives sound data from the processor 102, converts the sound data into an electrical signal, and transmits the electrical signal to the earpiece 101. The earpiece 101 converts the electrical signal into sound waves that can be heard by the human ear. The audio circuitry 110 also receives electrical signals from the microphone 105, converts the electrical signals to sound data, and transmits the sound data to the processor 102 for further processing. Audio data may be retrieved from the memory 104 or through the RF module 106. In addition, audio data may also be stored in the memory 104 or transmitted through the RF module 106.
The sensor 114 is disposed in the electronic body portion 10 or the main display 120, examples of the sensor 114 include, but are not limited to: light sensors, operational sensors, pressure sensors, gravitational acceleration sensors, and other sensors.
Specifically, the light sensors may include a light sensor 114F, a pressure sensor 114G. Among them, the pressure sensor 114G may detect a pressure generated by pressing on the mobile terminal 100. That is, the pressure sensor 114G detects pressure generated by contact or pressing between the user and the mobile terminal, for example, contact or pressing between the user's ear and the mobile terminal. Accordingly, the pressure sensor 114G may be used to determine whether contact or pressing has occurred between the user and the mobile terminal 100, as well as the magnitude of the pressure.
Referring to fig. 8 again, in the embodiment shown in fig. 8, the light sensor 114F and the pressure sensor 114G are disposed adjacent to the display panel 111. The light sensor 114F may turn off the display output when an object is near the main display 120, for example, when the electronic body portion 10 moves to the ear.
As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in various directions (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping) and the like for recognizing the attitude of the mobile terminal 100. In addition, the electronic body 10 may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer and a thermometer, which are not described herein,
in this embodiment, the input module 118 may include the touch screen 109 disposed on the main display 120, and the touch screen 109 may collect touch operations of the user (for example, operations of the user on or near the touch screen 109 using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. Optionally, the touch screen 109 may include a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 102, and can receive and execute commands sent by the processor 102. In addition, the touch detection function of the touch screen 109 may be implemented by various types, such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch screen 109, in other variations, the input module 118 may include other input devices, such as keys 107. The keys 107 may include, for example, character keys for inputting characters, and control keys for activating control functions. Examples of such control keys include a "back to home" key, a power on/off key, and the like.
The main display 120 is used to display information input by a user, information provided to the user, and various graphic user interfaces of the electronic body section 10, which may be composed of graphics, text, icons, numbers, video, and any combination thereof, and in one example, the touch screen 109 may be provided on the display panel 111 so as to be integrated with the display panel 111.
The power module 122 is used to provide power supply to the processor 102 and other components. Specifically, the power module 122 may include a power management system, one or more power sources (e.g., batteries or ac power), a charging circuit, a power failure detection circuit, an inverter, a power status indicator light, and any other components associated with the generation, management, and distribution of power within the electronic body portion 10 or the primary display 120.
The mobile terminal 100 further comprises a locator 119, the locator 119 being configured to determine an actual location of the mobile terminal 100. In this embodiment, the locator 119 implements the positioning of the mobile terminal 100 by using a positioning service, which is understood to be a technology or a service for obtaining the position information (e.g., longitude and latitude coordinates) of the mobile terminal 100 by using a specific positioning technology and marking the position of the positioned object on an electronic map.
It should be understood that the mobile terminal 100 described above is not limited to a smartphone terminal, but it should refer to a computer device that can be used in mobility. Specifically, the mobile terminal 100 refers to a mobile computer device equipped with an intelligent operating system, and the mobile terminal 100 includes, but is not limited to, a smart phone, a smart watch, a tablet computer, and the like.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (mobile terminal) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments. In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method of rights management, the method comprising:
monitoring an acquisition request of the device management authority after the device management authority of the application is activated;
when an acquisition request of a target authority is monitored, acquiring the authority level of the target authority, and judging whether the authority level is higher than a preset level, wherein the target authority is the authority in the equipment management authority;
when the authority level is higher than the preset level, displaying prompt information for judging whether to allow the operation corresponding to the target authority to be executed;
and when an instruction indicating that the target authority is allowed to be executed is received, operating the operation corresponding to the target authority.
2. The method according to claim 1, wherein the obtaining the permission level of the target permission when monitoring the obtaining request of the target permission and determining whether the permission level is higher than a preset level comprises:
when an acquisition request for the target permission is monitored, searching a mapping relation table comprising the target permission and the permission level;
acquiring the authority level of the target authority based on the mapping relation table;
and judging whether the permission level is higher than the preset level.
3. The method according to claim 1, wherein when the authority level is higher than the preset level, displaying a prompt message indicating whether to allow execution of an operation corresponding to the target authority, comprises:
and when the authority level is higher than the preset level, displaying the operation corresponding to the target authority and prompt information for judging whether to execute the operation corresponding to the target authority.
4. The method according to claim 3, wherein when the authority level is higher than the preset level, displaying a prompt message indicating whether the operation corresponding to the target authority is executed or not, the prompt message comprising:
and when the authority level is higher than the preset level, displaying the operation corresponding to the target authority, the harm corresponding to the operation and prompt information for judging whether to execute the operation corresponding to the target authority.
5. The method according to claim 1, wherein when the authority level is higher than the preset level, displaying a prompt message indicating whether to allow execution of an operation corresponding to the target authority, comprises:
and when the authority level is higher than the preset level, displaying prompt information for judging whether the operation corresponding to the target authority is allowed to be executed or not by a popup box.
6. The method according to any one of claims 1-5, further comprising:
and when the permission level is not higher than the preset level, operating the operation corresponding to the target permission.
7. The method according to any one of claims 1-5, further comprising:
when an instruction indicating that the target authority is not allowed to be executed is received, operation corresponding to the target authority is forbidden to be executed; and
and displaying an operation step of deactivating the device management authority.
8. A rights management apparatus, characterized in that the apparatus comprises:
the monitoring starting module is used for monitoring an acquisition request of the equipment management authority after the equipment management authority of the application is activated;
the permission level judging module is used for acquiring the permission level of the target permission and judging whether the permission level is higher than a preset level or not when monitoring an acquisition request of the target permission, wherein the target permission is the permission in the equipment management permission;
the prompt information display module is used for displaying prompt information for judging whether to allow the operation corresponding to the target authority to be executed or not when the authority level is higher than the preset level;
and the authority operation running module is used for running the operation corresponding to the target authority when receiving an instruction indicating that the target authority is allowed to be executed.
9. A mobile terminal comprising a touch screen, a memory, and a processor, the touch screen and the memory coupled to the processor, the memory storing instructions that, when executed by the processor, the processor performs the method of any of claims 1-7.
10. A computer-readable storage medium having program code executable by a processor, the program code causing the processor to perform the method of any one of claims 1-7.
CN201810349295.1A 2018-04-18 2018-04-18 Authority management method, device, mobile terminal and storage medium Active CN108712561B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810349295.1A CN108712561B (en) 2018-04-18 2018-04-18 Authority management method, device, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810349295.1A CN108712561B (en) 2018-04-18 2018-04-18 Authority management method, device, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN108712561A CN108712561A (en) 2018-10-26
CN108712561B true CN108712561B (en) 2020-05-19

Family

ID=63866736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810349295.1A Active CN108712561B (en) 2018-04-18 2018-04-18 Authority management method, device, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN108712561B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110062106B (en) * 2019-03-27 2021-10-15 努比亚技术有限公司 Calling method of application program, mobile terminal and storage medium
CN110334500B (en) * 2019-06-28 2022-04-12 百度在线网络技术(北京)有限公司 Authority control method and device of intelligent sound box, intelligent sound box and storage medium
CN110928467B (en) * 2019-11-19 2021-07-27 广东欢太科技有限公司 Connection option display method and device and computer readable storage medium
CN111444497B (en) * 2020-04-13 2024-03-08 Oppo广东移动通信有限公司 Application program detection method and device and electronic equipment
CN112118611B (en) * 2020-09-22 2022-09-16 上海连尚网络科技有限公司 Method and device for connecting wireless hotspot
CN112863150B (en) * 2021-01-11 2022-09-02 Tcl通讯(宁波)有限公司 Prompting method, prompting device, storage medium and mobile terminal
CN113343304A (en) * 2021-06-29 2021-09-03 挂号网(杭州)科技有限公司 Permission application method and device, electronic equipment and storage medium
CN113992369B (en) * 2021-10-18 2023-07-18 北京天融信网络安全技术有限公司 Topology management method and system for network security equipment
CN115017485B (en) * 2022-08-08 2022-10-25 北京永洪商智科技有限公司 Data authority management and control method and system
CN117098134B (en) * 2023-10-17 2024-01-26 湖北星纪魅族集团有限公司 Security control method, terminal, and non-transitory computer-readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110220A (en) * 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device
CN102404727A (en) * 2011-11-24 2012-04-04 中兴通讯股份有限公司 Method and device for safety control of mobile terminal
CN102420902A (en) * 2011-11-24 2012-04-18 中兴通讯股份有限公司 Method for classification management over right of using functions and mobile terminal
CN102523330A (en) * 2011-12-21 2012-06-27 广东步步高电子工业有限公司 Cell phone privilege management and verification method based on three-dimensional privilege level model
CN103686722A (en) * 2012-09-13 2014-03-26 中兴通讯股份有限公司 Access control method and device
CN104392176A (en) * 2014-12-12 2015-03-04 北京奇虎科技有限公司 Mobile terminal and method for intercepting device manager authority thereof
CN105631338A (en) * 2014-10-31 2016-06-01 重庆重邮信科通信技术有限公司 Application security authentication method and terminal
CN106055973A (en) * 2016-05-30 2016-10-26 深圳市永兴元科技有限公司 Application permission management method and application apparatus
US9521134B2 (en) * 2015-05-13 2016-12-13 Atto Research Co., Ltd. Control apparatus in software defined network and method for operating the same
CN106469270A (en) * 2015-08-17 2017-03-01 中国移动通信集团公司 A kind of management method of application permission, equipment and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102110220A (en) * 2011-02-14 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Application program monitoring method and device
CN102404727A (en) * 2011-11-24 2012-04-04 中兴通讯股份有限公司 Method and device for safety control of mobile terminal
CN102420902A (en) * 2011-11-24 2012-04-18 中兴通讯股份有限公司 Method for classification management over right of using functions and mobile terminal
CN102523330A (en) * 2011-12-21 2012-06-27 广东步步高电子工业有限公司 Cell phone privilege management and verification method based on three-dimensional privilege level model
CN103686722A (en) * 2012-09-13 2014-03-26 中兴通讯股份有限公司 Access control method and device
CN105631338A (en) * 2014-10-31 2016-06-01 重庆重邮信科通信技术有限公司 Application security authentication method and terminal
CN104392176A (en) * 2014-12-12 2015-03-04 北京奇虎科技有限公司 Mobile terminal and method for intercepting device manager authority thereof
US9521134B2 (en) * 2015-05-13 2016-12-13 Atto Research Co., Ltd. Control apparatus in software defined network and method for operating the same
CN106469270A (en) * 2015-08-17 2017-03-01 中国移动通信集团公司 A kind of management method of application permission, equipment and system
CN106055973A (en) * 2016-05-30 2016-10-26 深圳市永兴元科技有限公司 Application permission management method and application apparatus

Also Published As

Publication number Publication date
CN108712561A (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN108712561B (en) Authority management method, device, mobile terminal and storage medium
CN109699059B (en) Cell reselection method and terminal equipment
CN108021642B (en) Application program recommendation method and device, mobile terminal and storage medium
CN108235308B (en) Data reporting method and device, mobile terminal and computer readable medium
CN110674490B (en) Application permission display method and device and mobile terminal
CN108710795B (en) Information prompting method and device, mobile terminal and storage medium
CN107506646B (en) Malicious application detection method and device and computer readable storage medium
CN108200632B (en) Method for accessing terminal to LTE network and terminal
CN109542279B (en) Terminal device control method and terminal device
CN108668328B (en) Network switching method and mobile terminal
CN109753350B (en) Resource management method and terminal equipment
CN108632460A (en) Right management method, device, mobile terminal and storage medium
CN108737638B (en) Application control method and device, mobile terminal and computer readable medium
CN107908939B (en) Terminal alarm method and device and mobile terminal
CN108763892A (en) Right management method, device, mobile terminal and storage medium
CN110457935B (en) Permission configuration method and terminal equipment
AU2019211885B2 (en) Authentication window display method and apparatus
CN110557499B (en) Information processing method and device and mobile terminal
CN110505340B (en) Message sending method, terminal equipment and readable storage medium
CN108647070B (en) Information reminding method and device, mobile terminal and computer readable medium
CN109815679B (en) Authority management method and mobile terminal
CN108769366B (en) Authority management method, device, mobile terminal and storage medium
CN109522741B (en) Application program permission prompting method and terminal equipment thereof
CN110221736B (en) Icon processing method and device, mobile terminal and storage medium
CN107819938B (en) Corner mark configuration method and device, mobile terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant