CN109743441A - Access limit setting method and device - Google Patents
Access limit setting method and device Download PDFInfo
- Publication number
- CN109743441A CN109743441A CN201811526670.1A CN201811526670A CN109743441A CN 109743441 A CN109743441 A CN 109743441A CN 201811526670 A CN201811526670 A CN 201811526670A CN 109743441 A CN109743441 A CN 109743441A
- Authority
- CN
- China
- Prior art keywords
- access limit
- file
- application program
- candidate access
- candidate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The disclosure is directed to a kind of access limit setting method and devices, include at least one candidate access limit in the access limit configuration this method comprises: adding access limit configuration in the priority assignation of application program;When receiving the access operation for the priority assignation of the application program, then the various candidate access limits that the access limit configuration includes are exported;When receiving the selection operation for the candidate access limit, then the corresponding access limit of the application program is determined according to the candidate access limit selected.Therefore, the access limit for the control application program that the disclosure can be more accurate, so that the application program can only be written and read in user-defined range, and can limit the access limit of Malware, also improve the safety of user data and privacy.
Description
Technical field
This disclosure relates to the communications field more particularly to a kind of access limit setting method and device.
Background technique
With the continuous development of the communication technology, intelligent terminal is also widely used.In the related technology, for read-write hand
It can be set whether application program can read and write the file system of mobile phone in the application permission setting of machine storage, if being set as fair
Perhaps, then the application program can read each of file system file.But if malicious application is accessible
To all data of user, it will cause the privacy leakage of user.
Summary of the invention
To overcome the problems in correlation technique, present disclose provides a kind of access limit setting method and devices.
According to the first aspect of the embodiments of the present disclosure, a kind of access limit setting method is provided, which comprises
Access limit configuration is added in the priority assignation of application program, includes at least one in the access limit configuration
Candidate access limit;
When receiving the access operation for the priority assignation of the application program, then the access limit configuration is exported
Including the various candidate access limits;
When receiving the selection operation for the candidate access limit, then determined according to the candidate access limit selected
The corresponding access limit of the application program.
Optionally, at least one candidate access limit includes at least one of the following:
First candidate access limit, the described first candidate access limit be used to characterize not allow to read and write all file with
File;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built text of application program
Part folder and file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and text
Part;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and text for characterizing
Part.
Optionally, the method also includes:
In the installation and use process of application program, corresponding file and file, corresponding file are created
With file for characterizing the application program self-built file and file;
Record the storage location of corresponding file and file.
Optionally, the candidate access limit selected includes the described first candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding first access limit of the application program is determined according to the described first candidate access limit, and described first reads
Write permission is cannot to be written and read to file and file all in terminal document system.
Optionally, the candidate access limit selected includes the described second candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding second access limit of the application program is determined according to the described second candidate access limit, and described second reads
Write permission be can the file and file self-built to the application program stored in terminal document system be written and read, but
The alternative document folder and file stored in the terminal document system cannot be written and read.
Optionally, the candidate access limit selected includes the third candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
The first catalogue is exported according to the third candidate access limit, includes file and file in first catalogue;
When receiving the selection operation for file and file in first catalogue, then file that will select
It is determined as the specified file and file with file;
Determine that the corresponding third access limit of the application program, the third access limit can be to described specified
File and file are written and read.
Optionally, the candidate access limit selected includes the described 4th candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
According to the described 4th candidate access limit output file list of types;
When receiving the selection operation for the file type in the file type list, then files classes that will select
Type is determined as the specified file type;
Determine corresponding 4th access limit of the application program, the 4th access limit can be to described specified
The file of file type is written and read.
Optionally, the candidate access limit selected includes the described 5th candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
It include that security warning is believed in the security warning frame according to the described 5th candidate access limit output safety caution frame
Breath;
When receiving the confirmation operation for the security warning information, it is determined that the application program the corresponding 5th
Access limit, the 5th access limit are can be written and read behaviour to file and file all in terminal document system
Make.
According to the second aspect of an embodiment of the present disclosure, a kind of access limit setting device is provided, described device includes:
Permission adds module, is configured as adding access limit configuration, the read-write in the priority assignation of application program
It include at least one candidate access limit in authority configuration;
Permission output module is configured as when receiving the access operation for the priority assignation of the application program,
Then export the various candidate access limits that the access limit configuration includes;
Permission determining module is configured as when receiving the selection operation for the candidate access limit, then basis
The candidate access limit selected determines the corresponding access limit of the application program.
Optionally, at least one candidate access limit includes at least one of the following:
First candidate access limit, the described first candidate access limit be used to characterize not allow to read and write all file with
File;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built text of application program
Part folder and file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and text
Part;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and text for characterizing
Part.
Optionally, described device further include:
Creation module is configured as in the installation and use process of application program, creates corresponding file and file,
Corresponding file and file are for characterizing the application program self-built file and file;
Logging modle is configured as recording the storage location of corresponding file and file.
Optionally, the candidate access limit selected includes the described first candidate access limit;The permission determines mould
Block includes:
First permission determines submodule, is configured as determining the application program pair according to the described first candidate access limit
The first access limit answered, first access limit are cannot to carry out to file all in terminal document system and file
Read-write operation.
Optionally, the candidate access limit selected includes the described second candidate access limit;The permission determines mould
Block includes:
Second permission determines submodule, is configured as determining the application program pair according to the described second candidate access limit
The second access limit answered, second access limit is can be self-built to the application program stored in terminal document system
File and file are written and read, but cannot be carried out to the alternative document folder and file stored in the terminal document system
Read-write operation.
Optionally, the candidate access limit selected includes the third candidate access limit;The permission determines mould
Block includes:
First output sub-module is configured as exporting the first catalogue according to the third candidate access limit, described first
It include file and file in catalogue;
First determines submodule, is configured as working as the selection received for file and file in first catalogue
When operation, then the file selected and file are determined as the specified file and file;
Third permission determines submodule, is configured to determine that the corresponding third access limit of the application program, described
Three access limits are can be written and read to the specified file and file.
Optionally, the candidate access limit selected includes the described 4th candidate access limit;The permission determines mould
Block includes:
Second output sub-module is configured as according to the described 4th candidate access limit output file list of types;
Second determines submodule, is configured as working as the selection received for the file type in the file type list
When operation, then the file type selected is determined as the specified file type;
4th permission determines submodule, is configured to determine that corresponding 4th access limit of the application program, described
Four access limits are can be written and read to the file of the specified file type.
Optionally, the candidate access limit selected includes the described 5th candidate access limit;The permission determines mould
Block includes:
Third output sub-module is configured as according to the described 5th candidate access limit output safety caution frame, the peace
It include security warning information in full caution frame;
5th permission determines submodule, is configured as when receiving the confirmation operation for the security warning information,
Then determine corresponding 5th access limit of the application program, the 5th access limit is can be to institute in terminal document system
Some files and file are written and read.
According to the third aspect of an embodiment of the present disclosure, a kind of access limit setting device is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Access limit configuration is added in the priority assignation of application program, includes at least one in the access limit configuration
Candidate access limit;
When receiving the access operation for the priority assignation of the application program, then the access limit configuration is exported
Including the various candidate access limits;
When receiving the selection operation for the candidate access limit, then determined according to the candidate access limit selected
The corresponding access limit of the application program.
The technical scheme provided by this disclosed embodiment can include the following benefits:
Terminal can add access limit configuration, access limit configuration in the priority assignation of application program in the disclosure
In include at least one candidate access limit, also, when receiving the access operation for the priority assignation of application program, then
The various candidate access limits that output access limit configuration includes, and work as the selection operation received for candidate access limit
When, then the corresponding access limit of the application program is determined according to the candidate access limit selected, so as to more accurate control
The access limit of application program processed, so that the application program can only be written and read in user-defined range, and can
The access limit for limiting Malware, also improves the safety of user data and privacy.
Terminal shows that user is based on security consideration and does not allow when user has selected the first candidate access limit in the disclosure
Application program reads and writes all file and file, can determine the application program pair according to the first candidate access limit at this time
The first access limit answered, first access limit are cannot to read file and file all in terminal document system
Write operation, to ensure that the safety of user data and privacy.
Terminal shows that user is based on security consideration and only allows when user has selected the second candidate access limit in the disclosure
Application program reads and writes the self-built file and file of the application program, and can be determined at this time according to the second candidate access limit should
Corresponding second access limit of application program, second access limit be can to stored in terminal document system this using journey
The self-built file of sequence and file are written and read, but cannot be to the alternative document folder and file stored in terminal document system
It is written and read, to limit the read-write range of application program, improves the alternative document stored in terminal document system
The safety of folder and file.
Terminal shows that user is based on security consideration and only allows when user has selected third candidate's access limit in the disclosure
Application program read-write specified file and file, also need to export at this time first for determining specified file and file
Catalogue, and one or more files that user is chosen from the first catalogue and file be as specified file and file,
And determine the corresponding third access limit of application program, the third access limit be can to specified file and file into
Row read-write operation also improves the standard of access limit setting to meet the individual needs of user's specified folder and file
True property.
Terminal shows that user is based on security consideration and only allows when user has selected the 4th candidate access limit in the disclosure
The specified file type of application program read-write also needs to export at this time the file type column for determining specified file type
Table, and one or more file types that user is chosen from file type list are as specified file type, and really
Determine corresponding 4th access limit of application program, the 4th access limit is can to read the file of specified file type
Write operation has also refined the access limit range of application program to meet the individual needs of user's file types.
Terminal shows that user thinks that application program is safety when user has selected the 5th candidate access limit in the disclosure
, output safety caution frame is also needed at this time, includes security warning information in the security warning frame, and safe police is read by user
Whether after showing information, reaffirming allows application program to access all file and file, if confirmation, can determine answer at this time
With corresponding 5th access limit of program, the 5th access limit is can be to file and text all in terminal document system
Part is written and read, to improve the reliability of access limit setting, also improves the practicability of access limit setting.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of disclosure access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 2 is a kind of disclosure application scenario diagram of access limit setting method shown according to an exemplary embodiment;
Fig. 3 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 4 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 5 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 6 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 7 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 8 is a kind of disclosure block diagram of access limit setting device shown according to an exemplary embodiment;
Fig. 9 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 10 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 11 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 12 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 13 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 14 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 15 be the disclosure it is shown according to an exemplary embodiment it is a kind of for access limit setting device structure show
It is intended to.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
It is only to be not intended to be limiting the disclosure merely for for the purpose of describing particular embodiments in the term that the disclosure uses.
The "an" of the singular used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority
Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps
It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure
A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from
In the case where disclosure range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determination ".
As shown in Figure 1, Fig. 1 is a kind of disclosure access limit setting method process shown according to an exemplary embodiment
Figure, Fig. 2 is a kind of scene figure of access limit setting method shown according to an exemplary embodiment;This method can be used for end
End, such as: smart phone, as shown in Figure 1, the access limit setting method may comprise steps of 110-130:
In step 110, access limit configuration is added in the priority assignation of application program, is wrapped in access limit configuration
Include at least one candidate access limit.
In the embodiment of the present disclosure, the purpose for adding access limit configuration is the institute for preventing malicious application that user is accessed
Have a data and caused by privacy of user reveal.
Such as: certain unsafe application programs can be limited in the file for only allowing to read and write oneself creation, only permitted
Perhaps the reading and writing of files below the file of oneself creation, cannot thus read and write the file of other applications creation.
For another example: certain unsafe application programs can be limited in the read-write that cannot operate any file, thus
Avoid privacy of user leakage.
In one embodiment, the candidate access limit of at least one of above-mentioned steps 110 can include but is not limited to following
At least one of:
(1-1) first candidate access limit, the described first candidate access limit allow to read and write all texts for characterizing not
Part folder and file;
(1-2) second candidate's access limit, the described second candidate access limit allow to read and write application program certainly for characterizing
The file and file built;
(1-3) third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file
Folder and file;
(1-4) the 4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file
Type;
(1-5) the 5th candidate access limit, the described 5th candidate access limit allow to read and write all files for characterizing
Folder and file.
Application program in above-mentioned (1-2) self-built file and file can be application program installation and used
Corresponding file and file are created in journey.Correspondingly, in one embodiment, which can also wrap
It includes:
(2-1) creates corresponding file and file, corresponding text in the installation and use process of application program
Part folder and file are for characterizing the application program self-built file and file;
(2-2) records the storage location of corresponding file and file.
In the step 120, when receiving the access operation for the priority assignation of application program, then access limit is exported
The various candidate access limits that configuration includes.
In the embodiment of the present disclosure, user can be for application program for the access operation of the priority assignation of application program
Priority assignation access operation.That is, the access operation can open the priority assignation of application program for user.
After exporting the various candidate access limits that access limit configuration includes, such user can be from these candidate's read-writes
The candidate access limit for being suitable for the application program is chosen in permission.
Such as: user thinks the application security, and can choose above-mentioned (1-1) allows application program read-write all
File and file, the access limit as the application program.
For another example: user thinks that the application program is dangerous, and can choose above-mentioned (1-2) i.e. only allows the application program to read
It is written from the file and file built, the application program in this way cannot read and write the file and file of other applications creation
, to ensure that the data safety of other applications.
In step 130, when receiving the selection operation for candidate access limit, then according to the candidate read-write selected
Permission determines the corresponding access limit of the application program.
In the embodiment of the present disclosure, user can be for candidate access limit for the selection operation of candidate access limit
Selection operation.That is, user can choose the candidate access limit suitable for the application program from candidate access limit.
Also, after user selects candidate access limit, terminal also needs to determine the application according to candidate's access limit
The corresponding access limit of program.
Wherein, due to candidate access limit that user is application program selection may there are many selection mode, it is all most
The corresponding access limit of the application program determined eventually also can specifically be detailed in implementation shown in Fig. 3 to Fig. 7 there are many permission mode
Example.
In an exemplary scene, as shown in Fig. 2, user and smart phone.Smart phone can be in the permission of application program
Access limit configuration is added in setting, includes at least one candidate access limit in the access limit configuration;When receiving use
Family for the priority assignation of the application program access operation when, then export that access limit configuration includes is various described
Candidate access limit;When receiving selection operation of the user for the candidate access limit, then according to the candidate reading selected
Write permission determines the corresponding access limit of the application program.
As seen from the above-described embodiment, access limit configuration, read-write power can be added in the priority assignation of application program
Limit includes at least one candidate access limit in configuring, also, is grasped when receiving the access for the priority assignation of application program
When making, then the various candidate access limits that access limit configuration includes are exported, and be directed to candidate access limit when receiving
When selection operation, then the corresponding access limit of the application program is determined according to the candidate access limit selected, so as to more
It is accurately controlled the access limit of application program, so that the application program can only be written and read behaviour in user-defined range
Make, and the access limit of Malware can be limited, also improves the safety of user data and privacy.
As shown in figure 3, Fig. 3 is the disclosure another access limit setting method stream shown according to an exemplary embodiment
Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select
Candidate access limit includes the first candidate access limit;Described first candidate access limit does not allow to read and write all for characterization
File and file;In executing step 130, it may comprise steps of 310:
In the step 310, when receiving the selection operation for the first candidate access limit, then according to first selected
Candidate access limit determines corresponding first access limit of application program, which is cannot be to terminal document system
In all file and file be written and read.
As seen from the above-described embodiment, when user has selected the first candidate access limit, show that user is based on security consideration
Do not allow application program to read and write all file and file, the application can be determined according to the first candidate access limit at this time
Corresponding first access limit of program, which is cannot be to file and file all in terminal document system
It is written and read, to ensure that the safety of user data and privacy.
As shown in figure 4, Fig. 4 is the disclosure another access limit setting method stream shown according to an exemplary embodiment
Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select
Candidate access limit includes the second candidate access limit;Described second candidate access limit allows to read and write application program for characterizing
Self-built file and file;In executing step 130, it may comprise steps of 410:
In step 410, when receiving the selection operation for the second candidate access limit, then according to second selected
Candidate access limit determines corresponding second access limit of application program, which is can be to terminal document system
The file and file that the application program of middle storage is self-built be written and read, but cannot be to storing in terminal document system
Alternative document folder and file are written and read.
As seen from the above-described embodiment, when user has selected the second candidate access limit, show that user is based on security consideration
Only application program is allowed to read and write the self-built file and file of the application program, it at this time can be according to the second candidate access limit
Determine that corresponding second access limit of the application program, second access limit are can be somebody's turn to do to what is stored in terminal document system
The self-built file of application program and file are written and read, but cannot be pressed from both sides to the alternative document stored in terminal document system
It is written and read with file, to limit the read-write range of application program, improves its stored in terminal document system
The safety of his file and file.
As shown in figure 5, Fig. 5 is the disclosure another access limit setting method stream shown according to an exemplary embodiment
Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select
Candidate access limit includes third candidate's access limit;The third candidate access limit, which is used to characterize, to be allowed to read and write specified text
Part folder and file;In executing step 130,510-530 may comprise steps of:
In step 510, when receiving the selection operation for third candidate access limit, then according to the third selected
Candidate access limit exports the first catalogue, includes file and file in first catalogue.
In the embodiment of the present disclosure, after user selects third candidate access limit, terminal can be referred to automatic spring for determination
First catalogue of fixed file and file.
In step 520, it when receiving the selection operation for file and file in the first catalogue, then will select
File and file be determined as specified file and file.
In the embodiment of the present disclosure, user can choose one or more files and file as specified from the first catalogue
File and file, and application program is allowed to read and write these specified files and file.
In step 530, the corresponding third access limit of application program is determined, which is can be to specified
File and file be written and read.
As seen from the above-described embodiment, when user has selected third candidate's access limit, show that user is based on security consideration
Only application program is allowed to read and write specified file and file, also needs to export for determining specified file and file at this time
The first catalogue, and one or more files that user is chosen from the first catalogue and file as specified file and
File, and determine the corresponding third access limit of application program, the third access limit be can to specified file and
File is written and read, to meet the individual needs of user's specified folder and file, is also improved access limit and is set
The accuracy set.
As shown in fig. 6, Fig. 6 is the disclosure another access limit setting method stream shown according to an exemplary embodiment
Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select
Candidate access limit includes the 4th candidate access limit;Described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified text
Part class;In executing step 130,610-630 may comprise steps of:
In step 610, when receiving the selection operation for the 4th candidate access limit, then according to the 4th selected
Candidate access limit output file list of types.
In the embodiment of the present disclosure, after the candidate access limit of user's selection the 4th, terminal can be referred to automatic spring for determination
The file type list of fixed file type.It wherein, may include one or more file types in file type list.Than
Such as: jpg file type, log file type.
In step 620, it when receiving the selection operation for the file type in file type list, then will select
File type be determined as the specified file type.
In the embodiment of the present disclosure, user can choose one or more file types as specified from file type list
File type, and application program is allowed to read and write the files of these specified file types.
In act 630, corresponding 4th access limit of application program is determined, the 4th access limit is can be to specified
The file of file type be written and read.
As seen from the above-described embodiment, when user has selected the 4th candidate access limit, show that user is based on security consideration
Only application program is allowed to read and write specified file type, also needs to export the files classes for determining specified file type at this time
Type list, and one or more file types that user is chosen from file type list are as specified file type, with
And determine corresponding 4th access limit of application program, the 4th access limit be can file to specified file type into
Row read-write operation has also refined the access limit model of application program to meet the individual needs of user's file types
It encloses.
As shown in fig. 7, Fig. 7 is the disclosure another access limit setting method stream shown according to an exemplary embodiment
Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select
Candidate access limit includes the 5th candidate access limit;Described 5th candidate access limit allows to read and write all texts for characterizing
Part folder and file;In executing step 130,710-720 may comprise steps of:
In step 720, when receiving the selection operation for the 5th candidate access limit, then according to the 5th selected
Candidate access limit output safety caution frame includes security warning information in the security warning frame.
In step 720, when receiving the confirmation operation for security warning information, it is determined that application program is corresponding
5th access limit, the 5th access limit are can be written and read behaviour to file and file all in terminal document system
Make.
As seen from the above-described embodiment, when user has selected the 5th candidate access limit, show that user thinks application program
Be it is safe, also need output safety caution frame at this time, include security warning information in the security warning frame, and read by user
Whether after security warning information, reaffirming allows application program to access all file and file, at this time can be with if confirmation
Determine corresponding 5th access limit of application program, the 5th access limit is can be to file all in terminal document system
Folder and file are written and read, to improve the reliability of access limit setting, also improve the reality of access limit setting
The property used.
Corresponding with aforementioned access limit setting method embodiment, the disclosure additionally provides the reality of access limit setting device
Apply example.
As shown in figure 8, Fig. 8 is a kind of disclosure frame of access limit setting device shown according to an exemplary embodiment
Figure, described device, which can be applied, can be used for terminal, such as: smart phone, and for executing access limit setting shown in FIG. 1
Method, as shown in figure 8, access limit setting device may include:
Permission adds module 81, is configured as adding access limit configuration, the reading in the priority assignation of application program
It include at least one candidate access limit in write permission configuration;
Permission output module 82 is configured as when the access operation for receiving the priority assignation for the application program
When, then export the various candidate access limits that the access limit configuration includes;
Permission determining module 83 is configured as when receiving the selection operation for the candidate access limit, then root
The corresponding access limit of the application program is determined according to the candidate access limit selected.
As seen from the above-described embodiment, access limit configuration, read-write power can be added in the priority assignation of application program
Limit includes at least one candidate access limit in configuring, also, is grasped when receiving the access for the priority assignation of application program
When making, then the various candidate access limits that access limit configuration includes are exported, and be directed to candidate access limit when receiving
When selection operation, then the corresponding access limit of the application program is determined according to the candidate access limit selected, so as to more
It is accurately controlled the access limit of application program, so that the application program can only be written and read behaviour in user-defined range
Make, and the access limit of Malware can be limited, also improves the safety of user data and privacy.
In one embodiment, it establishes on the basis of device shown in Fig. 8, at least one candidate access limit can wrap
It includes but is not limited at least one of following:
First candidate access limit, the described first candidate access limit be used to characterize not allow to read and write all file with
File;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built text of application program
Part folder and file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and text
Part;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and text for characterizing
Part.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 9, described device can also include:
Creation module 91 is configured as in the installation and use process of application program, creates corresponding file and text
Part, corresponding file and file are for characterizing the application program self-built file and file;
Logging modle 92 is configured as recording the storage location of corresponding file and file.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in Figure 10, the candidate read-write selected
Permission includes the described first candidate access limit;The permission determining module 83 may include:
First permission determines submodule 101, is configured as being determined according to the described first candidate access limit described using journey
Corresponding first access limit of sequence, first access limit is cannot be to file and file all in terminal document system
It is written and read.
As seen from the above-described embodiment, when user has selected the first candidate access limit, show that user is based on security consideration
Do not allow application program to read and write all file and file, the application can be determined according to the first candidate access limit at this time
Corresponding first access limit of program, which is cannot be to file and file all in terminal document system
It is written and read, to ensure that the safety of user data and privacy.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 11, the candidate read-write selected
Permission includes the described second candidate access limit;The permission determining module 83 may include:
Second permission determines submodule 111, is configured as being determined according to the described second candidate access limit described using journey
Corresponding second access limit of sequence, second access limit is can be to the application program stored in terminal document system certainly
The file and file built are written and read, but cannot be to the alternative document folder and file stored in the terminal document system
It is written and read.
As seen from the above-described embodiment, when user has selected the second candidate access limit, show that user is based on security consideration
Only application program is allowed to read and write the self-built file and file of the application program, it at this time can be according to the second candidate access limit
Determine that corresponding second access limit of the application program, second access limit are can be somebody's turn to do to what is stored in terminal document system
The self-built file of application program and file are written and read, but cannot be pressed from both sides to the alternative document stored in terminal document system
It is written and read with file, to limit the read-write range of application program, improves its stored in terminal document system
The safety of his file and file.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 12, the candidate read-write selected
Permission includes the third candidate access limit;The permission determining module 83 may include:
First output sub-module 121 is configured as exporting the first catalogue according to the third candidate access limit, described the
It include file and file in one catalogue;
First determines submodule 122, is configured as working as the file and file received in first catalogue
When selection operation, then the file selected and file are determined as the specified file and file;
Third permission determines submodule 123, is configured to determine that the corresponding third access limit of the application program, described
Third access limit is can be written and read to the specified file and file.
As seen from the above-described embodiment, when user has selected third candidate's access limit, show that user is based on security consideration
Only application program is allowed to read and write specified file and file, also needs to export for determining specified file and file at this time
The first catalogue, and one or more files that user is chosen from the first catalogue and file as specified file and
File, and determine the corresponding third access limit of application program, the third access limit be can to specified file and
File is written and read, to meet the individual needs of user's specified folder and file, is also improved access limit and is set
The accuracy set.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 13, the candidate read-write selected
Permission includes the described 4th candidate access limit;The permission determining module 83 may include:
Second output sub-module 131 is configured as according to the described 4th candidate access limit output file list of types;
Second determination submodule 132, is configured as to receive for the file type in the file type list
When selection operation, then the file type selected is determined as the specified file type;
4th permission determines submodule 133, is configured to determine that corresponding 4th access limit of the application program, described
4th access limit is can be written and read to the file of the specified file type.
As seen from the above-described embodiment, when user has selected the 4th candidate access limit, show that user is based on security consideration
Only application program is allowed to read and write specified file type, also needs to export the files classes for determining specified file type at this time
Type list, and one or more file types that user is chosen from file type list are as specified file type, with
And determine corresponding 4th access limit of application program, the 4th access limit be can file to specified file type into
Row read-write operation has also refined the access limit model of application program to meet the individual needs of user's file types
It encloses.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 14, the candidate read-write selected
Permission includes the described 5th candidate access limit;The permission determining module 83 may include:
Third output sub-module 141 is configured as according to the described 5th candidate access limit output safety caution frame, described
It include security warning information in security warning frame;
5th permission determines submodule 142, is configured as working as the confirmation operation received for the security warning information
When, it is determined that corresponding 5th access limit of the application program, the 5th access limit is can be to terminal document system
In all file and file be written and read.
As seen from the above-described embodiment, when user has selected the 5th candidate access limit, show that user thinks application program
Be it is safe, also need output safety caution frame at this time, include security warning information in the security warning frame, and read by user
Whether after security warning information, reaffirming allows application program to access all file and file, at this time can be with if confirmation
Determine corresponding 5th access limit of application program, the 5th access limit is can be to file all in terminal document system
Folder and file are written and read, to improve the reliability of access limit setting, also improve the reality of access limit setting
The property used.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus
Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with
It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual
The purpose for needing to select some or all of the modules therein to realize disclosure scheme.Those of ordinary skill in the art are not paying
Out in the case where creative work, it can understand and implement.
With Fig. 8 correspondingly, the disclosure also provides another access limit setting device, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Access limit configuration is added in the priority assignation of application program, includes at least one in the access limit configuration
Candidate access limit;
When receiving the access operation for the priority assignation of the application program, then the access limit configuration is exported
Including the various candidate access limits;
When receiving the selection operation for the candidate access limit, then determined according to the candidate access limit selected
The corresponding access limit of the application program.
As shown in figure 15, Figure 15 is that the disclosure is shown according to an exemplary embodiment a kind of for access limit setting dress
Set 1500 structural schematic diagram.For example, device 1500 can be the mobile phone with routing function, computer, number is extensively
Broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, the terminals such as personal digital assistant.
Referring to Fig.1 5, device 1500 may include following one or more components: processing component 1502, memory 1504,
Power supply module 1506, multimedia component 1508, audio component 1510, the interface 1512 of input/output (I/O), sensor module
1514 and communication component 1516.
The integrated operation of the usual control device 1500 of processing component 1502, such as with display, telephone call, data communication,
Camera operation and record operate associated operation.Processing component 1502 may include one or more processors 1520 to execute
Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1502 may include one or more moulds
Block, convenient for the interaction between processing component 1502 and other assemblies.For example, processing component 1502 may include multi-media module,
To facilitate the interaction between multimedia component 1508 and processing component 1502.
Memory 1504 is configured as storing various types of data to support the operation in device 1500.These data
Example includes the instruction of any application or method for operating on device 1500, contact data, telephone book data,
Message, picture, video etc..Memory 1504 can by any kind of volatibility or non-volatile memory device or they
Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Power supply module 1506 provides electric power for the various assemblies of device 1500.Power supply module 1506 may include power management
System, one or more power supplys and other with for device 1500 generate, manage, and distribute the associated component of electric power.
Multimedia component 1508 includes the screen of one output interface of offer between described device 1500 and user.?
In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes
Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic
The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more
Media component 1508 includes a front camera and/or rear camera.When device 1500 is in operation mode, as shot mould
When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting
Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 1510 is configured as output and/or input audio signal.For example, audio component 1510 includes a wheat
Gram wind (MIC), when device 1500 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt
It is configured to receive external audio signal.The received audio signal can be further stored in memory 1504 or via communication
Component 1516 is sent.In some embodiments, audio component 1510 further includes a loudspeaker, is used for output audio signal.
I/O interface 1512 provides interface, above-mentioned peripheral interface module between processing component 1502 and peripheral interface module
It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and
Locking press button.
Sensor module 1514 includes one or more sensors, and the state for providing various aspects for device 1500 is commented
Estimate.For example, sensor module 1514 can detecte the state that opens/closes of device 1500, the relative positioning of component, such as institute
The display and keypad that component is device 1500 are stated, sensor module 1514 can be with detection device 1500 or device 1,500 1
The location information of a component changes, the existence or non-existence that user contacts with device 1500,1500 orientation of device or acceleration/deceleration
With the temperature change of device 1500.Sensor module 1514 may include proximity sensor, be configured to not any
It is detected the presence of nearby objects when physical contact.Sensor module 1514 can also include optical sensor, such as CMOS or ccd image
Sensor, for being used in imaging applications.In some embodiments, which can also include that acceleration passes
Sensor, gyro sensor, Magnetic Sensor, pressure sensor, microwave remote sensor or temperature sensor.
Communication component 1516 is configured to facilitate the communication of wired or wireless way between device 1500 and other equipment.Dress
The wireless network based on communication standard, such as WiFi can be accessed by setting 1500,2G or 3G or their combination.It is exemplary at one
In embodiment, communication component 1516 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, the communication component 1516 further includes near-field communication (NFC) module, to promote short distance
Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1500 can be by one or more application specific integrated circuit (ASIC), number
Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 1504 of instruction, above-metioned instruction can be executed by the processor 1520 of device 1500 to complete the above method.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
Its embodiment.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (17)
1. a kind of access limit setting method, which is characterized in that the described method includes:
Access limit configuration is added in the priority assignation of application program, includes at least one candidate in the access limit configuration
Access limit;
When receiving the access operation for the priority assignation of the application program, then exporting the access limit configuration includes
The various candidate access limits;
When receiving the selection operation for the candidate access limit, then according to the candidate access limit determination selected
The corresponding access limit of application program.
2. the method according to claim 1, wherein at least one candidate access limit include it is following at least
One:
First candidate access limit, the described first candidate access limit allow to read and write all file and text for characterizing not
Part;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built file of application program
And file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and file;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and file for characterizing.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
In the installation and use process of application program, corresponding file and file, corresponding file and text are created
Part is for characterizing the application program self-built file and file;
Record the storage location of corresponding file and file.
4. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes first time
Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding first access limit of the application program, the first read-write power are determined according to the described first candidate access limit
Limit is cannot to be written and read to file and file all in terminal document system.
5. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes second time
Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding second access limit of the application program, the second read-write power are determined according to the described second candidate access limit
Limit be can the file and file self-built to the application program stored in terminal document system be written and read, but cannot
The alternative document folder and file that store in the terminal document system are written and read.
6. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes that the third is waited
Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
The first catalogue is exported according to the third candidate access limit, includes file and file in first catalogue;
When receiving the selection operation for file and file in first catalogue, then by the file selected and text
Part is determined as the specified file and file;
Determine the corresponding third access limit of the application program, the third access limit is can be to the specified file
Folder and file are written and read.
7. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes the 4th time
Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
According to the described 4th candidate access limit output file list of types;
It is when receiving the selection operation for the file type in the file type list, then the file type selected is true
It is set to the specified file type;
Determine corresponding 4th access limit of the application program, the 4th access limit is can be to the specified file
The file of type is written and read.
8. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes the 5th time
Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
It include security warning information in the security warning frame according to the described 5th candidate access limit output safety caution frame;
When receiving the confirmation operation for the security warning information, it is determined that the application program the corresponding 5th is read and write
Permission, the 5th access limit are can be written and read to file and file all in terminal document system.
9. device is arranged in a kind of access limit, which is characterized in that described device includes:
Permission adds module, is configured as adding access limit configuration, the access limit in the priority assignation of application program
It include at least one candidate access limit in configuration;
Permission output module is configured as when receiving the access operation for the priority assignation of the application program, then defeated
The various candidate access limits that the access limit configuration includes out;
Permission determining module is configured as when receiving the selection operation for the candidate access limit, then basis is selected
Candidate access limit determine the corresponding access limit of the application program.
10. device according to claim 9, which is characterized in that at least one candidate access limit include with down toward
One item missing:
First candidate access limit, the described first candidate access limit allow to read and write all file and text for characterizing not
Part;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built file of application program
And file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and file;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and file for characterizing.
11. device according to claim 10, which is characterized in that described device further include:
Creation module is configured as in the installation and use process of application program, creates corresponding file and file, described
Corresponding file and file are for characterizing the application program self-built file and file;
Logging modle is configured as recording the storage location of corresponding file and file.
12. device according to claim 10, which is characterized in that the candidate access limit selected includes described first
Candidate access limit;The permission determining module includes:
First permission determines submodule, is configured as determining that the application program is corresponding according to the described first candidate access limit
First access limit, first access limit are cannot to be written and read to file and file all in terminal document system
Operation.
13. device according to claim 10, which is characterized in that the candidate access limit selected includes described second
Candidate access limit;The permission determining module includes:
Second permission determines submodule, is configured as determining that the application program is corresponding according to the described second candidate access limit
Second access limit, second access limit are files that can be self-built to the application program stored in terminal document system
Folder and file are written and read, but cannot be written and read to the alternative document folder and file stored in the terminal document system
Operation.
14. device according to claim 10, which is characterized in that the candidate access limit selected includes the third
Candidate access limit;The permission determining module includes:
First output sub-module is configured as exporting the first catalogue, first catalogue according to the third candidate access limit
In include file and file;
First determines submodule, is configured as working as the selection operation received for file and file in first catalogue
When, then the file selected and file are determined as the specified file and file;
Third permission determines submodule, is configured to determine that the corresponding third access limit of the application program, the third are read
Write permission is can be written and read to the specified file and file.
15. device according to claim 10, which is characterized in that the candidate access limit selected includes the described 4th
Candidate access limit;The permission determining module includes:
Second output sub-module is configured as according to the described 4th candidate access limit output file list of types;
Second determines submodule, is configured as working as the selection operation received for the file type in the file type list
When, then the file type selected is determined as the specified file type;
4th permission determines submodule, is configured to determine that corresponding 4th access limit of the application program, and the described 4th reads
Write permission is can be written and read to the file of the specified file type.
16. device according to claim 10, which is characterized in that the candidate access limit selected includes the described 5th
Candidate access limit;The permission determining module includes:
Third output sub-module is configured as according to the described 5th candidate access limit output safety caution frame, the safe police
Show to include security warning information in frame;
5th permission determines submodule, is configured as when receiving the confirmation operation for the security warning information, then really
Determine corresponding 5th access limit of the application program, the 5th access limit can be to all in terminal document system
File and file are written and read.
17. device is arranged in a kind of access limit, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Access limit configuration is added in the priority assignation of application program, includes at least one candidate in the access limit configuration
Access limit;
When receiving the access operation for the priority assignation of the application program, then exporting the access limit configuration includes
The various candidate access limits;
When receiving the selection operation for the candidate access limit, then according to the candidate access limit determination selected
The corresponding access limit of application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811526670.1A CN109743441B (en) | 2018-12-13 | 2018-12-13 | Read-write permission setting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811526670.1A CN109743441B (en) | 2018-12-13 | 2018-12-13 | Read-write permission setting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109743441A true CN109743441A (en) | 2019-05-10 |
CN109743441B CN109743441B (en) | 2021-09-07 |
Family
ID=66359337
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811526670.1A Active CN109743441B (en) | 2018-12-13 | 2018-12-13 | Read-write permission setting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109743441B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532764A (en) * | 2019-08-19 | 2019-12-03 | 维沃移动通信有限公司 | A kind of method, mobile terminal and the readable storage medium storing program for executing of permission processing |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090328155A1 (en) * | 2008-05-12 | 2009-12-31 | George Madathilparamgil George | Master device for controlling application security environments |
US20150089247A1 (en) * | 2013-09-23 | 2015-03-26 | Samsung Electronics Co., Ltd. | Storage medium having security function and security method thereof |
CN105653988A (en) * | 2015-12-30 | 2016-06-08 | 北京金山安全软件有限公司 | External storage device read-write permission control method and device and terminal device |
CN106570419A (en) * | 2016-10-28 | 2017-04-19 | 努比亚技术有限公司 | File read-write device and method |
CN106778291A (en) * | 2016-11-22 | 2017-05-31 | 北京奇虎科技有限公司 | The partition method and isolating device of application program |
CN107665175A (en) * | 2016-07-27 | 2018-02-06 | 展讯通信(上海)有限公司 | The method, apparatus and electronic equipment of memory partition isolation |
CN107798252A (en) * | 2017-10-27 | 2018-03-13 | 维沃移动通信有限公司 | A kind of file access method and mobile terminal |
CN108038369A (en) * | 2017-12-26 | 2018-05-15 | 上海展扬通信技术有限公司 | A kind of application permission control method and terminal |
CN108052461A (en) * | 2017-12-29 | 2018-05-18 | 普华基础软件股份有限公司 | A kind of method for protecting EMS memory of operating system |
-
2018
- 2018-12-13 CN CN201811526670.1A patent/CN109743441B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090328155A1 (en) * | 2008-05-12 | 2009-12-31 | George Madathilparamgil George | Master device for controlling application security environments |
US20150089247A1 (en) * | 2013-09-23 | 2015-03-26 | Samsung Electronics Co., Ltd. | Storage medium having security function and security method thereof |
CN105653988A (en) * | 2015-12-30 | 2016-06-08 | 北京金山安全软件有限公司 | External storage device read-write permission control method and device and terminal device |
CN107665175A (en) * | 2016-07-27 | 2018-02-06 | 展讯通信(上海)有限公司 | The method, apparatus and electronic equipment of memory partition isolation |
CN106570419A (en) * | 2016-10-28 | 2017-04-19 | 努比亚技术有限公司 | File read-write device and method |
CN106778291A (en) * | 2016-11-22 | 2017-05-31 | 北京奇虎科技有限公司 | The partition method and isolating device of application program |
CN107798252A (en) * | 2017-10-27 | 2018-03-13 | 维沃移动通信有限公司 | A kind of file access method and mobile terminal |
CN108038369A (en) * | 2017-12-26 | 2018-05-15 | 上海展扬通信技术有限公司 | A kind of application permission control method and terminal |
CN108052461A (en) * | 2017-12-29 | 2018-05-18 | 普华基础软件股份有限公司 | A kind of method for protecting EMS memory of operating system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532764A (en) * | 2019-08-19 | 2019-12-03 | 维沃移动通信有限公司 | A kind of method, mobile terminal and the readable storage medium storing program for executing of permission processing |
CN110532764B (en) * | 2019-08-19 | 2022-03-11 | 维沃移动通信有限公司 | Authority processing method, mobile terminal and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109743441B (en) | 2021-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111078655B (en) | Document content sharing method, device, terminal and storage medium | |
CN104765552B (en) | Right management method and device | |
KR102610013B1 (en) | An apparatus for providinng privacy protection and method thereof | |
CN105607834B (en) | Screen control method, device and terminal | |
CN105049269B (en) | information feedback method and device | |
CN105701997A (en) | Alarm method and device | |
CN105095717B (en) | The processing method and processing device of anomalous event, electronic equipment | |
CN105516485B (en) | The way of recording and device | |
CN105246068B (en) | SIM card selection method and device | |
CN109451813A (en) | Cell accessing method and device | |
CN104881342B (en) | terminal test method and device | |
CN105898573A (en) | Method and device for multimedia file playing | |
CN105205153A (en) | File storage method and device | |
CN106534551B (en) | Information display method and device | |
CN105187671A (en) | Recording method and device | |
CN105430469B (en) | Playback method, device, terminal and the server of audio, video data | |
CN107423378A (en) | Image display method and device | |
CN108509863A (en) | Information cuing method, device and electronic equipment | |
KR20130088610A (en) | Mobile terminal, control method thereof, and contents output system | |
CN108319835A (en) | User's space access control method, device, equipment and storage medium | |
CN109743441A (en) | Access limit setting method and device | |
CN105701245B (en) | Picture recommendation method and device | |
CN107463809A (en) | The display methods and device of application icon | |
CN105956489B (en) | Long-range control method and device | |
CN106060253B (en) | Information presentation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |