CN109743441A - Access limit setting method and device - Google Patents

Access limit setting method and device Download PDF

Info

Publication number
CN109743441A
CN109743441A CN201811526670.1A CN201811526670A CN109743441A CN 109743441 A CN109743441 A CN 109743441A CN 201811526670 A CN201811526670 A CN 201811526670A CN 109743441 A CN109743441 A CN 109743441A
Authority
CN
China
Prior art keywords
access limit
file
application program
candidate access
candidate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811526670.1A
Other languages
Chinese (zh)
Other versions
CN109743441B (en
Inventor
王芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201811526670.1A priority Critical patent/CN109743441B/en
Publication of CN109743441A publication Critical patent/CN109743441A/en
Application granted granted Critical
Publication of CN109743441B publication Critical patent/CN109743441B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The disclosure is directed to a kind of access limit setting method and devices, include at least one candidate access limit in the access limit configuration this method comprises: adding access limit configuration in the priority assignation of application program;When receiving the access operation for the priority assignation of the application program, then the various candidate access limits that the access limit configuration includes are exported;When receiving the selection operation for the candidate access limit, then the corresponding access limit of the application program is determined according to the candidate access limit selected.Therefore, the access limit for the control application program that the disclosure can be more accurate, so that the application program can only be written and read in user-defined range, and can limit the access limit of Malware, also improve the safety of user data and privacy.

Description

Access limit setting method and device
Technical field
This disclosure relates to the communications field more particularly to a kind of access limit setting method and device.
Background technique
With the continuous development of the communication technology, intelligent terminal is also widely used.In the related technology, for read-write hand It can be set whether application program can read and write the file system of mobile phone in the application permission setting of machine storage, if being set as fair Perhaps, then the application program can read each of file system file.But if malicious application is accessible To all data of user, it will cause the privacy leakage of user.
Summary of the invention
To overcome the problems in correlation technique, present disclose provides a kind of access limit setting method and devices.
According to the first aspect of the embodiments of the present disclosure, a kind of access limit setting method is provided, which comprises
Access limit configuration is added in the priority assignation of application program, includes at least one in the access limit configuration Candidate access limit;
When receiving the access operation for the priority assignation of the application program, then the access limit configuration is exported Including the various candidate access limits;
When receiving the selection operation for the candidate access limit, then determined according to the candidate access limit selected The corresponding access limit of the application program.
Optionally, at least one candidate access limit includes at least one of the following:
First candidate access limit, the described first candidate access limit be used to characterize not allow to read and write all file with File;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built text of application program Part folder and file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and text Part;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and text for characterizing Part.
Optionally, the method also includes:
In the installation and use process of application program, corresponding file and file, corresponding file are created With file for characterizing the application program self-built file and file;
Record the storage location of corresponding file and file.
Optionally, the candidate access limit selected includes the described first candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding first access limit of the application program is determined according to the described first candidate access limit, and described first reads Write permission is cannot to be written and read to file and file all in terminal document system.
Optionally, the candidate access limit selected includes the described second candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding second access limit of the application program is determined according to the described second candidate access limit, and described second reads Write permission be can the file and file self-built to the application program stored in terminal document system be written and read, but The alternative document folder and file stored in the terminal document system cannot be written and read.
Optionally, the candidate access limit selected includes the third candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
The first catalogue is exported according to the third candidate access limit, includes file and file in first catalogue;
When receiving the selection operation for file and file in first catalogue, then file that will select It is determined as the specified file and file with file;
Determine that the corresponding third access limit of the application program, the third access limit can be to described specified File and file are written and read.
Optionally, the candidate access limit selected includes the described 4th candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
According to the described 4th candidate access limit output file list of types;
When receiving the selection operation for the file type in the file type list, then files classes that will select Type is determined as the specified file type;
Determine corresponding 4th access limit of the application program, the 4th access limit can be to described specified The file of file type is written and read.
Optionally, the candidate access limit selected includes the described 5th candidate access limit;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
It include that security warning is believed in the security warning frame according to the described 5th candidate access limit output safety caution frame Breath;
When receiving the confirmation operation for the security warning information, it is determined that the application program the corresponding 5th Access limit, the 5th access limit are can be written and read behaviour to file and file all in terminal document system Make.
According to the second aspect of an embodiment of the present disclosure, a kind of access limit setting device is provided, described device includes:
Permission adds module, is configured as adding access limit configuration, the read-write in the priority assignation of application program It include at least one candidate access limit in authority configuration;
Permission output module is configured as when receiving the access operation for the priority assignation of the application program, Then export the various candidate access limits that the access limit configuration includes;
Permission determining module is configured as when receiving the selection operation for the candidate access limit, then basis The candidate access limit selected determines the corresponding access limit of the application program.
Optionally, at least one candidate access limit includes at least one of the following:
First candidate access limit, the described first candidate access limit be used to characterize not allow to read and write all file with File;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built text of application program Part folder and file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and text Part;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and text for characterizing Part.
Optionally, described device further include:
Creation module is configured as in the installation and use process of application program, creates corresponding file and file, Corresponding file and file are for characterizing the application program self-built file and file;
Logging modle is configured as recording the storage location of corresponding file and file.
Optionally, the candidate access limit selected includes the described first candidate access limit;The permission determines mould Block includes:
First permission determines submodule, is configured as determining the application program pair according to the described first candidate access limit The first access limit answered, first access limit are cannot to carry out to file all in terminal document system and file Read-write operation.
Optionally, the candidate access limit selected includes the described second candidate access limit;The permission determines mould Block includes:
Second permission determines submodule, is configured as determining the application program pair according to the described second candidate access limit The second access limit answered, second access limit is can be self-built to the application program stored in terminal document system File and file are written and read, but cannot be carried out to the alternative document folder and file stored in the terminal document system Read-write operation.
Optionally, the candidate access limit selected includes the third candidate access limit;The permission determines mould Block includes:
First output sub-module is configured as exporting the first catalogue according to the third candidate access limit, described first It include file and file in catalogue;
First determines submodule, is configured as working as the selection received for file and file in first catalogue When operation, then the file selected and file are determined as the specified file and file;
Third permission determines submodule, is configured to determine that the corresponding third access limit of the application program, described Three access limits are can be written and read to the specified file and file.
Optionally, the candidate access limit selected includes the described 4th candidate access limit;The permission determines mould Block includes:
Second output sub-module is configured as according to the described 4th candidate access limit output file list of types;
Second determines submodule, is configured as working as the selection received for the file type in the file type list When operation, then the file type selected is determined as the specified file type;
4th permission determines submodule, is configured to determine that corresponding 4th access limit of the application program, described Four access limits are can be written and read to the file of the specified file type.
Optionally, the candidate access limit selected includes the described 5th candidate access limit;The permission determines mould Block includes:
Third output sub-module is configured as according to the described 5th candidate access limit output safety caution frame, the peace It include security warning information in full caution frame;
5th permission determines submodule, is configured as when receiving the confirmation operation for the security warning information, Then determine corresponding 5th access limit of the application program, the 5th access limit is can be to institute in terminal document system Some files and file are written and read.
According to the third aspect of an embodiment of the present disclosure, a kind of access limit setting device is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Access limit configuration is added in the priority assignation of application program, includes at least one in the access limit configuration Candidate access limit;
When receiving the access operation for the priority assignation of the application program, then the access limit configuration is exported Including the various candidate access limits;
When receiving the selection operation for the candidate access limit, then determined according to the candidate access limit selected The corresponding access limit of the application program.
The technical scheme provided by this disclosed embodiment can include the following benefits:
Terminal can add access limit configuration, access limit configuration in the priority assignation of application program in the disclosure In include at least one candidate access limit, also, when receiving the access operation for the priority assignation of application program, then The various candidate access limits that output access limit configuration includes, and work as the selection operation received for candidate access limit When, then the corresponding access limit of the application program is determined according to the candidate access limit selected, so as to more accurate control The access limit of application program processed, so that the application program can only be written and read in user-defined range, and can The access limit for limiting Malware, also improves the safety of user data and privacy.
Terminal shows that user is based on security consideration and does not allow when user has selected the first candidate access limit in the disclosure Application program reads and writes all file and file, can determine the application program pair according to the first candidate access limit at this time The first access limit answered, first access limit are cannot to read file and file all in terminal document system Write operation, to ensure that the safety of user data and privacy.
Terminal shows that user is based on security consideration and only allows when user has selected the second candidate access limit in the disclosure Application program reads and writes the self-built file and file of the application program, and can be determined at this time according to the second candidate access limit should Corresponding second access limit of application program, second access limit be can to stored in terminal document system this using journey The self-built file of sequence and file are written and read, but cannot be to the alternative document folder and file stored in terminal document system It is written and read, to limit the read-write range of application program, improves the alternative document stored in terminal document system The safety of folder and file.
Terminal shows that user is based on security consideration and only allows when user has selected third candidate's access limit in the disclosure Application program read-write specified file and file, also need to export at this time first for determining specified file and file Catalogue, and one or more files that user is chosen from the first catalogue and file be as specified file and file, And determine the corresponding third access limit of application program, the third access limit be can to specified file and file into Row read-write operation also improves the standard of access limit setting to meet the individual needs of user's specified folder and file True property.
Terminal shows that user is based on security consideration and only allows when user has selected the 4th candidate access limit in the disclosure The specified file type of application program read-write also needs to export at this time the file type column for determining specified file type Table, and one or more file types that user is chosen from file type list are as specified file type, and really Determine corresponding 4th access limit of application program, the 4th access limit is can to read the file of specified file type Write operation has also refined the access limit range of application program to meet the individual needs of user's file types.
Terminal shows that user thinks that application program is safety when user has selected the 5th candidate access limit in the disclosure , output safety caution frame is also needed at this time, includes security warning information in the security warning frame, and safe police is read by user Whether after showing information, reaffirming allows application program to access all file and file, if confirmation, can determine answer at this time With corresponding 5th access limit of program, the 5th access limit is can be to file and text all in terminal document system Part is written and read, to improve the reliability of access limit setting, also improves the practicability of access limit setting.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of disclosure access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 2 is a kind of disclosure application scenario diagram of access limit setting method shown according to an exemplary embodiment;
Fig. 3 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 4 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 5 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 6 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 7 is the disclosure another access limit setting method flow chart shown according to an exemplary embodiment;
Fig. 8 is a kind of disclosure block diagram of access limit setting device shown according to an exemplary embodiment;
Fig. 9 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 10 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 11 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 12 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 13 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 14 is the block diagram of the disclosure another access limit setting device shown according to an exemplary embodiment;
Figure 15 be the disclosure it is shown according to an exemplary embodiment it is a kind of for access limit setting device structure show It is intended to.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
It is only to be not intended to be limiting the disclosure merely for for the purpose of describing particular embodiments in the term that the disclosure uses. The "an" of the singular used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where disclosure range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
As shown in Figure 1, Fig. 1 is a kind of disclosure access limit setting method process shown according to an exemplary embodiment Figure, Fig. 2 is a kind of scene figure of access limit setting method shown according to an exemplary embodiment;This method can be used for end End, such as: smart phone, as shown in Figure 1, the access limit setting method may comprise steps of 110-130:
In step 110, access limit configuration is added in the priority assignation of application program, is wrapped in access limit configuration Include at least one candidate access limit.
In the embodiment of the present disclosure, the purpose for adding access limit configuration is the institute for preventing malicious application that user is accessed Have a data and caused by privacy of user reveal.
Such as: certain unsafe application programs can be limited in the file for only allowing to read and write oneself creation, only permitted Perhaps the reading and writing of files below the file of oneself creation, cannot thus read and write the file of other applications creation.
For another example: certain unsafe application programs can be limited in the read-write that cannot operate any file, thus Avoid privacy of user leakage.
In one embodiment, the candidate access limit of at least one of above-mentioned steps 110 can include but is not limited to following At least one of:
(1-1) first candidate access limit, the described first candidate access limit allow to read and write all texts for characterizing not Part folder and file;
(1-2) second candidate's access limit, the described second candidate access limit allow to read and write application program certainly for characterizing The file and file built;
(1-3) third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file Folder and file;
(1-4) the 4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file Type;
(1-5) the 5th candidate access limit, the described 5th candidate access limit allow to read and write all files for characterizing Folder and file.
Application program in above-mentioned (1-2) self-built file and file can be application program installation and used Corresponding file and file are created in journey.Correspondingly, in one embodiment, which can also wrap It includes:
(2-1) creates corresponding file and file, corresponding text in the installation and use process of application program Part folder and file are for characterizing the application program self-built file and file;
(2-2) records the storage location of corresponding file and file.
In the step 120, when receiving the access operation for the priority assignation of application program, then access limit is exported The various candidate access limits that configuration includes.
In the embodiment of the present disclosure, user can be for application program for the access operation of the priority assignation of application program Priority assignation access operation.That is, the access operation can open the priority assignation of application program for user.
After exporting the various candidate access limits that access limit configuration includes, such user can be from these candidate's read-writes The candidate access limit for being suitable for the application program is chosen in permission.
Such as: user thinks the application security, and can choose above-mentioned (1-1) allows application program read-write all File and file, the access limit as the application program.
For another example: user thinks that the application program is dangerous, and can choose above-mentioned (1-2) i.e. only allows the application program to read It is written from the file and file built, the application program in this way cannot read and write the file and file of other applications creation , to ensure that the data safety of other applications.
In step 130, when receiving the selection operation for candidate access limit, then according to the candidate read-write selected Permission determines the corresponding access limit of the application program.
In the embodiment of the present disclosure, user can be for candidate access limit for the selection operation of candidate access limit Selection operation.That is, user can choose the candidate access limit suitable for the application program from candidate access limit.
Also, after user selects candidate access limit, terminal also needs to determine the application according to candidate's access limit The corresponding access limit of program.
Wherein, due to candidate access limit that user is application program selection may there are many selection mode, it is all most The corresponding access limit of the application program determined eventually also can specifically be detailed in implementation shown in Fig. 3 to Fig. 7 there are many permission mode Example.
In an exemplary scene, as shown in Fig. 2, user and smart phone.Smart phone can be in the permission of application program Access limit configuration is added in setting, includes at least one candidate access limit in the access limit configuration;When receiving use Family for the priority assignation of the application program access operation when, then export that access limit configuration includes is various described Candidate access limit;When receiving selection operation of the user for the candidate access limit, then according to the candidate reading selected Write permission determines the corresponding access limit of the application program.
As seen from the above-described embodiment, access limit configuration, read-write power can be added in the priority assignation of application program Limit includes at least one candidate access limit in configuring, also, is grasped when receiving the access for the priority assignation of application program When making, then the various candidate access limits that access limit configuration includes are exported, and be directed to candidate access limit when receiving When selection operation, then the corresponding access limit of the application program is determined according to the candidate access limit selected, so as to more It is accurately controlled the access limit of application program, so that the application program can only be written and read behaviour in user-defined range Make, and the access limit of Malware can be limited, also improves the safety of user data and privacy.
As shown in figure 3, Fig. 3 is the disclosure another access limit setting method stream shown according to an exemplary embodiment Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select Candidate access limit includes the first candidate access limit;Described first candidate access limit does not allow to read and write all for characterization File and file;In executing step 130, it may comprise steps of 310:
In the step 310, when receiving the selection operation for the first candidate access limit, then according to first selected Candidate access limit determines corresponding first access limit of application program, which is cannot be to terminal document system In all file and file be written and read.
As seen from the above-described embodiment, when user has selected the first candidate access limit, show that user is based on security consideration Do not allow application program to read and write all file and file, the application can be determined according to the first candidate access limit at this time Corresponding first access limit of program, which is cannot be to file and file all in terminal document system It is written and read, to ensure that the safety of user data and privacy.
As shown in figure 4, Fig. 4 is the disclosure another access limit setting method stream shown according to an exemplary embodiment Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select Candidate access limit includes the second candidate access limit;Described second candidate access limit allows to read and write application program for characterizing Self-built file and file;In executing step 130, it may comprise steps of 410:
In step 410, when receiving the selection operation for the second candidate access limit, then according to second selected Candidate access limit determines corresponding second access limit of application program, which is can be to terminal document system The file and file that the application program of middle storage is self-built be written and read, but cannot be to storing in terminal document system Alternative document folder and file are written and read.
As seen from the above-described embodiment, when user has selected the second candidate access limit, show that user is based on security consideration Only application program is allowed to read and write the self-built file and file of the application program, it at this time can be according to the second candidate access limit Determine that corresponding second access limit of the application program, second access limit are can be somebody's turn to do to what is stored in terminal document system The self-built file of application program and file are written and read, but cannot be pressed from both sides to the alternative document stored in terminal document system It is written and read with file, to limit the read-write range of application program, improves its stored in terminal document system The safety of his file and file.
As shown in figure 5, Fig. 5 is the disclosure another access limit setting method stream shown according to an exemplary embodiment Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select Candidate access limit includes third candidate's access limit;The third candidate access limit, which is used to characterize, to be allowed to read and write specified text Part folder and file;In executing step 130,510-530 may comprise steps of:
In step 510, when receiving the selection operation for third candidate access limit, then according to the third selected Candidate access limit exports the first catalogue, includes file and file in first catalogue.
In the embodiment of the present disclosure, after user selects third candidate access limit, terminal can be referred to automatic spring for determination First catalogue of fixed file and file.
In step 520, it when receiving the selection operation for file and file in the first catalogue, then will select File and file be determined as specified file and file.
In the embodiment of the present disclosure, user can choose one or more files and file as specified from the first catalogue File and file, and application program is allowed to read and write these specified files and file.
In step 530, the corresponding third access limit of application program is determined, which is can be to specified File and file be written and read.
As seen from the above-described embodiment, when user has selected third candidate's access limit, show that user is based on security consideration Only application program is allowed to read and write specified file and file, also needs to export for determining specified file and file at this time The first catalogue, and one or more files that user is chosen from the first catalogue and file as specified file and File, and determine the corresponding third access limit of application program, the third access limit be can to specified file and File is written and read, to meet the individual needs of user's specified folder and file, is also improved access limit and is set The accuracy set.
As shown in fig. 6, Fig. 6 is the disclosure another access limit setting method stream shown according to an exemplary embodiment Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select Candidate access limit includes the 4th candidate access limit;Described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified text Part class;In executing step 130,610-630 may comprise steps of:
In step 610, when receiving the selection operation for the 4th candidate access limit, then according to the 4th selected Candidate access limit output file list of types.
In the embodiment of the present disclosure, after the candidate access limit of user's selection the 4th, terminal can be referred to automatic spring for determination The file type list of fixed file type.It wherein, may include one or more file types in file type list.Than Such as: jpg file type, log file type.
In step 620, it when receiving the selection operation for the file type in file type list, then will select File type be determined as the specified file type.
In the embodiment of the present disclosure, user can choose one or more file types as specified from file type list File type, and application program is allowed to read and write the files of these specified file types.
In act 630, corresponding 4th access limit of application program is determined, the 4th access limit is can be to specified The file of file type be written and read.
As seen from the above-described embodiment, when user has selected the 4th candidate access limit, show that user is based on security consideration Only application program is allowed to read and write specified file type, also needs to export the files classes for determining specified file type at this time Type list, and one or more file types that user is chosen from file type list are as specified file type, with And determine corresponding 4th access limit of application program, the 4th access limit be can file to specified file type into Row read-write operation has also refined the access limit model of application program to meet the individual needs of user's file types It encloses.
As shown in fig. 7, Fig. 7 is the disclosure another access limit setting method stream shown according to an exemplary embodiment Cheng Tu, this method can be used for terminal, such as: smart phone, and establishing on the basis of method shown in Fig. 1, it is described to select Candidate access limit includes the 5th candidate access limit;Described 5th candidate access limit allows to read and write all texts for characterizing Part folder and file;In executing step 130,710-720 may comprise steps of:
In step 720, when receiving the selection operation for the 5th candidate access limit, then according to the 5th selected Candidate access limit output safety caution frame includes security warning information in the security warning frame.
In step 720, when receiving the confirmation operation for security warning information, it is determined that application program is corresponding 5th access limit, the 5th access limit are can be written and read behaviour to file and file all in terminal document system Make.
As seen from the above-described embodiment, when user has selected the 5th candidate access limit, show that user thinks application program Be it is safe, also need output safety caution frame at this time, include security warning information in the security warning frame, and read by user Whether after security warning information, reaffirming allows application program to access all file and file, at this time can be with if confirmation Determine corresponding 5th access limit of application program, the 5th access limit is can be to file all in terminal document system Folder and file are written and read, to improve the reliability of access limit setting, also improve the reality of access limit setting The property used.
Corresponding with aforementioned access limit setting method embodiment, the disclosure additionally provides the reality of access limit setting device Apply example.
As shown in figure 8, Fig. 8 is a kind of disclosure frame of access limit setting device shown according to an exemplary embodiment Figure, described device, which can be applied, can be used for terminal, such as: smart phone, and for executing access limit setting shown in FIG. 1 Method, as shown in figure 8, access limit setting device may include:
Permission adds module 81, is configured as adding access limit configuration, the reading in the priority assignation of application program It include at least one candidate access limit in write permission configuration;
Permission output module 82 is configured as when the access operation for receiving the priority assignation for the application program When, then export the various candidate access limits that the access limit configuration includes;
Permission determining module 83 is configured as when receiving the selection operation for the candidate access limit, then root The corresponding access limit of the application program is determined according to the candidate access limit selected.
As seen from the above-described embodiment, access limit configuration, read-write power can be added in the priority assignation of application program Limit includes at least one candidate access limit in configuring, also, is grasped when receiving the access for the priority assignation of application program When making, then the various candidate access limits that access limit configuration includes are exported, and be directed to candidate access limit when receiving When selection operation, then the corresponding access limit of the application program is determined according to the candidate access limit selected, so as to more It is accurately controlled the access limit of application program, so that the application program can only be written and read behaviour in user-defined range Make, and the access limit of Malware can be limited, also improves the safety of user data and privacy.
In one embodiment, it establishes on the basis of device shown in Fig. 8, at least one candidate access limit can wrap It includes but is not limited at least one of following:
First candidate access limit, the described first candidate access limit be used to characterize not allow to read and write all file with File;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built text of application program Part folder and file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and text Part;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and text for characterizing Part.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 9, described device can also include:
Creation module 91 is configured as in the installation and use process of application program, creates corresponding file and text Part, corresponding file and file are for characterizing the application program self-built file and file;
Logging modle 92 is configured as recording the storage location of corresponding file and file.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in Figure 10, the candidate read-write selected Permission includes the described first candidate access limit;The permission determining module 83 may include:
First permission determines submodule 101, is configured as being determined according to the described first candidate access limit described using journey Corresponding first access limit of sequence, first access limit is cannot be to file and file all in terminal document system It is written and read.
As seen from the above-described embodiment, when user has selected the first candidate access limit, show that user is based on security consideration Do not allow application program to read and write all file and file, the application can be determined according to the first candidate access limit at this time Corresponding first access limit of program, which is cannot be to file and file all in terminal document system It is written and read, to ensure that the safety of user data and privacy.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 11, the candidate read-write selected Permission includes the described second candidate access limit;The permission determining module 83 may include:
Second permission determines submodule 111, is configured as being determined according to the described second candidate access limit described using journey Corresponding second access limit of sequence, second access limit is can be to the application program stored in terminal document system certainly The file and file built are written and read, but cannot be to the alternative document folder and file stored in the terminal document system It is written and read.
As seen from the above-described embodiment, when user has selected the second candidate access limit, show that user is based on security consideration Only application program is allowed to read and write the self-built file and file of the application program, it at this time can be according to the second candidate access limit Determine that corresponding second access limit of the application program, second access limit are can be somebody's turn to do to what is stored in terminal document system The self-built file of application program and file are written and read, but cannot be pressed from both sides to the alternative document stored in terminal document system It is written and read with file, to limit the read-write range of application program, improves its stored in terminal document system The safety of his file and file.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 12, the candidate read-write selected Permission includes the third candidate access limit;The permission determining module 83 may include:
First output sub-module 121 is configured as exporting the first catalogue according to the third candidate access limit, described the It include file and file in one catalogue;
First determines submodule 122, is configured as working as the file and file received in first catalogue When selection operation, then the file selected and file are determined as the specified file and file;
Third permission determines submodule 123, is configured to determine that the corresponding third access limit of the application program, described Third access limit is can be written and read to the specified file and file.
As seen from the above-described embodiment, when user has selected third candidate's access limit, show that user is based on security consideration Only application program is allowed to read and write specified file and file, also needs to export for determining specified file and file at this time The first catalogue, and one or more files that user is chosen from the first catalogue and file as specified file and File, and determine the corresponding third access limit of application program, the third access limit be can to specified file and File is written and read, to meet the individual needs of user's specified folder and file, is also improved access limit and is set The accuracy set.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 13, the candidate read-write selected Permission includes the described 4th candidate access limit;The permission determining module 83 may include:
Second output sub-module 131 is configured as according to the described 4th candidate access limit output file list of types;
Second determination submodule 132, is configured as to receive for the file type in the file type list When selection operation, then the file type selected is determined as the specified file type;
4th permission determines submodule 133, is configured to determine that corresponding 4th access limit of the application program, described 4th access limit is can be written and read to the file of the specified file type.
As seen from the above-described embodiment, when user has selected the 4th candidate access limit, show that user is based on security consideration Only application program is allowed to read and write specified file type, also needs to export the files classes for determining specified file type at this time Type list, and one or more file types that user is chosen from file type list are as specified file type, with And determine corresponding 4th access limit of application program, the 4th access limit be can file to specified file type into Row read-write operation has also refined the access limit model of application program to meet the individual needs of user's file types It encloses.
In one embodiment, it establishes on the basis of device shown in Fig. 8, as shown in figure 14, the candidate read-write selected Permission includes the described 5th candidate access limit;The permission determining module 83 may include:
Third output sub-module 141 is configured as according to the described 5th candidate access limit output safety caution frame, described It include security warning information in security warning frame;
5th permission determines submodule 142, is configured as working as the confirmation operation received for the security warning information When, it is determined that corresponding 5th access limit of the application program, the 5th access limit is can be to terminal document system In all file and file be written and read.
As seen from the above-described embodiment, when user has selected the 5th candidate access limit, show that user thinks application program Be it is safe, also need output safety caution frame at this time, include security warning information in the security warning frame, and read by user Whether after security warning information, reaffirming allows application program to access all file and file, at this time can be with if confirmation Determine corresponding 5th access limit of application program, the 5th access limit is can be to file all in terminal document system Folder and file are written and read, to improve the reliability of access limit setting, also improve the reality of access limit setting The property used.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize disclosure scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
With Fig. 8 correspondingly, the disclosure also provides another access limit setting device, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Access limit configuration is added in the priority assignation of application program, includes at least one in the access limit configuration Candidate access limit;
When receiving the access operation for the priority assignation of the application program, then the access limit configuration is exported Including the various candidate access limits;
When receiving the selection operation for the candidate access limit, then determined according to the candidate access limit selected The corresponding access limit of the application program.
As shown in figure 15, Figure 15 is that the disclosure is shown according to an exemplary embodiment a kind of for access limit setting dress Set 1500 structural schematic diagram.For example, device 1500 can be the mobile phone with routing function, computer, number is extensively Broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, the terminals such as personal digital assistant.
Referring to Fig.1 5, device 1500 may include following one or more components: processing component 1502, memory 1504, Power supply module 1506, multimedia component 1508, audio component 1510, the interface 1512 of input/output (I/O), sensor module 1514 and communication component 1516.
The integrated operation of the usual control device 1500 of processing component 1502, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing component 1502 may include one or more processors 1520 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1502 may include one or more moulds Block, convenient for the interaction between processing component 1502 and other assemblies.For example, processing component 1502 may include multi-media module, To facilitate the interaction between multimedia component 1508 and processing component 1502.
Memory 1504 is configured as storing various types of data to support the operation in device 1500.These data Example includes the instruction of any application or method for operating on device 1500, contact data, telephone book data, Message, picture, video etc..Memory 1504 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1506 provides electric power for the various assemblies of device 1500.Power supply module 1506 may include power management System, one or more power supplys and other with for device 1500 generate, manage, and distribute the associated component of electric power.
Multimedia component 1508 includes the screen of one output interface of offer between described device 1500 and user.? In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more Media component 1508 includes a front camera and/or rear camera.When device 1500 is in operation mode, as shot mould When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 1510 is configured as output and/or input audio signal.For example, audio component 1510 includes a wheat Gram wind (MIC), when device 1500 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 1504 or via communication Component 1516 is sent.In some embodiments, audio component 1510 further includes a loudspeaker, is used for output audio signal.
I/O interface 1512 provides interface, above-mentioned peripheral interface module between processing component 1502 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and Locking press button.
Sensor module 1514 includes one or more sensors, and the state for providing various aspects for device 1500 is commented Estimate.For example, sensor module 1514 can detecte the state that opens/closes of device 1500, the relative positioning of component, such as institute The display and keypad that component is device 1500 are stated, sensor module 1514 can be with detection device 1500 or device 1,500 1 The location information of a component changes, the existence or non-existence that user contacts with device 1500,1500 orientation of device or acceleration/deceleration With the temperature change of device 1500.Sensor module 1514 may include proximity sensor, be configured to not any It is detected the presence of nearby objects when physical contact.Sensor module 1514 can also include optical sensor, such as CMOS or ccd image Sensor, for being used in imaging applications.In some embodiments, which can also include that acceleration passes Sensor, gyro sensor, Magnetic Sensor, pressure sensor, microwave remote sensor or temperature sensor.
Communication component 1516 is configured to facilitate the communication of wired or wireless way between device 1500 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 1500,2G or 3G or their combination.It is exemplary at one In embodiment, communication component 1516 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1516 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1500 can be by one or more application specific integrated circuit (ASIC), number Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1504 of instruction, above-metioned instruction can be executed by the processor 1520 of device 1500 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (17)

1. a kind of access limit setting method, which is characterized in that the described method includes:
Access limit configuration is added in the priority assignation of application program, includes at least one candidate in the access limit configuration Access limit;
When receiving the access operation for the priority assignation of the application program, then exporting the access limit configuration includes The various candidate access limits;
When receiving the selection operation for the candidate access limit, then according to the candidate access limit determination selected The corresponding access limit of application program.
2. the method according to claim 1, wherein at least one candidate access limit include it is following at least One:
First candidate access limit, the described first candidate access limit allow to read and write all file and text for characterizing not Part;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built file of application program And file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and file;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and file for characterizing.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
In the installation and use process of application program, corresponding file and file, corresponding file and text are created Part is for characterizing the application program self-built file and file;
Record the storage location of corresponding file and file.
4. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes first time Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding first access limit of the application program, the first read-write power are determined according to the described first candidate access limit Limit is cannot to be written and read to file and file all in terminal document system.
5. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes second time Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
Corresponding second access limit of the application program, the second read-write power are determined according to the described second candidate access limit Limit be can the file and file self-built to the application program stored in terminal document system be written and read, but cannot The alternative document folder and file that store in the terminal document system are written and read.
6. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes that the third is waited Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
The first catalogue is exported according to the third candidate access limit, includes file and file in first catalogue;
When receiving the selection operation for file and file in first catalogue, then by the file selected and text Part is determined as the specified file and file;
Determine the corresponding third access limit of the application program, the third access limit is can be to the specified file Folder and file are written and read.
7. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes the 4th time Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
According to the described 4th candidate access limit output file list of types;
It is when receiving the selection operation for the file type in the file type list, then the file type selected is true It is set to the specified file type;
Determine corresponding 4th access limit of the application program, the 4th access limit is can be to the specified file The file of type is written and read.
8. according to the method described in claim 2, it is characterized in that, the candidate access limit selected includes the 5th time Select write permission to read;
The candidate access limit that the basis is selected determines the corresponding access limit of the application program, comprising:
It include security warning information in the security warning frame according to the described 5th candidate access limit output safety caution frame;
When receiving the confirmation operation for the security warning information, it is determined that the application program the corresponding 5th is read and write Permission, the 5th access limit are can be written and read to file and file all in terminal document system.
9. device is arranged in a kind of access limit, which is characterized in that described device includes:
Permission adds module, is configured as adding access limit configuration, the access limit in the priority assignation of application program It include at least one candidate access limit in configuration;
Permission output module is configured as when receiving the access operation for the priority assignation of the application program, then defeated The various candidate access limits that the access limit configuration includes out;
Permission determining module is configured as when receiving the selection operation for the candidate access limit, then basis is selected Candidate access limit determine the corresponding access limit of the application program.
10. device according to claim 9, which is characterized in that at least one candidate access limit include with down toward One item missing:
First candidate access limit, the described first candidate access limit allow to read and write all file and text for characterizing not Part;
Second candidate access limit, the described second candidate access limit, which is used to characterize, allows to read and write the self-built file of application program And file;
Third candidate's access limit, the third candidate access limit, which is used to characterize, to be allowed to read and write specified file and file;
4th candidate access limit, the described 4th candidate access limit, which is used to characterize, to be allowed to read and write specified file type;
5th candidate access limit, the described 5th candidate access limit allow to read and write all file and file for characterizing.
11. device according to claim 10, which is characterized in that described device further include:
Creation module is configured as in the installation and use process of application program, creates corresponding file and file, described Corresponding file and file are for characterizing the application program self-built file and file;
Logging modle is configured as recording the storage location of corresponding file and file.
12. device according to claim 10, which is characterized in that the candidate access limit selected includes described first Candidate access limit;The permission determining module includes:
First permission determines submodule, is configured as determining that the application program is corresponding according to the described first candidate access limit First access limit, first access limit are cannot to be written and read to file and file all in terminal document system Operation.
13. device according to claim 10, which is characterized in that the candidate access limit selected includes described second Candidate access limit;The permission determining module includes:
Second permission determines submodule, is configured as determining that the application program is corresponding according to the described second candidate access limit Second access limit, second access limit are files that can be self-built to the application program stored in terminal document system Folder and file are written and read, but cannot be written and read to the alternative document folder and file stored in the terminal document system Operation.
14. device according to claim 10, which is characterized in that the candidate access limit selected includes the third Candidate access limit;The permission determining module includes:
First output sub-module is configured as exporting the first catalogue, first catalogue according to the third candidate access limit In include file and file;
First determines submodule, is configured as working as the selection operation received for file and file in first catalogue When, then the file selected and file are determined as the specified file and file;
Third permission determines submodule, is configured to determine that the corresponding third access limit of the application program, the third are read Write permission is can be written and read to the specified file and file.
15. device according to claim 10, which is characterized in that the candidate access limit selected includes the described 4th Candidate access limit;The permission determining module includes:
Second output sub-module is configured as according to the described 4th candidate access limit output file list of types;
Second determines submodule, is configured as working as the selection operation received for the file type in the file type list When, then the file type selected is determined as the specified file type;
4th permission determines submodule, is configured to determine that corresponding 4th access limit of the application program, and the described 4th reads Write permission is can be written and read to the file of the specified file type.
16. device according to claim 10, which is characterized in that the candidate access limit selected includes the described 5th Candidate access limit;The permission determining module includes:
Third output sub-module is configured as according to the described 5th candidate access limit output safety caution frame, the safe police Show to include security warning information in frame;
5th permission determines submodule, is configured as when receiving the confirmation operation for the security warning information, then really Determine corresponding 5th access limit of the application program, the 5th access limit can be to all in terminal document system File and file are written and read.
17. device is arranged in a kind of access limit, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Access limit configuration is added in the priority assignation of application program, includes at least one candidate in the access limit configuration Access limit;
When receiving the access operation for the priority assignation of the application program, then exporting the access limit configuration includes The various candidate access limits;
When receiving the selection operation for the candidate access limit, then according to the candidate access limit determination selected The corresponding access limit of application program.
CN201811526670.1A 2018-12-13 2018-12-13 Read-write permission setting method and device Active CN109743441B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811526670.1A CN109743441B (en) 2018-12-13 2018-12-13 Read-write permission setting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811526670.1A CN109743441B (en) 2018-12-13 2018-12-13 Read-write permission setting method and device

Publications (2)

Publication Number Publication Date
CN109743441A true CN109743441A (en) 2019-05-10
CN109743441B CN109743441B (en) 2021-09-07

Family

ID=66359337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811526670.1A Active CN109743441B (en) 2018-12-13 2018-12-13 Read-write permission setting method and device

Country Status (1)

Country Link
CN (1) CN109743441B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532764A (en) * 2019-08-19 2019-12-03 维沃移动通信有限公司 A kind of method, mobile terminal and the readable storage medium storing program for executing of permission processing

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328155A1 (en) * 2008-05-12 2009-12-31 George Madathilparamgil George Master device for controlling application security environments
US20150089247A1 (en) * 2013-09-23 2015-03-26 Samsung Electronics Co., Ltd. Storage medium having security function and security method thereof
CN105653988A (en) * 2015-12-30 2016-06-08 北京金山安全软件有限公司 External storage device read-write permission control method and device and terminal device
CN106570419A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 File read-write device and method
CN106778291A (en) * 2016-11-22 2017-05-31 北京奇虎科技有限公司 The partition method and isolating device of application program
CN107665175A (en) * 2016-07-27 2018-02-06 展讯通信(上海)有限公司 The method, apparatus and electronic equipment of memory partition isolation
CN107798252A (en) * 2017-10-27 2018-03-13 维沃移动通信有限公司 A kind of file access method and mobile terminal
CN108038369A (en) * 2017-12-26 2018-05-15 上海展扬通信技术有限公司 A kind of application permission control method and terminal
CN108052461A (en) * 2017-12-29 2018-05-18 普华基础软件股份有限公司 A kind of method for protecting EMS memory of operating system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328155A1 (en) * 2008-05-12 2009-12-31 George Madathilparamgil George Master device for controlling application security environments
US20150089247A1 (en) * 2013-09-23 2015-03-26 Samsung Electronics Co., Ltd. Storage medium having security function and security method thereof
CN105653988A (en) * 2015-12-30 2016-06-08 北京金山安全软件有限公司 External storage device read-write permission control method and device and terminal device
CN107665175A (en) * 2016-07-27 2018-02-06 展讯通信(上海)有限公司 The method, apparatus and electronic equipment of memory partition isolation
CN106570419A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 File read-write device and method
CN106778291A (en) * 2016-11-22 2017-05-31 北京奇虎科技有限公司 The partition method and isolating device of application program
CN107798252A (en) * 2017-10-27 2018-03-13 维沃移动通信有限公司 A kind of file access method and mobile terminal
CN108038369A (en) * 2017-12-26 2018-05-15 上海展扬通信技术有限公司 A kind of application permission control method and terminal
CN108052461A (en) * 2017-12-29 2018-05-18 普华基础软件股份有限公司 A kind of method for protecting EMS memory of operating system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110532764A (en) * 2019-08-19 2019-12-03 维沃移动通信有限公司 A kind of method, mobile terminal and the readable storage medium storing program for executing of permission processing
CN110532764B (en) * 2019-08-19 2022-03-11 维沃移动通信有限公司 Authority processing method, mobile terminal and readable storage medium

Also Published As

Publication number Publication date
CN109743441B (en) 2021-09-07

Similar Documents

Publication Publication Date Title
CN111078655B (en) Document content sharing method, device, terminal and storage medium
CN104765552B (en) Right management method and device
KR102610013B1 (en) An apparatus for providinng privacy protection and method thereof
CN105607834B (en) Screen control method, device and terminal
CN105049269B (en) information feedback method and device
CN105701997A (en) Alarm method and device
CN105095717B (en) The processing method and processing device of anomalous event, electronic equipment
CN105516485B (en) The way of recording and device
CN105246068B (en) SIM card selection method and device
CN109451813A (en) Cell accessing method and device
CN104881342B (en) terminal test method and device
CN105898573A (en) Method and device for multimedia file playing
CN105205153A (en) File storage method and device
CN106534551B (en) Information display method and device
CN105187671A (en) Recording method and device
CN105430469B (en) Playback method, device, terminal and the server of audio, video data
CN107423378A (en) Image display method and device
CN108509863A (en) Information cuing method, device and electronic equipment
KR20130088610A (en) Mobile terminal, control method thereof, and contents output system
CN108319835A (en) User's space access control method, device, equipment and storage medium
CN109743441A (en) Access limit setting method and device
CN105701245B (en) Picture recommendation method and device
CN107463809A (en) The display methods and device of application icon
CN105956489B (en) Long-range control method and device
CN106060253B (en) Information presentation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant