CN109886012A - A kind of management method and system of application permission - Google Patents

A kind of management method and system of application permission Download PDF

Info

Publication number
CN109886012A
CN109886012A CN201910003540.8A CN201910003540A CN109886012A CN 109886012 A CN109886012 A CN 109886012A CN 201910003540 A CN201910003540 A CN 201910003540A CN 109886012 A CN109886012 A CN 109886012A
Authority
CN
China
Prior art keywords
permission
class
phone
application
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910003540.8A
Other languages
Chinese (zh)
Other versions
CN109886012B (en
Inventor
吴亦舜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910003540.8A priority Critical patent/CN109886012B/en
Publication of CN109886012A publication Critical patent/CN109886012A/en
Application granted granted Critical
Publication of CN109886012B publication Critical patent/CN109886012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of management method of application permission and systems.Method includes: to show the interface to be opened of first kind application permission when detecting the functional module installation in application program or application program;The request that the user received opens first kind application permission is sent to the corresponding server-side of application program, so that the message registration of server-side analysis user;The analysis returned in response to server-side is as a result, show guidance interface to guide user to open the second class application permission;Wherein, first kind application permission is the basic permission for realizing calling protection function, and the second class application permission is the expansion permission for realizing calling protection function.By the analysis of displaying as a result, user can timely and effectively perceive oneself for the desirability of calling protection function.Corresponding function after application permission is opened can improve the enthusiasm that user experiences corresponding function in the application timely and effectively to user feedback, presentation.

Description

A kind of management method and system of application permission
Technical field
The present invention relates to Internet communication technology field more particularly to the management methods and system of a kind of application permission.
Background technique
When user is easily and efficiently communicated using terminal device, also occur harassing call etc. thereupon, these Phone affects the communication experience of user.With the fast development of Internet communication technology, the application journey installed in terminal device Sequence (Application, APP) can identify harassing call etc., and prompt user.Application program is to utilize the application permission obtained Realize the identification to harassing call etc..
However, user is for the not stronger perception to the corresponding application permission of application program authorization.Wherein, some Application permission is defaulted when application program is installed to be authorized to;Alternatively, some application permissions are after user authorizes, can not and When its effect is effectively presented to user.These all affect user when using application program to the body of application permission grant It tests.
Summary of the invention
Apply the corresponding function after application permission unlatching can not be timely and effectively to user to solve the prior art Feedback is presented, and influences the problems such as user experiences the enthusiasm of corresponding function in the application, the present invention provides a kind of applications The management method and system of permission:
On the one hand, the present invention provides a kind of management methods of application permission, which comprises
When detecting the functional module installation in application program or the application program, first kind application permission is shown Interface to be opened;
The request that the user received opens the first kind application permission is sent to the corresponding clothes of the application program Business end, so that the message registration of server-side analysis user;
The analysis returned in response to the server-side is as a result, show guidance interface to guide user to open the second class application power Limit;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, the second class application power It is limited to realize the expansion permission of calling protection function.
On the other hand a kind of management system of application permission is provided, the system comprises the corresponding clients of application program Server-side corresponding with the application program, the client include:
Detection module: for when detect in the application program or the application program functional module installation when, Show the interface to be opened of first kind application permission;
Sending module: the request for the user received to be opened the first kind application permission is sent to the application The corresponding server-side of program, so that the message registration of server-side analysis user;
Guiding module: the analysis for returning in response to the server-side is as a result, show guidance interface to guide user to open Open the second class application permission;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, the second class application power It is limited to realize the expansion permission of calling protection function.
On the other hand a kind of management server end of application permission is provided, the server-side includes processor and memory, It is stored at least one instruction, at least a Duan Chengxu, code set or instruction set in the memory, at least one instruction, An at least Duan Chengxu, the code set or instruction set are loaded by the processor and are executed to realize such as above-mentioned application power The management method of limit.
On the other hand a kind of computer readable storage medium is provided, at least one finger is stored in the storage medium Enable, at least a Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or Instruction set is loaded by processor and is executed to realize the management method such as above-mentioned application permission.
The management method and system of a kind of application permission provided by the invention, have the following technical effect that
The present invention after user opens in relation to the basic permission of calling protection function, analyzed by authorization privilege and used by server-side The message registration at family, client show analysis as a result, guidance user opens the expansion permission in relation to calling protection function to user. By the analysis of displaying as a result, user can timely and effectively perceive oneself for the desirability of calling protection function, from And it is determined whether to enable expand permission.When functional module in application program or application program is installed, after application permission is opened Corresponding function can timely and effectively to user feedback, present, improve user and experience the product of corresponding function in the application Polarity enhances the usage rate of the user of application program.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology and advantage, below will be to implementation Example or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, the accompanying drawings in the following description is only It is only some embodiments of the present invention, for those of ordinary skill in the art, without creative efforts, It can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is a kind of schematic diagram of application environment provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of the management method of application permission provided in an embodiment of the present invention;
Fig. 3 is the request transmission that the user provided in an embodiment of the present invention that will be received opens the first kind application permission To a kind of flow diagram of the corresponding server-side of the application program;
Fig. 4 is server-side provided in an embodiment of the present invention according to the preset number stored in database, to the contact person Number carries out a kind of matched flow diagram;
Fig. 5 be it is provided in an embodiment of the present invention in response to the server-side return analysis as a result, show guidance interface with User is guided to open a kind of flow diagram of the second class application permission;
Fig. 6-Fig. 9 is the UI interface schematic diagram obtained using the embodiment of the present invention respectively;
Figure 10 is a kind of composition block diagram of the management system of application permission provided in an embodiment of the present invention;
Figure 11 is a kind of composition block diagram of server-side provided in an embodiment of the present invention;
Figure 12 is a kind of composition block diagram of guiding module provided in an embodiment of the present invention;
Figure 13 is a kind of structural schematic diagram of server-side provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art without making creative work it is obtained it is all its His embodiment, shall fall within the protection scope of the present invention.
It should be noted that term " includes " and " tool in description and claims of this specification and above-mentioned attached drawing Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units Process, method, system, product or server-side those of are not necessarily limited to be clearly listed step or unit, but may include not having Other step or units being clearly listed or intrinsic for these process, methods, product or equipment.
Referring to Fig. 1, Fig. 1 is a kind of schematic diagram of application environment provided in an embodiment of the present invention, as shown in Figure 1, this is answered Related application installation or user are carried out on the terminal device with user in environment to the function mould in some application program When block is installed, the corresponding client of application program shows the interface to be opened (left side such as Fig. 1 of first kind application permission to user Interface shown in side);When user is by clicking the corresponding position in interface, the user received is opened described the by client The request of a kind of application permission is sent to server-side, so that the message registration of server-side analysis user;Client receives The analysis that the server-side returns is as a result, show guidance interface (interface shown on the right side of Fig. 1) to guide user to open second Class application permission.The first kind application permission is the basic permission for realizing calling protection function, the second class application permission For the expansion permission for realizing calling protection function.Client is when asking for the permission for enabling calling protection function to user, to need The permission to be asked for work is classified, and first asks for first kind application permission to user, the authorization by user to first kind application permission, Client shows analysis result to the analysis of message registration based on server-side and asks for the second class application permission to user.The present invention The demand perception scene for opening the second class application permission is provided for user, user timely and effectively perceives by analyzing result Oneself desirability for calling protection function.It should be noted that Fig. 1 is only a kind of example.
In embodiments of the present invention, the first kind application permission includes message registration access authority;Alternatively, described first Class application permission includes message registration access authority and address list access authority.The second class application permission includes phone power Limit and opens resident permission at suspended window permission certainly.Specifically, message registration access authority: including history message registration access authority, Application program (or functional module in application program) is allowed to obtain, the contact number in inquiry and identification user's communication record Which is harassing call etc..Address list access authority: application program (or functional module in application program) is allowed to access communication Record, it is address list incoming call which, which can be distinguished,.Phone permission: application program (or functional module in application program) is allowed to supervise It answers a call, to capture calling event.Suspended window permission: allow application program (or functional module in application program) in terminal The floating window that incoming call prompting is presented on the interface of equipment, the displaying of phone type is given in screen locking by suspended window permission. Include self-starting permission and survival permission from resident permission is opened, open resident permission certainly and be used to that corresponding process not to be allowed to be terminated, Middle self-starting permission can restart after allowing process to be terminated;Survival permission then guarantees that process will not be terminated, sometimes Also it is backstage protection permission.
In embodiments of the present invention, terminal device includes but is not limited to smart phone, intelligent wearable device and PDA (flat Plate computer).
In practical applications, user opens first kind application permission and/or the second class application power on the interface of terminal device The mode at family is limited the use of, can be triggered by the corresponding position clicked in interface, naturally it is also possible to triggered by gesture sliding trace, Headwork triggering (the camera generic module of terminal device detects) etc..
A kind of specific embodiment of the management method of application permission of the present invention introduced below, Fig. 2 is that the embodiment of the present invention mentions A kind of flow diagram of the management method of the application permission supplied, present description provides the sides as described in embodiment or flow chart Method operating procedure, but based on routine or may include more or less operating procedure without creative labor.Embodiment In the step of enumerating sequence be only one of numerous step execution sequences mode, do not represent and unique execute sequence.In reality When system or server-side product in border execute, it can be executed according to embodiment or method shown in the drawings sequence or parallel It executes (such as environment of parallel processor or multiple threads).It is specific as shown in Fig. 2, the method may include:
S201: when detecting the functional module installation in application program or the application program, show that the first kind is answered With the interface to be opened of permission;
In embodiments of the present invention, application program installed on the terminal device (such as the first time install application program pair The installation kit answered) or application program in functional module install that (for example installation function module is corresponding on the terminal device Increment installation kit etc.), the corresponding client of application program shows interface to be opened (such as Fig. 1, figure of first kind application permission at this time Shown in 6).Permission is a kind of limitation applied to the access of code on terminal device or data, to prevent key code sum number Bad experience is brought to user according to being abused.To realize calling protection function, party in request of the application program as permission, by visitor First kind application permission (such as message registration access authority) is asked for user in family end.
S202: it is corresponding that the request that the user received opens the first kind application permission is sent to the application program Server-side so that the server-side analysis user message registration;
In embodiments of the present invention, as shown in figure 3, the user that will be received opens the first kind application permission Request is sent to the step of application program corresponding server-side, comprising:
S301: corresponding contact number in the message registration is read;
Specifically, application program is allowed access to history message registration, answers when user opens message registration access authority With the corresponding client of program read corresponding contact number in the message registration (with the number of user there are caller or The number of called relationship), client can read corresponding in the preset quantity nearest apart from the current time message registration Contact number.Here preset quantity can be 30,50,100 etc..When preset quantity is 50, this 50 call notes In record corresponding contact number there are it is duplicate be more than preset value (such as 10) when, suitable message registration can be read again Number guarantees that analysis result characterizes the authenticity that user's communication records, and realizes that user just guides interface to open the second class application power Effective judgement of limit.For example, before application program is installed, rate problem multiple (such as 12 time) and operator of the user with regard to flow Phone (such as 10086) is linked up, then there are duplicate when reading 50 message registration nearest apart from current time 10086, thus read suitable message registration number again forward according to time inverted order, reduce the sample because carrying out message registration analysis This problem of, causes analysis result to be unable to the probability of exact representation, while can not read whole message registrations, improves analysis speed Degree guarantees that analysis result more in time, is effectively presented in client.Certainly, the number that client reads message registration is not limited to 50.Server-side can also read whole message registrations.
S302: the service is sent to by the contact number and to the matched request of contact number progress End;
Client is matched by the contact number of the preset quantity read from message registration, and to contact number Request be sent to server-side.
In embodiments of the present invention, the step of message registration of the server-side analysis user, comprising:
Firstly, being matched according to the preset number stored in database to the contact number;
Specifically, preset number includes at least Yellow Page (the international industrial and commercial enterprise by enterprise nature and product category layout Industry telephone directory book) class number, house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone in It is a kind of.There may be intersection, such as company A, the telephone number that can be used as house property medium company are same in five above-mentioned class numbers When be present in Yellow Page class number and house property medium class number, harassing and wrecking class phone and/or wide can also be present in because of the label of user It accuses and promotes in class phone.The correspondence number having in preset number can be more than preset value (such as 50 times) according to the label of user And it increases newly.Preset number can store in database beyond the clouds, and the corresponding server-side of application program will be read from message registration Contact number be uploaded to cloud database, and then matched.
As shown in figure 4, it is described according to the preset number stored in database, matched step is carried out to the contact number Suddenly, comprising:
S401: according to the area code of number length, number operator and number, the preset number is divided Class;
It may include fixed line number, phone number etc. in preset number.It, can area in a certain range according to number length Divide fixed line number and phone number.For fixed line number can by the area code of number and whether be as defined in service number into Row classification.It can be classified by number operator etc. for phone number.After carrying out above-mentioned classification, what is obtained is parallel Series: the first classification (A class special service fixed line number), the second classification (B class special service fixed line number), third class Mesh (the fixed line number for belonging to the ground C), the 4th classification (phone number of D operator number section) etc..Certainly, to preset number into The classification reference factor of row classification, classification execute step and are not limited to foregoing description.
S402: according to prefix, the corresponding ternary tree of the preset number under each series is constructed;
For example the preset number pair under the 4th classification (phone number of D operator number section) is constructed according to prefix The ternary tree (TST, TernarySearchTree) answered.Ternary tree can be realized prefix matching operation, inquiry it is high-efficient, and And space consuming is small.Ternary tree has 3 byte points, is left sibling (left), intermediate node (mid), right node respectively (right).When increasing number in preset number newly, that is, when progress keyword (key) insertion, from tree root as present node Start (tree root is nil when tree is empty), the recurrence of one character of a character executes following procedure: if (1) working as prosthomere Point is nil, then creates a new node, and current character is saved in node, present node is set to.(2) if The character that current character and present node save all is '/0 ', and data are stored in present node, terminates and calls.If current character Less than the character that present node saves, then recurrence is by the left child node of current character insertion node, greater than being then inserted into right sub- section Point;The equal intermediate child node that character late is then inserted into present node.What ternary tree can be supported to have in preset number The dynamic of corresponding number increases and deletes, and ensure that server-side carries out analysis to message registration and is directed to newest default number Code, the analysis result that client is shown to user is not only timely and effectively, to have in terms of content and in time on presentation speed Effect.
S403: searching the contact number in the ternary tree, when finding the contact person number in the ternary tree When code, the contact number and the preset number successful match.
When carrying out contact number lookup, matching in preset number, the sum of keyword one character, one character The character that tree interior joint saves is compared, and recurrence executes equally since tree root.(1) it if present node is nil, looks into It looks for unsuccessfully.(2) if current character is than small in node, recurrence searches left child node, still compares current character.(3) such as For fruit current character than big in node, recurrence searches right child node, still compares current character.(4) if current character with Equal in node and be all '/0 ', then just deposit the corresponding value of keyword, terminate and call in this node.If it is equal still It is not '/0 ', then recurrence searches intermediate child node, and comparing character is character late.Pass through server-side looking into ternary tree It looks for, realizes matched quickly and efficiently to contact number progress.Wherein, the mode searched in ternary tree can pass through Binary chop.
In practical applications, due to being marked as certain class (such as house property medium class phone, harassing and wrecking class electricity in preset number Words, swindle class phone and ad promotions class) number, there may come a time when the similitude that will appear certain rule property, such as mobile phone Preceding nine bit digital of number is all identical, only rear two digits difference.So when contact number (is all 11 hands for being Machine number) preceding nine bit digital it is same, then can assert the contact number and the preset number successful match.When So, foregoing description is not limited to using the digital matched mode in non-number.
In further embodiments, to the preset number under each series by construction Fibonacci sequence into Row segmentation, two endpoints and cut-point of lookup range are all related with Fibonacci sequence.Fibonacci (Fibonacci) is searched Algorithm establishes corresponding tree using Fibonacci sequence to reduce seeking scope, and it is higher to search matching efficiency.
Then, according to the matching status of the contact number, the contact number is marked;
The matching status according to the contact number, the step of the contact number is marked, comprising:
When the contact number and the house property medium class phone successful match, the contact number is labeled as The house property medium class phone;
When the contact number and the harassing and wrecking class phone successful match, by the contact number labeled as described Harass class phone;
When the contact number and the swindle class phone successful match, by the contact number labeled as described Swindle class phone;
When the contact number and the ad promotions class phone successful match, the contact number is labeled as The ad promotions class phone.
S203: the analysis returned in response to the server-side is as a result, show guidance interface to guide user to open the second class Application permission;
The severity that class phone etc. is harassed in the daily phone received of user is informed by guidance interface, then again to The unlatching of family inquiry other application permission.Perception after user opens application permission in this way has stronger cognition, is also more willing to out Open subsequent application permission.User is also more preferable for the usage experience of application program.
In embodiments of the present invention, as shown in figure 5, the analysis returned in response to the server-side is drawn as a result, showing The step of interface is led to guide user to open the second class application permission, comprising:
S501: the analysis result is counted;
It is described analysis result be the server-side in the message registration contact phone and database in preset number Code matched and marked after result.
Specifically, being denoted as firstly, count the number number in the contact phone with the predetermined telephone successful match Number quantity to be calculated.For example have 5 and house property medium class phone successful match in 50 contact numbers, 6 and harassing and wrecking class Phone successful match, 3 and swindle class phone successful match, 10 and ad promotions class phone successful match.
Then, the number quantity to be calculated ratio shared in total number number of the contact phone is calculated. So, the number quantity of house property medium class phone ratio shared in total number number of contact phone is 10%, harassing and wrecking The number quantity of class phone ratio shared in total number number of contact phone is 12%, swindles the number number of class phone Measuring shared ratio in total number number of contact phone is 6%, and the number quantity of ad promotions class phone is in contact person Shared ratio is 20% in total number number of phone.
When the ratio is greater than the first preset ratio, determining the message registration, there are severes to harass situation;Alternatively, working as When the ratio is greater than the second preset ratio and is less than or equal to first preset ratio, determine that there are moderates for the message registration Harass situation;Alternatively, determining that the message registration exists when the ratio is less than or equal to second preset ratio and slightly disturbing Disturb situation;Wherein, first preset ratio is greater than second preset ratio.First preset ratio is with the second preset ratio To total number quantity with preset number successful match, 4 class numbers being marked in total number number of contact phone Accounting.For example, the first preset ratio is 60%, the second preset ratio is 30%, then determining that the call is remembered according to calculating It records and harasses situation (30% < 48% < 60%) in moderate.Certainly determine that harassing and wrecking situation can also be respectively to every one kind in 4 classes Weight is arranged in the accounting of number, then on the basis of this compared with default accounting.
In practical applications, the first kind application permission that user opens can also include logical in addition to message registration access authority News record access authority.Contact number is sent to server-side by the access to message registration by the corresponding client of application program Obtain: the contact phone in message registration matched and marked with preset number in database after result.Client is logical The access to message registration and address list is crossed, is excluding wherein to be present in user from the contact number read in message registration Address list, newly-generated contact number is sent to server-side and is matched and is marked.It solves and only passes through message registration When reading contact number, the problem bad for the individualized experience of different user such as label harassing and wrecking class phone.For example, for House property medium practitioner may include the contact person number that the label from colleague is class in his/her message registration Code, if effective analysis knot just cannot be provided for user using these as the factor for determining harassing and wrecking situation without reference to address list Fruit.
S502: the guidance interface is shown to guide user to enable calling protection function;
The content at the guidance interface includes showing that the chart of statistical result and calling protection function enable interface, to pass through The calling protection function enables the interface to be opened that interface triggering jumps to the second class application permission.
As shown in fig. 7, the exhibition method of statistical result includes but is not limited to circular chart, histogram.The state of displaying can be with It is static be also possible to dynamically.Main title shown in Fig. 7 " you are harassed by following incoming call severe recently ", reaction is step Harassing and wrecking situation is determined in rapid S501 (setting is default than column).By data obtained in step S501, shown by way of chart, The analysis result obtained after can making user is more intuitive, has more the understanding application permission of picture to open.
S503: enabling the request of the calling protection function according to the user received, shows the second class application permission Interface to be opened;
The unlatching of first kind application permission allow user obtained to oneself harassing and wrecking situation understanding, to user with chart Form shows that guidance user opens the second class application permission, what user obtained after opening for application permission to after analysis result Calling protection experience is more positive.
In practical applications, first by the nearest message registration analysis of showing interface shown in Fig. 7, when user triggers Fig. 7 Shown in " enabling disturbance incoming call protection " interface in interface;Jump to the interface as shown in Fig. 8, showing interface shown in Fig. 8 Harassing and wrecking intercept, and the top at the interface includes the current state of a permission in the second class application permission: " self-starting switch is not opened Open " (current state of other the second class application permissions certainly, can also be presented here);When user passes through " opening authorization " interface After triggering the permission, interface as shown in Figure 9 is jumped to, the showing interface the second class application permission being not yet turned on: suspend Window permission, self-starting permission and survival permission, and the corresponding effect for describing these three permissions.
Certainly, use above in realize calling protection function basic permission and expand permission, can with graft application in It realizes the basic permission of short message defencive function and expands permission.After opening the access recorded to short message, analysis short message record, exhibition Show analysis result (such as matched indicia obtained pseudo-base station note etc.), reboots user and open and expand permission (such as suspended window Permission etc.).
The technical solution provided by above this specification embodiment is as it can be seen that related in user's unlatching in this specification embodiment After the basic permission of calling protection function, server-side analyzes the message registration of user by authorization privilege, and client is to user's exhibition Show analysis as a result, guidance user opens the expansion permission in relation to calling protection function.By the analysis of displaying as a result, user can Oneself is timely and effectively perceived for the desirability of calling protection function, so that it is determined whether to enable expand permission.It is answering With in program or application program functional module install when, application permission open after corresponding function can timely and effectively to Family feedback is presented, and is improved the enthusiasm that user experiences corresponding function in the application, is enhanced the usage rate of the user of application program.
The embodiment of the invention also provides a kind of management systems of application permission, and as shown in Figure 10, the system comprises visitors Family end 600 and server-side 700, the client 600 include:
Detection module 610: for opening up when detecting the functional module installation in application program or the application program Show the interface to be opened of first kind application permission.Wherein, the first kind application permission is the basis for realizing calling protection function Permission, the first kind application permission may include message registration access authority;Alternatively, the first kind application permission can wrap Include message registration access authority and address list access authority.
Sending module 620: the request for the user received to be opened the first kind application permission is sent to service End, so that the message registration of server-side analysis user;Sending module 620 includes: number reading unit: being read for number Corresponding contact number in the message registration;And request transmitting unit, for by the contact number and to described Contact number carries out matched request and is sent to the server-side.In practical applications, number reading unit is read recently Corresponding contact number in 50 message registrations.
Guiding module 630: the analysis for returning in response to the server-side is as a result, show guidance interface to guide user Open the second class application permission.Wherein, the second class application permission is the expansion permission for realizing calling protection function.Described Two class application permissions may include phone permission, suspended window permission and open resident permission certainly.As shown in figure 11, the guiding module 630 include: statistic unit 631: for counting to the analysis result;Function enables guidance unit 632: for showing Guidance interface is stated to guide user to enable calling protection function;Open showing interface unit 633: for according to the user received The request of the calling protection function is enabled, shows the interface to be opened of the second class application permission.Wherein, the analysis result is The server-side contact phone in the message registration is matched and is marked with preset number in database after knot Fruit;The preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone.Specifically , statistic unit is used to count the number number in the contact phone with the predetermined telephone successful match, is denoted as wait count Calculate number quantity;Calculate the number quantity to be calculated ratio shared in total number number of the contact phone;When When the ratio is greater than the first preset ratio, determining the message registration, there are severes to harass situation;Alternatively, when the ratio is big In the second preset ratio and be less than or equal to first preset ratio when, determine the message registration there are moderate harass situation; Alternatively, determining that the message registration has slight harassing and wrecking situation when the ratio is less than or equal to second preset ratio;Its In, first preset ratio is greater than second preset ratio.The content at the guidance interface includes showing statistical result Chart and calling protection function enable interface, jump to second class to enable interface triggering by the calling protection function The interface to be opened of application permission.
The server-side 700 analyzes the message registration of user, and as shown in figure 12, the server-side 700 includes:
Numbers match module 710: for according to the preset number stored in database, the contact number is carried out Match.The numbers match module includes: taxon: for the area according to number length, number operator and number Number, classify to the preset number;Ternary tree construction unit: for constructing under each series according to prefix The corresponding ternary tree of the preset number;Searching unit: for searching the contact number in the ternary tree, when in institute When stating ternary tree and finding the contact number, the contact number and the preset number successful match.Wherein, described Preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone.In practical application In, the contact number is uploaded to cloud database and matched by numbers match module.
Number mark module 720: for the matching status according to the contact number, the contact number is carried out Label;The number mark module includes: house property medium class phone marking unit: for when the contact number and the room When producing intermediary's class phone successful match, the contact number is labeled as the house property medium class phone;Harass class phone mark Remember unit: for when the contact number and the harassing and wrecking class phone successful match, the contact number to be labeled as The harassing and wrecking class phone;Swindle class phone marking unit: for being matched into when the contact number with the swindle class phone When function, the contact number is labeled as the swindle class phone;Ad promotions class phone marking unit: for when described When being people's number and the ad promotions class phone successful match, by the contact number labeled as the ad promotions class electricity Words.
It should be noted that the System and method for embodiment in the system embodiment is based on same inventive concept.
The embodiment of the invention provides a kind of management server end of application permission, server-side includes processor and memory, At least one instruction, at least a Duan Chengxu, code set or instruction set are stored in the memory, this at least one instruction, this extremely A few Duan Chengxu, the code set or instruction set are loaded as the processor and are executed to realize as provided by above method embodiment The management method of application permission.
Memory can be used for storing software program and module, and processor is stored in the software program of memory by operation And module, thereby executing various function application and data processing.Memory can mainly include storing program area and storage number According to area, wherein storing program area can application program needed for storage program area, function etc.;Storage data area can store basis The equipment uses created data etc..In addition, memory may include high-speed random access memory, can also include Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memory can also include Memory Controller, to provide access of the processor to memory.
The embodiment of the invention also provides a kind of structural schematic diagrams of server-side, please refer to Figure 13, which uses In the management method of application permission for implementing to provide in above-described embodiment, specifically, on the service end structure may include State the management system of application permission.The server-side 1300 can generate bigger difference because configuration or performance are different, can wrap One or more central processing units (Central Processing Units, CPU) 1310 are included (for example, one or one The above processor) and memory 1330, the storage medium of one or more storage application programs 1323 or data 1322 1320 (such as one or more mass memory units).Wherein, memory 1330 and storage medium 1320 can be of short duration Storage or persistent storage.The program for being stored in storage medium 1320 may include one or more modules, and each module can To include to the series of instructions operation in server-side.Further, central processing unit 1310 can be set to be situated between with storage Matter 1320 communicates, and the series of instructions operation in storage medium 1320 is executed in server-side 1300.Server-side 1300 can be with Including one or more power supplys 1360, one or more wired or wireless network interfaces 1350, one or one with Upper input/output interface 1340, and/or, one or more operating systems 1321, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The embodiments of the present invention also provide a kind of storage medium, the storage medium be may be disposed among server-side to protect Deposit relevant at least one instruction of management method for realizing application permission a kind of in embodiment of the method, an at least Duan Chengxu, Code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or the instruction set are loaded simultaneously by the processor Execute the management method to realize the application permission of above method embodiment offer.
Optionally, in the present embodiment, above-mentioned storage medium can be located in multiple network service ends of computer network At least one network service end.Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, only Read memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), movement The various media that can store program code such as hard disk, magnetic or disk.
It should be understood that embodiments of the present invention sequencing is for illustration only, do not represent the advantages or disadvantages of the embodiments. And above-mentioned this specification specific embodiment is described.Other embodiments are within the scope of the appended claims.One In a little situations, the movement recorded in detail in the claims or step can be executed according to the sequence being different from embodiment and Still desired result may be implemented.In addition, process depicted in the drawing not necessarily requires the particular order shown or company Continuous sequence is just able to achieve desired result.In some embodiments, multitasking and parallel processing it is also possible or It may be advantageous.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system and For server-side embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to side The part of method embodiment illustrates.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of management method of application permission, which is characterized in that the described method includes:
When detect in application program or the application program functional module installation when, show first kind application permission to Open interface;
The request that the user received opens the first kind application permission is sent to the corresponding server-side of the application program, So that the message registration of the server-side analysis user;
The analysis returned in response to the server-side is as a result, show guidance interface to guide user to open the second class application permission;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, and the second class application permission is Realize the expansion permission of calling protection function.
2. the method according to claim 1, wherein described open the first kind application for the user received The step of request of permission is sent to server-side, comprising:
Read corresponding contact number in the message registration;
The server-side is sent to by the contact number and to the matched request of contact number progress;
The step of message registration of the server-side analysis user, comprising:
According to the preset number stored in database, the contact number received is matched;
According to the matching status of the contact number, the contact number is marked;
Wherein, the preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class electricity Words.
3. according to the method described in claim 2, it is characterized in that, described according to the preset number stored in database, to institute State the step of contact number is matched, comprising:
According to the area code of number length, number operator and number, classify to the preset number;
According to prefix, the corresponding ternary tree of the preset number under each series is constructed;
The contact number is searched in the ternary tree, it is described when the ternary tree finds the contact number Contact number and the preset number successful match.
4. according to the method described in claim 3, it is characterized in that, the matching status according to the contact number, right The step of contact number is marked, comprising:
When the contact number and the house property medium class phone successful match, by the contact number labeled as described House property medium class phone;
When the contact number and the harassing and wrecking class phone successful match, the contact number is labeled as the harassing and wrecking Class phone;
When the contact number and the swindle class phone successful match, the contact number is labeled as the swindle Class phone;
When the contact number and the ad promotions class phone successful match, by the contact number labeled as described Ad promotions class phone.
5. the method according to claim 1, wherein it is described in response to the server-side return analysis as a result, Show the step of guidance interface is to guide user to open the second class application permission, comprising:
The analysis result is counted;
The guidance interface is shown to guide user to enable calling protection function;
The request of the calling protection function is enabled according to the user received, shows the boundary to be opened of the second class application permission Face;
Wherein, it is described analysis result be the server-side in the message registration contact phone and database in preset number Code matched and marked after result;
The preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone.
6. according to the method described in claim 5, it is characterized in that, described the step of being counted to the analysis result, packet It includes:
The number number in the contact phone with the predetermined telephone successful match is counted, number quantity to be calculated is denoted as;
Calculate the number quantity to be calculated ratio shared in total number number of the contact phone;
When the ratio is greater than the first preset ratio, determining the message registration, there are severes to harass situation;Alternatively, when described When ratio is greater than the second preset ratio and is less than or equal to first preset ratio, determining the message registration, there are moderate harassing and wrecking Situation;Alternatively, determining that the message registration has slight harassing and wrecking feelings when the ratio is less than or equal to second preset ratio Condition;
Wherein, first preset ratio is greater than second preset ratio.
7. according to the method described in claim 5, it is characterized in that, the content at the guidance interface includes showing statistical result Chart and calling protection function enable interface, jump to second class to enable interface triggering by the calling protection function The interface to be opened of application permission.
8. according to the method described in claim 2, it is characterized in that, described read corresponding contact person number in the message registration The step of code, comprising:
Read corresponding contact number in the nearest preset quantity message registration;
It is described according to the preset number stored in database, the step of matching to the contact number, comprising: will be described Contact number is uploaded to cloud database.
9. the method according to claim 1, wherein the first kind application permission includes message registration access right Limit;Alternatively, the first kind application permission includes message registration access authority and address list access authority;
The second class application permission includes phone permission, suspended window permission and opens resident permission certainly.
10. a kind of management system of application permission, which is characterized in that the system comprises the corresponding client of application program and institutes The corresponding server-side of application program is stated, the client includes:
Detection module: for showing when detecting the functional module installation in the application program or the application program The interface to be opened of first kind application permission;
Sending module: the request for the user received to be opened the first kind application permission is sent to the application program Corresponding server-side, so that the message registration of server-side analysis user;
Guiding module: analysis for returning in response to the server-side is as a result, show guidance interface to guide user to open the Two class application permissions;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, and the second class application permission is Realize the expansion permission of calling protection function.
CN201910003540.8A 2019-01-03 2019-01-03 Application authority management method and system Active CN109886012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910003540.8A CN109886012B (en) 2019-01-03 2019-01-03 Application authority management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910003540.8A CN109886012B (en) 2019-01-03 2019-01-03 Application authority management method and system

Publications (2)

Publication Number Publication Date
CN109886012A true CN109886012A (en) 2019-06-14
CN109886012B CN109886012B (en) 2023-03-07

Family

ID=66925572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910003540.8A Active CN109886012B (en) 2019-01-03 2019-01-03 Application authority management method and system

Country Status (1)

Country Link
CN (1) CN109886012B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN102811202A (en) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 Method and system for preventing harassment calls through cloud computing
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN103945036A (en) * 2014-04-11 2014-07-23 江苏物联网研究发展中心 Method for allowing user to select head portraits on cell phone and protecting privacy of user during call receiving
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104410700A (en) * 2014-12-04 2015-03-11 北京奇虎科技有限公司 Method for issuing crank call list as well as crank call interception method and system
CN104486476A (en) * 2014-12-11 2015-04-01 北京奇虎科技有限公司 Crank call interception method and device
CN105162940A (en) * 2015-07-31 2015-12-16 小米科技有限责任公司 Call processing method and call processing device
CN105262876A (en) * 2015-10-30 2016-01-20 百度在线网络技术(北京)有限公司 Conversation processing method, method for providing number information of telephone number, and device
CN105516464A (en) * 2015-11-26 2016-04-20 厦门美图移动科技有限公司 Incoming call data privacy protection method and apparatus, and mobile terminal
CN106302937A (en) * 2016-08-18 2017-01-04 北京奇虎科技有限公司 The based reminding method of communication harassing and wrecking and device
CN106385483A (en) * 2016-09-05 2017-02-08 北京奇虎科技有限公司 Phone number processing method and mobile terminal and cloud server thereof
CN106953989A (en) * 2017-05-17 2017-07-14 努比亚技术有限公司 Incoming call reminding method and device, terminal, computer-readable recording medium
CN106993083A (en) * 2017-02-21 2017-07-28 北京奇虎科技有限公司 A kind of method and apparatus of recommendation intelligent terminal operation prompt information
CN107360300A (en) * 2017-08-01 2017-11-17 中国联合网络通信集团有限公司 Harassing call hold-up interception method and device
CN107547716A (en) * 2016-06-29 2018-01-05 腾讯科技(深圳)有限公司 A kind of information processing method and terminal

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN102811202A (en) * 2011-06-01 2012-12-05 网秦无限(北京)科技有限公司 Method and system for preventing harassment calls through cloud computing
CN102694900A (en) * 2012-06-18 2012-09-26 奇智软件(北京)有限公司 Phone call intercepting method and device
CN103167500A (en) * 2013-02-01 2013-06-19 杭州东信北邮信息技术有限公司 Method and system achieving united processing of mobile phone
CN104113466A (en) * 2013-04-17 2014-10-22 腾讯科技(深圳)有限公司 Harassing phone call identification method, client, server and system
CN103945036A (en) * 2014-04-11 2014-07-23 江苏物联网研究发展中心 Method for allowing user to select head portraits on cell phone and protecting privacy of user during call receiving
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104410700A (en) * 2014-12-04 2015-03-11 北京奇虎科技有限公司 Method for issuing crank call list as well as crank call interception method and system
CN104486476A (en) * 2014-12-11 2015-04-01 北京奇虎科技有限公司 Crank call interception method and device
CN105162940A (en) * 2015-07-31 2015-12-16 小米科技有限责任公司 Call processing method and call processing device
CN105262876A (en) * 2015-10-30 2016-01-20 百度在线网络技术(北京)有限公司 Conversation processing method, method for providing number information of telephone number, and device
CN105516464A (en) * 2015-11-26 2016-04-20 厦门美图移动科技有限公司 Incoming call data privacy protection method and apparatus, and mobile terminal
CN107547716A (en) * 2016-06-29 2018-01-05 腾讯科技(深圳)有限公司 A kind of information processing method and terminal
CN106302937A (en) * 2016-08-18 2017-01-04 北京奇虎科技有限公司 The based reminding method of communication harassing and wrecking and device
CN106385483A (en) * 2016-09-05 2017-02-08 北京奇虎科技有限公司 Phone number processing method and mobile terminal and cloud server thereof
CN106993083A (en) * 2017-02-21 2017-07-28 北京奇虎科技有限公司 A kind of method and apparatus of recommendation intelligent terminal operation prompt information
CN106953989A (en) * 2017-05-17 2017-07-14 努比亚技术有限公司 Incoming call reminding method and device, terminal, computer-readable recording medium
CN107360300A (en) * 2017-08-01 2017-11-17 中国联合网络通信集团有限公司 Harassing call hold-up interception method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
陆峰: "大数据时代,突破个人隐私保护困境", 《互联网经济》 *
马庆贺等: "基于海量数据分析与远程取证的反电信诈骗平台", 《警察技术》 *

Also Published As

Publication number Publication date
CN109886012B (en) 2023-03-07

Similar Documents

Publication Publication Date Title
US11347883B2 (en) Access controlled graph query spanning
CN106569860A (en) Application management method and terminal
CN107590386B (en) Security event information processing method and device, storage medium and computer equipment
CN109391620B (en) Method, system, server and storage medium for establishing abnormal behavior judgment model
CN112287326B (en) Security authentication method and device, electronic equipment and storage medium
CN109543405A (en) A kind of privacy calls Activity recognition method and electronic equipment
CN103412913B (en) A kind of association search method and system
US20090037443A1 (en) Intelligent group communication
US20190164193A1 (en) Predictive search context system for targeted recommendations
CN112667875A (en) Data acquisition method, data analysis method, data acquisition device, data analysis device, equipment and storage medium
CN109886012A (en) A kind of management method and system of application permission
CN106535102A (en) Mobile terminal positioning method and mobile terminal
Hassan et al. On the importance of performing app analysis within peer groups
Hao et al. Global and personal app networks: characterizing social relations among mobile apps
US20160092481A1 (en) Information integration and assessment
CN106897620B (en) Android application program safety visual analysis method based on malicious behavior function call graph
CN106559554A (en) A kind of communication processing method, device
US20190163832A1 (en) Predictive search context system for location intercept
CN108667685B (en) Mobile application network flow clustering device
CN112416482B (en) Interface switching method and device
CN114186029A (en) Analysis method of information leakage behavior, related device and computer storage medium
CN112100294A (en) User relationship analysis method and device for network platform and related equipment
CN113485594A (en) Message record searching method, device and storage medium
KR20110125905A (en) Method and system for management of reply comment usgin pattern analysis and web server thereof
US10484868B2 (en) Configuring privacy policies by formulating questions and evaluating responses

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant