CN109886012A - A kind of management method and system of application permission - Google Patents
A kind of management method and system of application permission Download PDFInfo
- Publication number
- CN109886012A CN109886012A CN201910003540.8A CN201910003540A CN109886012A CN 109886012 A CN109886012 A CN 109886012A CN 201910003540 A CN201910003540 A CN 201910003540A CN 109886012 A CN109886012 A CN 109886012A
- Authority
- CN
- China
- Prior art keywords
- permission
- class
- phone
- application
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of management method of application permission and systems.Method includes: to show the interface to be opened of first kind application permission when detecting the functional module installation in application program or application program;The request that the user received opens first kind application permission is sent to the corresponding server-side of application program, so that the message registration of server-side analysis user;The analysis returned in response to server-side is as a result, show guidance interface to guide user to open the second class application permission;Wherein, first kind application permission is the basic permission for realizing calling protection function, and the second class application permission is the expansion permission for realizing calling protection function.By the analysis of displaying as a result, user can timely and effectively perceive oneself for the desirability of calling protection function.Corresponding function after application permission is opened can improve the enthusiasm that user experiences corresponding function in the application timely and effectively to user feedback, presentation.
Description
Technical field
The present invention relates to Internet communication technology field more particularly to the management methods and system of a kind of application permission.
Background technique
When user is easily and efficiently communicated using terminal device, also occur harassing call etc. thereupon, these
Phone affects the communication experience of user.With the fast development of Internet communication technology, the application journey installed in terminal device
Sequence (Application, APP) can identify harassing call etc., and prompt user.Application program is to utilize the application permission obtained
Realize the identification to harassing call etc..
However, user is for the not stronger perception to the corresponding application permission of application program authorization.Wherein, some
Application permission is defaulted when application program is installed to be authorized to;Alternatively, some application permissions are after user authorizes, can not and
When its effect is effectively presented to user.These all affect user when using application program to the body of application permission grant
It tests.
Summary of the invention
Apply the corresponding function after application permission unlatching can not be timely and effectively to user to solve the prior art
Feedback is presented, and influences the problems such as user experiences the enthusiasm of corresponding function in the application, the present invention provides a kind of applications
The management method and system of permission:
On the one hand, the present invention provides a kind of management methods of application permission, which comprises
When detecting the functional module installation in application program or the application program, first kind application permission is shown
Interface to be opened;
The request that the user received opens the first kind application permission is sent to the corresponding clothes of the application program
Business end, so that the message registration of server-side analysis user;
The analysis returned in response to the server-side is as a result, show guidance interface to guide user to open the second class application power
Limit;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, the second class application power
It is limited to realize the expansion permission of calling protection function.
On the other hand a kind of management system of application permission is provided, the system comprises the corresponding clients of application program
Server-side corresponding with the application program, the client include:
Detection module: for when detect in the application program or the application program functional module installation when,
Show the interface to be opened of first kind application permission;
Sending module: the request for the user received to be opened the first kind application permission is sent to the application
The corresponding server-side of program, so that the message registration of server-side analysis user;
Guiding module: the analysis for returning in response to the server-side is as a result, show guidance interface to guide user to open
Open the second class application permission;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, the second class application power
It is limited to realize the expansion permission of calling protection function.
On the other hand a kind of management server end of application permission is provided, the server-side includes processor and memory,
It is stored at least one instruction, at least a Duan Chengxu, code set or instruction set in the memory, at least one instruction,
An at least Duan Chengxu, the code set or instruction set are loaded by the processor and are executed to realize such as above-mentioned application power
The management method of limit.
On the other hand a kind of computer readable storage medium is provided, at least one finger is stored in the storage medium
Enable, at least a Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or
Instruction set is loaded by processor and is executed to realize the management method such as above-mentioned application permission.
The management method and system of a kind of application permission provided by the invention, have the following technical effect that
The present invention after user opens in relation to the basic permission of calling protection function, analyzed by authorization privilege and used by server-side
The message registration at family, client show analysis as a result, guidance user opens the expansion permission in relation to calling protection function to user.
By the analysis of displaying as a result, user can timely and effectively perceive oneself for the desirability of calling protection function, from
And it is determined whether to enable expand permission.When functional module in application program or application program is installed, after application permission is opened
Corresponding function can timely and effectively to user feedback, present, improve user and experience the product of corresponding function in the application
Polarity enhances the usage rate of the user of application program.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology and advantage, below will be to implementation
Example or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, the accompanying drawings in the following description is only
It is only some embodiments of the present invention, for those of ordinary skill in the art, without creative efforts,
It can also be obtained according to these attached drawings other attached drawings.
Fig. 1 is a kind of schematic diagram of application environment provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of the management method of application permission provided in an embodiment of the present invention;
Fig. 3 is the request transmission that the user provided in an embodiment of the present invention that will be received opens the first kind application permission
To a kind of flow diagram of the corresponding server-side of the application program;
Fig. 4 is server-side provided in an embodiment of the present invention according to the preset number stored in database, to the contact person
Number carries out a kind of matched flow diagram;
Fig. 5 be it is provided in an embodiment of the present invention in response to the server-side return analysis as a result, show guidance interface with
User is guided to open a kind of flow diagram of the second class application permission;
Fig. 6-Fig. 9 is the UI interface schematic diagram obtained using the embodiment of the present invention respectively;
Figure 10 is a kind of composition block diagram of the management system of application permission provided in an embodiment of the present invention;
Figure 11 is a kind of composition block diagram of server-side provided in an embodiment of the present invention;
Figure 12 is a kind of composition block diagram of guiding module provided in an embodiment of the present invention;
Figure 13 is a kind of structural schematic diagram of server-side provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art without making creative work it is obtained it is all its
His embodiment, shall fall within the protection scope of the present invention.
It should be noted that term " includes " and " tool in description and claims of this specification and above-mentioned attached drawing
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units
Process, method, system, product or server-side those of are not necessarily limited to be clearly listed step or unit, but may include not having
Other step or units being clearly listed or intrinsic for these process, methods, product or equipment.
Referring to Fig. 1, Fig. 1 is a kind of schematic diagram of application environment provided in an embodiment of the present invention, as shown in Figure 1, this is answered
Related application installation or user are carried out on the terminal device with user in environment to the function mould in some application program
When block is installed, the corresponding client of application program shows the interface to be opened (left side such as Fig. 1 of first kind application permission to user
Interface shown in side);When user is by clicking the corresponding position in interface, the user received is opened described the by client
The request of a kind of application permission is sent to server-side, so that the message registration of server-side analysis user;Client receives
The analysis that the server-side returns is as a result, show guidance interface (interface shown on the right side of Fig. 1) to guide user to open second
Class application permission.The first kind application permission is the basic permission for realizing calling protection function, the second class application permission
For the expansion permission for realizing calling protection function.Client is when asking for the permission for enabling calling protection function to user, to need
The permission to be asked for work is classified, and first asks for first kind application permission to user, the authorization by user to first kind application permission,
Client shows analysis result to the analysis of message registration based on server-side and asks for the second class application permission to user.The present invention
The demand perception scene for opening the second class application permission is provided for user, user timely and effectively perceives by analyzing result
Oneself desirability for calling protection function.It should be noted that Fig. 1 is only a kind of example.
In embodiments of the present invention, the first kind application permission includes message registration access authority;Alternatively, described first
Class application permission includes message registration access authority and address list access authority.The second class application permission includes phone power
Limit and opens resident permission at suspended window permission certainly.Specifically, message registration access authority: including history message registration access authority,
Application program (or functional module in application program) is allowed to obtain, the contact number in inquiry and identification user's communication record
Which is harassing call etc..Address list access authority: application program (or functional module in application program) is allowed to access communication
Record, it is address list incoming call which, which can be distinguished,.Phone permission: application program (or functional module in application program) is allowed to supervise
It answers a call, to capture calling event.Suspended window permission: allow application program (or functional module in application program) in terminal
The floating window that incoming call prompting is presented on the interface of equipment, the displaying of phone type is given in screen locking by suspended window permission.
Include self-starting permission and survival permission from resident permission is opened, open resident permission certainly and be used to that corresponding process not to be allowed to be terminated,
Middle self-starting permission can restart after allowing process to be terminated;Survival permission then guarantees that process will not be terminated, sometimes
Also it is backstage protection permission.
In embodiments of the present invention, terminal device includes but is not limited to smart phone, intelligent wearable device and PDA (flat
Plate computer).
In practical applications, user opens first kind application permission and/or the second class application power on the interface of terminal device
The mode at family is limited the use of, can be triggered by the corresponding position clicked in interface, naturally it is also possible to triggered by gesture sliding trace,
Headwork triggering (the camera generic module of terminal device detects) etc..
A kind of specific embodiment of the management method of application permission of the present invention introduced below, Fig. 2 is that the embodiment of the present invention mentions
A kind of flow diagram of the management method of the application permission supplied, present description provides the sides as described in embodiment or flow chart
Method operating procedure, but based on routine or may include more or less operating procedure without creative labor.Embodiment
In the step of enumerating sequence be only one of numerous step execution sequences mode, do not represent and unique execute sequence.In reality
When system or server-side product in border execute, it can be executed according to embodiment or method shown in the drawings sequence or parallel
It executes (such as environment of parallel processor or multiple threads).It is specific as shown in Fig. 2, the method may include:
S201: when detecting the functional module installation in application program or the application program, show that the first kind is answered
With the interface to be opened of permission;
In embodiments of the present invention, application program installed on the terminal device (such as the first time install application program pair
The installation kit answered) or application program in functional module install that (for example installation function module is corresponding on the terminal device
Increment installation kit etc.), the corresponding client of application program shows interface to be opened (such as Fig. 1, figure of first kind application permission at this time
Shown in 6).Permission is a kind of limitation applied to the access of code on terminal device or data, to prevent key code sum number
Bad experience is brought to user according to being abused.To realize calling protection function, party in request of the application program as permission, by visitor
First kind application permission (such as message registration access authority) is asked for user in family end.
S202: it is corresponding that the request that the user received opens the first kind application permission is sent to the application program
Server-side so that the server-side analysis user message registration;
In embodiments of the present invention, as shown in figure 3, the user that will be received opens the first kind application permission
Request is sent to the step of application program corresponding server-side, comprising:
S301: corresponding contact number in the message registration is read;
Specifically, application program is allowed access to history message registration, answers when user opens message registration access authority
With the corresponding client of program read corresponding contact number in the message registration (with the number of user there are caller or
The number of called relationship), client can read corresponding in the preset quantity nearest apart from the current time message registration
Contact number.Here preset quantity can be 30,50,100 etc..When preset quantity is 50, this 50 call notes
In record corresponding contact number there are it is duplicate be more than preset value (such as 10) when, suitable message registration can be read again
Number guarantees that analysis result characterizes the authenticity that user's communication records, and realizes that user just guides interface to open the second class application power
Effective judgement of limit.For example, before application program is installed, rate problem multiple (such as 12 time) and operator of the user with regard to flow
Phone (such as 10086) is linked up, then there are duplicate when reading 50 message registration nearest apart from current time
10086, thus read suitable message registration number again forward according to time inverted order, reduce the sample because carrying out message registration analysis
This problem of, causes analysis result to be unable to the probability of exact representation, while can not read whole message registrations, improves analysis speed
Degree guarantees that analysis result more in time, is effectively presented in client.Certainly, the number that client reads message registration is not limited to
50.Server-side can also read whole message registrations.
S302: the service is sent to by the contact number and to the matched request of contact number progress
End;
Client is matched by the contact number of the preset quantity read from message registration, and to contact number
Request be sent to server-side.
In embodiments of the present invention, the step of message registration of the server-side analysis user, comprising:
Firstly, being matched according to the preset number stored in database to the contact number;
Specifically, preset number includes at least Yellow Page (the international industrial and commercial enterprise by enterprise nature and product category layout
Industry telephone directory book) class number, house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone in
It is a kind of.There may be intersection, such as company A, the telephone number that can be used as house property medium company are same in five above-mentioned class numbers
When be present in Yellow Page class number and house property medium class number, harassing and wrecking class phone and/or wide can also be present in because of the label of user
It accuses and promotes in class phone.The correspondence number having in preset number can be more than preset value (such as 50 times) according to the label of user
And it increases newly.Preset number can store in database beyond the clouds, and the corresponding server-side of application program will be read from message registration
Contact number be uploaded to cloud database, and then matched.
As shown in figure 4, it is described according to the preset number stored in database, matched step is carried out to the contact number
Suddenly, comprising:
S401: according to the area code of number length, number operator and number, the preset number is divided
Class;
It may include fixed line number, phone number etc. in preset number.It, can area in a certain range according to number length
Divide fixed line number and phone number.For fixed line number can by the area code of number and whether be as defined in service number into
Row classification.It can be classified by number operator etc. for phone number.After carrying out above-mentioned classification, what is obtained is parallel
Series: the first classification (A class special service fixed line number), the second classification (B class special service fixed line number), third class
Mesh (the fixed line number for belonging to the ground C), the 4th classification (phone number of D operator number section) etc..Certainly, to preset number into
The classification reference factor of row classification, classification execute step and are not limited to foregoing description.
S402: according to prefix, the corresponding ternary tree of the preset number under each series is constructed;
For example the preset number pair under the 4th classification (phone number of D operator number section) is constructed according to prefix
The ternary tree (TST, TernarySearchTree) answered.Ternary tree can be realized prefix matching operation, inquiry it is high-efficient, and
And space consuming is small.Ternary tree has 3 byte points, is left sibling (left), intermediate node (mid), right node respectively
(right).When increasing number in preset number newly, that is, when progress keyword (key) insertion, from tree root as present node
Start (tree root is nil when tree is empty), the recurrence of one character of a character executes following procedure: if (1) working as prosthomere
Point is nil, then creates a new node, and current character is saved in node, present node is set to.(2) if
The character that current character and present node save all is '/0 ', and data are stored in present node, terminates and calls.If current character
Less than the character that present node saves, then recurrence is by the left child node of current character insertion node, greater than being then inserted into right sub- section
Point;The equal intermediate child node that character late is then inserted into present node.What ternary tree can be supported to have in preset number
The dynamic of corresponding number increases and deletes, and ensure that server-side carries out analysis to message registration and is directed to newest default number
Code, the analysis result that client is shown to user is not only timely and effectively, to have in terms of content and in time on presentation speed
Effect.
S403: searching the contact number in the ternary tree, when finding the contact person number in the ternary tree
When code, the contact number and the preset number successful match.
When carrying out contact number lookup, matching in preset number, the sum of keyword one character, one character
The character that tree interior joint saves is compared, and recurrence executes equally since tree root.(1) it if present node is nil, looks into
It looks for unsuccessfully.(2) if current character is than small in node, recurrence searches left child node, still compares current character.(3) such as
For fruit current character than big in node, recurrence searches right child node, still compares current character.(4) if current character with
Equal in node and be all '/0 ', then just deposit the corresponding value of keyword, terminate and call in this node.If it is equal still
It is not '/0 ', then recurrence searches intermediate child node, and comparing character is character late.Pass through server-side looking into ternary tree
It looks for, realizes matched quickly and efficiently to contact number progress.Wherein, the mode searched in ternary tree can pass through
Binary chop.
In practical applications, due to being marked as certain class (such as house property medium class phone, harassing and wrecking class electricity in preset number
Words, swindle class phone and ad promotions class) number, there may come a time when the similitude that will appear certain rule property, such as mobile phone
Preceding nine bit digital of number is all identical, only rear two digits difference.So when contact number (is all 11 hands for being
Machine number) preceding nine bit digital it is same, then can assert the contact number and the preset number successful match.When
So, foregoing description is not limited to using the digital matched mode in non-number.
In further embodiments, to the preset number under each series by construction Fibonacci sequence into
Row segmentation, two endpoints and cut-point of lookup range are all related with Fibonacci sequence.Fibonacci (Fibonacci) is searched
Algorithm establishes corresponding tree using Fibonacci sequence to reduce seeking scope, and it is higher to search matching efficiency.
Then, according to the matching status of the contact number, the contact number is marked;
The matching status according to the contact number, the step of the contact number is marked, comprising:
When the contact number and the house property medium class phone successful match, the contact number is labeled as
The house property medium class phone;
When the contact number and the harassing and wrecking class phone successful match, by the contact number labeled as described
Harass class phone;
When the contact number and the swindle class phone successful match, by the contact number labeled as described
Swindle class phone;
When the contact number and the ad promotions class phone successful match, the contact number is labeled as
The ad promotions class phone.
S203: the analysis returned in response to the server-side is as a result, show guidance interface to guide user to open the second class
Application permission;
The severity that class phone etc. is harassed in the daily phone received of user is informed by guidance interface, then again to
The unlatching of family inquiry other application permission.Perception after user opens application permission in this way has stronger cognition, is also more willing to out
Open subsequent application permission.User is also more preferable for the usage experience of application program.
In embodiments of the present invention, as shown in figure 5, the analysis returned in response to the server-side is drawn as a result, showing
The step of interface is led to guide user to open the second class application permission, comprising:
S501: the analysis result is counted;
It is described analysis result be the server-side in the message registration contact phone and database in preset number
Code matched and marked after result.
Specifically, being denoted as firstly, count the number number in the contact phone with the predetermined telephone successful match
Number quantity to be calculated.For example have 5 and house property medium class phone successful match in 50 contact numbers, 6 and harassing and wrecking class
Phone successful match, 3 and swindle class phone successful match, 10 and ad promotions class phone successful match.
Then, the number quantity to be calculated ratio shared in total number number of the contact phone is calculated.
So, the number quantity of house property medium class phone ratio shared in total number number of contact phone is 10%, harassing and wrecking
The number quantity of class phone ratio shared in total number number of contact phone is 12%, swindles the number number of class phone
Measuring shared ratio in total number number of contact phone is 6%, and the number quantity of ad promotions class phone is in contact person
Shared ratio is 20% in total number number of phone.
When the ratio is greater than the first preset ratio, determining the message registration, there are severes to harass situation;Alternatively, working as
When the ratio is greater than the second preset ratio and is less than or equal to first preset ratio, determine that there are moderates for the message registration
Harass situation;Alternatively, determining that the message registration exists when the ratio is less than or equal to second preset ratio and slightly disturbing
Disturb situation;Wherein, first preset ratio is greater than second preset ratio.First preset ratio is with the second preset ratio
To total number quantity with preset number successful match, 4 class numbers being marked in total number number of contact phone
Accounting.For example, the first preset ratio is 60%, the second preset ratio is 30%, then determining that the call is remembered according to calculating
It records and harasses situation (30% < 48% < 60%) in moderate.Certainly determine that harassing and wrecking situation can also be respectively to every one kind in 4 classes
Weight is arranged in the accounting of number, then on the basis of this compared with default accounting.
In practical applications, the first kind application permission that user opens can also include logical in addition to message registration access authority
News record access authority.Contact number is sent to server-side by the access to message registration by the corresponding client of application program
Obtain: the contact phone in message registration matched and marked with preset number in database after result.Client is logical
The access to message registration and address list is crossed, is excluding wherein to be present in user from the contact number read in message registration
Address list, newly-generated contact number is sent to server-side and is matched and is marked.It solves and only passes through message registration
When reading contact number, the problem bad for the individualized experience of different user such as label harassing and wrecking class phone.For example, for
House property medium practitioner may include the contact person number that the label from colleague is class in his/her message registration
Code, if effective analysis knot just cannot be provided for user using these as the factor for determining harassing and wrecking situation without reference to address list
Fruit.
S502: the guidance interface is shown to guide user to enable calling protection function;
The content at the guidance interface includes showing that the chart of statistical result and calling protection function enable interface, to pass through
The calling protection function enables the interface to be opened that interface triggering jumps to the second class application permission.
As shown in fig. 7, the exhibition method of statistical result includes but is not limited to circular chart, histogram.The state of displaying can be with
It is static be also possible to dynamically.Main title shown in Fig. 7 " you are harassed by following incoming call severe recently ", reaction is step
Harassing and wrecking situation is determined in rapid S501 (setting is default than column).By data obtained in step S501, shown by way of chart,
The analysis result obtained after can making user is more intuitive, has more the understanding application permission of picture to open.
S503: enabling the request of the calling protection function according to the user received, shows the second class application permission
Interface to be opened;
The unlatching of first kind application permission allow user obtained to oneself harassing and wrecking situation understanding, to user with chart
Form shows that guidance user opens the second class application permission, what user obtained after opening for application permission to after analysis result
Calling protection experience is more positive.
In practical applications, first by the nearest message registration analysis of showing interface shown in Fig. 7, when user triggers Fig. 7
Shown in " enabling disturbance incoming call protection " interface in interface;Jump to the interface as shown in Fig. 8, showing interface shown in Fig. 8
Harassing and wrecking intercept, and the top at the interface includes the current state of a permission in the second class application permission: " self-starting switch is not opened
Open " (current state of other the second class application permissions certainly, can also be presented here);When user passes through " opening authorization " interface
After triggering the permission, interface as shown in Figure 9 is jumped to, the showing interface the second class application permission being not yet turned on: suspend
Window permission, self-starting permission and survival permission, and the corresponding effect for describing these three permissions.
Certainly, use above in realize calling protection function basic permission and expand permission, can with graft application in
It realizes the basic permission of short message defencive function and expands permission.After opening the access recorded to short message, analysis short message record, exhibition
Show analysis result (such as matched indicia obtained pseudo-base station note etc.), reboots user and open and expand permission (such as suspended window
Permission etc.).
The technical solution provided by above this specification embodiment is as it can be seen that related in user's unlatching in this specification embodiment
After the basic permission of calling protection function, server-side analyzes the message registration of user by authorization privilege, and client is to user's exhibition
Show analysis as a result, guidance user opens the expansion permission in relation to calling protection function.By the analysis of displaying as a result, user can
Oneself is timely and effectively perceived for the desirability of calling protection function, so that it is determined whether to enable expand permission.It is answering
With in program or application program functional module install when, application permission open after corresponding function can timely and effectively to
Family feedback is presented, and is improved the enthusiasm that user experiences corresponding function in the application, is enhanced the usage rate of the user of application program.
The embodiment of the invention also provides a kind of management systems of application permission, and as shown in Figure 10, the system comprises visitors
Family end 600 and server-side 700, the client 600 include:
Detection module 610: for opening up when detecting the functional module installation in application program or the application program
Show the interface to be opened of first kind application permission.Wherein, the first kind application permission is the basis for realizing calling protection function
Permission, the first kind application permission may include message registration access authority;Alternatively, the first kind application permission can wrap
Include message registration access authority and address list access authority.
Sending module 620: the request for the user received to be opened the first kind application permission is sent to service
End, so that the message registration of server-side analysis user;Sending module 620 includes: number reading unit: being read for number
Corresponding contact number in the message registration;And request transmitting unit, for by the contact number and to described
Contact number carries out matched request and is sent to the server-side.In practical applications, number reading unit is read recently
Corresponding contact number in 50 message registrations.
Guiding module 630: the analysis for returning in response to the server-side is as a result, show guidance interface to guide user
Open the second class application permission.Wherein, the second class application permission is the expansion permission for realizing calling protection function.Described
Two class application permissions may include phone permission, suspended window permission and open resident permission certainly.As shown in figure 11, the guiding module
630 include: statistic unit 631: for counting to the analysis result;Function enables guidance unit 632: for showing
Guidance interface is stated to guide user to enable calling protection function;Open showing interface unit 633: for according to the user received
The request of the calling protection function is enabled, shows the interface to be opened of the second class application permission.Wherein, the analysis result is
The server-side contact phone in the message registration is matched and is marked with preset number in database after knot
Fruit;The preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone.Specifically
, statistic unit is used to count the number number in the contact phone with the predetermined telephone successful match, is denoted as wait count
Calculate number quantity;Calculate the number quantity to be calculated ratio shared in total number number of the contact phone;When
When the ratio is greater than the first preset ratio, determining the message registration, there are severes to harass situation;Alternatively, when the ratio is big
In the second preset ratio and be less than or equal to first preset ratio when, determine the message registration there are moderate harass situation;
Alternatively, determining that the message registration has slight harassing and wrecking situation when the ratio is less than or equal to second preset ratio;Its
In, first preset ratio is greater than second preset ratio.The content at the guidance interface includes showing statistical result
Chart and calling protection function enable interface, jump to second class to enable interface triggering by the calling protection function
The interface to be opened of application permission.
The server-side 700 analyzes the message registration of user, and as shown in figure 12, the server-side 700 includes:
Numbers match module 710: for according to the preset number stored in database, the contact number is carried out
Match.The numbers match module includes: taxon: for the area according to number length, number operator and number
Number, classify to the preset number;Ternary tree construction unit: for constructing under each series according to prefix
The corresponding ternary tree of the preset number;Searching unit: for searching the contact number in the ternary tree, when in institute
When stating ternary tree and finding the contact number, the contact number and the preset number successful match.Wherein, described
Preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone.In practical application
In, the contact number is uploaded to cloud database and matched by numbers match module.
Number mark module 720: for the matching status according to the contact number, the contact number is carried out
Label;The number mark module includes: house property medium class phone marking unit: for when the contact number and the room
When producing intermediary's class phone successful match, the contact number is labeled as the house property medium class phone;Harass class phone mark
Remember unit: for when the contact number and the harassing and wrecking class phone successful match, the contact number to be labeled as
The harassing and wrecking class phone;Swindle class phone marking unit: for being matched into when the contact number with the swindle class phone
When function, the contact number is labeled as the swindle class phone;Ad promotions class phone marking unit: for when described
When being people's number and the ad promotions class phone successful match, by the contact number labeled as the ad promotions class electricity
Words.
It should be noted that the System and method for embodiment in the system embodiment is based on same inventive concept.
The embodiment of the invention provides a kind of management server end of application permission, server-side includes processor and memory,
At least one instruction, at least a Duan Chengxu, code set or instruction set are stored in the memory, this at least one instruction, this extremely
A few Duan Chengxu, the code set or instruction set are loaded as the processor and are executed to realize as provided by above method embodiment
The management method of application permission.
Memory can be used for storing software program and module, and processor is stored in the software program of memory by operation
And module, thereby executing various function application and data processing.Memory can mainly include storing program area and storage number
According to area, wherein storing program area can application program needed for storage program area, function etc.;Storage data area can store basis
The equipment uses created data etc..In addition, memory may include high-speed random access memory, can also include
Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase
Ying Di, memory can also include Memory Controller, to provide access of the processor to memory.
The embodiment of the invention also provides a kind of structural schematic diagrams of server-side, please refer to Figure 13, which uses
In the management method of application permission for implementing to provide in above-described embodiment, specifically, on the service end structure may include
State the management system of application permission.The server-side 1300 can generate bigger difference because configuration or performance are different, can wrap
One or more central processing units (Central Processing Units, CPU) 1310 are included (for example, one or one
The above processor) and memory 1330, the storage medium of one or more storage application programs 1323 or data 1322
1320 (such as one or more mass memory units).Wherein, memory 1330 and storage medium 1320 can be of short duration
Storage or persistent storage.The program for being stored in storage medium 1320 may include one or more modules, and each module can
To include to the series of instructions operation in server-side.Further, central processing unit 1310 can be set to be situated between with storage
Matter 1320 communicates, and the series of instructions operation in storage medium 1320 is executed in server-side 1300.Server-side 1300 can be with
Including one or more power supplys 1360, one or more wired or wireless network interfaces 1350, one or one with
Upper input/output interface 1340, and/or, one or more operating systems 1321, such as Windows ServerTM, Mac
OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The embodiments of the present invention also provide a kind of storage medium, the storage medium be may be disposed among server-side to protect
Deposit relevant at least one instruction of management method for realizing application permission a kind of in embodiment of the method, an at least Duan Chengxu,
Code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or the instruction set are loaded simultaneously by the processor
Execute the management method to realize the application permission of above method embodiment offer.
Optionally, in the present embodiment, above-mentioned storage medium can be located in multiple network service ends of computer network
At least one network service end.Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, only
Read memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), movement
The various media that can store program code such as hard disk, magnetic or disk.
It should be understood that embodiments of the present invention sequencing is for illustration only, do not represent the advantages or disadvantages of the embodiments.
And above-mentioned this specification specific embodiment is described.Other embodiments are within the scope of the appended claims.One
In a little situations, the movement recorded in detail in the claims or step can be executed according to the sequence being different from embodiment and
Still desired result may be implemented.In addition, process depicted in the drawing not necessarily requires the particular order shown or company
Continuous sequence is just able to achieve desired result.In some embodiments, multitasking and parallel processing it is also possible or
It may be advantageous.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system and
For server-side embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to side
The part of method embodiment illustrates.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of management method of application permission, which is characterized in that the described method includes:
When detect in application program or the application program functional module installation when, show first kind application permission to
Open interface;
The request that the user received opens the first kind application permission is sent to the corresponding server-side of the application program,
So that the message registration of the server-side analysis user;
The analysis returned in response to the server-side is as a result, show guidance interface to guide user to open the second class application permission;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, and the second class application permission is
Realize the expansion permission of calling protection function.
2. the method according to claim 1, wherein described open the first kind application for the user received
The step of request of permission is sent to server-side, comprising:
Read corresponding contact number in the message registration;
The server-side is sent to by the contact number and to the matched request of contact number progress;
The step of message registration of the server-side analysis user, comprising:
According to the preset number stored in database, the contact number received is matched;
According to the matching status of the contact number, the contact number is marked;
Wherein, the preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class electricity
Words.
3. according to the method described in claim 2, it is characterized in that, described according to the preset number stored in database, to institute
State the step of contact number is matched, comprising:
According to the area code of number length, number operator and number, classify to the preset number;
According to prefix, the corresponding ternary tree of the preset number under each series is constructed;
The contact number is searched in the ternary tree, it is described when the ternary tree finds the contact number
Contact number and the preset number successful match.
4. according to the method described in claim 3, it is characterized in that, the matching status according to the contact number, right
The step of contact number is marked, comprising:
When the contact number and the house property medium class phone successful match, by the contact number labeled as described
House property medium class phone;
When the contact number and the harassing and wrecking class phone successful match, the contact number is labeled as the harassing and wrecking
Class phone;
When the contact number and the swindle class phone successful match, the contact number is labeled as the swindle
Class phone;
When the contact number and the ad promotions class phone successful match, by the contact number labeled as described
Ad promotions class phone.
5. the method according to claim 1, wherein it is described in response to the server-side return analysis as a result,
Show the step of guidance interface is to guide user to open the second class application permission, comprising:
The analysis result is counted;
The guidance interface is shown to guide user to enable calling protection function;
The request of the calling protection function is enabled according to the user received, shows the boundary to be opened of the second class application permission
Face;
Wherein, it is described analysis result be the server-side in the message registration contact phone and database in preset number
Code matched and marked after result;
The preset number includes house property medium class phone, harassing and wrecking class phone, swindle class phone and ad promotions class phone.
6. according to the method described in claim 5, it is characterized in that, described the step of being counted to the analysis result, packet
It includes:
The number number in the contact phone with the predetermined telephone successful match is counted, number quantity to be calculated is denoted as;
Calculate the number quantity to be calculated ratio shared in total number number of the contact phone;
When the ratio is greater than the first preset ratio, determining the message registration, there are severes to harass situation;Alternatively, when described
When ratio is greater than the second preset ratio and is less than or equal to first preset ratio, determining the message registration, there are moderate harassing and wrecking
Situation;Alternatively, determining that the message registration has slight harassing and wrecking feelings when the ratio is less than or equal to second preset ratio
Condition;
Wherein, first preset ratio is greater than second preset ratio.
7. according to the method described in claim 5, it is characterized in that, the content at the guidance interface includes showing statistical result
Chart and calling protection function enable interface, jump to second class to enable interface triggering by the calling protection function
The interface to be opened of application permission.
8. according to the method described in claim 2, it is characterized in that, described read corresponding contact person number in the message registration
The step of code, comprising:
Read corresponding contact number in the nearest preset quantity message registration;
It is described according to the preset number stored in database, the step of matching to the contact number, comprising: will be described
Contact number is uploaded to cloud database.
9. the method according to claim 1, wherein the first kind application permission includes message registration access right
Limit;Alternatively, the first kind application permission includes message registration access authority and address list access authority;
The second class application permission includes phone permission, suspended window permission and opens resident permission certainly.
10. a kind of management system of application permission, which is characterized in that the system comprises the corresponding client of application program and institutes
The corresponding server-side of application program is stated, the client includes:
Detection module: for showing when detecting the functional module installation in the application program or the application program
The interface to be opened of first kind application permission;
Sending module: the request for the user received to be opened the first kind application permission is sent to the application program
Corresponding server-side, so that the message registration of server-side analysis user;
Guiding module: analysis for returning in response to the server-side is as a result, show guidance interface to guide user to open the
Two class application permissions;
Wherein, the first kind application permission is the basic permission for realizing calling protection function, and the second class application permission is
Realize the expansion permission of calling protection function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910003540.8A CN109886012B (en) | 2019-01-03 | 2019-01-03 | Application authority management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910003540.8A CN109886012B (en) | 2019-01-03 | 2019-01-03 | Application authority management method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109886012A true CN109886012A (en) | 2019-06-14 |
CN109886012B CN109886012B (en) | 2023-03-07 |
Family
ID=66925572
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910003540.8A Active CN109886012B (en) | 2019-01-03 | 2019-01-03 | Application authority management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109886012B (en) |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN102694900A (en) * | 2012-06-18 | 2012-09-26 | 奇智软件(北京)有限公司 | Phone call intercepting method and device |
CN102811202A (en) * | 2011-06-01 | 2012-12-05 | 网秦无限(北京)科技有限公司 | Method and system for preventing harassment calls through cloud computing |
CN103167500A (en) * | 2013-02-01 | 2013-06-19 | 杭州东信北邮信息技术有限公司 | Method and system achieving united processing of mobile phone |
CN103945036A (en) * | 2014-04-11 | 2014-07-23 | 江苏物联网研究发展中心 | Method for allowing user to select head portraits on cell phone and protecting privacy of user during call receiving |
CN104113466A (en) * | 2013-04-17 | 2014-10-22 | 腾讯科技(深圳)有限公司 | Harassing phone call identification method, client, server and system |
CN104243727A (en) * | 2014-10-15 | 2014-12-24 | 上海欣方智能系统有限公司 | System and method for performing big data analysis confirmation and interception on phone scams |
CN104410700A (en) * | 2014-12-04 | 2015-03-11 | 北京奇虎科技有限公司 | Method for issuing crank call list as well as crank call interception method and system |
CN104486476A (en) * | 2014-12-11 | 2015-04-01 | 北京奇虎科技有限公司 | Crank call interception method and device |
CN105162940A (en) * | 2015-07-31 | 2015-12-16 | 小米科技有限责任公司 | Call processing method and call processing device |
CN105262876A (en) * | 2015-10-30 | 2016-01-20 | 百度在线网络技术(北京)有限公司 | Conversation processing method, method for providing number information of telephone number, and device |
CN105516464A (en) * | 2015-11-26 | 2016-04-20 | 厦门美图移动科技有限公司 | Incoming call data privacy protection method and apparatus, and mobile terminal |
CN106302937A (en) * | 2016-08-18 | 2017-01-04 | 北京奇虎科技有限公司 | The based reminding method of communication harassing and wrecking and device |
CN106385483A (en) * | 2016-09-05 | 2017-02-08 | 北京奇虎科技有限公司 | Phone number processing method and mobile terminal and cloud server thereof |
CN106953989A (en) * | 2017-05-17 | 2017-07-14 | 努比亚技术有限公司 | Incoming call reminding method and device, terminal, computer-readable recording medium |
CN106993083A (en) * | 2017-02-21 | 2017-07-28 | 北京奇虎科技有限公司 | A kind of method and apparatus of recommendation intelligent terminal operation prompt information |
CN107360300A (en) * | 2017-08-01 | 2017-11-17 | 中国联合网络通信集团有限公司 | Harassing call hold-up interception method and device |
CN107547716A (en) * | 2016-06-29 | 2018-01-05 | 腾讯科技(深圳)有限公司 | A kind of information processing method and terminal |
-
2019
- 2019-01-03 CN CN201910003540.8A patent/CN109886012B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN102811202A (en) * | 2011-06-01 | 2012-12-05 | 网秦无限(北京)科技有限公司 | Method and system for preventing harassment calls through cloud computing |
CN102694900A (en) * | 2012-06-18 | 2012-09-26 | 奇智软件(北京)有限公司 | Phone call intercepting method and device |
CN103167500A (en) * | 2013-02-01 | 2013-06-19 | 杭州东信北邮信息技术有限公司 | Method and system achieving united processing of mobile phone |
CN104113466A (en) * | 2013-04-17 | 2014-10-22 | 腾讯科技(深圳)有限公司 | Harassing phone call identification method, client, server and system |
CN103945036A (en) * | 2014-04-11 | 2014-07-23 | 江苏物联网研究发展中心 | Method for allowing user to select head portraits on cell phone and protecting privacy of user during call receiving |
CN104243727A (en) * | 2014-10-15 | 2014-12-24 | 上海欣方智能系统有限公司 | System and method for performing big data analysis confirmation and interception on phone scams |
CN104410700A (en) * | 2014-12-04 | 2015-03-11 | 北京奇虎科技有限公司 | Method for issuing crank call list as well as crank call interception method and system |
CN104486476A (en) * | 2014-12-11 | 2015-04-01 | 北京奇虎科技有限公司 | Crank call interception method and device |
CN105162940A (en) * | 2015-07-31 | 2015-12-16 | 小米科技有限责任公司 | Call processing method and call processing device |
CN105262876A (en) * | 2015-10-30 | 2016-01-20 | 百度在线网络技术(北京)有限公司 | Conversation processing method, method for providing number information of telephone number, and device |
CN105516464A (en) * | 2015-11-26 | 2016-04-20 | 厦门美图移动科技有限公司 | Incoming call data privacy protection method and apparatus, and mobile terminal |
CN107547716A (en) * | 2016-06-29 | 2018-01-05 | 腾讯科技(深圳)有限公司 | A kind of information processing method and terminal |
CN106302937A (en) * | 2016-08-18 | 2017-01-04 | 北京奇虎科技有限公司 | The based reminding method of communication harassing and wrecking and device |
CN106385483A (en) * | 2016-09-05 | 2017-02-08 | 北京奇虎科技有限公司 | Phone number processing method and mobile terminal and cloud server thereof |
CN106993083A (en) * | 2017-02-21 | 2017-07-28 | 北京奇虎科技有限公司 | A kind of method and apparatus of recommendation intelligent terminal operation prompt information |
CN106953989A (en) * | 2017-05-17 | 2017-07-14 | 努比亚技术有限公司 | Incoming call reminding method and device, terminal, computer-readable recording medium |
CN107360300A (en) * | 2017-08-01 | 2017-11-17 | 中国联合网络通信集团有限公司 | Harassing call hold-up interception method and device |
Non-Patent Citations (2)
Title |
---|
陆峰: "大数据时代,突破个人隐私保护困境", 《互联网经济》 * |
马庆贺等: "基于海量数据分析与远程取证的反电信诈骗平台", 《警察技术》 * |
Also Published As
Publication number | Publication date |
---|---|
CN109886012B (en) | 2023-03-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11347883B2 (en) | Access controlled graph query spanning | |
CN106569860A (en) | Application management method and terminal | |
CN107590386B (en) | Security event information processing method and device, storage medium and computer equipment | |
CN109391620B (en) | Method, system, server and storage medium for establishing abnormal behavior judgment model | |
CN112287326B (en) | Security authentication method and device, electronic equipment and storage medium | |
CN109543405A (en) | A kind of privacy calls Activity recognition method and electronic equipment | |
CN103412913B (en) | A kind of association search method and system | |
US20090037443A1 (en) | Intelligent group communication | |
US20190164193A1 (en) | Predictive search context system for targeted recommendations | |
CN112667875A (en) | Data acquisition method, data analysis method, data acquisition device, data analysis device, equipment and storage medium | |
CN109886012A (en) | A kind of management method and system of application permission | |
CN106535102A (en) | Mobile terminal positioning method and mobile terminal | |
Hassan et al. | On the importance of performing app analysis within peer groups | |
Hao et al. | Global and personal app networks: characterizing social relations among mobile apps | |
US20160092481A1 (en) | Information integration and assessment | |
CN106897620B (en) | Android application program safety visual analysis method based on malicious behavior function call graph | |
CN106559554A (en) | A kind of communication processing method, device | |
US20190163832A1 (en) | Predictive search context system for location intercept | |
CN108667685B (en) | Mobile application network flow clustering device | |
CN112416482B (en) | Interface switching method and device | |
CN114186029A (en) | Analysis method of information leakage behavior, related device and computer storage medium | |
CN112100294A (en) | User relationship analysis method and device for network platform and related equipment | |
CN113485594A (en) | Message record searching method, device and storage medium | |
KR20110125905A (en) | Method and system for management of reply comment usgin pattern analysis and web server thereof | |
US10484868B2 (en) | Configuring privacy policies by formulating questions and evaluating responses |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |