CN110188520A - A kind of right management method and mobile terminal of application - Google Patents

A kind of right management method and mobile terminal of application Download PDF

Info

Publication number
CN110188520A
CN110188520A CN201910458777.5A CN201910458777A CN110188520A CN 110188520 A CN110188520 A CN 110188520A CN 201910458777 A CN201910458777 A CN 201910458777A CN 110188520 A CN110188520 A CN 110188520A
Authority
CN
China
Prior art keywords
permission
target
user
target application
prompting message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910458777.5A
Other languages
Chinese (zh)
Other versions
CN110188520B (en
Inventor
刘亚洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Weiwo Software Technology Co ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910458777.5A priority Critical patent/CN110188520B/en
Publication of CN110188520A publication Critical patent/CN110188520A/en
Application granted granted Critical
Publication of CN110188520B publication Critical patent/CN110188520B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of right management method of application and mobile terminals, comprising: obtains the permission and the corresponding default management parameters of permission of target application;Determine the current operating conditions of target application;According to current operating conditions, the use state parameter of the target permission for target application is obtained;According to use state parameter and default management parameters, generate includes the mark of target application and the prompting message of target permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter and default management parameters of permission, determine the change of permission under application scenarios, and user is reminded for the permission, reach and has been suggested according to personalized remind in real time, to the purpose that the opening and closing state of permission changes, the using experience degree for the function that user applies mobile terminal is improved.

Description

A kind of right management method and mobile terminal of application
Technical field
The present embodiments relate to the right management methods and movement of field of communication technology more particularly to a kind of application eventually End.
Background technique
In daily life, in order to guarantee privacy of user, user using mobile terminal during being applied, it usually needs Mobile terminal is supplied to using various permissions, is applied for mobile terminal and corresponding function is realized according to the permission.
In the prior art, mobile terminal is used for the first time in user in application, mobile terminal application can be provided according to itself Function (is such as taken pictures, positioning etc.), and whereabouts user requests to open the permission of these functions, if user opens mobile terminal application execution The permission of these functions, then before user actively closes these permissions, mobile terminal application can according to the permission having turned on, Execute the corresponding function of permission.
But at present in scheme, mobile terminal is applied after opening permission, can be always maintained at permission open state until Permission is actively closed by user, when the function or authority acquiring mode, purpose that mobile terminal is applied change, Yong Huke It will not can timely understand these changes, and the change to rights state can not be made according to these changes, so that some needs The permission that pent permission can not be closed or some needs are turned on can not be turned on, and reduce user to mobile terminal The using experience degree of the function of application.
Summary of the invention
The embodiment of the present invention provides the right management method and mobile terminal of a kind of application, to solve user in the prior art The change of permission will not timely be understood, and rights state can not be modified according to these changes, cause user to movement The lower problem of the using experience degree of the function of terminal applies.
In a first aspect, being applied to mobile terminal, the party the embodiment of the invention provides a kind of right management method of application Method includes:
Obtain the permission and the corresponding default management parameters of the permission of target application;
Determine the current operating conditions of the target application;
According to the current operating conditions, the use state parameter of the target permission for the target application is obtained;
According to the use state parameter and the default management parameters, generate include the target application mark and The prompting message of the target permission, and show the prompting message.
Second aspect, the embodiment of the invention provides a kind of mobile terminal, which includes:
First obtains module, the corresponding default management parameters of permission and the permission for obtaining target application;
Determining module, for determining the current operating conditions of the target application;
Second obtains module, for obtaining the target permission for being directed to the target application according to the current operating conditions Use state parameter;
Generation module, for really according to the use state parameter and the default management parameters, generating to include the mesh The mark of application and the prompting message of the target permission are marked, and shows the prompting message.
The third aspect the embodiment of the invention also provides a kind of mobile terminal, including processor, memory and is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing the right management method such as application provided by the invention.
Fourth aspect, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, the instruction in the storage medium When being executed by the processor of electronic equipment, so that electronic equipment is able to carry out the right management method such as application provided by the invention The step of.
In embodiments of the present invention, the permission of the available target application of mobile terminal and the corresponding default pipe of permission Manage parameter;Determine the current operating conditions of target application;According to current operating conditions, the target permission for being directed to target application is obtained Use state parameter;According to use state parameter and default management parameters, mark and target including target application are generated The prompting message of permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter of permission and default pipe Parameter is managed, the change of permission under application scenarios is determined, and remind user for the permission, has reached according to a in real time Propertyization, which is reminded, suggests, to the purpose that the opening and closing state of permission changes, improves what user applied mobile terminal The using experience degree of function.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of the right management method of application provided in an embodiment of the present invention;
Fig. 2 is the step flow chart of the right management method of another application provided in an embodiment of the present invention;
Fig. 3 is the step flow chart of the right management method of another application provided in an embodiment of the present invention;
Fig. 4 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 5 is the block diagram of the mobile terminal of another embodiment of the present invention;
Fig. 6 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention It is fully disclosed to those skilled in the art.
Fig. 1 is a kind of step flow chart of the right management method of application provided in an embodiment of the present invention, as shown in Figure 1, This method may include:
Step 101, the permission and the corresponding default management parameters of the permission for obtaining target application.
In embodiments of the present invention, it generally requires and mobile terminal relevant interface is called, can realize target application Correlation function, e.g., target application then need the target application to be called camera shooting to realize the function of shooting by camera The operation of head interface.
Specifically, can control information to the interface of mobile terminal with additional access, this information is referred to as describing safely Symbol allows to access the type of the user of the interface for controlling.Permission defines in the security descriptor of interface, and permission is for fixed Justice allows to access the identity information of the user of the interface.For example, for the utilizing camera interface of mobile terminal, it is assumed that using A and answer All there is camera function with B, camera function permission is granted by by user using A, and B is applied not authorize camera function power by user Limit, then in the security descriptor of utilizing camera interface, camera function permission can be defined using the corresponding identity information of A, in order to Using A when realizing camera function, it can realize to call and take the photograph by the identity information defined in camera function permission using A As the operation of head interface.
In this step, target application can obtain the power of the target application by the rights interface of calling system bottom Registration table is limited, in the permission registration table, target application is listed and all permissions obtained is supported to have in these permissions Permission may be most likely initiated by a user, some permissions may be most likely initiated by a user also, for the permission having been turned on, wherein can also deposit It is being used by a user in the permission having, some permissions are not used by a user, wherein using a certain permission, can be referred to the power The interface of limit is called, to realize the corresponding function of the permission.
Further, user can according to actual needs, default management parameters corresponding to authority setting, presets management ginseng Number can be to qualifications attached by the currently used state of permission, for so that the working condition of permission is satisfied with default pipe Manage the constraint of parameter.
It, can be with to the default management parameters of authority setting for example, in a kind of specific implementation of the embodiment of the present invention For time threshold, which can be used for limiting the length of time that permission is under use state.
In addition, can be frequency of use of the permission within the scope of certain time to the default management parameters of authority setting Value, e.g., can limit frequency of use value of a certain permission in 1 hour as 10 times, to limit the number that the permission is used.
Step 102, the current operating conditions for determining the target application.
Specifically, in embodiments of the present invention, target application usually has a variety of current operating conditions, in a kind of situation Under, current operating conditions may include: background operation state or non-background operation state.For target application, locating Under different operating statuses, can to permission use management tool have different needs, e.g., target application is in non-running background Under state, the target application is generally used in user at this time, and user can be used utilizing camera interface and call permission, so as to user It is shot, the operation such as barcode scanning;And target application, in the state of running background, the target is not used in the positive maximum probability of user at this time Using, can close at this time utilizing camera interface call permission, with prevent illegal person backstage kidnap target application, and using camera shooting Head steals privacy of user data.
Further, the current operating conditions of mobile terminal can also include that high electricity operating status and low battery run shape State, high electricity operating status can be greater than or equal to the first default charge value, low battery operation for the current electric quantity of mobile terminal State can be less than or equal to the second default charge value for the current electric quantity of mobile terminal, and it is pre- that the first default charge value is greater than second If charge value.
In addition, in some other cases, the type for the permission that can also be supported according to target application, to target application into Row grouping, and the grouping different according to target application, determine the current operating conditions of target application.
For example, the application with camera function can be divided into camera shooting status packet, by the application with positioning function It is divided into positioning states grouping.When the target application run at present is in camera shooting status packet, the current of target application is determined Operating status is camera shooting state, and when target application is under camera shooting state, the camera that can set target application calls power The time threshold of limit is T1;When the target application run at present is in positioning states grouping, the current fortune of target application is determined Row state is positioning states, and when target application is under positioning states, the locating module that can set target application calls power The time threshold of limit sets different time thresholds for T2 to reach the different rights type of the acquisition according to needed for target application Purpose, improve the individual demand of rights management.
Step 103, according to the current operating conditions, obtain the use state of the target permission for the target application Parameter.
In embodiments of the present invention, the use state parameter of permission may include target application in the current state of operation, The use state data or history added up for the target permission use data, and e.g., use state parameter may include power For limit in opening lower the accumulated time, permission, which is in, closes lower the accumulated time etc..
In addition, the use state parameter of target permission may include the user property that target application corresponds to user, such as the use Gender, age, the nationality at family etc..User, can be with when register for the user account of target application by target application Input includes the registration information of user property, to complete to register, therefore can carry out user property by calling user account It obtains.
Step 104, according to the use state parameter and the default management parameters, generating includes the target application The prompting message of mark and the target permission, and show the prompting message.
It in this step, can be the case where the use state parameter of target permission meets the constraint of default management parameters Under, generating includes the mark of target application and the prompting message of the target permission, and show the prompting message, for Family opens or closes the target permission according to the prompting message, allows user according to the use state parameter of permission and pre- If management parameters, the change of target permission under application scenarios is determined, and obtain corresponding to the prompting of the target permission, reached basis Personalized remind is suggested in real time, the purpose changed to the opening and closing state of target permission.
For example, in a kind of specific implementation of the embodiment of the present invention, to the default management parameters of target authority setting Can be time threshold, the time threshold can be used for limiting target permission it is in the open state under length of time, work as target When time under the target permission of application is in the open state is more than the time threshold, it may remind the user that closing the target answers The target permission.
It should be noted that in embodiments of the present invention, the use state parameter of target permission meets default management parameters Constraint, can specifically include: the use state parameter of target permission be in default management parameters in the range of, target permission Use state parameter be not at default management parameters in the range of, the use state parameter and default management parameters of target permission Match, the use state parameter of target permission and default management parameters mismatch etc..
To sum up, the right management method of a kind of application provided in an embodiment of the present invention, comprising: obtain the power of target application Limit and the corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operating conditions, obtain Take the use state parameter of the target permission for target application;According to use state parameter and default management parameters, packet is generated Include the mark of target application and the prompting message of target permission, and display alarm information, in the present invention, mobile terminal is according to power The use state parameter and default management parameters of limit, determine the change of permission under application scenarios, and for the permission to user into Row is reminded, and has been reached according to personalized remind is suggested in real time, to the purpose that the opening and closing state of permission changes, has been mentioned The using experience degree for the function that high user applies mobile terminal.
Fig. 2 is the step flow chart of the right management method of another application provided in an embodiment of the present invention, such as Fig. 2 institute Show, this method may include:
Step 201, the permission and the corresponding default management parameters of the permission for obtaining target application, the default pipe Reason parameter includes the preset time threshold for the permission.
In a kind of specific implementation of the embodiment of the present invention, the default management parameters to authority setting can be default Time threshold, the preset time threshold can be used for limiting permission it is in the open state under length of time.So that user is to quick The opening time length of sense permission is limited.
Step 202, the current operating conditions for determining the target application.
The implementation of this step is similar with the realization process of above-mentioned steps 102, and this will not be detailed here for the embodiment of the present invention.
Step 203, the current operating conditions be background operation state in the case where, counting the target application has made With the time of the target permission.
In embodiments of the present invention, when target application is in the state of running background, the target permission may be in Open state and in the state of being currently being used, therefore the time that target application has used the target permission can be counted.
If step 204, the target application are greater than or equal to the preset time threshold using the time of the target permission Value, then generate the first prompting message, and show first prompting message, first prompting message includes the target application Mark, and suggest closing the advisory information of the target permission.
In embodiments of the present invention, if target application is greater than or equal to preset time threshold using the time of the target permission Value, it may be considered that the target application has exceeded the required time range of user using the time of the target permission, if continuing Keep the open state of the permission, it is possible to will cause and reveal asking for private data because the long-time of the target permission uses Topic.Therefore, when target application using the target permission time be greater than or equal to preset time threshold when, can be generated including The mark of target application, and suggest closing the first prompting message of the target permission, and show first prompting message, So that user is according to first prompting message, instant makes the operation for closing the target permission, avoids because the target permission is long Time use and caused by adverse consequences.
In conclusion the right management method of another application provided in an embodiment of the present invention, comprising: obtain target application Permission and the corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operation shape State obtains the use state parameter of the target permission for target application;It is raw according to use state parameter and default management parameters At the prompting message of the mark and target permission that include target application, and display alarm information, in the present invention, mobile terminal root According to the use state parameter and default management parameters of permission, determine the change of permission under application scenarios, and for the permission to Family is reminded, and has been reached and has been suggested according to personalized remind in real time, the mesh changed to the opening and closing state of permission , improve the using experience degree for the function that user applies mobile terminal.In addition, when target application uses the target permission Time when being greater than or equal to preset time threshold, can be generated the mark including target application, and suggest closing the mesh The first prompting message of permission is marked, and shows first prompting message, so that user is according to the prompting message, instant is made The operation for closing the target permission avoids adverse consequences caused by due to the target permission uses for a long time.
Fig. 3 is the step flow chart of the right management method of another application provided in an embodiment of the present invention, such as Fig. 3 institute Show, this method may include:
Step 301, the permission for obtaining the target application.
In this step, target application can obtain the power of the target application by the rights interface of calling system bottom Registration table is limited, in the permission registration table, target application is listed and all permissions obtained is supported to have in these permissions Permission may be most likely initiated by a user, some permissions may be most likely initiated by a user also.
Step 302 obtains the historical sample information for being directed to the permission of the target application, and the historical sample information includes The user of different user attribute is by the priority assignation in the information of open state or the information of closed state, each user Attribute belongs to corresponding user property classification.
In embodiments of the present invention, for target application during by users' use, each user can foundation The demand of oneself executes opening operation to one or more permissions in target application, or to one or more in target application A permission executes shutoff operation, and target application can collect the user property of these users and the user holds permission execution It opens or shutoff operation, and according to the user property of user, user is divided to corresponding user property classification, establishes user-use The corresponding relationship for opening or closing operation that family attribute classification-executes permission, and the corresponding relationship is configured to history sample This.Wherein, user property may include the information such as gender, age, the nationality of the user, and user property can be belonging corresponding User property classification, e.g., according to the age attribute of user, after can establish (19 years old to 29 years old) user property classification after 90s, 70 (39 years old to 49 years old) user property classification etc., then the age attribute of user, can be belonging after 90s between 19 years old to 29 years old User property classification, the age attribute of user, can user property classifications after belonging 70 between 39 years old to 49 years old.
Such as, however, it is determined that user property is the age, and establishes (39 years old to 49 years old) two behind (19 years old to 29 years old) after 90s and 70 A user property classification, the then user that mobile terminal can count (19 years old to 29 years old) user property classification after 90s answer for target Positioning permission performed by open or close operation (for target application positioning priority assignation in open state or closing State), and the user of (39 years old to 49 years old) user property classification is directed to performed by the positioning permission of target application after statistics 70 Open or close operation.
Step 303, according to the historical sample information, count the user in each user property classification, will be described The unlatching ratio value of priority assignation in the on state.
In this step, opening ratio value is in the user property classification, in the on state by the priority assignation Number of users, with the ratio value between total number of users in the user property classification.
The example provided for above-mentioned steps 302, it is assumed that counted 100 users after 90s to the positioning permission of target application Performed opens or closes operation, and is opened after having counted 100 70 performed by positioning permission of the user to target application It opens or shutoff operation, wherein in 100 users after 90s, there are 80 users to perform opening operation to positioning permission;100 70 Afterwards in user, there are 30 users to perform opening operation to positioning permission, then may finally obtain user property classification after 90s It is 80% that user, which will position the unlatching ratio value of priority assignation in the on state, and the user of user property classification will position after 70 The unlatching ratio value of priority assignation in the on state is 30%.
Step 304, the current operating conditions for determining the target application.
The implementation of this step is similar with the realization process of above-mentioned steps 102, and this will not be detailed here for the embodiment of the present invention.
Step 305, the current operating conditions be non-background operation state in the case where, obtain the target permission pair The user property answered.
In embodiments of the present invention, the user property of user may include the information such as gender, age, the nationality of the user. User can input the registration including user property when register for the user account of target application by target application Information to complete to register, therefore can carry out the acquisition of user property by calling user account.
Step 306, according to the historical sample information, determine target belonging to the corresponding user property of the target permission User property classification.
In embodiments of the present invention, can include by the user property of determining user, and according in historical sample information User property classification, further determine that target user's attribute classification belonging to the corresponding user property of target permission.
For example, it is assumed that the user of the server statistics of target application (19 years old to 29 years old) user property classification after 90s is directed to Operation is opened or closed performed by the positioning permission of target application, and (39 years old to 49 years old) user property class after having counted 70 Operation is opened or closed performed by positioning permission of other user for target application.Wherein, include in historical sample information User property be age of user, if in user property age of user be in 19 years old to 29 years old within the scope of, can determine user Target user's attribute classification belonging to attribute is user property classification after 90s;If age of user is in 39 years old to 49 in user property Year range in, then can determine target user's attribute classification belonging to user property be 70 after user property classification.
If step 307, the corresponding unlatching ratio value of target user's attribute classification are greater than or equal to the first preset threshold, The second prompting message is then generated, and shows second prompting message, second prompting message includes the target application Mark, and open the advisory information of the target permission.
In this step, the example provided for above-mentioned steps 306, it is assumed that the age of user is 24 years old, and first is default Threshold value is 60%, then according to the unlatching ratio value 80% of the corresponding target permission of user property classification after 90s, can determine target The corresponding unlatching ratio value of user property classification is greater than or equal to the first preset threshold, it is believed that in historical user after 90s, greatly Majority keep it turned on the target permission, i.e. packet can be generated compared with the preference by historical user after 90s in the permission The mark of target application is included, and suggests opening the second prompting message of the target permission, and shows that described second reminds letter Breath.So that active user after 90s is not under the premise of opening the target permission, the age bracket according to belonging to oneself is to the target Permission carries out the preference of opening operation, carries out opening operation to the target permission of the target application.It improves to rights management The personalization level of operation.
If step 308, the corresponding unlatching ratio value of target user's attribute classification are generated less than the second preset threshold Third prompting message, and show the third prompting message, the third prompting message includes the mark of the target application, with And close the advisory information of the target permission.
In embodiments of the present invention, the first preset threshold can be less than the second preset threshold.
In this step, the example provided for above-mentioned steps 306, it is assumed that the age of user is 24 years old, and second is default Threshold value is 90%, then according to the unlatching ratio value 80% of the corresponding target permission of user property classification after 90s, can determine target The corresponding unlatching ratio value of user property classification is less than the second preset threshold, it is believed that in historical user after 90s, most people The target permission is remained off, i.e., the permission is less by the preference of historical user after 90s, therefore can be generated including mesh The mark of application is marked, and suggests closing the second prompting message of the target permission, and show second prompting message.With For active user after 90s under the premise of opening the target permission, the age bracket according to belonging to oneself carries out the target permission The preference of shutoff operation carries out shutoff operation to the target permission of the target application.Improve to DRM operations Property degree.
It should be noted that above-mentioned is for the corresponding unlatching ratio value of same user property classification and the first default threshold The comparison of value, the second preset threshold generates simultaneously display alarm information for comparison result, if being directed to different user property classes Not, settable different the first preset threshold or the second preset threshold, the embodiment of the present invention preset the first preset threshold, second The specific value and size relation of threshold value are not construed as limiting.
In conclusion the right management method of another application provided in an embodiment of the present invention, comprising: obtain target application Permission and the corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operation shape State obtains the use state parameter of the target permission for target application;It is raw according to use state parameter and default management parameters At the prompting message of the mark and target permission that include target application, and display alarm information, in the present invention, mobile terminal root According to the use state parameter and default management parameters of permission, determine the change of permission under application scenarios, and for the permission to Family is reminded, and has been reached and has been suggested according to personalized remind in real time, the mesh changed to the opening and closing state of permission , improve the using experience degree for the function that user applies mobile terminal.
Fig. 4 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention, as shown in figure 4, the mobile terminal 40 includes:
First obtains module 401, the corresponding default management ginseng of the permission and the permission for obtaining target application Number;
Optionally, first module 401 is obtained, comprising:
First acquisition submodule, for obtaining the permission of the target application;
Second acquisition submodule, for obtaining the historical sample information for being directed to the permission of the target application, the history Sample information include different user attribute user by the priority assignation in the information of open state or the information of closed state, Each user property belongs to corresponding user property classification;
Statistic submodule, for counting the user in each user property classification according to the historical sample information, By the unlatching ratio value of the priority assignation in the on state;The unlatching ratio value is to incite somebody to action in the user property classification The ratio between total number of users in the number of users of the priority assignation in the on state, with the user property classification Value.
Determining module 402, for determining the current operating conditions of the target application;
Second obtains module 403, and the target for obtaining for the target application according to the current operating conditions is weighed The use state parameter of limit;
Optionally, the second acquisition module 402 is also used in the feelings that the current operating conditions are background operation state Under condition, the time that the target application has used the target permission is counted.
Optionally, the second acquisition module 402 is also used in the current operating conditions be non-background operation state In the case of, obtain the user property of the corresponding user of the target permission.
Generation module 404, for according to the use state parameter and the default management parameters, generating to include the mesh The mark of application and the prompting message of the target permission are marked, and shows the prompting message.
Optionally, the default management parameters include the preset time threshold for the target permission;The generation mould The time of the target permission has been used to be greater than or equal to the preset time threshold if block 404 is also used to the target application, The first prompting message is then generated, and shows first prompting message, first prompting message includes the target application Mark, and close the advisory information of the target permission.
Optionally, the generation module 404, comprising:
Submodule is determined, for determining the corresponding user property institute of the target permission according to the historical sample information Target user's attribute classification of category;
First display sub-module, if for corresponding the unlatchings ratio value of target user's attribute classification more than or equal to the One preset threshold then generates the second prompting message, and shows second prompting message, and second prompting message includes described The mark of target application, and open the advisory information of the target permission;
Second display sub-module, if default less than second for the corresponding unlatching ratio value of target user's attribute classification Threshold value then generates third prompting message, and shows the third prompting message, and the third prompting message includes that the target is answered Mark, and close the advisory information of the target permission;
First preset threshold is less than second preset threshold.
In conclusion a kind of mobile terminal provided in an embodiment of the present invention, including, the permission of target application is obtained, and The corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operating conditions, obtains and be directed to mesh Mark the use state parameter of the target permission of application;According to use state parameter and default management parameters, generation is answered including target The prompting message of mark and target permission, and display alarm information, in the present invention, mobile terminal is according to the use of permission State parameter and default management parameters determine the change of permission under application scenarios, and remind for the permission user, reach It has arrived according to personalized remind is suggested in real time, to the purpose that the opening and closing state of permission changes, has improved user To the using experience degree of the function of mobile terminal application.
The embodiment of the present invention also provides a kind of mobile terminal, including processor, and memory is stored on the memory simultaneously The computer program that can be run on the processor, the computer program realize above-mentioned application when being executed by the processor Right management method embodiment each process, and identical technical effect can be reached, it is no longer superfluous here to avoid repeating It states.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each mistake of the right management method embodiment of above-mentioned application when being executed by processor Journey, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium Matter, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
Fig. 5 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 500 shown in fig. 5 includes: at least One processor 501, memory 502, at least one network interface 504, user interface 503 and camera 506.Mobile terminal Various components in 500 are coupled by bus system 505.It is understood that bus system 505 for realizing these components it Between connection communication.Bus system 505 further includes power bus, control bus and status signal in addition to including data/address bus Bus.But for the sake of clear explanation, various buses are all designated as bus system 505 in Fig. 5.
Wherein, user interface 503 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or flexible screen etc..
It is appreciated that the memory 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), electrically erasable programmable read-only memory (ElectricallyEPROM, EEPROM) dodge It deposits.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is slow to be used as external high speed It deposits.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory (DirectRambusRAM, DRRAM).The memory 502 of the system and method for description of the embodiment of the present invention is intended to include but unlimited In the memory of these and any other suitable type.
In some embodiments, memory 502 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 5021 and application program 5022.
Wherein, operating system 5021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 5022 includes various application programs, such as media Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side The program of method may be embodied in application program 5022.
In embodiments of the present invention, by the program or instruction of calling memory 502 to store, specifically, can be application The program or instruction stored in program 5022, permission and permission of the processor 501 for obtaining target application are corresponding default Management parameters;Determine the current operating conditions of target application;According to current operating conditions, the target obtained for target application is weighed The use state parameter of limit;According to use state parameter and default management parameters, mark and mesh including target application are generated Mark the prompting message of permission, and display alarm information.
The method that the embodiments of the present invention disclose can be applied in processor 501, or be realized by processor 501. Processor 501 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 501 or the instruction of software form.Above-mentioned processing Device 501 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), specific integrated circuit (ApplicationSpecificIntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic Device, discrete hardware components.It may be implemented or execute disclosed each method, step and the logical box in the embodiment of the present invention Figure.General processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with the present invention The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and execute completion, or use decoding processor In hardware and software module combination execute completion.Software module can be located at random access memory, and flash memory, read-only memory can In the storage medium of this fields such as program read-only memory or electrically erasable programmable memory, register maturation.The storage Medium is located at memory 502, and processor 501 reads the information in memory 502, and the step of the above method is completed in conjunction with its hardware Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware, Microcode or combinations thereof is realized.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (App LicationSpecificIntegratedCircuits, ASIC), digital signal processor (DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller, microprocessor, other electronics lists for executing herein described function In member or combinations thereof.
For software implementations, can by execute the embodiment of the present invention described in function module (such as process, function etc.) come Realize technology described in the embodiment of the present invention.Software code is storable in memory and is executed by processor.Memory can With portion realizes in the processor or outside the processor.
Mobile terminal 500 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here It repeats no more.
In the embodiment of the present invention, the permission and the corresponding default pipe of permission of the available target application of mobile terminal 500 Manage parameter;Determine the current operating conditions of target application;According to current operating conditions, the target permission for being directed to target application is obtained Use state parameter;According to use state parameter and default management parameters, mark and target including target application are generated The prompting message of permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter of permission and default pipe Parameter is managed, the change of permission under application scenarios is determined, and remind user for the permission, has reached according to a in real time Propertyization, which is reminded, suggests, to the purpose that the opening and closing state of permission changes, improves what user applied mobile terminal The using experience degree of function.
Fig. 6 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
The mobile terminal includes: processor, memory and is stored on the memory and can be on the processor The computer program of operation, the computer program realize the right management method of above-mentioned application when being executed by the processor The step of.
The mobile terminal further include: computer program is stored on readable storage medium storing program for executing, the computer program is located The step of reason device realizes the right management method of above-mentioned application when executing.
Specifically, the mobile terminal 600 in Fig. 6 can be mobile phone, tablet computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted computer etc..
Mobile terminal 600 in Fig. 6 includes radio frequency (RadioFrequency, RF) circuit 610, memory 620, input list Member 630, display unit 640, processor 660, voicefrequency circuit 670, WLAN (WirelessFidelity) module 680, Power supply 690 and camera 6110.
Wherein, input unit 630 can be used for receiving the number or character information of user's input, and generation and mobile terminal The related signal input of 600 user setting and function control.Specifically, in the embodiment of the present invention, which can To include touch panel 631.Touch panel 631, collect user on it or nearby touch operation (such as user use hand The operation of any suitable object or attachment such as finger, stylus on touch panel 631), and driven according to preset formula Corresponding attachment device.Optionally, touch panel 631 may include both touch detecting apparatus and touch controller.Wherein, Touch detecting apparatus detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch control Device;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives the processor 660, and order that processor 660 is sent can be received and executed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray with And the multiple types such as surface acoustic wave realize touch panel 631.In addition to touch panel 631, input unit 630 can also include other Input equipment 632, other input equipments 632 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 640 can be used for showing information input by user or be supplied to the information and movement of user The various menu interfaces of terminal 600.Display unit 640 may include display panel 641, optionally, can use LCD or organic hair The forms such as optical diode (OrganicLight-EmittingDiode, OLED) configure display panel 641.
It should be noted that touch panel 631 can cover display panel 641, touch display screen is formed, when the touch display screen is examined After measuring touch operation on it or nearby, processor 660 is sent to determine the type of touch event, is followed by subsequent processing device 660 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 660 is the control centre of mobile terminal 600, utilizes various interfaces and connection whole mobile phone Various pieces, by running or executing the software program and/or module that are stored in first memory 621, and calling storage Data in second memory 622 execute the various functions and processing data of mobile terminal 600, thus to mobile terminal 600 Carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 621 in software program and/or module and/ Or the data in the second memory 622, processor 660 is for taking the permission of target application and the corresponding default pipe of permission Manage parameter;Determine the current operating conditions of target application;According to current operating conditions, making for the permission for being directed to target application is obtained Use state parameter;According to use state parameter and default management parameters, generating includes the mark of target application and mentioning for permission Awake information, and display alarm information.
As it can be seen that mobile terminal may include: that the permission for obtaining target application and permission correspond in the embodiment of the present invention Default management parameters;Determine the current operating conditions of target application;According to current operating conditions, obtain for target application The use state parameter of target permission;According to use state parameter and default management parameters, the mark including target application is generated And the prompting message of target permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter of permission With default management parameters, the change of permission under application scenarios is determined, and user is reminded for the permission, reached basis Real-time personalized remind is suggested, to the purpose that the opening and closing state of permission changes, improves user to mobile whole Hold the using experience degree of the function of application.
For above-mentioned apparatus embodiment, since it is basically similar to the method embodiment, so be described relatively simple, The relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It would have readily occurred to a person skilled in the art that: any combination application of above-mentioned each embodiment is all feasible, therefore Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited, This is not just detailed one by one.
The right management method applied provided herein is not solid with any certain computer, virtual system or other equipment There is correlation.Various general-purpose systems can also be used together with teachings based herein.As described above, construction has this hair Structure required by the system of bright scheme is obvious.In addition, the present invention is also not directed to any particular programming language.It should Understand, can use various programming languages and realize summary of the invention described herein, and language-specific is done above Description is in order to disclose the best mode of carrying out the invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the present invention and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, such as right As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool Thus claims of body embodiment are expressly incorporated in the specific embodiment, wherein each claim conduct itself Separate embodiments of the invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize the identification side of background music in video according to an embodiment of the present invention The some or all functions of some or all components in method.The present invention is also implemented as described here for executing Method some or all device or device programs (for example, computer program and computer program product).This The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.

Claims (14)

1. a kind of right management method of application is applied to mobile terminal, which is characterized in that the described method includes:
Obtain the permission and the corresponding default management parameters of the permission of target application;
Determine the current operating conditions of the target application;
According to the current operating conditions, the use state parameter of the target permission for the target application is obtained;
According to the use state parameter and the default management parameters, it includes the mark of the target application and described for generating The prompting message of target permission, and show the prompting message.
2. acquisition is directed to institute the method according to claim 1, wherein described according to the current operating conditions State the use state parameter of the target permission of target application, comprising:
In the case where the current operating conditions are background operation state, count the target application and weighed using the target The time of limit.
3. according to the method described in claim 2, it is characterized in that, the default management parameters include being directed to the target permission Preset time threshold;
It is described according to the use state parameter and the default management parameters, generate include the target application mark and The prompting message of the target permission, and show the prompting message, comprising:
If the target application has used the time of the target permission to be greater than or equal to the preset time threshold, the is generated One prompting message, and show first prompting message, first prompting message includes the mark of the target application, and Close the advisory information of the target permission.
4. the method according to claim 1, wherein the permission and the permission for obtaining target application Corresponding default management parameters, comprising:
Obtain the permission of the target application;
The historical sample information of the permission for the target application is obtained, the historical sample information includes different user attribute User by the priority assignation in the information of open state or the information of closed state, each user property belongs to correspondence User property classification;
According to the historical sample information, the user in each user property classification is counted, the priority assignation is being opened Open the unlatching ratio value under state;The unlatching ratio value is to open the priority assignation in the user property classification The ratio value between total number of users in number of users under state, with the user property classification.
5. according to the method described in claim 4, acquisition is directed to institute it is characterized in that, described according to the current operating conditions State the use state parameter of the target permission of target application, comprising:
In the case where the current operating conditions are non-background operation state, obtain the corresponding user of the target permission and belong to Property.
6. according to the method described in claim 5, it is characterized in that, described according to the use state parameter and the default pipe Parameter is managed, generating includes the mark of the target application and the prompting message of the target permission, and shows the prompting letter Breath, comprising:
According to the historical sample information, target user's Attribute class belonging to the corresponding user property of the target permission is determined Not;
If the corresponding unlatching ratio value of target user's attribute classification is greater than or equal to the first preset threshold, generates second and mention Awake information, and show second prompting message, second prompting message includes the mark of the target application, and is opened The advisory information of the target permission;
If the corresponding unlatching ratio value of target user's attribute classification generates third and reminds letter less than the second preset threshold Breath, and show the third prompting message, the third prompting message includes the mark of the target application, and described in closing The advisory information of target permission;
Wherein, first preset threshold is less than second preset threshold.
7. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
First obtains module, the corresponding default management parameters of permission and the permission for obtaining target application;
Determining module, for determining the current operating conditions of the target application;
Second obtains module, for obtaining making for the target permission for being directed to the target application according to the current operating conditions Use state parameter;
Generation module, for according to the use state parameter and the default management parameters, generating to include the target application Mark and the target permission prompting message, and show the prompting message.
8. mobile terminal according to claim 7, which is characterized in that the second acquisition module is also used to described current In the case that operating status is background operation state, the time that the target application has used the target permission is counted.
9. mobile terminal according to claim 8, which is characterized in that the default management parameters include being directed to the target The preset time threshold of permission;Use the time of the target permission big if the generation module is also used to the target application In or equal to the preset time threshold, then the first prompting message is generated, and show first prompting message, described first mentions Awake information includes the mark of the target application, and closes the advisory information of the target permission.
10. mobile terminal according to claim 6, which is characterized in that described first obtains module, comprising:
First acquisition submodule, for obtaining the permission of the target application;
Second acquisition submodule, for obtaining the historical sample information for being directed to the permission of the target application, the historical sample Information include different user attribute user by the priority assignation in the information of open state or the information of closed state, each The user property belongs to corresponding user property classification;
Statistic submodule, for the user in each user property classification being counted, by institute according to the historical sample information State the unlatching ratio value of priority assignation in the on state;The unlatching ratio value is in the user property classification, will be described The ratio value between total number of users in the number of users of priority assignation in the on state, with the user property classification.
11. mobile terminal according to claim 10, which is characterized in that the second acquisition module is also used to work as described In the case that preceding operating status is non-background operation state, the corresponding user property of the target permission is obtained.
12. mobile terminal according to claim 11, which is characterized in that the generation module, comprising:
Submodule is determined, for determining belonging to the corresponding user property of the target permission according to the historical sample information Target user's attribute classification;
First display sub-module, if it is pre- to be greater than or equal to first for the corresponding unlatching ratio value of target user's attribute classification If threshold value, then the second prompting message is generated, and show second prompting message, second prompting message includes the target The mark of application, and open the advisory information of the target permission;
Second display sub-module, if for the corresponding unlatching ratio value of target user's attribute classification less than the second default threshold Value, then generate third prompting message, and show the third prompting message, the third prompting message includes the target application Mark, and close the advisory information of the target permission;
Wherein, first preset threshold is less than second preset threshold.
13. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor Any one of described in application right management method the step of.
14. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the permission pipe such as application described in any one of claims 1 to 6 when the computer program is executed by processor The step of reason method.
CN201910458777.5A 2019-05-29 2019-05-29 Application authority management method and mobile terminal Active CN110188520B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910458777.5A CN110188520B (en) 2019-05-29 2019-05-29 Application authority management method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910458777.5A CN110188520B (en) 2019-05-29 2019-05-29 Application authority management method and mobile terminal

Publications (2)

Publication Number Publication Date
CN110188520A true CN110188520A (en) 2019-08-30
CN110188520B CN110188520B (en) 2021-06-25

Family

ID=67718741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910458777.5A Active CN110188520B (en) 2019-05-29 2019-05-29 Application authority management method and mobile terminal

Country Status (1)

Country Link
CN (1) CN110188520B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111428262A (en) * 2020-03-03 2020-07-17 Oppo广东移动通信有限公司 Positioning application monitoring method and device, electronic equipment and storage medium
CN111596846A (en) * 2020-04-30 2020-08-28 维沃移动通信有限公司 Application authority control method and device and electronic equipment
CN113254805A (en) * 2020-02-12 2021-08-13 维沃移动通信有限公司 Method and network equipment for inquiring group position
CN113297461A (en) * 2020-02-24 2021-08-24 北京达佳互联信息技术有限公司 Target user identification method, target user group identification method and related product
CN113792328A (en) * 2021-08-12 2021-12-14 荣耀终端有限公司 Authority management method, user interface and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130347096A1 (en) * 2012-06-22 2013-12-26 Wistron Corp. Permission management method for applications, electronic device thereof, and computer readable medium
CN103905653A (en) * 2014-03-24 2014-07-02 小米科技有限责任公司 Mobile equipment data service control method and device
CN104766005A (en) * 2015-04-15 2015-07-08 小米科技有限责任公司 Management method and device for application software access authority
CN107766098A (en) * 2017-09-26 2018-03-06 深圳天珑无线科技有限公司 Using backstage orientation management method, mobile terminal and storage medium
US20180089452A1 (en) * 2016-09-28 2018-03-29 International Business Machines Corporation Application recommendation based on permissions
CN108427886A (en) * 2018-01-25 2018-08-21 上海掌门科技有限公司 A kind of application program access rights setting method, system, equipment and readable medium
CN108804938A (en) * 2018-06-14 2018-11-13 北京金山安全软件有限公司 Authority detection method and device, electronic equipment and readable storage medium
CN108833690A (en) * 2018-05-31 2018-11-16 努比亚技术有限公司 authority control method, terminal and computer readable storage medium
CN109615504A (en) * 2018-11-02 2019-04-12 深圳壹账通智能科技有限公司 Products Show method, apparatus, electronic equipment and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130347096A1 (en) * 2012-06-22 2013-12-26 Wistron Corp. Permission management method for applications, electronic device thereof, and computer readable medium
CN103905653A (en) * 2014-03-24 2014-07-02 小米科技有限责任公司 Mobile equipment data service control method and device
CN104766005A (en) * 2015-04-15 2015-07-08 小米科技有限责任公司 Management method and device for application software access authority
US20180089452A1 (en) * 2016-09-28 2018-03-29 International Business Machines Corporation Application recommendation based on permissions
CN107766098A (en) * 2017-09-26 2018-03-06 深圳天珑无线科技有限公司 Using backstage orientation management method, mobile terminal and storage medium
CN108427886A (en) * 2018-01-25 2018-08-21 上海掌门科技有限公司 A kind of application program access rights setting method, system, equipment and readable medium
CN108833690A (en) * 2018-05-31 2018-11-16 努比亚技术有限公司 authority control method, terminal and computer readable storage medium
CN108804938A (en) * 2018-06-14 2018-11-13 北京金山安全软件有限公司 Authority detection method and device, electronic equipment and readable storage medium
CN109615504A (en) * 2018-11-02 2019-04-12 深圳壹账通智能科技有限公司 Products Show method, apparatus, electronic equipment and computer readable storage medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254805A (en) * 2020-02-12 2021-08-13 维沃移动通信有限公司 Method and network equipment for inquiring group position
CN113297461A (en) * 2020-02-24 2021-08-24 北京达佳互联信息技术有限公司 Target user identification method, target user group identification method and related product
CN113297461B (en) * 2020-02-24 2023-12-12 北京达佳互联信息技术有限公司 Target user identification method, target user group identification method and device
CN111428262A (en) * 2020-03-03 2020-07-17 Oppo广东移动通信有限公司 Positioning application monitoring method and device, electronic equipment and storage medium
CN111428262B (en) * 2020-03-03 2024-01-09 Oppo广东移动通信有限公司 Positioning application monitoring method and device, electronic equipment and storage medium
CN111596846A (en) * 2020-04-30 2020-08-28 维沃移动通信有限公司 Application authority control method and device and electronic equipment
CN113792328A (en) * 2021-08-12 2021-12-14 荣耀终端有限公司 Authority management method, user interface and electronic equipment

Also Published As

Publication number Publication date
CN110188520B (en) 2021-06-25

Similar Documents

Publication Publication Date Title
CN110188520A (en) A kind of right management method and mobile terminal of application
RU2535582C2 (en) Providing selected data through locked display
CN106022196B (en) A kind of method and intelligent terminal of information sharing
CN105824663B (en) Background application method for cleaning and mobile terminal
CN106648382B (en) A kind of picture browsing method and mobile terminal
CN106357866B (en) A kind of book management method and mobile intelligent terminal
CN106126077A (en) A kind of application program image target display control method and mobile terminal
WO2008103581A2 (en) Contextural management of multiple device capabilities in a communication device
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN107741820A (en) A kind of entering method keyboard display methods and mobile terminal
CN108848142A (en) Information push method, device, computer equipment and storage medium
CN106951335A (en) A kind of process guard method and mobile terminal
CN106959797B (en) A kind of setting method and mobile terminal notifying footmark
CN108334755A (en) Private space creation method and device, storage medium, electronic equipment
CN106100982B (en) A kind of recommended method and mobile terminal of group member
CN108234744A (en) A kind of PUSH message management method and mobile terminal
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN106446614B (en) A kind of right management method and mobile terminal of application program
CN105955600B (en) A kind of method and mobile terminal adjusting mobile terminal display interface
CN107679381B (en) A kind of notification information processing method and mobile terminal
CN106991306B (en) A kind of method and mobile terminal inputting password
CN109271778A (en) Using installation source differentiating method, electronic equipment and computer storage medium
CN106453778B (en) A kind of contact photo setting method and mobile terminal
CN110188523A (en) A kind of verification method and mobile terminal
CN105975317A (en) Notification message processing method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220811

Address after: 5 / F, building B, No. 25, Andemen street, Yuhuatai District, Nanjing City, Jiangsu Province, 210012

Patentee after: NANJING WEIWO SOFTWARE TECHNOLOGY CO.,LTD.

Address before: 523860 No. 283 BBK Avenue, Changan Town, Changan, Guangdong.

Patentee before: VIVO MOBILE COMMUNICATION Co.,Ltd.