CN110188520A - A kind of right management method and mobile terminal of application - Google Patents
A kind of right management method and mobile terminal of application Download PDFInfo
- Publication number
- CN110188520A CN110188520A CN201910458777.5A CN201910458777A CN110188520A CN 110188520 A CN110188520 A CN 110188520A CN 201910458777 A CN201910458777 A CN 201910458777A CN 110188520 A CN110188520 A CN 110188520A
- Authority
- CN
- China
- Prior art keywords
- permission
- target
- user
- target application
- prompting message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of right management method of application and mobile terminals, comprising: obtains the permission and the corresponding default management parameters of permission of target application;Determine the current operating conditions of target application;According to current operating conditions, the use state parameter of the target permission for target application is obtained;According to use state parameter and default management parameters, generate includes the mark of target application and the prompting message of target permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter and default management parameters of permission, determine the change of permission under application scenarios, and user is reminded for the permission, reach and has been suggested according to personalized remind in real time, to the purpose that the opening and closing state of permission changes, the using experience degree for the function that user applies mobile terminal is improved.
Description
Technical field
The present embodiments relate to the right management methods and movement of field of communication technology more particularly to a kind of application eventually
End.
Background technique
In daily life, in order to guarantee privacy of user, user using mobile terminal during being applied, it usually needs
Mobile terminal is supplied to using various permissions, is applied for mobile terminal and corresponding function is realized according to the permission.
In the prior art, mobile terminal is used for the first time in user in application, mobile terminal application can be provided according to itself
Function (is such as taken pictures, positioning etc.), and whereabouts user requests to open the permission of these functions, if user opens mobile terminal application execution
The permission of these functions, then before user actively closes these permissions, mobile terminal application can according to the permission having turned on,
Execute the corresponding function of permission.
But at present in scheme, mobile terminal is applied after opening permission, can be always maintained at permission open state until
Permission is actively closed by user, when the function or authority acquiring mode, purpose that mobile terminal is applied change, Yong Huke
It will not can timely understand these changes, and the change to rights state can not be made according to these changes, so that some needs
The permission that pent permission can not be closed or some needs are turned on can not be turned on, and reduce user to mobile terminal
The using experience degree of the function of application.
Summary of the invention
The embodiment of the present invention provides the right management method and mobile terminal of a kind of application, to solve user in the prior art
The change of permission will not timely be understood, and rights state can not be modified according to these changes, cause user to movement
The lower problem of the using experience degree of the function of terminal applies.
In a first aspect, being applied to mobile terminal, the party the embodiment of the invention provides a kind of right management method of application
Method includes:
Obtain the permission and the corresponding default management parameters of the permission of target application;
Determine the current operating conditions of the target application;
According to the current operating conditions, the use state parameter of the target permission for the target application is obtained;
According to the use state parameter and the default management parameters, generate include the target application mark and
The prompting message of the target permission, and show the prompting message.
Second aspect, the embodiment of the invention provides a kind of mobile terminal, which includes:
First obtains module, the corresponding default management parameters of permission and the permission for obtaining target application;
Determining module, for determining the current operating conditions of the target application;
Second obtains module, for obtaining the target permission for being directed to the target application according to the current operating conditions
Use state parameter;
Generation module, for really according to the use state parameter and the default management parameters, generating to include the mesh
The mark of application and the prompting message of the target permission are marked, and shows the prompting message.
The third aspect the embodiment of the invention also provides a kind of mobile terminal, including processor, memory and is stored in institute
The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor
The step of realizing the right management method such as application provided by the invention.
Fourth aspect, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, the instruction in the storage medium
When being executed by the processor of electronic equipment, so that electronic equipment is able to carry out the right management method such as application provided by the invention
The step of.
In embodiments of the present invention, the permission of the available target application of mobile terminal and the corresponding default pipe of permission
Manage parameter;Determine the current operating conditions of target application;According to current operating conditions, the target permission for being directed to target application is obtained
Use state parameter;According to use state parameter and default management parameters, mark and target including target application are generated
The prompting message of permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter of permission and default pipe
Parameter is managed, the change of permission under application scenarios is determined, and remind user for the permission, has reached according to a in real time
Propertyization, which is reminded, suggests, to the purpose that the opening and closing state of permission changes, improves what user applied mobile terminal
The using experience degree of function.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of the right management method of application provided in an embodiment of the present invention;
Fig. 2 is the step flow chart of the right management method of another application provided in an embodiment of the present invention;
Fig. 3 is the step flow chart of the right management method of another application provided in an embodiment of the present invention;
Fig. 4 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 5 is the block diagram of the mobile terminal of another embodiment of the present invention;
Fig. 6 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
Specific embodiment
The exemplary embodiment that the present invention will be described in more detail below with reference to accompanying drawings.Although showing the present invention in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention without should be by embodiments set forth here
It is limited.It is to be able to thoroughly understand the present invention on the contrary, providing these embodiments, and can be by the scope of the present invention
It is fully disclosed to those skilled in the art.
Fig. 1 is a kind of step flow chart of the right management method of application provided in an embodiment of the present invention, as shown in Figure 1,
This method may include:
Step 101, the permission and the corresponding default management parameters of the permission for obtaining target application.
In embodiments of the present invention, it generally requires and mobile terminal relevant interface is called, can realize target application
Correlation function, e.g., target application then need the target application to be called camera shooting to realize the function of shooting by camera
The operation of head interface.
Specifically, can control information to the interface of mobile terminal with additional access, this information is referred to as describing safely
Symbol allows to access the type of the user of the interface for controlling.Permission defines in the security descriptor of interface, and permission is for fixed
Justice allows to access the identity information of the user of the interface.For example, for the utilizing camera interface of mobile terminal, it is assumed that using A and answer
All there is camera function with B, camera function permission is granted by by user using A, and B is applied not authorize camera function power by user
Limit, then in the security descriptor of utilizing camera interface, camera function permission can be defined using the corresponding identity information of A, in order to
Using A when realizing camera function, it can realize to call and take the photograph by the identity information defined in camera function permission using A
As the operation of head interface.
In this step, target application can obtain the power of the target application by the rights interface of calling system bottom
Registration table is limited, in the permission registration table, target application is listed and all permissions obtained is supported to have in these permissions
Permission may be most likely initiated by a user, some permissions may be most likely initiated by a user also, for the permission having been turned on, wherein can also deposit
It is being used by a user in the permission having, some permissions are not used by a user, wherein using a certain permission, can be referred to the power
The interface of limit is called, to realize the corresponding function of the permission.
Further, user can according to actual needs, default management parameters corresponding to authority setting, presets management ginseng
Number can be to qualifications attached by the currently used state of permission, for so that the working condition of permission is satisfied with default pipe
Manage the constraint of parameter.
It, can be with to the default management parameters of authority setting for example, in a kind of specific implementation of the embodiment of the present invention
For time threshold, which can be used for limiting the length of time that permission is under use state.
In addition, can be frequency of use of the permission within the scope of certain time to the default management parameters of authority setting
Value, e.g., can limit frequency of use value of a certain permission in 1 hour as 10 times, to limit the number that the permission is used.
Step 102, the current operating conditions for determining the target application.
Specifically, in embodiments of the present invention, target application usually has a variety of current operating conditions, in a kind of situation
Under, current operating conditions may include: background operation state or non-background operation state.For target application, locating
Under different operating statuses, can to permission use management tool have different needs, e.g., target application is in non-running background
Under state, the target application is generally used in user at this time, and user can be used utilizing camera interface and call permission, so as to user
It is shot, the operation such as barcode scanning;And target application, in the state of running background, the target is not used in the positive maximum probability of user at this time
Using, can close at this time utilizing camera interface call permission, with prevent illegal person backstage kidnap target application, and using camera shooting
Head steals privacy of user data.
Further, the current operating conditions of mobile terminal can also include that high electricity operating status and low battery run shape
State, high electricity operating status can be greater than or equal to the first default charge value, low battery operation for the current electric quantity of mobile terminal
State can be less than or equal to the second default charge value for the current electric quantity of mobile terminal, and it is pre- that the first default charge value is greater than second
If charge value.
In addition, in some other cases, the type for the permission that can also be supported according to target application, to target application into
Row grouping, and the grouping different according to target application, determine the current operating conditions of target application.
For example, the application with camera function can be divided into camera shooting status packet, by the application with positioning function
It is divided into positioning states grouping.When the target application run at present is in camera shooting status packet, the current of target application is determined
Operating status is camera shooting state, and when target application is under camera shooting state, the camera that can set target application calls power
The time threshold of limit is T1;When the target application run at present is in positioning states grouping, the current fortune of target application is determined
Row state is positioning states, and when target application is under positioning states, the locating module that can set target application calls power
The time threshold of limit sets different time thresholds for T2 to reach the different rights type of the acquisition according to needed for target application
Purpose, improve the individual demand of rights management.
Step 103, according to the current operating conditions, obtain the use state of the target permission for the target application
Parameter.
In embodiments of the present invention, the use state parameter of permission may include target application in the current state of operation,
The use state data or history added up for the target permission use data, and e.g., use state parameter may include power
For limit in opening lower the accumulated time, permission, which is in, closes lower the accumulated time etc..
In addition, the use state parameter of target permission may include the user property that target application corresponds to user, such as the use
Gender, age, the nationality at family etc..User, can be with when register for the user account of target application by target application
Input includes the registration information of user property, to complete to register, therefore can carry out user property by calling user account
It obtains.
Step 104, according to the use state parameter and the default management parameters, generating includes the target application
The prompting message of mark and the target permission, and show the prompting message.
It in this step, can be the case where the use state parameter of target permission meets the constraint of default management parameters
Under, generating includes the mark of target application and the prompting message of the target permission, and show the prompting message, for
Family opens or closes the target permission according to the prompting message, allows user according to the use state parameter of permission and pre-
If management parameters, the change of target permission under application scenarios is determined, and obtain corresponding to the prompting of the target permission, reached basis
Personalized remind is suggested in real time, the purpose changed to the opening and closing state of target permission.
For example, in a kind of specific implementation of the embodiment of the present invention, to the default management parameters of target authority setting
Can be time threshold, the time threshold can be used for limiting target permission it is in the open state under length of time, work as target
When time under the target permission of application is in the open state is more than the time threshold, it may remind the user that closing the target answers
The target permission.
It should be noted that in embodiments of the present invention, the use state parameter of target permission meets default management parameters
Constraint, can specifically include: the use state parameter of target permission be in default management parameters in the range of, target permission
Use state parameter be not at default management parameters in the range of, the use state parameter and default management parameters of target permission
Match, the use state parameter of target permission and default management parameters mismatch etc..
To sum up, the right management method of a kind of application provided in an embodiment of the present invention, comprising: obtain the power of target application
Limit and the corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operating conditions, obtain
Take the use state parameter of the target permission for target application;According to use state parameter and default management parameters, packet is generated
Include the mark of target application and the prompting message of target permission, and display alarm information, in the present invention, mobile terminal is according to power
The use state parameter and default management parameters of limit, determine the change of permission under application scenarios, and for the permission to user into
Row is reminded, and has been reached according to personalized remind is suggested in real time, to the purpose that the opening and closing state of permission changes, has been mentioned
The using experience degree for the function that high user applies mobile terminal.
Fig. 2 is the step flow chart of the right management method of another application provided in an embodiment of the present invention, such as Fig. 2 institute
Show, this method may include:
Step 201, the permission and the corresponding default management parameters of the permission for obtaining target application, the default pipe
Reason parameter includes the preset time threshold for the permission.
In a kind of specific implementation of the embodiment of the present invention, the default management parameters to authority setting can be default
Time threshold, the preset time threshold can be used for limiting permission it is in the open state under length of time.So that user is to quick
The opening time length of sense permission is limited.
Step 202, the current operating conditions for determining the target application.
The implementation of this step is similar with the realization process of above-mentioned steps 102, and this will not be detailed here for the embodiment of the present invention.
Step 203, the current operating conditions be background operation state in the case where, counting the target application has made
With the time of the target permission.
In embodiments of the present invention, when target application is in the state of running background, the target permission may be in
Open state and in the state of being currently being used, therefore the time that target application has used the target permission can be counted.
If step 204, the target application are greater than or equal to the preset time threshold using the time of the target permission
Value, then generate the first prompting message, and show first prompting message, first prompting message includes the target application
Mark, and suggest closing the advisory information of the target permission.
In embodiments of the present invention, if target application is greater than or equal to preset time threshold using the time of the target permission
Value, it may be considered that the target application has exceeded the required time range of user using the time of the target permission, if continuing
Keep the open state of the permission, it is possible to will cause and reveal asking for private data because the long-time of the target permission uses
Topic.Therefore, when target application using the target permission time be greater than or equal to preset time threshold when, can be generated including
The mark of target application, and suggest closing the first prompting message of the target permission, and show first prompting message,
So that user is according to first prompting message, instant makes the operation for closing the target permission, avoids because the target permission is long
Time use and caused by adverse consequences.
In conclusion the right management method of another application provided in an embodiment of the present invention, comprising: obtain target application
Permission and the corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operation shape
State obtains the use state parameter of the target permission for target application;It is raw according to use state parameter and default management parameters
At the prompting message of the mark and target permission that include target application, and display alarm information, in the present invention, mobile terminal root
According to the use state parameter and default management parameters of permission, determine the change of permission under application scenarios, and for the permission to
Family is reminded, and has been reached and has been suggested according to personalized remind in real time, the mesh changed to the opening and closing state of permission
, improve the using experience degree for the function that user applies mobile terminal.In addition, when target application uses the target permission
Time when being greater than or equal to preset time threshold, can be generated the mark including target application, and suggest closing the mesh
The first prompting message of permission is marked, and shows first prompting message, so that user is according to the prompting message, instant is made
The operation for closing the target permission avoids adverse consequences caused by due to the target permission uses for a long time.
Fig. 3 is the step flow chart of the right management method of another application provided in an embodiment of the present invention, such as Fig. 3 institute
Show, this method may include:
Step 301, the permission for obtaining the target application.
In this step, target application can obtain the power of the target application by the rights interface of calling system bottom
Registration table is limited, in the permission registration table, target application is listed and all permissions obtained is supported to have in these permissions
Permission may be most likely initiated by a user, some permissions may be most likely initiated by a user also.
Step 302 obtains the historical sample information for being directed to the permission of the target application, and the historical sample information includes
The user of different user attribute is by the priority assignation in the information of open state or the information of closed state, each user
Attribute belongs to corresponding user property classification.
In embodiments of the present invention, for target application during by users' use, each user can foundation
The demand of oneself executes opening operation to one or more permissions in target application, or to one or more in target application
A permission executes shutoff operation, and target application can collect the user property of these users and the user holds permission execution
It opens or shutoff operation, and according to the user property of user, user is divided to corresponding user property classification, establishes user-use
The corresponding relationship for opening or closing operation that family attribute classification-executes permission, and the corresponding relationship is configured to history sample
This.Wherein, user property may include the information such as gender, age, the nationality of the user, and user property can be belonging corresponding
User property classification, e.g., according to the age attribute of user, after can establish (19 years old to 29 years old) user property classification after 90s, 70
(39 years old to 49 years old) user property classification etc., then the age attribute of user, can be belonging after 90s between 19 years old to 29 years old
User property classification, the age attribute of user, can user property classifications after belonging 70 between 39 years old to 49 years old.
Such as, however, it is determined that user property is the age, and establishes (39 years old to 49 years old) two behind (19 years old to 29 years old) after 90s and 70
A user property classification, the then user that mobile terminal can count (19 years old to 29 years old) user property classification after 90s answer for target
Positioning permission performed by open or close operation (for target application positioning priority assignation in open state or closing
State), and the user of (39 years old to 49 years old) user property classification is directed to performed by the positioning permission of target application after statistics 70
Open or close operation.
Step 303, according to the historical sample information, count the user in each user property classification, will be described
The unlatching ratio value of priority assignation in the on state.
In this step, opening ratio value is in the user property classification, in the on state by the priority assignation
Number of users, with the ratio value between total number of users in the user property classification.
The example provided for above-mentioned steps 302, it is assumed that counted 100 users after 90s to the positioning permission of target application
Performed opens or closes operation, and is opened after having counted 100 70 performed by positioning permission of the user to target application
It opens or shutoff operation, wherein in 100 users after 90s, there are 80 users to perform opening operation to positioning permission;100 70
Afterwards in user, there are 30 users to perform opening operation to positioning permission, then may finally obtain user property classification after 90s
It is 80% that user, which will position the unlatching ratio value of priority assignation in the on state, and the user of user property classification will position after 70
The unlatching ratio value of priority assignation in the on state is 30%.
Step 304, the current operating conditions for determining the target application.
The implementation of this step is similar with the realization process of above-mentioned steps 102, and this will not be detailed here for the embodiment of the present invention.
Step 305, the current operating conditions be non-background operation state in the case where, obtain the target permission pair
The user property answered.
In embodiments of the present invention, the user property of user may include the information such as gender, age, the nationality of the user.
User can input the registration including user property when register for the user account of target application by target application
Information to complete to register, therefore can carry out the acquisition of user property by calling user account.
Step 306, according to the historical sample information, determine target belonging to the corresponding user property of the target permission
User property classification.
In embodiments of the present invention, can include by the user property of determining user, and according in historical sample information
User property classification, further determine that target user's attribute classification belonging to the corresponding user property of target permission.
For example, it is assumed that the user of the server statistics of target application (19 years old to 29 years old) user property classification after 90s is directed to
Operation is opened or closed performed by the positioning permission of target application, and (39 years old to 49 years old) user property class after having counted 70
Operation is opened or closed performed by positioning permission of other user for target application.Wherein, include in historical sample information
User property be age of user, if in user property age of user be in 19 years old to 29 years old within the scope of, can determine user
Target user's attribute classification belonging to attribute is user property classification after 90s;If age of user is in 39 years old to 49 in user property
Year range in, then can determine target user's attribute classification belonging to user property be 70 after user property classification.
If step 307, the corresponding unlatching ratio value of target user's attribute classification are greater than or equal to the first preset threshold,
The second prompting message is then generated, and shows second prompting message, second prompting message includes the target application
Mark, and open the advisory information of the target permission.
In this step, the example provided for above-mentioned steps 306, it is assumed that the age of user is 24 years old, and first is default
Threshold value is 60%, then according to the unlatching ratio value 80% of the corresponding target permission of user property classification after 90s, can determine target
The corresponding unlatching ratio value of user property classification is greater than or equal to the first preset threshold, it is believed that in historical user after 90s, greatly
Majority keep it turned on the target permission, i.e. packet can be generated compared with the preference by historical user after 90s in the permission
The mark of target application is included, and suggests opening the second prompting message of the target permission, and shows that described second reminds letter
Breath.So that active user after 90s is not under the premise of opening the target permission, the age bracket according to belonging to oneself is to the target
Permission carries out the preference of opening operation, carries out opening operation to the target permission of the target application.It improves to rights management
The personalization level of operation.
If step 308, the corresponding unlatching ratio value of target user's attribute classification are generated less than the second preset threshold
Third prompting message, and show the third prompting message, the third prompting message includes the mark of the target application, with
And close the advisory information of the target permission.
In embodiments of the present invention, the first preset threshold can be less than the second preset threshold.
In this step, the example provided for above-mentioned steps 306, it is assumed that the age of user is 24 years old, and second is default
Threshold value is 90%, then according to the unlatching ratio value 80% of the corresponding target permission of user property classification after 90s, can determine target
The corresponding unlatching ratio value of user property classification is less than the second preset threshold, it is believed that in historical user after 90s, most people
The target permission is remained off, i.e., the permission is less by the preference of historical user after 90s, therefore can be generated including mesh
The mark of application is marked, and suggests closing the second prompting message of the target permission, and show second prompting message.With
For active user after 90s under the premise of opening the target permission, the age bracket according to belonging to oneself carries out the target permission
The preference of shutoff operation carries out shutoff operation to the target permission of the target application.Improve to DRM operations
Property degree.
It should be noted that above-mentioned is for the corresponding unlatching ratio value of same user property classification and the first default threshold
The comparison of value, the second preset threshold generates simultaneously display alarm information for comparison result, if being directed to different user property classes
Not, settable different the first preset threshold or the second preset threshold, the embodiment of the present invention preset the first preset threshold, second
The specific value and size relation of threshold value are not construed as limiting.
In conclusion the right management method of another application provided in an embodiment of the present invention, comprising: obtain target application
Permission and the corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operation shape
State obtains the use state parameter of the target permission for target application;It is raw according to use state parameter and default management parameters
At the prompting message of the mark and target permission that include target application, and display alarm information, in the present invention, mobile terminal root
According to the use state parameter and default management parameters of permission, determine the change of permission under application scenarios, and for the permission to
Family is reminded, and has been reached and has been suggested according to personalized remind in real time, the mesh changed to the opening and closing state of permission
, improve the using experience degree for the function that user applies mobile terminal.
Fig. 4 is a kind of block diagram of mobile terminal provided in an embodiment of the present invention, as shown in figure 4, the mobile terminal 40 includes:
First obtains module 401, the corresponding default management ginseng of the permission and the permission for obtaining target application
Number;
Optionally, first module 401 is obtained, comprising:
First acquisition submodule, for obtaining the permission of the target application;
Second acquisition submodule, for obtaining the historical sample information for being directed to the permission of the target application, the history
Sample information include different user attribute user by the priority assignation in the information of open state or the information of closed state,
Each user property belongs to corresponding user property classification;
Statistic submodule, for counting the user in each user property classification according to the historical sample information,
By the unlatching ratio value of the priority assignation in the on state;The unlatching ratio value is to incite somebody to action in the user property classification
The ratio between total number of users in the number of users of the priority assignation in the on state, with the user property classification
Value.
Determining module 402, for determining the current operating conditions of the target application;
Second obtains module 403, and the target for obtaining for the target application according to the current operating conditions is weighed
The use state parameter of limit;
Optionally, the second acquisition module 402 is also used in the feelings that the current operating conditions are background operation state
Under condition, the time that the target application has used the target permission is counted.
Optionally, the second acquisition module 402 is also used in the current operating conditions be non-background operation state
In the case of, obtain the user property of the corresponding user of the target permission.
Generation module 404, for according to the use state parameter and the default management parameters, generating to include the mesh
The mark of application and the prompting message of the target permission are marked, and shows the prompting message.
Optionally, the default management parameters include the preset time threshold for the target permission;The generation mould
The time of the target permission has been used to be greater than or equal to the preset time threshold if block 404 is also used to the target application,
The first prompting message is then generated, and shows first prompting message, first prompting message includes the target application
Mark, and close the advisory information of the target permission.
Optionally, the generation module 404, comprising:
Submodule is determined, for determining the corresponding user property institute of the target permission according to the historical sample information
Target user's attribute classification of category;
First display sub-module, if for corresponding the unlatchings ratio value of target user's attribute classification more than or equal to the
One preset threshold then generates the second prompting message, and shows second prompting message, and second prompting message includes described
The mark of target application, and open the advisory information of the target permission;
Second display sub-module, if default less than second for the corresponding unlatching ratio value of target user's attribute classification
Threshold value then generates third prompting message, and shows the third prompting message, and the third prompting message includes that the target is answered
Mark, and close the advisory information of the target permission;
First preset threshold is less than second preset threshold.
In conclusion a kind of mobile terminal provided in an embodiment of the present invention, including, the permission of target application is obtained, and
The corresponding default management parameters of permission;Determine the current operating conditions of target application;According to current operating conditions, obtains and be directed to mesh
Mark the use state parameter of the target permission of application;According to use state parameter and default management parameters, generation is answered including target
The prompting message of mark and target permission, and display alarm information, in the present invention, mobile terminal is according to the use of permission
State parameter and default management parameters determine the change of permission under application scenarios, and remind for the permission user, reach
It has arrived according to personalized remind is suggested in real time, to the purpose that the opening and closing state of permission changes, has improved user
To the using experience degree of the function of mobile terminal application.
The embodiment of the present invention also provides a kind of mobile terminal, including processor, and memory is stored on the memory simultaneously
The computer program that can be run on the processor, the computer program realize above-mentioned application when being executed by the processor
Right management method embodiment each process, and identical technical effect can be reached, it is no longer superfluous here to avoid repeating
It states.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each mistake of the right management method embodiment of above-mentioned application when being executed by processor
Journey, and identical technical effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium
Matter, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access
Memory, abbreviation RAM), magnetic or disk etc..
Fig. 5 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 500 shown in fig. 5 includes: at least
One processor 501, memory 502, at least one network interface 504, user interface 503 and camera 506.Mobile terminal
Various components in 500 are coupled by bus system 505.It is understood that bus system 505 for realizing these components it
Between connection communication.Bus system 505 further includes power bus, control bus and status signal in addition to including data/address bus
Bus.But for the sake of clear explanation, various buses are all designated as bus system 505 in Fig. 5.
Wherein, user interface 503 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or flexible screen etc..
It is appreciated that the memory 502 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM
(ErasablePROM, EPROM), electrically erasable programmable read-only memory (ElectricallyEPROM, EEPROM) dodge
It deposits.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is slow to be used as external high speed
It deposits.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory
(SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory
(DirectRambusRAM, DRRAM).The memory 502 of the system and method for description of the embodiment of the present invention is intended to include but unlimited
In the memory of these and any other suitable type.
In some embodiments, memory 502 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 5021 and application program 5022.
Wherein, operating system 5021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 5022 includes various application programs, such as media
Player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize embodiment of the present invention side
The program of method may be embodied in application program 5022.
In embodiments of the present invention, by the program or instruction of calling memory 502 to store, specifically, can be application
The program or instruction stored in program 5022, permission and permission of the processor 501 for obtaining target application are corresponding default
Management parameters;Determine the current operating conditions of target application;According to current operating conditions, the target obtained for target application is weighed
The use state parameter of limit;According to use state parameter and default management parameters, mark and mesh including target application are generated
Mark the prompting message of permission, and display alarm information.
The method that the embodiments of the present invention disclose can be applied in processor 501, or be realized by processor 501.
Processor 501 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 501 or the instruction of software form.Above-mentioned processing
Device 501 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), specific integrated circuit
(ApplicationSpecificIntegratedCircuit, ASIC), ready-made programmable gate array
(FieldProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic
Device, discrete hardware components.It may be implemented or execute disclosed each method, step and the logical box in the embodiment of the present invention
Figure.General processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with the present invention
The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and execute completion, or use decoding processor
In hardware and software module combination execute completion.Software module can be located at random access memory, and flash memory, read-only memory can
In the storage medium of this fields such as program read-only memory or electrically erasable programmable memory, register maturation.The storage
Medium is located at memory 502, and processor 501 reads the information in memory 502, and the step of the above method is completed in conjunction with its hardware
Suddenly.
It is understood that the embodiment of the present invention description these embodiments can with hardware, software, firmware, middleware,
Microcode or combinations thereof is realized.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (App
LicationSpecificIntegratedCircuits, ASIC), digital signal processor
(DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device
(ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray,
FPGA), general processor, controller, microcontroller, microprocessor, other electronics lists for executing herein described function
In member or combinations thereof.
For software implementations, can by execute the embodiment of the present invention described in function module (such as process, function etc.) come
Realize technology described in the embodiment of the present invention.Software code is storable in memory and is executed by processor.Memory can
With portion realizes in the processor or outside the processor.
Mobile terminal 500 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
It repeats no more.
In the embodiment of the present invention, the permission and the corresponding default pipe of permission of the available target application of mobile terminal 500
Manage parameter;Determine the current operating conditions of target application;According to current operating conditions, the target permission for being directed to target application is obtained
Use state parameter;According to use state parameter and default management parameters, mark and target including target application are generated
The prompting message of permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter of permission and default pipe
Parameter is managed, the change of permission under application scenarios is determined, and remind user for the permission, has reached according to a in real time
Propertyization, which is reminded, suggests, to the purpose that the opening and closing state of permission changes, improves what user applied mobile terminal
The using experience degree of function.
Fig. 6 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.
The mobile terminal includes: processor, memory and is stored on the memory and can be on the processor
The computer program of operation, the computer program realize the right management method of above-mentioned application when being executed by the processor
The step of.
The mobile terminal further include: computer program is stored on readable storage medium storing program for executing, the computer program is located
The step of reason device realizes the right management method of above-mentioned application when executing.
Specifically, the mobile terminal 600 in Fig. 6 can be mobile phone, tablet computer, personal digital assistant
(PersonalDigital Assistant, PDA) or vehicle-mounted computer etc..
Mobile terminal 600 in Fig. 6 includes radio frequency (RadioFrequency, RF) circuit 610, memory 620, input list
Member 630, display unit 640, processor 660, voicefrequency circuit 670, WLAN (WirelessFidelity) module 680,
Power supply 690 and camera 6110.
Wherein, input unit 630 can be used for receiving the number or character information of user's input, and generation and mobile terminal
The related signal input of 600 user setting and function control.Specifically, in the embodiment of the present invention, which can
To include touch panel 631.Touch panel 631, collect user on it or nearby touch operation (such as user use hand
The operation of any suitable object or attachment such as finger, stylus on touch panel 631), and driven according to preset formula
Corresponding attachment device.Optionally, touch panel 631 may include both touch detecting apparatus and touch controller.Wherein,
Touch detecting apparatus detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch control
Device;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives the processor
660, and order that processor 660 is sent can be received and executed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray with
And the multiple types such as surface acoustic wave realize touch panel 631.In addition to touch panel 631, input unit 630 can also include other
Input equipment 632, other input equipments 632 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Wherein, display unit 640 can be used for showing information input by user or be supplied to the information and movement of user
The various menu interfaces of terminal 600.Display unit 640 may include display panel 641, optionally, can use LCD or organic hair
The forms such as optical diode (OrganicLight-EmittingDiode, OLED) configure display panel 641.
It should be noted that touch panel 631 can cover display panel 641, touch display screen is formed, when the touch display screen is examined
After measuring touch operation on it or nearby, processor 660 is sent to determine the type of touch event, is followed by subsequent processing device
660 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 660 is the control centre of mobile terminal 600, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or executing the software program and/or module that are stored in first memory 621, and calling storage
Data in second memory 622 execute the various functions and processing data of mobile terminal 600, thus to mobile terminal 600
Carry out integral monitoring.Optionally, processor 660 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 621 in software program and/or module and/
Or the data in the second memory 622, processor 660 is for taking the permission of target application and the corresponding default pipe of permission
Manage parameter;Determine the current operating conditions of target application;According to current operating conditions, making for the permission for being directed to target application is obtained
Use state parameter;According to use state parameter and default management parameters, generating includes the mark of target application and mentioning for permission
Awake information, and display alarm information.
As it can be seen that mobile terminal may include: that the permission for obtaining target application and permission correspond in the embodiment of the present invention
Default management parameters;Determine the current operating conditions of target application;According to current operating conditions, obtain for target application
The use state parameter of target permission;According to use state parameter and default management parameters, the mark including target application is generated
And the prompting message of target permission, and display alarm information, in the present invention, mobile terminal is according to the use state parameter of permission
With default management parameters, the change of permission under application scenarios is determined, and user is reminded for the permission, reached basis
Real-time personalized remind is suggested, to the purpose that the opening and closing state of permission changes, improves user to mobile whole
Hold the using experience degree of the function of application.
For above-mentioned apparatus embodiment, since it is basically similar to the method embodiment, so be described relatively simple,
The relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It would have readily occurred to a person skilled in the art that: any combination application of above-mentioned each embodiment is all feasible, therefore
Any combination between above-mentioned each embodiment is all embodiment of the present invention, but this specification exists as space is limited,
This is not just detailed one by one.
The right management method applied provided herein is not solid with any certain computer, virtual system or other equipment
There is correlation.Various general-purpose systems can also be used together with teachings based herein.As described above, construction has this hair
Structure required by the system of bright scheme is obvious.In addition, the present invention is also not directed to any particular programming language.It should
Understand, can use various programming languages and realize summary of the invention described herein, and language-specific is done above
Description is in order to disclose the best mode of carrying out the invention.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the present invention and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, such as right
As claim reflects, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows tool
Thus claims of body embodiment are expressly incorporated in the specific embodiment, wherein each claim conduct itself
Separate embodiments of the invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any
Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize the identification side of background music in video according to an embodiment of the present invention
The some or all functions of some or all components in method.The present invention is also implemented as described here for executing
Method some or all device or device programs (for example, computer program and computer program product).This
The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal
Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other
Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
Claims (14)
1. a kind of right management method of application is applied to mobile terminal, which is characterized in that the described method includes:
Obtain the permission and the corresponding default management parameters of the permission of target application;
Determine the current operating conditions of the target application;
According to the current operating conditions, the use state parameter of the target permission for the target application is obtained;
According to the use state parameter and the default management parameters, it includes the mark of the target application and described for generating
The prompting message of target permission, and show the prompting message.
2. acquisition is directed to institute the method according to claim 1, wherein described according to the current operating conditions
State the use state parameter of the target permission of target application, comprising:
In the case where the current operating conditions are background operation state, count the target application and weighed using the target
The time of limit.
3. according to the method described in claim 2, it is characterized in that, the default management parameters include being directed to the target permission
Preset time threshold;
It is described according to the use state parameter and the default management parameters, generate include the target application mark and
The prompting message of the target permission, and show the prompting message, comprising:
If the target application has used the time of the target permission to be greater than or equal to the preset time threshold, the is generated
One prompting message, and show first prompting message, first prompting message includes the mark of the target application, and
Close the advisory information of the target permission.
4. the method according to claim 1, wherein the permission and the permission for obtaining target application
Corresponding default management parameters, comprising:
Obtain the permission of the target application;
The historical sample information of the permission for the target application is obtained, the historical sample information includes different user attribute
User by the priority assignation in the information of open state or the information of closed state, each user property belongs to correspondence
User property classification;
According to the historical sample information, the user in each user property classification is counted, the priority assignation is being opened
Open the unlatching ratio value under state;The unlatching ratio value is to open the priority assignation in the user property classification
The ratio value between total number of users in number of users under state, with the user property classification.
5. according to the method described in claim 4, acquisition is directed to institute it is characterized in that, described according to the current operating conditions
State the use state parameter of the target permission of target application, comprising:
In the case where the current operating conditions are non-background operation state, obtain the corresponding user of the target permission and belong to
Property.
6. according to the method described in claim 5, it is characterized in that, described according to the use state parameter and the default pipe
Parameter is managed, generating includes the mark of the target application and the prompting message of the target permission, and shows the prompting letter
Breath, comprising:
According to the historical sample information, target user's Attribute class belonging to the corresponding user property of the target permission is determined
Not;
If the corresponding unlatching ratio value of target user's attribute classification is greater than or equal to the first preset threshold, generates second and mention
Awake information, and show second prompting message, second prompting message includes the mark of the target application, and is opened
The advisory information of the target permission;
If the corresponding unlatching ratio value of target user's attribute classification generates third and reminds letter less than the second preset threshold
Breath, and show the third prompting message, the third prompting message includes the mark of the target application, and described in closing
The advisory information of target permission;
Wherein, first preset threshold is less than second preset threshold.
7. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
First obtains module, the corresponding default management parameters of permission and the permission for obtaining target application;
Determining module, for determining the current operating conditions of the target application;
Second obtains module, for obtaining making for the target permission for being directed to the target application according to the current operating conditions
Use state parameter;
Generation module, for according to the use state parameter and the default management parameters, generating to include the target application
Mark and the target permission prompting message, and show the prompting message.
8. mobile terminal according to claim 7, which is characterized in that the second acquisition module is also used to described current
In the case that operating status is background operation state, the time that the target application has used the target permission is counted.
9. mobile terminal according to claim 8, which is characterized in that the default management parameters include being directed to the target
The preset time threshold of permission;Use the time of the target permission big if the generation module is also used to the target application
In or equal to the preset time threshold, then the first prompting message is generated, and show first prompting message, described first mentions
Awake information includes the mark of the target application, and closes the advisory information of the target permission.
10. mobile terminal according to claim 6, which is characterized in that described first obtains module, comprising:
First acquisition submodule, for obtaining the permission of the target application;
Second acquisition submodule, for obtaining the historical sample information for being directed to the permission of the target application, the historical sample
Information include different user attribute user by the priority assignation in the information of open state or the information of closed state, each
The user property belongs to corresponding user property classification;
Statistic submodule, for the user in each user property classification being counted, by institute according to the historical sample information
State the unlatching ratio value of priority assignation in the on state;The unlatching ratio value is in the user property classification, will be described
The ratio value between total number of users in the number of users of priority assignation in the on state, with the user property classification.
11. mobile terminal according to claim 10, which is characterized in that the second acquisition module is also used to work as described
In the case that preceding operating status is non-background operation state, the corresponding user property of the target permission is obtained.
12. mobile terminal according to claim 11, which is characterized in that the generation module, comprising:
Submodule is determined, for determining belonging to the corresponding user property of the target permission according to the historical sample information
Target user's attribute classification;
First display sub-module, if it is pre- to be greater than or equal to first for the corresponding unlatching ratio value of target user's attribute classification
If threshold value, then the second prompting message is generated, and show second prompting message, second prompting message includes the target
The mark of application, and open the advisory information of the target permission;
Second display sub-module, if for the corresponding unlatching ratio value of target user's attribute classification less than the second default threshold
Value, then generate third prompting message, and show the third prompting message, the third prompting message includes the target application
Mark, and close the advisory information of the target permission;
Wherein, first preset threshold is less than second preset threshold.
13. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor
Any one of described in application right management method the step of.
14. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the permission pipe such as application described in any one of claims 1 to 6 when the computer program is executed by processor
The step of reason method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458777.5A CN110188520B (en) | 2019-05-29 | 2019-05-29 | Application authority management method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910458777.5A CN110188520B (en) | 2019-05-29 | 2019-05-29 | Application authority management method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110188520A true CN110188520A (en) | 2019-08-30 |
CN110188520B CN110188520B (en) | 2021-06-25 |
Family
ID=67718741
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910458777.5A Active CN110188520B (en) | 2019-05-29 | 2019-05-29 | Application authority management method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110188520B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111428262A (en) * | 2020-03-03 | 2020-07-17 | Oppo广东移动通信有限公司 | Positioning application monitoring method and device, electronic equipment and storage medium |
CN111596846A (en) * | 2020-04-30 | 2020-08-28 | 维沃移动通信有限公司 | Application authority control method and device and electronic equipment |
CN113254805A (en) * | 2020-02-12 | 2021-08-13 | 维沃移动通信有限公司 | Method and network equipment for inquiring group position |
CN113297461A (en) * | 2020-02-24 | 2021-08-24 | 北京达佳互联信息技术有限公司 | Target user identification method, target user group identification method and related product |
CN113792328A (en) * | 2021-08-12 | 2021-12-14 | 荣耀终端有限公司 | Authority management method, user interface and electronic equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130347096A1 (en) * | 2012-06-22 | 2013-12-26 | Wistron Corp. | Permission management method for applications, electronic device thereof, and computer readable medium |
CN103905653A (en) * | 2014-03-24 | 2014-07-02 | 小米科技有限责任公司 | Mobile equipment data service control method and device |
CN104766005A (en) * | 2015-04-15 | 2015-07-08 | 小米科技有限责任公司 | Management method and device for application software access authority |
CN107766098A (en) * | 2017-09-26 | 2018-03-06 | 深圳天珑无线科技有限公司 | Using backstage orientation management method, mobile terminal and storage medium |
US20180089452A1 (en) * | 2016-09-28 | 2018-03-29 | International Business Machines Corporation | Application recommendation based on permissions |
CN108427886A (en) * | 2018-01-25 | 2018-08-21 | 上海掌门科技有限公司 | A kind of application program access rights setting method, system, equipment and readable medium |
CN108804938A (en) * | 2018-06-14 | 2018-11-13 | 北京金山安全软件有限公司 | Authority detection method and device, electronic equipment and readable storage medium |
CN108833690A (en) * | 2018-05-31 | 2018-11-16 | 努比亚技术有限公司 | authority control method, terminal and computer readable storage medium |
CN109615504A (en) * | 2018-11-02 | 2019-04-12 | 深圳壹账通智能科技有限公司 | Products Show method, apparatus, electronic equipment and computer readable storage medium |
-
2019
- 2019-05-29 CN CN201910458777.5A patent/CN110188520B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130347096A1 (en) * | 2012-06-22 | 2013-12-26 | Wistron Corp. | Permission management method for applications, electronic device thereof, and computer readable medium |
CN103905653A (en) * | 2014-03-24 | 2014-07-02 | 小米科技有限责任公司 | Mobile equipment data service control method and device |
CN104766005A (en) * | 2015-04-15 | 2015-07-08 | 小米科技有限责任公司 | Management method and device for application software access authority |
US20180089452A1 (en) * | 2016-09-28 | 2018-03-29 | International Business Machines Corporation | Application recommendation based on permissions |
CN107766098A (en) * | 2017-09-26 | 2018-03-06 | 深圳天珑无线科技有限公司 | Using backstage orientation management method, mobile terminal and storage medium |
CN108427886A (en) * | 2018-01-25 | 2018-08-21 | 上海掌门科技有限公司 | A kind of application program access rights setting method, system, equipment and readable medium |
CN108833690A (en) * | 2018-05-31 | 2018-11-16 | 努比亚技术有限公司 | authority control method, terminal and computer readable storage medium |
CN108804938A (en) * | 2018-06-14 | 2018-11-13 | 北京金山安全软件有限公司 | Authority detection method and device, electronic equipment and readable storage medium |
CN109615504A (en) * | 2018-11-02 | 2019-04-12 | 深圳壹账通智能科技有限公司 | Products Show method, apparatus, electronic equipment and computer readable storage medium |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113254805A (en) * | 2020-02-12 | 2021-08-13 | 维沃移动通信有限公司 | Method and network equipment for inquiring group position |
CN113297461A (en) * | 2020-02-24 | 2021-08-24 | 北京达佳互联信息技术有限公司 | Target user identification method, target user group identification method and related product |
CN113297461B (en) * | 2020-02-24 | 2023-12-12 | 北京达佳互联信息技术有限公司 | Target user identification method, target user group identification method and device |
CN111428262A (en) * | 2020-03-03 | 2020-07-17 | Oppo广东移动通信有限公司 | Positioning application monitoring method and device, electronic equipment and storage medium |
CN111428262B (en) * | 2020-03-03 | 2024-01-09 | Oppo广东移动通信有限公司 | Positioning application monitoring method and device, electronic equipment and storage medium |
CN111596846A (en) * | 2020-04-30 | 2020-08-28 | 维沃移动通信有限公司 | Application authority control method and device and electronic equipment |
CN113792328A (en) * | 2021-08-12 | 2021-12-14 | 荣耀终端有限公司 | Authority management method, user interface and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110188520B (en) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110188520A (en) | A kind of right management method and mobile terminal of application | |
RU2535582C2 (en) | Providing selected data through locked display | |
CN106022196B (en) | A kind of method and intelligent terminal of information sharing | |
CN105824663B (en) | Background application method for cleaning and mobile terminal | |
CN106648382B (en) | A kind of picture browsing method and mobile terminal | |
CN106357866B (en) | A kind of book management method and mobile intelligent terminal | |
CN106126077A (en) | A kind of application program image target display control method and mobile terminal | |
WO2008103581A2 (en) | Contextural management of multiple device capabilities in a communication device | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
CN107741820A (en) | A kind of entering method keyboard display methods and mobile terminal | |
CN108848142A (en) | Information push method, device, computer equipment and storage medium | |
CN106951335A (en) | A kind of process guard method and mobile terminal | |
CN106959797B (en) | A kind of setting method and mobile terminal notifying footmark | |
CN108334755A (en) | Private space creation method and device, storage medium, electronic equipment | |
CN106100982B (en) | A kind of recommended method and mobile terminal of group member | |
CN108234744A (en) | A kind of PUSH message management method and mobile terminal | |
CN108573168A (en) | Private space starts method and apparatus, storage medium, electronic equipment | |
CN106446614B (en) | A kind of right management method and mobile terminal of application program | |
CN105955600B (en) | A kind of method and mobile terminal adjusting mobile terminal display interface | |
CN107679381B (en) | A kind of notification information processing method and mobile terminal | |
CN106991306B (en) | A kind of method and mobile terminal inputting password | |
CN109271778A (en) | Using installation source differentiating method, electronic equipment and computer storage medium | |
CN106453778B (en) | A kind of contact photo setting method and mobile terminal | |
CN110188523A (en) | A kind of verification method and mobile terminal | |
CN105975317A (en) | Notification message processing method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220811 Address after: 5 / F, building B, No. 25, Andemen street, Yuhuatai District, Nanjing City, Jiangsu Province, 210012 Patentee after: NANJING WEIWO SOFTWARE TECHNOLOGY CO.,LTD. Address before: 523860 No. 283 BBK Avenue, Changan Town, Changan, Guangdong. Patentee before: VIVO MOBILE COMMUNICATION Co.,Ltd. |