CN110457935B - Permission configuration method and terminal equipment - Google Patents

Permission configuration method and terminal equipment Download PDF

Info

Publication number
CN110457935B
CN110457935B CN201910563554.5A CN201910563554A CN110457935B CN 110457935 B CN110457935 B CN 110457935B CN 201910563554 A CN201910563554 A CN 201910563554A CN 110457935 B CN110457935 B CN 110457935B
Authority
CN
China
Prior art keywords
application program
terminal device
application
authority
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910563554.5A
Other languages
Chinese (zh)
Other versions
CN110457935A (en
Inventor
奉光跃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910563554.5A priority Critical patent/CN110457935B/en
Publication of CN110457935A publication Critical patent/CN110457935A/en
Application granted granted Critical
Publication of CN110457935B publication Critical patent/CN110457935B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the invention discloses a permission configuration method and terminal equipment, relates to the technical field of communication, and can solve the problem that privacy information of a user is leaked after permission for one application program to access another application program is configured. The scheme comprises the following steps: searching a first application program corresponding to a first object in N application programs in the terminal equipment, wherein the first object is an object in a second application program; and under the condition that the first application program is found, configuring a first authority to the first application program, wherein the first authority is an authority for accessing the first object, and N is a positive integer. The scheme is applied to the scene of permission configuration.

Description

Permission configuration method and terminal equipment
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a permission configuration method and terminal equipment.
Background
With the continuous development of communication technology, more and more applications can be installed in the terminal device.
In general, after a certain application (hereinafter, referred to as application a) is installed in a terminal device, the terminal device can configure a right for the application a. For example, the terminal device may configure the application a with rights to access other applications. Taking the example that the terminal device configures the permission to access the short message application program for the application program a, after the terminal device configures the permission to access the short message application program for the application program a, the application program a may read the contents of all short messages in the short message application program.
However, since one application can access all contents of another application after configuring a right for the one application to access the other application, privacy information of a user may be leaked.
Disclosure of Invention
The embodiment of the invention provides a permission configuration method and terminal equipment, and aims to solve the problem that privacy information of a user is leaked after a permission for accessing another application program is configured for one application program.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present invention provides a method for configuring a right, where the method is applied to a terminal device, and the method includes: searching a first application program corresponding to a first object in N application programs in the terminal equipment; and under the condition that the first application program is found, configuring a first authority to the first application program. The first object is an object in a second application program, the first authority is an authority for accessing the first object, and N is a positive integer.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device may include a lookup module and a configuration module. The searching module is used for searching a first application program corresponding to a first object in N application programs in the terminal equipment, wherein the first object is an object in a second application program; and the configuration module is used for configuring the first authority to the first application program under the condition that the first application program is searched by the search module, wherein the first authority is the authority for accessing the first object, and N is a positive integer.
In a third aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, and when the computer program is executed by the processor, the terminal device implements the steps of the permission configuration method in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the permission configuration method in the first aspect.
In the embodiment of the present invention, a first application corresponding to a first object (the first object is an object in a second application) may be searched in N applications in the terminal device, and a first right to access the first object may be configured to the first application under the condition that the first application is found. By the scheme, when the authority for accessing the second application program is configured for the first application program, only the access authority (namely the first authority) of the first object corresponding to the first application program in the second application program can be configured for the first application program, namely, the first application program can only access the object related to the first application program in the second application program and cannot access other objects in the second application program, so that the leakage of the privacy information of the user can be prevented, and the security of the privacy information of the user is ensured.
Drawings
Fig. 1 is a schematic structural diagram of an android operating system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a permission configuration method according to an embodiment of the present invention;
fig. 3 is a second schematic diagram illustrating a right configuration method according to an embodiment of the invention;
fig. 4 is a schematic diagram of an interface applied by a permission configuration method according to an embodiment of the present invention;
fig. 5 is a third schematic diagram illustrating a permission configuration method according to an embodiment of the present invention;
FIG. 6 is a fourth schematic diagram illustrating a privilege configuration method according to an embodiment of the present invention;
fig. 7 is a fifth schematic diagram illustrating a permission configuration method according to an embodiment of the present invention;
fig. 8 is a sixth schematic view illustrating a permission configuration method according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 10 is a second schematic structural diagram of a terminal device according to the second embodiment of the present invention;
fig. 11 is a third schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 12 is a fourth schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 13 is a schematic hardware diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
The term "and/or" herein is an association relationship describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The symbol "/" herein denotes a relationship in which the associated object is or, for example, a/B denotes a or B.
The terms "first" and "second," etc. herein are used to distinguish between different objects, and are not used to describe a particular order of objects. For example, the first object and the second object, etc. are for distinguishing different objects, not for describing a specific order of the objects.
In the present embodiments, words such as "exemplary" or "for example" are used to indicate examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the description of the embodiments of the present invention, unless otherwise specified, "a plurality" means two or more, for example, a plurality of elements means two or more elements, and the like.
The embodiment of the invention provides a permission configuration method and terminal equipment, which can search a first application program corresponding to a first object (the first object is an object in a second application program) in N application programs in the terminal equipment, and configure a first permission for accessing the first object to the first application program under the condition of searching the first application program. Through the scheme, when the authority for accessing the second application program is configured for the first application program, only the access authority (namely the first authority) of the first object corresponding to the first application program in the second application program can be configured for the first application program, namely, the first application program can only access the object related to the first application program in the second application program and cannot access other objects in the second application program, so that the privacy information of the user can be prevented from being leaked, and the security of the privacy information of the user is ensured.
The terminal device in the embodiment of the present invention may be a terminal device having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which is not limited in the embodiments of the present invention.
The following describes a software environment to which the permission configuration method provided by the embodiment of the present invention is applied, by taking an android operating system as an example.
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of observing the development principle of the framework of the application.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the permission configuration method provided in the embodiment of the present invention based on the system architecture of the android operating system shown in fig. 1, so that the permission configuration method may operate based on the android operating system shown in fig. 1. That is, the processor or the terminal device may implement the permission configuration method provided by the embodiment of the present invention by running the software program in the android operating system.
The terminal device in the embodiment of the invention can be a terminal device and can also be a non-terminal device. By way of example, the terminal device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted terminal, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-terminal device may be a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiment of the present invention is not particularly limited.
The main body of the authority configuration method provided in the embodiment of the present invention may be the terminal device, or may also be a functional module and/or a functional entity that can implement the authority configuration method in the terminal device, and may be specifically determined according to actual use requirements, which is not limited in the embodiment of the present invention. The following takes a terminal device as an example to exemplarily explain the authority configuration method provided by the embodiment of the present invention.
In the embodiment of the invention, the terminal equipment can configure the authority for accessing other application programs for each application program in the terminal equipment. For example, it is assumed that the terminal device can configure the shopping application with the right to access the sms application.
In one scenario, for each object (for example, each short message in a short message application) in one application program, when a terminal device is started (which may be for each startup), the terminal device may configure, for other application programs in the terminal device, an access right of an object related to the other application programs in the one application program by executing the right configuration method provided in the embodiment of the present invention, that is, the other application programs can only access the object related to the other application programs in the one application program.
In another scenario, for each object in one application (for example, each short message in a short message application), the terminal device may configure, for other applications in the terminal device, the access right of the object related to the other applications in the one application by periodically executing the right configuration method provided in the embodiment of the present invention, that is, the other applications can only access the object related to the one application. The period in which the terminal device periodically executes the method for configuring permissions provided in the embodiment of the present invention may be determined according to actual usage requirements, and the embodiment of the present invention is not limited.
In another scenario, when the terminal device receives or generates an object, the terminal device may configure the access right of the object only to the application program related to the terminal device by executing the right configuration method provided in the embodiment of the present invention, that is, only the application program can access the object.
Thus, in the three scenarios, when configuring the right to access another application for one application, only the access right of the object related to the one application in the another application may be configured for the one application, so that it is possible to avoid that the one application may access all objects in the another application, thereby preventing the private information of the user from being leaked, and further ensuring the security of the private information of the user.
The following specifically describes, with reference to various drawings, an authority configuration method provided in an embodiment of the present invention.
As shown in fig. 2, an embodiment of the present invention provides a method for configuring a right, which may include the following steps S201 to S202.
S201, the terminal device searches a first application program corresponding to the first object in N application programs in the terminal device.
The first object may be an object in a second application.
It is understood that, in the embodiment of the present invention, the foregoing S201 may be executed under the foregoing three scenarios. In the three scenarios, the terminal device may configure only the access right of the object related to the other application program in the one application program to the other application program by executing the right configuration method provided in the embodiment of the present invention, so that it is avoided that the other application program can access all objects in the one application program, thereby preventing the privacy information of the user from being leaked, and further ensuring the security of the privacy information of the user.
Optionally, in the embodiment of the present invention, the N applications in the terminal device may be N applications installed in the terminal device. In particular, the N applications may be non-system applications (including third party applications and vendor embedded applications). Illustratively, the N applications may include a banking application, a shopping application, a taxi-taking application, a video application, and the like.
Optionally, in this embodiment of the present invention, the first application may be an application of N applications. Illustratively, the first application may be a banking application or a shopping application, or the like.
Optionally, in this embodiment of the present invention, the second application may be a system application or a non-system application. For example, when the second application is a system application, the second application may be a short message application or a gallery application. When the second application is a non-system application, the second application may be a communication application or a photographing application.
Optionally, in this embodiment of the present invention, for the second application, the first object (i.e., an object in the second application) may be any possible object such as a short message, contact information, a picture, a video, or a folder. For example, when the second application program is a short message application program, the first object may be a short message; the first application program may be an application program related to the short message, such as a bank application program. When the second application program is a gallery application program, the first object can be a picture; the first application may be an application related to a picture, such as a shopping application.
S202, under the condition that the first application program is found, the terminal equipment configures the first permission to the first application program.
The first right may be a right to access the first object (which may also be referred to as an access right of the first object). I.e. after the first right is configured to the first application, the first application may access the first object.
It is to be understood that the first right may also be other rights for the first object, such as copy rights, modification rights. The method and the device can be determined according to actual use requirements, and the embodiment of the invention is not limited.
For example, assuming that the second application program is a short message application program, the first object is a short message in the short message application program, and the first application program is a bank application program related to the short message, after the terminal device finds the bank application program corresponding to the short message in the N application programs, the terminal device may configure the access right of the short message to the bank application program, so that the bank application program may access the content of the short message.
According to the permission configuration method provided by the embodiment of the invention, when the permission for accessing the second application program is configured for the first application program, only the access permission of the first object corresponding to the first application program in the second application program can be configured for the first application program, that is, the first application program can only access the object related to the first application program in the second application program, but cannot access other objects in the second application program, so that the privacy information of the user can be prevented from being leaked, and the security of the privacy information of the user can be ensured.
Optionally, in this embodiment of the present invention, after the terminal device configures the first right (i.e., the right to access the first object) to the first application program, the terminal device may further display an identifier indicating the first application program on an interface displaying the first object in the second application program. The identification may be used to indicate that the application corresponding to or related to the first object is the first application. Specifically, the terminal device may display the identifier in a display area where the first object is located, so that identifiers of application programs corresponding to different objects may be displayed respectively for the different objects.
For example, with reference to fig. 2, as shown in fig. 3, after S202, the method for configuring rights according to the embodiment of the present invention may further include S203.
S203, the terminal device displays the first identification in the first area.
The first identifier may be used to indicate a first application program, and the first area may be a display area of a first object.
In the embodiment of the present invention, after the terminal device configures the first right (i.e., the right to access the first object) to the first application program, the terminal device may display a first identifier indicating the first application program in a display area of the first object, so that a user may know that the application program related to the first object is the first application program according to the first identifier.
The following describes an exemplary privilege configuration method provided in the embodiment of the present invention with reference to fig. 4.
For example, assuming that the second application is a short message application, the first object is a short message in the short message application, and the first application is an application related to the short message, the first application may be a bank application, a shopping application, a taxi-taking application, etc. in a case that the first objects are different short messages in the short message application. Specifically, as shown in fig. 4 (a), the interface is an interface of a short message application program displayed by the terminal device in a normal case, the interface includes 5 short messages, and information of the short messages (including keywords of the short messages, information of a sender, and the like) is displayed in a display area of each short message. After the terminal device executes the authority configuration method provided by the embodiment of the invention for the 5 short messages, the terminal device can respectively configure the access authority of each short message in the 5 short messages to the application program corresponding to the short message. In this case, as shown in (b) of fig. 4, the terminal device may display an identifier indicating an application corresponding to or related to each short message in the display area of the short message. For example, as shown in fig. 4 (b), after the terminal device configures the access right of the short message 1 to the XX bank application program, an "XX bank" may be displayed in a display area of the short message 1 to indicate the XX bank application program. After the terminal device configures the access right of the short message 2 to the YY shopping application program, the terminal device may display "YY shopping" in the display area of the short message 2 for indicating the YY shopping application program. After the terminal device configures the access right of the short message 3 to the ZZ taxi taking application program, the terminal device can display 'ZZ taxi taking' in a display area of the short message 3 so as to indicate the ZZ taxi taking application program.
Note that, the short messages 4 and 5 shown in fig. 4 (b) are short messages not configured with access rights. Specifically, the description of the short message without configured access right will be described in detail in the following embodiments, and will not be described herein again.
In the embodiment of the present invention, after the terminal device configures the access rights of the objects in the second application program to the application programs corresponding to the objects, the terminal device displays the identifiers indicating the application programs corresponding to the objects in the display areas of the objects, that is, the identifiers can clearly and clearly indicate which application programs the application programs corresponding to the objects are specific to, so that a user can conveniently know the application programs corresponding to the objects according to the identifiers.
Optionally, in this embodiment of the present invention, the first identifier may be an identifier in a control form or an operation option form, that is, the first identifier may be an operation entry of a user. Specifically, the first identifier may be used to quickly trigger an entry for setting an authority state of the first authority for the user. Wherein, the authority state of the first authority can be allowed or forbidden.
In the embodiment of the present invention, when the state of the first right is allowed, it may be understood that: the first application is allowed to access the first object. When the state of the first right is disabled, it can be understood that: the first application is not allowed (or prohibited) from accessing the first object.
For example, with reference to fig. 4, as shown in fig. 5, after S203, the method for configuring rights provided by the embodiment of the present invention may further include S204-S205 described below.
S204, the terminal equipment receives first input of the first identification by the user.
Optionally, in the embodiment of the present invention, the first input may be any possible form of input, such as a click input, a long-press input, or a drag input, and is specifically determined according to an actual use requirement, and the embodiment of the present invention is not limited.
And S205, the terminal equipment responds to the first input and displays the first control.
The first control can be used for setting the authority state of the first authority. Specifically, the user may trigger the terminal device to set the permission state of the first permission as permitted or prohibited by inputting the first control. For example, when the authority state of the first authority is allowed, the user may trigger the terminal device to modify the authority state of the first authority from allowed to prohibited by inputting the first control. Under the condition that the authority state of the first authority is forbidden, a user can trigger the terminal equipment to modify the authority state of the first authority from forbidden to allowed through inputting the first control component.
In the embodiment of the invention, the user can conveniently and quickly trigger the terminal equipment to modify the authority state of the first authority through inputting the first control.
Optionally, in the embodiment of the present invention, the permission configuration method provided in the embodiment of the present invention may also be applied to a scenario in which the terminal device downloads and installs an application program. Specifically, after the terminal device downloads and installs an application, the terminal device may configure the application with the right to access other applications. The terminal device may only configure the access right of the object related to the application program in other application programs to the application program.
For example, with reference to fig. 2, as shown in fig. 6, the method for configuring permissions according to the embodiment of the present invention may further include S206-S207 described below.
S206, after downloading and installing the third application program, the terminal device searches the second application program for a second object corresponding to the third application program.
The third application program may be a third party application program. Illustratively, the third application may be a banking application, a video application, or the like.
And S207, under the condition that the second object is found, the terminal equipment configures the second permission to a third application program.
The second right is a right to access the second object (which may also be referred to as an access right of the second object). I.e. after the second right is allocated to the third application, the third application can access the second object.
It is to be understood that the second right may also be other rights for the second object, such as copy right, modification right. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
For other descriptions of the second right, reference may be specifically made to the above-mentioned example and description of the first right in S202, and details are not described here again.
It can be understood that, in the embodiment of the present invention, after the terminal device downloads and installs the application program (hereinafter, referred to as application program a), the terminal device configures the authority of the application program a for accessing other application programs, and at this time, the authority configuration method shown in fig. 6 is executed to configure the access authority of the object related to the application program a in other application programs to the application program a, so that the application program a can access the objects related to the application program a in other application programs.
Optionally, in the embodiment of the present invention, the permission configuration method provided in the embodiment of the present invention may also be applied to a scenario in which the terminal device runs an application. Specifically, in the process that the terminal device runs one application program (hereinafter, referred to as application program B), when a user needs to use a function in the application program B (the function is a function provided by another application program (hereinafter, referred to as application program C), for example, a function of a shopping application program for selecting pictures from a gallery application program), after the user triggers the function, the terminal device may configure the access authority of the object related to the application program B in the application program C to the application program B by executing the method shown in fig. 6, so that the application program B can access the objects related to the application program C.
In the embodiment of the invention, after the terminal equipment downloads and installs one application program, the terminal equipment only configures the access authority of the object related to the application program in other application programs to the application program, so that the application program can be prevented from accessing all objects in other application programs, the privacy information of a user can be prevented from being leaked, and the security of the privacy information of the user can be ensured.
It should be noted that the embodiment of the present invention does not limit the execution sequence of S201-S202 and S206-S207. That is, in the embodiment of the present invention, S201 to S202 may be executed first, and then S206 to S207 may be executed; it is also possible to perform S206-S207 first and then S201-S202. Fig. 6 illustrates the steps of first executing S201-S202 and then executing S206-S207, which may be determined according to actual usage requirements, and the embodiment of the present invention is not limited thereto.
Optionally, in this embodiment of the present invention, the foregoing S206 to S207 may also be executed separately, that is, S206 to S207 may not be executed in combination with the method shown in fig. 2. Specifically, reference may be made to the description related to the method shown in fig. 6 in the foregoing embodiment, and details are not described here again.
Optionally, in this embodiment of the present invention, when the terminal device configures an authority for accessing another application program for the downloaded and installed application program, if the terminal device does not find an object corresponding to the application program in the other application program, the terminal device may configure the access authority of the object, to which the authority is not configured, in the other application program to the application program, or the terminal device may configure the access authority after encrypting all objects in the other application program to the application program.
For example, with reference to fig. 6, as shown in fig. 7, after S206, the method for configuring permissions according to the embodiment of the present invention may further include S208.
And S208, under the condition that the second object is not found, configuring a third authority to a third application program.
The third right may be a right to access a third object (which may also be referred to as an access right of the third object). The third object may be an object (for example, as short messages 4 and 5 in fig. 4 (b)) of the second application program, to which no authority is configured, or an object after encryption processing is performed in the second application program.
It should be noted that, the object without configured with a right in the second application refers to: the access right of the object is not configured to any application program in the terminal device, that is, no application program corresponding to or related to the object exists in the terminal device.
For example, assuming that the second application program is a short message application program and the third application program is a bank application program, after the terminal device downloads and installs the bank application program, the terminal device may search for a short message corresponding to the bank application program in the short message application program. Under the condition that the terminal device does not find the short message corresponding to the bank application program in the short message application program, the terminal device can configure the access authority of the short message which is not configured with the access authority in the short message application program to the bank application program, namely, the bank application program can access the short message which is not configured with the access authority in the short message application program. Or, under the condition that the terminal device does not find the short message corresponding to the bank application program in the short message application program, the terminal device may configure the access authority of the encrypted short message in the short message application program to the bank application program, that is, the bank application program may access the encrypted short message in the short message application program. The encrypted short message can be obtained by encrypting all short messages in the second application program.
In the embodiment of the present invention, because in a normal case, an object without configured rights may be a less important object, and an object after encryption processing may already hide key information in the object, configuring an access right of the object without configured rights or the object after encryption processing to an application program can be implemented on the basis of configuring a right for accessing the object for the application program, and ensuring that privacy information of a user is not leaked.
Optionally, in this embodiment of the present invention, when the terminal device searches for the first application program corresponding to the first object, the terminal device may search according to information of the first object. Specifically, the terminal device may first obtain information of the first object, and then search for the first application program corresponding to the first object according to the information of the first object.
Exemplarily, with reference to fig. 2, as shown in fig. 8, before the above S201, the authority configuration method provided in the embodiment of the present invention may further include the following S200. Specifically, S201 may be implemented by S201a described below.
S200, the terminal equipment acquires the information of the first object.
Optionally, in this embodiment of the present invention, the information of the first object may be information of a sender of the first object, may also be content of the first object, may also be a keyword of the first object, and may also be history information configuring a right to access the first object.
It may be understood that, in the embodiment of the present invention, the information of the first object may be used to indicate a feature of the first object and/or a category of the first object.
Optionally, in this embodiment of the present invention, the information of the sender of the first object may be a name of the sender, or may also be any other information that may be used for uniquely determining the first application, such as a number (e.g., a telephone number) of the sender, and may specifically be determined according to an actual use requirement, which is not limited in this embodiment of the present invention.
Optionally, in this embodiment of the present invention, the content of the first object may be a text in the first object, a link in the first object, an identifier in the first object, or any other content that may be used to uniquely determine the first application program, and specifically may be determined according to an actual use requirement, which is not limited in this embodiment of the present invention.
Optionally, in this embodiment of the present invention, the keyword of the first object may be a title of the first object, or may also be any other information that may be used to uniquely determine the first application program, such as information that conforms to a preset feature in the first object, and specifically may be determined according to an actual use requirement, which is not limited in this embodiment of the present invention.
Optionally, in this embodiment of the present invention, the history information configuring the right to access the first object may be history information configuring the access right of the first object to the application program. The history information may be history configuration information in which the terminal device configures the access right of the first object or an object similar to the first object to the application, or may be history configuration information in which the server configures the access right of the first object or an object similar to the first object to the application for most of the terminal devices collected by the server.
Next, the above S200 will be further exemplarily described by taking the information of the first object as a keyword of the first object as an example.
For example, assuming that the first object is a short message, the short message is AA and the verification code is 674582, and the preset feature is that characters before the special character are used as keywords, the terminal device may use the character "AA" before the character of the verification code in the short message "AA and the verification code is 674582" as the keyword of the first object.
Further illustratively, still taking the information of the first object as the keyword of the first object as an example, assuming that the first object is a short message, the short message is: "[ BB ] that the purchased goods are being delivered", and the preset feature is that the character located in the special symbol is taken as the keyword, then the terminal device may take the character "BB" located in the middle bracket in the short message "[ BB ] that the purchased goods are being delivered" as the keyword of the first object.
S201a, the terminal device searches for a first application corresponding to the first object from the N applications in the terminal device according to the information of the first object.
It can be understood that after the terminal device obtains the information of the first object, the terminal device may search the first application program corresponding to the first object according to the information of the first object, and after the first application program corresponding to the first object is found, the terminal device may configure the access right of the first object to the first application program, so that the first application program may access the first object.
In the embodiment of the invention, the information of the first object can accurately represent the characteristics indicating the first object and/or the category of the first object, so that the terminal device can accurately determine the first application program corresponding to the first object according to the information of the first object.
It should be noted that, in the embodiment of the present invention, all the authority configuration methods shown in the above method drawings are exemplarily described by combining one drawing in the embodiment of the present invention. In specific implementation, the authority configuration method shown in each method drawing can also be implemented by combining any other drawing which can be combined and is illustrated in the above embodiments, and details are not described here.
As shown in fig. 9, an embodiment of the present invention provides a terminal device 400, where the terminal device 400 may include a searching module 401 and a configuring module 402. The searching module 401 may be configured to search, in N applications in the terminal device, a first application corresponding to a first object, where the first object is an object in a second application; the configuring module 402 may be configured to configure a first permission to the first application program when the searching module 401 finds the first application program, where the first permission is a permission to access the first object.
Optionally, with reference to fig. 9, as shown in fig. 10, the terminal device provided in the embodiment of the present invention may further include a display module 403. The display module 403 may be configured to display the first identifier in the first area after the configuration module 402 configures the first right to the first application. The first mark is used for indicating a first application program, and the first area is a display area of the first object.
Optionally, with reference to fig. 10, as shown in fig. 11, in this embodiment of the present invention, the terminal device may further include a receiving module 404 and an executing module 405. The receiving module 404 may be configured to receive a first input of the first identifier from the user after the displaying module 403 displays the first identifier; the executing module 405 may be configured to, in response to the first input received by the receiving module 404, display a first manipulation control, where the first manipulation control is used to set an authority state of the first authority, and the authority state is allowed or prohibited.
Optionally, in this embodiment of the present invention, the searching module 401 is further configured to search, after downloading and installing the third application program, a second object corresponding to the third application program in the second application program; the configuration module 402 is further configured to configure the second right to the third application program when the search module 401 finds the second object, where the second right is a right to access the second object.
Optionally, in this embodiment of the present invention, the configuration module 402 is further configured to configure a third right to a third application program when the search module 401 does not find the second object, where the third right is a right to access the third object, and the third object is an object of the second application program that is not configured with a right, or an object of the second application program that is encrypted.
Optionally, with reference to fig. 9, as shown in fig. 12, the terminal device provided in the embodiment of the present invention may further include an obtaining module 406. An obtaining module 406, configured to obtain information of a first object before the searching module 401 searches a first application corresponding to the first object in N applications in the terminal device; a searching module 401, configured to specifically search, according to the information of the first object obtained by the obtaining module 406, a first application program in the N application programs; wherein the information of the first object includes at least one of: information of a sender of the first object, content of the first object, keywords of the first object, history information configuring rights to access the first object.
The terminal device provided in the embodiment of the present invention can implement each process implemented by the terminal device in the above method embodiments, and in order to avoid repetition, details are not described here again.
The embodiment of the invention provides a terminal device, which can search a first application program corresponding to a first object (the first object is an object in a second application program) in N application programs in the terminal device, and configure a first right for accessing the first object to the first application program under the condition that the first application program is searched. By the scheme, when the terminal device configures the authority for the first application program to access the second application program, only the access authority (namely the first authority) of the first object corresponding to the first application program in the second application program can be configured to the first application program, namely, the first application program can only access the object related to the first application program in the second application program and cannot access other objects in the second application program, so that the leakage of the privacy information of the user can be prevented, and the security of the privacy information of the user is ensured.
Fig. 13 is a schematic diagram of a hardware structure of a terminal device for implementing various embodiments of the present invention. As shown in fig. 13, the terminal device 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the terminal device configuration shown in fig. 13 does not constitute a limitation of the terminal device, and that the terminal device may include more or fewer components than shown, or combine certain components, or a different arrangement of components. In the embodiment of the present invention, the terminal device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 110 is configured to search a first application corresponding to a first object in N applications in the terminal device, and configure a first right to the first application under the condition that the first application is found, where the first object is an object in a second application, and the first right is a right to access the first object.
The embodiment of the invention provides a terminal device, which can search a first application program corresponding to a first object (the first object is an object in a second application program) in N application programs in the terminal device, and configure a first right for accessing the first object to the first application program under the condition that the first application program is searched. By the scheme, when the terminal device configures the authority for the first application program to access the second application program, only the access authority (namely the first authority) of the first object corresponding to the first application program in the second application program can be configured to the first application program, namely, the first application program can only access the object related to the first application program in the second application program and cannot access other objects in the second application program, so that the leakage of the privacy information of the user can be prevented, and the security of the privacy information of the user is ensured.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 110; in addition, uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The terminal device provides wireless broadband internet access to the user through the network module 102, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal device 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the graphics processor 1041 processes image data of a still picture or a video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of the phone call mode.
The terminal device 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or the backlight when the terminal device 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal device posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal device. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, receives a command from the processor 110, and executes the command. In addition, the touch panel 1071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, the other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel is transmitted to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 13, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the terminal device, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the terminal device, which is not limited herein.
The interface unit 108 is an interface for connecting an external device to the terminal apparatus 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal apparatus 100 or may be used to transmit data between the terminal apparatus 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, etc. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the terminal device, connects various parts of the entire terminal device by using various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the terminal device. Processor 110 may include one or more processing units; alternatively, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The terminal device 100 may further include a power supply 111 (such as a battery) for supplying power to each component, and optionally, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the terminal device 100 includes some functional modules that are not shown, and are not described in detail here.
Optionally, an embodiment of the present invention further provides a terminal device, where the terminal device may include the processor 110 shown in fig. 13, the memory 109, and a computer program stored in the memory 109 and capable of running on the processor 110, and when the computer program is executed by the processor 110, the computer program may implement each process of the foregoing method embodiment, and may achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program can implement the processes of the foregoing method embodiments, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may include a read-only memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A permission configuration method is applied to a terminal device, and comprises the following steps:
searching a first application program corresponding to a first object in N application programs in the terminal equipment, wherein the first object is an object in a second application program;
under the condition that the first application program is found, configuring a first authority to the first application program, wherein the first authority is the authority for accessing the first object;
wherein N is a positive integer;
after the configuring the first right to the first application, the method further comprises:
displaying a first identifier in a first area, wherein the first identifier is used for indicating the first application program, and the first area is a display area of the first object;
after the first identifier is displayed in the first area, the method further comprises the following steps:
receiving a first input of the first identification by a user;
responding to the first input, and displaying a first control, wherein the first control is used for setting the authority state of the first authority, and the authority state is allowed or forbidden.
2. The method of claim 1, further comprising:
after downloading and installing a third application program, searching a second object corresponding to the third application program in the second application program;
and under the condition that the second object is found, configuring a second authority to the third application program, wherein the second authority is the authority for accessing the second object.
3. The method of claim 2, further comprising:
under the condition that the second object is not found, configuring a third authority to the third application program, wherein the third authority is an authority for accessing a third object;
the third object is an object which is not configured with a right in the second application program, or an object which is encrypted in the second application program.
4. The method according to any one of claims 1 to 3, wherein before searching for the first application corresponding to the first object among the N applications in the terminal device, the method further comprises:
acquiring information of the first object;
the searching for the first application program corresponding to the first object in the N application programs in the terminal device includes:
searching the first application program in the N application programs according to the information of the first object;
wherein the information of the first object comprises at least one of: information of a sender of the first object, content of the first object, keywords of the first object, history information configuring a right to access the first object.
5. A terminal device, comprising: the device comprises a searching module, a display module and a configuration module;
the searching module is used for searching a first application program corresponding to a first object in N application programs in the terminal equipment, wherein the first object is an object in a second application program;
the configuration module is configured to configure a first right to the first application program under the condition that the search module finds the first application program, where the first right is a right to access the first object;
wherein N is a positive integer;
the display module is configured to display a first identifier in a first area after the configuration module configures the first permission to the first application program, where the first identifier is used to indicate the first application program, and the first area is a display area of the first object; the terminal equipment also comprises a receiving module and an executing module;
the receiving module is used for receiving a first input of the first identifier by a user after the display module displays the first identifier in the first area;
the execution module is configured to display a first control in response to the first input received by the receiving module, where the first control is used to set an authority state of the first authority, and the authority state is allowed or prohibited.
6. The terminal device of claim 5,
the searching module is further configured to search a second object corresponding to a third application program in the second application program after the third application program is downloaded and installed in the terminal device;
the configuration module is further configured to configure a second right to the third application program when the search module finds the second object, where the second right is a right to access the second object.
7. The terminal device of claim 6,
the configuration module is further configured to configure a third permission to the third application program when the search module does not find the second object, where the third permission is a permission to access a third object;
the third object is an object which is not configured with a right in the second application program, or an object which is encrypted in the second application program.
8. The terminal device according to any one of claims 5 to 7, wherein the terminal device further comprises an acquisition module;
the obtaining module is configured to obtain information of the first object before the searching module searches for a first application corresponding to the first object in N applications in the terminal device;
the search module is specifically configured to search the first application program among the N application programs according to the information of the first object acquired by the acquisition module;
wherein the information of the first object comprises at least one of: information of a sender of the first object, content of the first object, a keyword of the first object, and history information configuring a right to access the first object.
9. A terminal device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor implementing the steps of the rights configuration method as claimed in any one of claims 1 to 4.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the rights configuration method according to any one of claims 1 to 4.
CN201910563554.5A 2019-06-26 2019-06-26 Permission configuration method and terminal equipment Active CN110457935B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910563554.5A CN110457935B (en) 2019-06-26 2019-06-26 Permission configuration method and terminal equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910563554.5A CN110457935B (en) 2019-06-26 2019-06-26 Permission configuration method and terminal equipment
PCT/CN2020/081248 WO2020258952A1 (en) 2019-06-26 2020-03-25 Permission configuration method and terminal device

Publications (2)

Publication Number Publication Date
CN110457935A CN110457935A (en) 2019-11-15
CN110457935B true CN110457935B (en) 2022-07-22

Family

ID=68481139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910563554.5A Active CN110457935B (en) 2019-06-26 2019-06-26 Permission configuration method and terminal equipment

Country Status (2)

Country Link
CN (1) CN110457935B (en)
WO (1) WO2020258952A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457935B (en) * 2019-06-26 2022-07-22 维沃移动通信有限公司 Permission configuration method and terminal equipment
CN111159735A (en) * 2019-12-24 2020-05-15 珠海荣邦智能科技有限公司 Data access method and device for application program
CN111859418A (en) * 2020-06-24 2020-10-30 华为技术有限公司 Atomic capability calling method and terminal equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105307137A (en) * 2015-09-18 2016-02-03 小米科技有限责任公司 Short message reading method and device
CN105657678A (en) * 2015-07-22 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Short message reading method, short message reading device, short message storage method and short message storage device
WO2016154783A1 (en) * 2015-03-27 2016-10-06 华为技术有限公司 Control method and terminal for short message reading
CN108446572A (en) * 2018-03-26 2018-08-24 南京邮电大学 A kind of privacy authority management method based on service granularity
CN109426735A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 A kind of method and system for protecting individual privacy

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098574A1 (en) * 2014-10-07 2016-04-07 Cynny Spa Systems and methods to manage file access
CN104376273A (en) * 2014-11-18 2015-02-25 乐视致新电子科技(天津)有限公司 Data access control method and device
US10382475B2 (en) * 2016-07-01 2019-08-13 Genesys Telecommunications Laboratories, Inc. System and method for preventing attacks in communications
CN108415786B (en) * 2018-03-13 2022-05-31 联想(北京)有限公司 Information processing method and device, electronic equipment and computer readable medium
CN108681427B (en) * 2018-05-28 2020-06-30 维沃移动通信有限公司 Access right control method and terminal equipment
CN109446834A (en) * 2018-09-26 2019-03-08 维沃移动通信有限公司 A kind of right management method and mobile terminal of application program
CN109766680B (en) * 2018-12-27 2021-01-08 维沃移动通信有限公司 Authority control method and terminal
CN110457935B (en) * 2019-06-26 2022-07-22 维沃移动通信有限公司 Permission configuration method and terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016154783A1 (en) * 2015-03-27 2016-10-06 华为技术有限公司 Control method and terminal for short message reading
CN105657678A (en) * 2015-07-22 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Short message reading method, short message reading device, short message storage method and short message storage device
CN105307137A (en) * 2015-09-18 2016-02-03 小米科技有限责任公司 Short message reading method and device
CN109426735A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 A kind of method and system for protecting individual privacy
CN108446572A (en) * 2018-03-26 2018-08-24 南京邮电大学 A kind of privacy authority management method based on service granularity

Also Published As

Publication number Publication date
WO2020258952A1 (en) 2020-12-30
CN110457935A (en) 2019-11-15

Similar Documents

Publication Publication Date Title
CN110457935B (en) Permission configuration method and terminal equipment
CN109542282B (en) Interface display method and terminal equipment
CN110062105B (en) Interface display method and terminal equipment
CN108595946B (en) Privacy protection method and terminal
CN110221737B (en) Icon display method and terminal equipment
CN111026299A (en) Information sharing method and electronic equipment
CN109828705B (en) Icon display method and terminal equipment
CN111027030A (en) Permission setting method and terminal device
CN108540645B (en) Mobile terminal operation method and mobile terminal
CN110851031A (en) Display control method and electronic equipment
CN110443030B (en) Permission processing method and terminal device
CN109815678B (en) Permission configuration method and mobile terminal
CN109343900B (en) Permission configuration method and terminal
CN110167006B (en) Method for controlling application program to use SIM card and terminal equipment
CN109522741B (en) Application program permission prompting method and terminal equipment thereof
CN109358931B (en) Interface display method and terminal
CN110908557B (en) Information display method and terminal equipment
CN111381753B (en) Multimedia file playing method and electronic equipment
WO2020192415A1 (en) Permission configuration method and terminal device
CN110990032B (en) Application program installation method and electronic equipment
CN111010455B (en) Hotspot name modification method and electronic equipment
CN110012152B (en) Interface display method and terminal equipment
CN109783710B (en) Document display method and terminal equipment
CN109190388B (en) Encryption method, decryption method and terminal equipment
CN109521920B (en) Application icon control method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant