CN110619221A - Virtual authorization method, device, terminal equipment and storage medium - Google Patents
Virtual authorization method, device, terminal equipment and storage medium Download PDFInfo
- Publication number
- CN110619221A CN110619221A CN201910736017.6A CN201910736017A CN110619221A CN 110619221 A CN110619221 A CN 110619221A CN 201910736017 A CN201910736017 A CN 201910736017A CN 110619221 A CN110619221 A CN 110619221A
- Authority
- CN
- China
- Prior art keywords
- authorization
- data
- virtual
- terminal equipment
- response
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000013475 authorization Methods 0.000 claims abstract description 180
- 230000004044 response Effects 0.000 claims abstract description 82
- 230000006870 function Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 241000331006 Euchaeta media Species 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a virtual authorization method, a device, a terminal device and a storage medium, wherein the virtual authorization method is applied to the terminal device and comprises the following steps: acquiring an authorization request of an application program installed in the terminal equipment; obtaining an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment; if the authorization response is a refusal authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data; and sending the virtual authorization data to the application program. According to the method and the device, when the terminal equipment receives the authorization request of the application program, the virtual data corresponding to the authorization request is generated according to the authorization response of the user and is sent to the corresponding application program, so that the leakage of the real data of the user is avoided.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a virtual authorization method, an apparatus, a terminal device, and a storage medium.
Background
With the continuous progress of science and technology, the platform development of the application program is rapid, the platform development becomes the most popular operating system of the mobile terminal, and the open terminal system provides more functional interfaces for application developers, and the functional interfaces improve the expandability of the system.
In the prior art, when a user uses some functions of some application programs, authorization needs to be performed on the application programs, so that the application programs can access some private data of the user, including information such as pictures, geographic locations, and address lists.
Therefore, when an application requires authorization, it is a popular research topic to give the corresponding authorization to the application so that a user can normally experience the application, and at the same time, the private data of the user can be protected.
Disclosure of Invention
The application mainly aims to provide a virtual authorization method, a virtual authorization device, a terminal device and a storage medium.
In order to achieve the above object, the present application provides a virtual authorization method, which is applied to a terminal device, and the virtual authorization method includes:
acquiring an authorization request of an application program installed in the terminal equipment;
obtaining an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refusal authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and sending the virtual authorization data to the application program.
Preferably, the generating virtual authorization data according to the authorization request and a preset relationship includes:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal device data as the virtual authorization data.
Preferably, the generating of the virtual terminal device data according to the original terminal device data and the preset relationship includes:
judging that the original terminal equipment data is first type data or second type data;
if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
Preferably, the method further comprises:
and if the authorization response is an authorization-allowed response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
Preferably, after the sending the virtual authorization data to the application, the method further comprises:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
if the authorization request of the application program is obtained again, the virtual authorization data is called according to the association identifier and sent to the corresponding application program.
The present application further provides a virtual authorization apparatus, which includes:
the request module is used for acquiring an authorization request of an application program installed in the terminal equipment;
the response module is used for acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by the terminal equipment controlled by the user;
the data generation module is used for generating virtual authorization data according to the authorization request and a preset relationship if the authorization response is a refusal authorization response, wherein the preset relationship is the corresponding relationship between the authorization request and the virtual authorization data;
and the data sending module is used for sending the virtual authorization data to the application program.
Preferably, the data generation module is further configured to:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal device data as the virtual authorization data.
Preferably, the original terminal device data includes a first type of data and a second type of data, and the data generating module is further configured to:
judging that the original terminal equipment data is first type data or second type data;
if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
Preferably, the virtual authorization apparatus further includes a real authorization module, configured to retrieve corresponding authorization data according to the authorization request and send the authorization data to the application program if the authorization response is an authorization-allowed response.
In some embodiments, the virtual authorization apparatus further includes a virtual storage module, configured to store the virtual authorization data; setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request; if the authorization request of the application program is obtained again, the virtual authorization data is called according to the association identifier and sent to the corresponding application program.
The present application further provides a terminal device, the terminal device includes:
a memory for storing a computer executable virtual authorization program; and
and the processor is used for calling the virtual authorization program stored in the memory to execute the virtual authorization method.
The application also provides a storage medium, the storage medium stores a virtual authorization program executable by a computer, and a processor can execute the virtual authorization method when calling the virtual authorization program
Compared with the prior art, the virtual authorization method provided by the application can enable a user to make a corresponding authorization response according to the authorization request by obtaining the authorization request of the application program, and if the authorization response is a refusal authorization response, the terminal device can generate corresponding virtual authorization data according to the authorization request and send the virtual authorization data to the application program, so that the application program can be normally used, original authorization data can be prevented from being leaked, and privacy data of the user are protected.
Drawings
Fig. 1 is a flowchart illustrating steps of a virtual authorization method according to an embodiment of the present application;
fig. 2 is a schematic view of an application scenario of the virtual authorization method provided in the present application; FIG. 3 is a flowchart illustrating sub-steps of step S12 of FIG. 1;
FIG. 4 is a flowchart illustrating sub-steps of step S122 in FIG. 3;
FIG. 5 is a flowchart illustrating steps of a virtual authorization method according to another embodiment of the present application;
fig. 6 is a block diagram of a virtual authorization apparatus according to an embodiment of the present application;
fig. 7 is a block diagram of a terminal device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the descriptions in this application referring to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
The application provides a virtual authorization method, a device, a terminal device and a storage medium, wherein the virtual authorization method is applied to the terminal device, and the method comprises the following steps: acquiring an authorization request of an application program installed in the terminal equipment; obtaining an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment; if the authorization response is a refusal authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data; and sending the virtual authorization data to the application program.
According to the virtual authorization method, the authorization request of the application program is obtained, the user can make a corresponding authorization response according to the authorization request, if the authorization response is a refusal authorization response, the terminal device can generate corresponding virtual authorization data according to the authorization request and send the virtual authorization data to the application program, so that the application program is normally used, original authorization data can be prevented from being leaked, and privacy data of the user are protected.
Referring to fig. 1, fig. 1 is a view illustrating a virtual authorization method provided by the present application, where the virtual authorization method is applied to a terminal device, and the terminal device may be a smart phone, a tablet computer, or a notebook computer, which is not limited herein.
The virtual authorization method comprises the following steps:
step S10: and acquiring an authorization request of the application program installed in the terminal equipment.
As shown in fig. 2, several applications 101 are installed in the terminal device 10, and when the applications 101 are installed or used by a user in a click mode, authorization requests are sent to the terminal device 10 so as to allow the applications 101 to call certain functions of the terminal device 10, such as obtaining a phone number and a MAC address of the terminal device 10 or allowing use of an image library or a camera function of the terminal device 10.
After receiving the authorization request of the application 101, the terminal device 10 generates a corresponding authorization request prompt to prompt the user that the application 101 is performing an authorization request of a corresponding function, where the authorization request prompt may be any one, two, or more of a text prompt, a voice prompt, or an image prompt, and is not limited herein, for example, the terminal device 10 displays on a display screen, and the a application is requesting to access a phonebook and whether? is allowed or not
Step S11: and obtaining an authorization response responding to the authorization request, wherein the authorization response is a response sent by the terminal equipment controlled by the user.
The user makes a corresponding authorization response according to the authorization request of the application 101, wherein the authorization response comprises a refusal authorization response and an allowance authorization response.
When the user does not agree with the authorization request for the application 10, the terminal device 10 may be manipulated to make a response of denying the authorization.
When the user agrees to the authorization request for the application 10, the terminal device 10 may be manipulated to make a permission authorization response.
Step S12: and if the authorization response is a refusal authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data.
If the response sent by the user operation terminal device 10 is a response of refusing the authorization, the terminal device 10 generates corresponding virtual authorization data according to the authorization request and the corresponding preset relationship.
Referring to fig. 3, in some embodiments, the generating virtual authorization data according to the authorization request and the preset relationship includes:
step S121: acquiring original terminal equipment data of the terminal equipment according to the authorization request;
step S122: generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
step S123: and taking the virtual terminal device data as the virtual authorization data.
Illustratively, the terminal device 10 obtains original terminal device data of the corresponding terminal device 10 according to the authorization request of the application program, and generates virtual terminal device data by using the original terminal device data, where the virtual terminal device data may be data preset in the terminal device 10 or data generated by changing the original terminal device data.
The raw data may be any one of image data, numerical data, alphabetic data, character data, or a combination of two or more thereof.
Referring to fig. 4, the generating of the virtual terminal device data according to the original terminal device data and the preset relationship includes:
step S1221: judging that the original terminal equipment data is first type data or second type data;
step S1222: if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
step S1223: and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
Illustratively, the original terminal device data includes a first type data and a second type data, and the first type data and the second type data are different, for example, the first type data is full numerical data, and the second type data is combined data of numerical data and letter data.
If the authorization request is a telephone number request used by the terminal device 10, the terminal device 10 obtains the real telephone number of the terminal device 10 according to the authorization request, the telephone number data is full-number data, and any number of the telephone number is randomly replaced by the telephone number according to a preset relationship until a virtual telephone number different from the original telephone number is obtained, such as 153529 xxxxx.
The method for randomly replacing any number of the telephone numbers by any number according to the preset relationship can be as follows: the terminal device 10 generates a random number in the length of the number group, adds the random number to the equal number of the random number, and performs the modulo operation on the value obtained finally by the operation of 10, and if the obtained value is the same as before, performs the operation again until a different value is obtained. For example, 133529xxxxx, the generated random is 2, the 2 nd bit in the numeric string is 3, 2+3 ═ 5, and the virtual number is 153529 xxxxx.
If the authorization request is the MAC information request of the terminal device 10, i.e. Media Access control address, the MAC address. The terminal device 10 acquires, according to the MAC information request, that the MAC information of the terminal device 10 is 745C9F061CCF, which is combination data of a numeric value and a letter. The MAC information is replaced with virtual MAC information according to a preset relationship, such as 749C5F061 CCF.
The replacing of the MAC information with the virtual MAC information according to the preset relationship may be that the terminal device 10 generates two random numbers, exchanges the random values at corresponding positions to obtain a new value, and executes the algorithm again until the values are different if the generated value is the same as the original value.
For example, if the MAC information is 745C9F061CCF, and the two generated random numbers 3 and 5 are used, the "5" of the third bit and the "9" of the fifth bit are exchanged to obtain 749C5F061 CCF.
Step S13: and sending the virtual authorization data to the application program.
The terminal device 10 transmits the generated virtual authorization data to the application 101.
In some embodiments, the method further comprises:
if the authorization response is an authorization-allowed response, the corresponding authorization data is called according to the authorization request;
and sending the authorization data to the application program.
If the user runs an authorization request of the application 101, the terminal device 10 calls corresponding authorization data to the application 101 according to the authorization request.
Referring to fig. 5, in some embodiments, after the sending the virtual authorization data to the application program, the method further includes:
step S14: storing the virtual authorization data;
step S15: setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
step S16: if the authorization request of the application program is obtained again, the virtual authorization data is called according to the association identifier and sent to the corresponding application program.
Illustratively, the terminal device 10 stores the acquired virtual authorization data in a preset format, sets a corresponding association identifier, and when the terminal device 10 acquires the authorization request of the corresponding application 101 again, calls the corresponding virtual data according to the association identifier and sends the virtual data to the application 101.
Referring to fig. 6, the present application further provides a virtual authorization apparatus 20, wherein the virtual authorization apparatus 20 includes:
a request module 201, configured to obtain an authorization request of an application installed in the terminal device;
a response module 202, configured to obtain an authorization response responding to the authorization request, where the authorization response is a response sent by a user operating the terminal device;
a data generating module 203, configured to generate virtual authorization data according to the authorization request and a preset relationship if the authorization response is a response of rejecting authorization, where the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data; and
a data sending module 204, configured to send the virtual authorization data to the application program.
In some embodiments, the data generation module 203 is further configured to:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal device data as the virtual authorization data.
Wherein the original terminal device data includes a first type of data and a second type of data, and the data generating module 203 is further configured to:
judging that the original terminal equipment data is first type data or second type data;
if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
In some embodiments, the virtual authorization apparatus 20 further includes a real authorization module, and the real authorization module is configured to, if the authorization response is an authorization-allowed response, invoke corresponding authorization data according to the authorization request, and send the authorization data to the application program.
In some embodiments, the virtual authorization apparatus 20 further includes a virtual storage module, which is configured to store the virtual authorization data; setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request; if the authorization request of the application program is obtained again, the virtual authorization data is called according to the association identifier and sent to the corresponding application program.
Referring to fig. 5, the present application further provides a terminal device 30, where the terminal device 30 includes a memory 301 and a processor 302, where the memory 301 and the processor 302 are electrically connected through a bus 303.
The memory 301 includes at least one type of readable storage medium, which includes flash memory, hard disk, multi-media card, card type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, and the like. The memory 301 may in some embodiments be an internal storage unit of the terminal device 30, for example a hard disk of the terminal device 30. The memory 301 may also be an external storage device of the terminal device 30 in other embodiments, such as a plug-in hard disk provided on the terminal device 30, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and so on. The memory 301 may be used to store not only application software installed in the vehicle-mounted device and various types of data, such as codes of a computer-readable program, but also temporarily store data that has been output or will be output, that is, the first memory may be used as a storage medium storing a virtual authorization program executable by a computer.
Processor 302, which in some embodiments may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip, may invoke a virtual authorization program stored in memory 301 to implement the following steps:
acquiring an authorization request of an application program installed in the terminal equipment;
obtaining an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refusal authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and sending the virtual authorization data to the application program.
In some embodiments, the processor 302 is further configured to implement the following steps:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal device data as the virtual authorization data.
In some embodiments, the original terminal device data includes a first type of data and a second type of data, and the processor 302 is further configured to implement the following steps:
judging that the original terminal equipment data is first type data or second type data;
if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
In some embodiments, the processor 302 is further configured to implement the following steps:
and if the authorization response is an authorization-allowed response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
In some embodiments, the processor 302 is further configured to implement the following steps:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
if the authorization request of the application program is obtained again, the virtual authorization data is called according to the association identifier and sent to the corresponding application program.
The present application further provides a storage medium, where a vehicle travel reservation program executable by a computer is stored, and when the processor calls the virtual authorization program, the following steps may be implemented:
acquiring an authorization request of an application program installed in the terminal equipment;
obtaining an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refusal authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and sending the virtual authorization data to the application program.
In some embodiments, the processor is further configured to implement the following steps:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal device data as the virtual authorization data.
In some embodiments, the original terminal device data includes a first type of data and a second type of data, and the processor is further configured to implement the following steps:
judging that the original terminal equipment data is first type data or second type data;
if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
In some embodiments, the processor is further configured to implement the following steps:
and if the authorization response is an authorization-allowed response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
In some embodiments, the processor is further configured to implement the following steps:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
if the authorization request of the application program is obtained again, the virtual authorization data is called according to the association identifier and sent to the corresponding application program.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.
Claims (10)
1. A virtual authorization method is applied to terminal equipment, and is characterized in that the virtual authorization method comprises the following steps:
acquiring an authorization request of an application program installed in the terminal equipment;
obtaining an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refusal authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and sending the virtual authorization data to the application program.
2. The virtual authorization method according to claim 1, wherein the generating virtual authorization data according to the authorization request and a preset relationship comprises:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal device data as the virtual authorization data.
3. The virtual authorization method according to claim 2, wherein the original terminal device data includes a first type of data and a second type of data, and the generating virtual terminal device data according to the original terminal device data and a preset relationship includes:
judging that the original terminal equipment data is first type data or second type data;
if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
4. The virtual authorization method of claim 1, wherein the method further comprises:
and if the authorization response is an authorization-allowed response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
5. The virtual authorization method according to claim 1, characterized in that after said sending of the virtual authorization data to the application program, the method further comprises:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
if the authorization request of the application program is obtained again, the virtual authorization data is called according to the association identifier and sent to the corresponding application program.
6. A virtual authorization apparatus, characterized in that the virtual authorization apparatus comprises:
the request module is used for acquiring an authorization request of an application program installed in the terminal equipment;
the response module is used for acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by the terminal equipment controlled by the user;
the data generation module is used for generating virtual authorization data according to the authorization request and a preset relationship if the authorization response is a refusal authorization response, wherein the preset relationship is the corresponding relationship between the authorization request and the virtual authorization data;
and the data sending module is used for sending the virtual authorization data to the application program.
7. The virtual authorization device of claim 6, wherein the data generation module is further to:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal device data as the virtual authorization data.
8. The virtual authorization apparatus according to claim 7, wherein the original terminal device data comprises a first type of data and a second type of data, the data generation module is further configured to:
judging that the original terminal equipment data is first type data or second type data;
if the original terminal equipment data is first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data is the second type data, generating virtual terminal equipment data according to a second preset relation.
9. A terminal device, characterized in that the terminal device comprises:
a memory for storing a computer executable virtual authorization program; and
a processor for invoking a virtual authorization program stored in the memory to perform the virtual authorization method of any of claims 1-5.
10. A storage medium storing a virtual authorization program executable by a computer, wherein a processor executes the virtual authorization method according to any one of claims 1 to 5 when the virtual authorization program is called.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910736017.6A CN110619221B (en) | 2019-08-09 | 2019-08-09 | Virtual authorization method, device, terminal equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910736017.6A CN110619221B (en) | 2019-08-09 | 2019-08-09 | Virtual authorization method, device, terminal equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110619221A true CN110619221A (en) | 2019-12-27 |
CN110619221B CN110619221B (en) | 2023-10-31 |
Family
ID=68921688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910736017.6A Active CN110619221B (en) | 2019-08-09 | 2019-08-09 | Virtual authorization method, device, terminal equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110619221B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112597483A (en) * | 2020-07-16 | 2021-04-02 | 同方股份有限公司 | Privacy protection method and device, intelligent terminal and storage medium |
CN112597482A (en) * | 2020-07-16 | 2021-04-02 | 同方股份有限公司 | Privacy protection method and device, intelligent terminal and storage medium |
CN112597484A (en) * | 2020-07-16 | 2021-04-02 | 同方股份有限公司 | Privacy protection method and device, intelligent terminal and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8195819B1 (en) * | 2009-07-13 | 2012-06-05 | Sprint Communications Company L.P. | Application single sign on leveraging virtual local area network identifier |
CN107180184A (en) * | 2017-06-14 | 2017-09-19 | 努比亚技术有限公司 | Application program right management method, device and computer-readable recording medium |
CN107341406A (en) * | 2017-07-05 | 2017-11-10 | 北京奇安信科技有限公司 | A kind of method and terminal for protecting privacy of user data |
CN107480554A (en) * | 2017-07-28 | 2017-12-15 | 中科创达软件科技(深圳)有限公司 | A kind of right management method, rights management device and intelligent terminal |
WO2018040639A1 (en) * | 2016-08-31 | 2018-03-08 | 长城汽车股份有限公司 | Authorization method and system for virtual key, mobile terminal and server |
CN107871062A (en) * | 2016-09-28 | 2018-04-03 | 中兴通讯股份有限公司 | A kind of application permission control method, device and terminal |
CN109426735A (en) * | 2017-08-29 | 2019-03-05 | 中兴通讯股份有限公司 | A kind of method and system for protecting individual privacy |
CN110084047A (en) * | 2019-03-20 | 2019-08-02 | 努比亚技术有限公司 | A kind of access right control method, terminal and computer readable storage medium |
-
2019
- 2019-08-09 CN CN201910736017.6A patent/CN110619221B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8195819B1 (en) * | 2009-07-13 | 2012-06-05 | Sprint Communications Company L.P. | Application single sign on leveraging virtual local area network identifier |
WO2018040639A1 (en) * | 2016-08-31 | 2018-03-08 | 长城汽车股份有限公司 | Authorization method and system for virtual key, mobile terminal and server |
CN107871062A (en) * | 2016-09-28 | 2018-04-03 | 中兴通讯股份有限公司 | A kind of application permission control method, device and terminal |
CN107180184A (en) * | 2017-06-14 | 2017-09-19 | 努比亚技术有限公司 | Application program right management method, device and computer-readable recording medium |
CN107341406A (en) * | 2017-07-05 | 2017-11-10 | 北京奇安信科技有限公司 | A kind of method and terminal for protecting privacy of user data |
CN107480554A (en) * | 2017-07-28 | 2017-12-15 | 中科创达软件科技(深圳)有限公司 | A kind of right management method, rights management device and intelligent terminal |
CN109426735A (en) * | 2017-08-29 | 2019-03-05 | 中兴通讯股份有限公司 | A kind of method and system for protecting individual privacy |
CN110084047A (en) * | 2019-03-20 | 2019-08-02 | 努比亚技术有限公司 | A kind of access right control method, terminal and computer readable storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112597483A (en) * | 2020-07-16 | 2021-04-02 | 同方股份有限公司 | Privacy protection method and device, intelligent terminal and storage medium |
CN112597482A (en) * | 2020-07-16 | 2021-04-02 | 同方股份有限公司 | Privacy protection method and device, intelligent terminal and storage medium |
CN112597484A (en) * | 2020-07-16 | 2021-04-02 | 同方股份有限公司 | Privacy protection method and device, intelligent terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110619221B (en) | 2023-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8478255B2 (en) | Portable terminal device, address book transfer device, information display method and address book transfer method used in portable terminal device, and computer program | |
CN110619221B (en) | Virtual authorization method, device, terminal equipment and storage medium | |
EP3032418A1 (en) | Permission control method and device | |
EP1782155B1 (en) | Methods and apparatuses for automatically selecting a profile | |
CN109460373A (en) | A kind of data sharing method, terminal device and storage medium | |
US20160048688A1 (en) | Restricting System Calls using Protected Storage | |
CN113067859B (en) | Communication method and device based on cloud mobile phone | |
CN107506637A (en) | Information displaying method and device, terminal and readable storage medium storing program for executing | |
CN110727941A (en) | Private data protection method and device, terminal equipment and storage medium | |
CN112165704A (en) | Information sharing method, earphone box and computer readable storage medium | |
CN109271211A (en) | Method, apparatus of attending to anything else, equipment and the medium of application program | |
CN110166564B (en) | Information communication method, terminal and storage medium | |
CN111459673A (en) | Secure memory expansion and release method and device and electronic equipment | |
CN113065120B (en) | Interface calling authentication method and device, electronic equipment and readable storage medium | |
CN115842656B (en) | Control method and device based on private data call | |
CN110851795B (en) | File management method, device, equipment and readable storage medium | |
CN111753268A (en) | Single sign-on method, device, storage medium and mobile terminal | |
CN106372536B (en) | Method and device for protecting privacy information and method for creating device | |
CN106933666B (en) | Method for calling information input program and electronic equipment | |
CN114021107A (en) | Privacy protection method, system, terminal device, storage medium and product | |
CN114489419A (en) | Authority control method and electronic equipment | |
CN112948817A (en) | Permission control method and device of application program, computer equipment and medium | |
CN103052060A (en) | Method for improving information security of mobile terminal and mobile terminal | |
CN105022941A (en) | Management method and system of username password | |
CN108121922B (en) | Information display method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 518129 4th floor, No.1 Workshop, beiyuanzheng science and technology plant, Wuhe Avenue, Bantian street, Longgang District, Shenzhen City, Guangdong Province Applicant after: GOLO IOV DATA TECHNOLOGY Co.,Ltd. Address before: 518129 4th floor, No.1 Workshop, beiyuanzheng science and technology plant, Wuhe Avenue, Bantian street, Longgang District, Shenzhen City, Guangdong Province Applicant before: GOLO IOV DATA TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |