CN110619221B - Virtual authorization method, device, terminal equipment and storage medium - Google Patents

Virtual authorization method, device, terminal equipment and storage medium Download PDF

Info

Publication number
CN110619221B
CN110619221B CN201910736017.6A CN201910736017A CN110619221B CN 110619221 B CN110619221 B CN 110619221B CN 201910736017 A CN201910736017 A CN 201910736017A CN 110619221 B CN110619221 B CN 110619221B
Authority
CN
China
Prior art keywords
authorization
data
virtual
terminal equipment
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910736017.6A
Other languages
Chinese (zh)
Other versions
CN110619221A (en
Inventor
刘均
李向煜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Golo Iov Data Technology Co ltd
Original Assignee
Golo Iov Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Golo Iov Data Technology Co ltd filed Critical Golo Iov Data Technology Co ltd
Priority to CN201910736017.6A priority Critical patent/CN110619221B/en
Publication of CN110619221A publication Critical patent/CN110619221A/en
Application granted granted Critical
Publication of CN110619221B publication Critical patent/CN110619221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a virtual authorization method, a device, a terminal device and a storage medium, wherein the virtual authorization method is applied to the terminal device and comprises the following steps: acquiring an authorization request of an application program installed on the terminal equipment; acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment; if the authorization response is a refused authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data; and sending the virtual authorization data to the application program. When the terminal equipment receives the authorization request of the application program, the virtual data corresponding to the authorization request is generated according to the authorization response of the user and is sent to the corresponding application program, so that the leakage of real data of the user is avoided.

Description

Virtual authorization method, device, terminal equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a virtual authorization method, a device, a terminal device, and a storage medium.
Background
With the continuous progress of technology, the platform development of application programs is rapid, and the platform development of application programs has gradually become the most popular operating system of mobile terminals, and an open terminal system provides more functional interfaces for application developers, and the functional interfaces improve the expandability of the system.
In the prior art, when a user uses some functions of some application programs, authorization needs to be performed for the application programs, so that the application programs can access some private data of the user, including information such as pictures, geographic positions, address books and the like, and if the user refuses to authorize the application programs, the user cannot experience the corresponding functions of the application programs.
Therefore, how to give corresponding authority to an application program when the application program requires authorization so that a user can normally experience the application program, and meanwhile, protecting privacy data of the user is a popular research topic.
Disclosure of Invention
The application mainly aims to provide a virtual authorization method, a virtual authorization device, terminal equipment and a storage medium.
In order to achieve the above object, the present application provides a virtual authorization method applied to a terminal device, the virtual authorization method including:
acquiring an authorization request of an application program installed on the terminal equipment;
acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refused authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and sending the virtual authorization data to the application program.
Preferably, the generating virtual authorization data according to the authorization request and the preset relationship includes:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal equipment data as the virtual authorization data.
Preferably, the original terminal device data includes first type data and second type data, and the generating virtual terminal device data according to the original terminal device data and a preset relationship includes:
judging whether the original terminal equipment data is first type data or second type data;
if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation.
Preferably, the method further comprises:
and if the authorization response is the permission authorization response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
Preferably, after said sending said virtual authorization data to said application, said method further comprises:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
The application also provides a virtual authorization device, which comprises:
the request module is used for acquiring an authorization request of an application program installed on the terminal equipment;
the response module is used for acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
the data generation module is used for generating virtual authorization data according to the authorization request and a preset relationship if the authorization response is a refused authorization response, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and the data transmitting module is used for transmitting the virtual authorization data to the application program.
Preferably, the data generation module is further configured to:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal equipment data as the virtual authorization data.
Preferably, the original terminal device data includes first type data and second type data, and the data generating module is further configured to:
judging whether the original terminal equipment data is first type data or second type data;
if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation.
Preferably, the virtual authorization device further includes a real authorization module, configured to, if the authorization response is an allowed authorization response, retrieve corresponding authorization data according to the authorization request, and send the authorization data to the application program.
In some embodiments, the virtual authorization device further includes a virtual storage module configured to store the virtual authorization data; setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request; and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
The application also provides a terminal device, which comprises:
a memory for storing a virtual authorization program executable by a computer; and
and the processor is used for retrieving the virtual authorization program stored in the memory to execute the virtual authorization method.
The application also provides a storage medium storing a virtual authorization program executable by a computer, and the processor can execute the virtual authorization method when the virtual authorization program is called
Compared with the prior art, the virtual authorization method provided by the application has the advantages that by acquiring the authorization request of the application program, the user can make a corresponding authorization response according to the authorization request, if the authorization response is a refusal authorization response, the terminal equipment can generate corresponding virtual authorization data according to the authorization request and send the virtual authorization data to the application program so as to normally use the application program and prevent the original authorization data from being revealed, thereby protecting the privacy data of the user.
Drawings
FIG. 1 is a flowchart illustrating steps of a virtual authorization method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an application scenario of the virtual authorization method provided by the present application; FIG. 3 is a flow chart of the substeps of step S12 in FIG. 1;
FIG. 4 is a flow chart of the substeps of step S122 in FIG. 3;
FIG. 5 is a flowchart illustrating steps of a virtual authorization method according to another embodiment of the present application;
FIG. 6 is a block diagram of a virtual authorization device according to an embodiment of the present application;
fig. 7 is a block diagram of a terminal device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present application.
The application provides a virtual authorization method, a device, a terminal device and a storage medium, wherein the virtual authorization method is applied to the terminal device and comprises the following steps: acquiring an authorization request of an application program installed on the terminal equipment; acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment; if the authorization response is a refused authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data; and sending the virtual authorization data to the application program.
According to the virtual authorization method provided by the application, by acquiring the authorization request of the application program, the user can make a corresponding authorization response according to the authorization request, if the authorization response is the refusal authorization response, the terminal equipment can generate corresponding virtual authorization data according to the authorization request and send the virtual authorization data to the application program so as to normally use the application program and prevent the original authorization data from being revealed, thereby protecting the privacy data of the user.
Referring to fig. 1, fig. 1 is a schematic diagram of a virtual authorization method provided by the present application, where the virtual authorization method is applied to a terminal device, and the terminal device may be a smart phone, a tablet computer or a notebook computer, which is not limited herein.
The virtual authorization method comprises the following steps:
step S10: and acquiring an authorization request of an application program installed on the terminal equipment.
As shown in fig. 2, a plurality of application programs 101 are installed in the terminal device 10, and the application programs 101 send an authorization request to the terminal device 10 when the application programs 101 are installed or the user clicks on the application programs to allow the application programs 101 to call certain functions of the terminal device 10, such as obtaining a phone number, a MAC address, or allowing use of an image library or a camera function of the terminal device 10.
After receiving the authorization request of the application 101, the terminal device 10 generates a corresponding authorization request prompt to prompt the user that the application 101 is performing an authorization request of the corresponding function, where the authorization request prompt may be any one, two or more of a text prompt, a voice prompt, or an image prompt, and is not limited herein, for example, the terminal device 10 is displayed on a display screen, and the application a is requesting to access the phonebook, and is allowed?
Step S11: and acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment.
The user makes a corresponding authorization response according to the authorization request of the application 101, wherein the authorization response comprises a refusal authorization response and an permission authorization response.
When the user does not agree with the authorization request of the application 10, the terminal device 10 may be manipulated to make a refusal authorization response.
When the user agrees to the authorization request for the application 10, the terminal device 10 can be manipulated to make an authorization-allowed response.
Step S12: and if the authorization response is a refused authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is the corresponding relationship between the authorization request and the virtual authorization data.
If the response sent by the user controlling the terminal device 10 is the refusal authorization response, the terminal device 10 generates corresponding virtual authorization data according to the authorization request and the corresponding preset relationship.
Referring to fig. 3, in some embodiments, the generating virtual authorization data according to the authorization request and the preset relationship includes:
step S121: acquiring original terminal equipment data of the terminal equipment according to the authorization request;
step S122: generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
step S123: and taking the virtual terminal equipment data as the virtual authorization data.
The terminal device 10 obtains the corresponding original terminal device data of the terminal device 10 according to the authorization request of the application program, and generates virtual terminal device data by using the original terminal device data, wherein the virtual terminal device data may be data preset in the terminal device 10 or data generated by changing the original terminal device data.
The source may be any one, two or a combination of image data, digital data, alphabetic data, character data.
Referring to fig. 4, the original terminal device data includes first type data and second type data, and generating virtual terminal device data according to the original terminal device data and a preset relationship includes:
step S1221: judging whether the original terminal equipment data is first type data or second type data;
step S1222: if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
step S1223: and if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation.
The original terminal device data may include first type data and second type data, where the first type data and the second type data are different, for example, the first type data is full-value data, and the second type data is combination data of numeric data and alphabetical data.
If the authorization request is a telephone number request used by the terminal device 10, the terminal device 10 obtains the real telephone number of the terminal device 10 according to the authorization request, and the telephone number data is full-value data, and randomly replaces any number of the telephone numbers according to a preset relation until a virtual telephone number different from the original telephone number is obtained, such as 153529 xxxx.
The manner of randomly replacing any number of the telephone numbers according to the preset relation can be as follows: the terminal device 10 generates a random number within the length of the number set, the random number is added to the number, the resulting value is subjected to a modulo operation on 10, and if the resulting value is the same as before, the operation is performed again until a different value is obtained. For example 133529xxxxx, where the random number is 2, the 2 nd bit in the string is 3, 2+3=5, the virtual number is 153529xxxxx.
If the authorization request is a MAC information request of the terminal device 10, i.e. Media Access ControlAddress, the media access control address. The terminal device 10 obtains the MAC information of 745C9F061CCF of the terminal device 10, which is the combination data of the numerical value and the letter, according to the MAC information request. The MAC information is replaced with virtual MAC information according to a preset relationship, e.g., 749C5F061CCF.
The replacing the MAC information with the virtual MAC information according to the preset relationship may be that the terminal device 10 generates two random numbers, exchanges the random values of the corresponding positions to obtain a new value, and if the generated value is the same as the original value, executes the algorithm again until the values are different.
For example, if the MAC information is 745C9F061CCF, the generated two random numbers 3,5 are exchanged for the third bit "5" and the fifth bit "9", so as to obtain the virtual MAC information as 749C5F061CCF.
Step S13: and sending the virtual authorization data to the application program.
The terminal device 10 transmits the generated virtual authorization data to the application 101.
In some embodiments, the method further comprises:
if the authorization response is the permission authorization response, the corresponding authorization data is called according to the authorization request;
and sending the authorization data to the application program.
If the user runs an authorization request of the application 101, the terminal device 10 invokes corresponding authorization data to the application 101 according to the authorization request.
Referring to fig. 5, in some embodiments, after the sending the virtual authorization data to the application, the method further includes:
step S14: storing the virtual authorization data;
step S15: setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
step S16: and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
The terminal device 10 stores the obtained virtual authorization data in a preset format, sets a corresponding association identifier, and when the terminal device 10 obtains the authorization request of the corresponding application 101 again, invokes the corresponding virtual data according to the association identifier and sends the virtual data to the application 101.
Referring to fig. 6, the present application further provides a virtual authorization device 20, wherein the virtual authorization device 20 includes:
a request module 201, configured to obtain an authorization request of an application installed in the terminal device;
a response module 202, configured to obtain an authorization response in response to the authorization request, where the authorization response is a response sent by the user to control the terminal device;
the data generation module 203 is configured to generate virtual authorization data according to the authorization request and a preset relationship if the authorization response is a refused authorization response, where the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data; a kind of electronic device with high-pressure air-conditioning system
And the data sending module 204 is configured to send the virtual authorization data to the application program.
In some embodiments, the data generation module 203 is further configured to:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal equipment data as the virtual authorization data.
Wherein the original terminal device data includes first type data and second type data, and the data generating module 203 is further configured to:
judging whether the original terminal equipment data is first type data or second type data;
if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation.
In some embodiments, the virtual authorization device 20 further includes a real authorization module, where the real authorization module is configured to, if the authorization response is an allowable authorization response, retrieve corresponding authorization data according to the authorization request, and send the authorization data to the application program.
In some embodiments, the virtual authorization device 20 further includes a virtual storage module, where the virtual storage module is configured to store the virtual authorization data; setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request; and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
Referring to fig. 5, the present application further provides a terminal device 30, where the terminal device 30 includes a memory 301 and a processor 302, and the memory 301 and the processor 302 are electrically connected through a bus 303.
The memory 301 includes at least one type of readable storage medium including flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 301 may in some embodiments be an internal storage unit of the terminal device 30, such as a hard disk of the terminal device 30. The memory 301 may also be an external storage device of the terminal device 30 in other embodiments, for example, a plug-in hard disk provided on the terminal device 30, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. The memory 301 may be used not only for storing application software installed in the in-vehicle apparatus and various types of data, such as code of a computer-readable program, but also for temporarily storing data that has been output or is to be output, that is, the first memory may be used as a storage medium storing a virtual authorization program executable by a computer.
Processor 302 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chip in some embodiments, processor 302 may call a virtual authorization program stored in memory 301 to implement the steps of:
acquiring an authorization request of an application program installed on the terminal equipment;
acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refused authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and sending the virtual authorization data to the application program.
In some embodiments, the processor 302 is further configured to implement the following steps:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal equipment data as the virtual authorization data.
In some embodiments, the original terminal device data includes a first type of data and a second type of data, and the processor 302 is further configured to implement the following steps:
judging whether the original terminal equipment data is first type data or second type data;
if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation.
In some embodiments, the processor 302 is further configured to implement the following steps:
and if the authorization response is the permission authorization response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
In some embodiments, the processor 302 is further configured to implement the following steps:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
The application also provides a storage medium, the storage medium stores a vehicle travel reservation program executable by a computer, and when the virtual authorization program is called by a processor, the following steps can be realized:
acquiring an authorization request of an application program installed on the terminal equipment;
acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refused authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
and sending the virtual authorization data to the application program.
In some embodiments, the processor is further configured to implement the following steps:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
and taking the virtual terminal equipment data as the virtual authorization data.
In some embodiments, the original terminal device data includes first type data and second type data, and the processor is further configured to implement the following steps:
judging whether the original terminal equipment data is first type data or second type data;
if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
and if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation.
In some embodiments, the processor is further configured to implement the following steps:
and if the authorization response is the permission authorization response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
In some embodiments, the processor is further configured to implement the following steps:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application or directly or indirectly applied to other related technical fields are included in the scope of the present application.

Claims (5)

1. A virtual authorization method applied to a terminal device, wherein the virtual authorization method comprises:
acquiring an authorization request of an application program installed on the terminal equipment;
acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
if the authorization response is a refused authorization response, generating virtual authorization data according to the authorization request and a preset relationship, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
transmitting the virtual authorization data to the application program;
the generating virtual authorization data according to the authorization request and the preset relation includes:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
taking the virtual terminal equipment data as the virtual authorization data;
the original terminal equipment data comprises first type data and second type data, and the generating virtual terminal equipment data according to the original terminal equipment data and a preset relation comprises the following steps:
judging whether the original terminal equipment data is first type data or second type data;
if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation;
after said sending said virtual authorization data to said application, said method further comprises:
storing the virtual authorization data;
setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request;
and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
2. The virtual authorization method according to claim 1, wherein the method further comprises:
and if the authorization response is the permission authorization response, the corresponding authorization data is called according to the authorization request, and the authorization data is sent to the application program.
3. A virtual authorization device, the virtual authorization device comprising:
the request module is used for acquiring an authorization request of an application program installed on the terminal equipment;
the response module is used for acquiring an authorization response responding to the authorization request, wherein the authorization response is a response sent by a user for controlling the terminal equipment;
the data generation module is used for generating virtual authorization data according to the authorization request and a preset relationship if the authorization response is a refused authorization response, wherein the preset relationship is a corresponding relationship between the authorization request and the virtual authorization data;
the data sending module is used for sending the virtual authorization data to the application program;
the data generation module is further configured to:
acquiring original terminal equipment data of the terminal equipment according to the authorization request;
generating virtual terminal equipment data according to the original terminal equipment data and a preset relation;
taking the virtual terminal equipment data as the virtual authorization data;
the original terminal device data comprises first type data and second type data, and the data generation module is further used for:
judging whether the original terminal equipment data is first type data or second type data;
if the original terminal equipment data are the first type data, generating virtual terminal equipment data according to a first preset relation;
if the original terminal equipment data are the second type data, generating virtual terminal equipment data according to a second preset relation;
the virtual authorization device also comprises a real authorization module, which is used for acquiring corresponding authorization data according to the authorization request and sending the authorization data to the application program if the authorization response is an allowable authorization response;
the virtual authorization device also comprises a virtual storage module for storing the virtual authorization data; setting an association identifier of the virtual authorization data, wherein the association identifier is an association identifier of the virtual authorization data and a corresponding authorization request; and if the authorization request of the application program is acquired again, calling the virtual authorization data according to the association identifier and sending the virtual authorization data to the corresponding application program.
4. A terminal device, characterized in that the terminal device comprises:
a memory for storing a virtual authorization program executable by a computer; and
a processor for retrieving a virtual authorization program stored in the memory to perform the virtual authorization method according to any of claims 1-2.
5. A storage medium storing a virtual authorization program executable by a computer, the virtual authorization method of any one of claims 1-2 being executable by a processor when the virtual authorization program is invoked.
CN201910736017.6A 2019-08-09 2019-08-09 Virtual authorization method, device, terminal equipment and storage medium Active CN110619221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910736017.6A CN110619221B (en) 2019-08-09 2019-08-09 Virtual authorization method, device, terminal equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910736017.6A CN110619221B (en) 2019-08-09 2019-08-09 Virtual authorization method, device, terminal equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110619221A CN110619221A (en) 2019-12-27
CN110619221B true CN110619221B (en) 2023-10-31

Family

ID=68921688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910736017.6A Active CN110619221B (en) 2019-08-09 2019-08-09 Virtual authorization method, device, terminal equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110619221B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112597483A (en) * 2020-07-16 2021-04-02 同方股份有限公司 Privacy protection method and device, intelligent terminal and storage medium
CN112597484A (en) * 2020-07-16 2021-04-02 同方股份有限公司 Privacy protection method and device, intelligent terminal and storage medium
CN112597482A (en) * 2020-07-16 2021-04-02 同方股份有限公司 Privacy protection method and device, intelligent terminal and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8195819B1 (en) * 2009-07-13 2012-06-05 Sprint Communications Company L.P. Application single sign on leveraging virtual local area network identifier
CN107180184A (en) * 2017-06-14 2017-09-19 努比亚技术有限公司 Application program right management method, device and computer-readable recording medium
CN107341406A (en) * 2017-07-05 2017-11-10 北京奇安信科技有限公司 A kind of method and terminal for protecting privacy of user data
CN107480554A (en) * 2017-07-28 2017-12-15 中科创达软件科技(深圳)有限公司 A kind of right management method, rights management device and intelligent terminal
WO2018040639A1 (en) * 2016-08-31 2018-03-08 长城汽车股份有限公司 Authorization method and system for virtual key, mobile terminal and server
CN107871062A (en) * 2016-09-28 2018-04-03 中兴通讯股份有限公司 A kind of application permission control method, device and terminal
CN109426735A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 A kind of method and system for protecting individual privacy
CN110084047A (en) * 2019-03-20 2019-08-02 努比亚技术有限公司 A kind of access right control method, terminal and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8195819B1 (en) * 2009-07-13 2012-06-05 Sprint Communications Company L.P. Application single sign on leveraging virtual local area network identifier
WO2018040639A1 (en) * 2016-08-31 2018-03-08 长城汽车股份有限公司 Authorization method and system for virtual key, mobile terminal and server
CN107871062A (en) * 2016-09-28 2018-04-03 中兴通讯股份有限公司 A kind of application permission control method, device and terminal
CN107180184A (en) * 2017-06-14 2017-09-19 努比亚技术有限公司 Application program right management method, device and computer-readable recording medium
CN107341406A (en) * 2017-07-05 2017-11-10 北京奇安信科技有限公司 A kind of method and terminal for protecting privacy of user data
CN107480554A (en) * 2017-07-28 2017-12-15 中科创达软件科技(深圳)有限公司 A kind of right management method, rights management device and intelligent terminal
CN109426735A (en) * 2017-08-29 2019-03-05 中兴通讯股份有限公司 A kind of method and system for protecting individual privacy
CN110084047A (en) * 2019-03-20 2019-08-02 努比亚技术有限公司 A kind of access right control method, terminal and computer readable storage medium

Also Published As

Publication number Publication date
CN110619221A (en) 2019-12-27

Similar Documents

Publication Publication Date Title
CN110619221B (en) Virtual authorization method, device, terminal equipment and storage medium
EP3032418A1 (en) Permission control method and device
CN102016867B (en) System and method of authorizing execution of software code based on at least one installed profile
CN107506637B (en) Information display method and device, terminal and readable storage medium
CN109460373A (en) A kind of data sharing method, terminal device and storage medium
CN110727941B (en) Privacy data protection method and device, terminal equipment and storage medium
JP2007505559A (en) Method and apparatus for content protection in a wireless network
US9069939B2 (en) Method and apparatus for storing a software license
CN111931160B (en) Authority verification method, authority verification device, terminal and storage medium
CN109271211A (en) Method, apparatus of attending to anything else, equipment and the medium of application program
CN115277143A (en) Data secure transmission method, device, equipment and storage medium
CN110719590B (en) One-key login method, device, equipment and storage medium based on mobile phone number
CN110166564B (en) Information communication method, terminal and storage medium
CN110769029A (en) Vehicle owner contact method, server, computer equipment and storage medium
CN108241515B (en) Application shortcut establishing method and terminal
CN110851795B (en) File management method, device, equipment and readable storage medium
CN105025482B (en) Communication information processing method and equipment thereof
CN110418331B (en) Unlocking method, unlocking device, mobile terminal and server
CN112948817A (en) Permission control method and device of application program, computer equipment and medium
CN111625811A (en) Data authorization method and device
CN113065120A (en) Interface calling authentication method and device, electronic equipment and readable storage medium
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
CN112214751A (en) Verification code generation method and device
CN111263356A (en) Short message processing method and system for terminal equipment, electronic equipment and storage medium
CN110765426A (en) Equipment permission setting method, device, equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518129 4th floor, No.1 Workshop, beiyuanzheng science and technology plant, Wuhe Avenue, Bantian street, Longgang District, Shenzhen City, Guangdong Province

Applicant after: GOLO IOV DATA TECHNOLOGY Co.,Ltd.

Address before: 518129 4th floor, No.1 Workshop, beiyuanzheng science and technology plant, Wuhe Avenue, Bantian street, Longgang District, Shenzhen City, Guangdong Province

Applicant before: GOLO IOV DATA TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant