CN111563252A - Authority management method and device, terminal and storage medium - Google Patents

Authority management method and device, terminal and storage medium Download PDF

Info

Publication number
CN111563252A
CN111563252A CN202010361036.8A CN202010361036A CN111563252A CN 111563252 A CN111563252 A CN 111563252A CN 202010361036 A CN202010361036 A CN 202010361036A CN 111563252 A CN111563252 A CN 111563252A
Authority
CN
China
Prior art keywords
list
sub
authority
information
information list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010361036.8A
Other languages
Chinese (zh)
Inventor
朱立军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Youzhuju Network Technology Co Ltd
Original Assignee
Beijing Infinite Light Field Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Infinite Light Field Technology Co Ltd filed Critical Beijing Infinite Light Field Technology Co Ltd
Priority to CN202010361036.8A priority Critical patent/CN111563252A/en
Publication of CN111563252A publication Critical patent/CN111563252A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure provides a method and apparatus for rights management, a terminal, and a storage medium. The method for managing the authority comprises the following steps: receiving an information list acquisition request, and responding to the information list acquisition request to generate a right corresponding to the information list acquisition request; converting the information list acquisition request into a replacement request in combination with the permission; and calling a corresponding response according to the replacement request. The authority management method disclosed by the invention can be used for selectively providing the sub-lists of the corresponding levels in the information list by grading the information list and judging the authority of the information list acquisition request, so that the user information can be effectively prevented from being leaked.

Description

Authority management method and device, terminal and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for rights management, a terminal, and a storage medium.
Background
At present, when a program is installed or operated on equipment, a program end often requires to call user information, but the condition of unnecessary call exists, and the risk of privacy disclosure is brought to a user.
Disclosure of Invention
In order to solve the existing problems, the present disclosure provides a method and apparatus for rights management, a terminal, and a storage medium.
The present disclosure adopts the following technical solutions.
In some embodiments, the present disclosure provides a method of rights management, comprising:
receiving an information list acquisition request, and responding to the information list acquisition request to generate a right corresponding to the information list acquisition request;
converting the information list acquisition request into a replacement request in combination with the permission; and
and calling a corresponding response according to the replacement request.
In some embodiments, the present disclosure provides an apparatus of rights management, comprising:
the receiving module is used for receiving an information list acquisition request;
the generating module is used for generating the authority corresponding to the information list obtaining request;
the conversion module is used for converting the information list acquisition request into a replacement request by combining the authority; and
and the calling module is used for calling the corresponding response according to the replacing request.
In some embodiments, the present disclosure provides a terminal comprising: at least one memory and at least one processor;
wherein the at least one memory is used for storing program codes, and the at least one processor is used for calling the program codes stored in the memory to execute the method.
In some embodiments, the present disclosure provides a storage medium for storing program code for performing the above-described method.
According to the authority management method, the information list is classified, the authority of the information list acquisition request is judged, the sub-lists of the corresponding levels in the information list are selectively provided, and user information can be effectively prevented from being leaked.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and elements are not necessarily drawn to scale.
Fig. 1 is a flowchart of a rights management method of an embodiment of the disclosure.
Fig. 2 is a schematic diagram of information list ranking of an embodiment of the present disclosure.
Fig. 3 is a schematic diagram of information list ranking of another embodiment of the present disclosure.
Fig. 4 is a schematic structural diagram of a rights management device according to an embodiment of the disclosure.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that various steps recited in method embodiments of the present disclosure may be performed in parallel and/or in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a" or "an" in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that reference to "one or more" unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1, fig. 1 is a flowchart of a rights management method of an embodiment of the disclosure, including the following steps.
S100, receiving an information list acquisition request, responding to the information list acquisition request, and generating a right corresponding to the information list acquisition request.
In the embodiment of the present disclosure, when a user downloads an application, installs or starts the application for the first time, the application may request to obtain the list or other lists. The user may not wish to allow the request for the purpose of protecting personal privacy; however, when the user chooses not to allow, the application is often exited or not launched, forcing the user to have to agree to a request to obtain the list information. Therefore, the user is required to measure the risk of information leakage and the installation necessity of the application side.
Specifically, the embodiment of the present disclosure may obtain a parameter of a request, for example, an information list obtaining request, and a port sending the request, and may further determine, for example, a field of the application and related information. Optionally, in the embodiment of the present disclosure, a list mechanism may be preset to record relevant information that needs to be obtained in each application program, and a necessary information list obtaining request release mechanism is given to ensure correct operation of the application program. Thus, embodiments of the present disclosure provide for hierarchical authorization based on a designated privilege. More specifically, the rights may include a first right and a second right; wherein the first right may be higher than the second right.
And S200, converting the information list acquisition request into a replacement request by combining the authority.
Specifically, for a request determined to require illegal/unjustified authorization, the present embodiment may use alternative information for authorization in view of the need to give information again. Therefore, the application program can be continuously operated, and the purpose of protecting the privacy of the user can be achieved. More specifically, embodiments of the present disclosure may obtain an information list, which is classified into a number of sub-lists; and judging a corresponding sub-list in the sub-lists corresponding to the corresponding response. At this point, the replacement request may correspond to all or part of the sub-list.
In this embodiment, the information list is classified into a first sub-list and a second sub-list as an example for description, and it is understood that in other embodiments of the present disclosure, more sub-lists may be further included. Wherein the first sub-list is at a first level and the second sub-list is at a second level. More specifically, the user's information list may include location information, address book, photos, etc., and the user may formulate different ranking strategies corresponding to different information lists. For example, for positioning information, the user may add virtual location information to a positioning information list, and accordingly, the positioning related information list includes a first sub-list such as real positioning information and a second sub-list such as virtual positioning information; for the address book, the user can grade the address book according to the importance degree, for example, real telephone information is divided into a first sub-list, and waste blank numbers are listed in a second sub-list, so that when the application terminal requires to call the address book of the user, the second sub-list, namely the blank numbers, can be selected to be uploaded, and the first sub-list comprising the real numbers is reserved. In particular, the address book is different from the positioning information in that the positioning information can be added to the virtual information; however, the address book preferably ranks the existing information list, because, for example, adding a virtual address book may cause interference to others by mistakenly adding numbers of others, it is preferable to add a waste number as the second sub-list, or a number which the user considers as available to the application without trouble. Then, the first sub-list in the positioning information is real information, and the second sub-list is virtual information; in contrast, the first sub-list and the second sub-list of the address book are both real information.
S300, calling a corresponding response according to the replacing request.
Specifically, after the authority of the information list acquisition request is identified according to a preset authority, the embodiment of the present disclosure may determine a corresponding sub-list of the plurality of sub-lists that matches the authority. At this time, the first sub-list may have a first attribute, such as real information; the second sub-list may have a first attribute or a second attribute, which may be, for example, virtual information. Among them, the system can classify various applications commonly used in an application store or according to their tags in advance, and preset different rights according to the classification. For example, the first type of application is a navigation type of application, and the positioning information is acquired as a reasonable request, so that the preset authority is the first authority; for another example, the second type of application is a payment type of application, and the address book is obtained as an unreasonable request, so that the corresponding preset authority is the second authority. It can be understood that the user can set different permission types according to actual conditions, the system can predefine the permission according to general rules, and the user can adjust and change the corresponding permission according to own requirements.
More specifically, when both the first sub-list and the second sub-list have the first attribute, for example, both are real information (T), see fig. 2, and fig. 2 is a schematic diagram of the information list hierarchy of the embodiment of the present disclosure. In fig. 2, as described above, the present embodiment may not include virtual information, that is, the first sub-list and the second sub-list are both real information, however, the first sub-list may include important information, for example, and the second sub-list may include secondary information, for example. It is understood that the first sub-list and the second sub-list may have the same or different information amount. Then, according to the importance ranking, important information may be left unacquired. If the authority is the first authority, the corresponding sub-list is the first sub-list and the second sub-list; and if the authority is the second authority, the corresponding sub-list is the second sub-list. The first right may be, for example, a necessary authorization right, that is, the application terminal needs the user to provide corresponding information to be able to provide the service, for example, the delivery service needs to acquire the user address. When detecting that the authority of the application terminal requiring to acquire the authorization is the necessary authority, preferably providing the first sub-list and the second sub-list correspondingly, namely the real information. However, it is understood that even if the user address needs to be obtained, the user can still choose not to provide the positioning information, and the related privacy is protected by adopting a mode of manually inputting the address, that is, the situation that authorization is completely authorized without the user's approval does not exist, and the final right is still controlled by the user. The second right may be, for example, an unnecessary authorization right, that is, the application terminal may provide services without the user providing information requested by the application terminal, and at this time, it may be considered that the application terminal puts unreasonable requirements out of the need of collecting user information by itself, and the user tends to reject the unreasonable requirements. When detecting that the authority of the application end is unnecessary, the second sub-list can be given, and the information with higher security level in the first sub-list is reserved.
As shown in fig. 3, fig. 3 is a schematic diagram of information list ranking of another embodiment of the present disclosure. In fig. 3, when the second sub-list has the second attribute, the first sub-list has the first attribute, and the second sub-list has the second attribute, for example, the first sub-list is real information (T), and the second sub-list is virtual information (F). Likewise, the first sub-list and the second sub-list may have the same or different information amount. If the authority is the first authority, the corresponding sub-list is the first sub-list; and if the authority is the second authority, the corresponding sub-list is the second sub-list. The first right may still be a necessary authorization right, that is, the application terminal needs the user to provide corresponding information to be able to provide the service, for example, the delivery service needs to obtain the user address. When detecting that the authority of the application terminal requiring to acquire the authorization is the necessary authority, preferably providing the first sub-list, i.e. the real information, correspondingly. However, it is understood that even if the user address needs to be obtained, the user can still choose not to provide the positioning information, and the related privacy is protected by adopting a mode of manually inputting the address, that is, the situation that authorization is completely authorized without the user's approval does not exist, and the final right is still controlled by the user. The second right may be, for example, an unnecessary authorization right, that is, the application terminal may provide services without the user providing information requested by the application terminal, and at this time, it may be considered that the application terminal puts unreasonable requirements out of the need of collecting user information by itself, and the user tends to reject the unreasonable requirements. When detecting that the authority of the application side is an unnecessary authority, a second sub-list, i.e. virtual information, can be given.
And corresponding to the different situations, the user selects to provide information with different levels, and sends the real or virtual corresponding sub-list to the application end, so that the user can obtain corresponding services and simultaneously protect the information security.
In addition, although the foregoing embodiment takes the information list as an example of two sub-lists, other embodiments of the present disclosure may also be classified into more sub-lists, each sub-list may have different attributes, the definition of the attributes may be different from the real information and the virtual information listed in the foregoing embodiments, and other types of attributes may also be used, which is not limited by the present disclosure. The principle of the disclosed embodiments is to rank the information list, either as important or secondary, or real and virtual. The same interface (API) is still called each time information is obtained, however, each list may only give part of the content, or part of the content is hidden, and the effect of successfully obtaining authorization can still be obtained at the application end. It should be noted that the above embodiments are merely provided for illustrative purposes, and other embodiments of the present disclosure may include other hierarchical manners and corresponding multi-level rights based on the principle of hierarchy. After classification, the authority level of the application terminal sending the information acquisition request is judged, and the authority level is matched or mapped with the classification, so that different types of applications acquire different authorizations, the application terminal is prevented from acquiring user information for the purpose of collecting data, and the application terminal can normally provide services while protecting the privacy of users.
As shown in fig. 4, fig. 4 is a schematic structural diagram of a rights management device according to an embodiment of the disclosure. The present embodiment also provides an apparatus 10 that may include a receiving module 12, a generating module 14, a transforming module 16, and a retrieving module 18. The receiving module 12 may be configured to receive an information list obtaining request. The generating module 14 may be configured to generate the right corresponding to the information list obtaining request. The translation module 16 may be configured to translate the information list obtaining request in combination with the permission into a replacement request. The retrieving module 18 may be configured to retrieve the corresponding response according to the replacement request. In addition, the present embodiment may further include a ranking module (not shown) for ranking the information list into a plurality of sub-lists.
For the embodiments of the apparatus, since they correspond substantially to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described apparatus embodiments are merely illustrative, wherein the modules described as separate modules may or may not be separate. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The method and apparatus for rights management according to the present disclosure have been described above based on the embodiments and application examples. In addition, the present disclosure also provides a terminal and a storage medium, which are described below.
Referring now to fig. 5, a schematic diagram of an electronic device (e.g., a terminal device or server) 800 suitable for use in implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, the electronic device 800 may include a processing means (e.g., central processing unit, graphics processor, etc.) 801 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage means 808 into a Random Access Memory (RAM) 803. In the RAM803, various programs and data necessary for the operation of the electronic apparatus 800 are also stored. The processing apparatus 801, the ROM 802, and the RAM803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
Generally, the following devices may be connected to the I/O interface 805: input devices 806 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 807 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage 808 including, for example, magnetic tape, hard disk, etc.; and a communication device 809. The communication means 809 may allow the electronic device 800 to communicate wirelessly or by wire with other devices to exchange data. While fig. 5 illustrates an electronic device 800 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication means 809, or installed from the storage means 808, or installed from the ROM 802. The computer program, when executed by the processing apparatus 801, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText transfer protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the methods of the present disclosure as described above.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of an element does not in some cases constitute a limitation on the element itself.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In accordance with one or more embodiments of the present disclosure, there is provided a method of rights management, including:
receiving an information list acquisition request, and responding to the information list acquisition request to generate a right corresponding to the information list acquisition request;
converting the information list acquisition request into a replacement request in combination with the permission; and
and calling a corresponding response according to the replacement request.
In accordance with one or more embodiments of the present disclosure, a method is provided wherein the rights include a first right and a second right.
According to one or more embodiments of the present disclosure, there is provided a method, characterized in that the method further comprises:
acquiring an information list, and classifying the information list into a plurality of sub-lists; and
and judging a corresponding sub-list in the sub-lists corresponding to the corresponding response.
In accordance with one or more embodiments of the present disclosure, there is provided a method, wherein the ranking the list of information into a number of sub-lists comprises:
the information list is classified into a first sub-list and a second sub-list;
wherein the first sub-list is at a first level and the second sub-list is at a second level.
In accordance with one or more embodiments of the present disclosure, there is provided a method wherein the first sublist and the second sublist both have a first attribute.
In accordance with one or more embodiments of the present disclosure, there is provided a method, wherein the determining a corresponding sub-list of the sub-lists corresponding to the corresponding answer comprises:
if the authority is the first authority, the corresponding sub-list is the first sub-list and the second sub-list;
and if the authority is the second authority, the corresponding sub-list is the second sub-list.
In accordance with one or more embodiments of the present disclosure, a method is provided wherein the first sub-list has a first attribute and the second sub-list has a second attribute.
According to one or more embodiments of the present disclosure, there is provided a method, wherein the step of determining corresponding sub-lists of the sub-lists that match the authority further includes:
if the authority is the first authority, the corresponding sub-list is the first sub-list;
and if the authority is the second authority, the corresponding sub-list is the second sub-list.
According to one or more embodiments of the present disclosure, there is provided a method, wherein the first attribute is real information, and the second attribute is virtual information; the first authority is a legal authority, and the second authority is an illegal authority; the first level is an importance level and the second level is a secondary level.
According to one or more embodiments of the present disclosure, there is provided an apparatus of rights management, including:
the receiving module is used for receiving an information list acquisition request;
the generating module is used for generating the authority corresponding to the information list obtaining request;
the conversion module is used for converting the information list acquisition request into a replacement request by combining the authority; and
and the calling module is used for calling the corresponding response according to the replacing request.
According to one or more embodiments of the present disclosure, there is provided a terminal including: at least one memory and at least one processor;
wherein the at least one memory is configured to store program code, and the at least one processor is configured to call the program code stored in the at least one memory to perform the method of any one of the above.
According to one or more embodiments of the present disclosure, there is provided a storage medium for storing program code for performing the above-described method.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (12)

1. A method of rights management, comprising:
receiving an information list acquisition request, and responding to the information list acquisition request to generate a right corresponding to the information list acquisition request;
converting the information list acquisition request into a replacement request in combination with the permission; and
and calling a corresponding response according to the replacement request.
2. The method of claim 1, wherein the rights comprise a first right and a second right.
3. The method of claim 2, further comprising:
acquiring an information list, and classifying the information list into a plurality of sub-lists; and
and judging a corresponding sub-list in the sub-lists corresponding to the corresponding response.
4. The method of claim 3, wherein the ranking the list of information into a number of sub-lists comprises:
the information list is classified into a first sub-list and a second sub-list;
wherein the first sub-list is at a first level and the second sub-list is at a second level.
5. The method of claim 4, wherein the first sublist and the second sublist both have a first attribute.
6. The method of claim 5, wherein said determining a corresponding sub-list of the sub-lists corresponding to the respective response comprises:
if the authority is the first authority, the corresponding sub-list is the first sub-list and the second sub-list;
and if the authority is the second authority, the corresponding sub-list is the second sub-list.
7. The method of claim 4, wherein the first sublist has a first attribute and the second sublist has a second attribute.
8. The method of claim 7, wherein said determining a corresponding sub-list of the sub-lists corresponding to the respective response further comprises:
if the authority is the first authority, the corresponding sub-list is the first sub-list;
and if the authority is the second authority, the corresponding sub-list is the second sub-list.
9. The method according to any one of claims 5-8, wherein the first attribute is real information and the second attribute is virtual information; the first authority is a legal authority, and the second authority is an illegal authority; the first level is an importance level and the second level is a secondary level.
10. An apparatus of rights management, comprising:
the receiving module is used for receiving an information list acquisition request;
the generating module is used for generating the authority corresponding to the information list obtaining request;
the conversion module is used for converting the information list acquisition request into a replacement request by combining the authority; and
and the calling module is used for calling the corresponding response according to the replacing request.
11. A terminal, comprising:
at least one memory and at least one processor;
wherein the at least one memory is configured to store program code and the at least one processor is configured to invoke the program code stored in the at least one memory to perform the method of any of claims 1 to 9.
12. A storage medium for storing program code for performing the method of any one of claims 1 to 9.
CN202010361036.8A 2020-04-30 2020-04-30 Authority management method and device, terminal and storage medium Pending CN111563252A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010361036.8A CN111563252A (en) 2020-04-30 2020-04-30 Authority management method and device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010361036.8A CN111563252A (en) 2020-04-30 2020-04-30 Authority management method and device, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN111563252A true CN111563252A (en) 2020-08-21

Family

ID=72074527

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010361036.8A Pending CN111563252A (en) 2020-04-30 2020-04-30 Authority management method and device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN111563252A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404819A (en) * 2014-09-10 2016-03-16 华为技术有限公司 Data access control method and apparatus and terminal
CN107451488A (en) * 2017-07-21 2017-12-08 珠海格力电器股份有限公司 Method and device for providing personal information and mobile terminal
US20180097944A1 (en) * 2016-10-03 2018-04-05 Fuji Xerox Co., Ltd. Information processing apparatus
CN108549798A (en) * 2018-04-12 2018-09-18 珠海市魅族科技有限公司 Terminal equipment control method and device, terminal device and computer readable storage medium
CN110084047A (en) * 2019-03-20 2019-08-02 努比亚技术有限公司 A kind of access right control method, terminal and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404819A (en) * 2014-09-10 2016-03-16 华为技术有限公司 Data access control method and apparatus and terminal
US20180097944A1 (en) * 2016-10-03 2018-04-05 Fuji Xerox Co., Ltd. Information processing apparatus
CN107451488A (en) * 2017-07-21 2017-12-08 珠海格力电器股份有限公司 Method and device for providing personal information and mobile terminal
CN108549798A (en) * 2018-04-12 2018-09-18 珠海市魅族科技有限公司 Terminal equipment control method and device, terminal device and computer readable storage medium
CN110084047A (en) * 2019-03-20 2019-08-02 努比亚技术有限公司 A kind of access right control method, terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN110851139B (en) Method and device for checking codes and electronic equipment
CN110569667B (en) Access control method and device, computer equipment and storage medium
CN112257104A (en) Authority control method and device and electronic equipment
CN111209306A (en) Business logic judgment method and device, electronic equipment and storage medium
CN112487451A (en) Display method and device and electronic equipment
CN112256231A (en) Volume control method, device, terminal and storage medium
CN111309254A (en) Data processing method and device, readable medium and electronic equipment
CN111460432B (en) On-line document authority control method, device, equipment and computer readable medium
CN113391860B (en) Service request processing method and device, electronic equipment and computer storage medium
CN111798251A (en) Verification method and device of house source data and electronic equipment
CN112131181A (en) Storage path display method and device and electronic equipment
CN115086305B (en) Information processing method, apparatus, electronic device and storage medium
CN111563252A (en) Authority management method and device, terminal and storage medium
CN111756833B (en) Node processing method, node processing device, electronic equipment and computer readable medium
CN111026504B (en) Processing method and device for configuring instruction for acquiring processor information in virtual machine, CPU chip, system on chip and computer
CN110941683B (en) Method, device, medium and electronic equipment for acquiring object attribute information in space
CN113518183A (en) Camera calling method and device and electronic equipment
CN111367590A (en) Interrupt event processing method and device
CN111240657A (en) Method and device for generating SDK and electronic equipment
CN111291379A (en) Android-based vehicle-mounted system application detection method and device and electronic equipment
CN112306317A (en) Unread message notification method and device and electronic equipment
CN111787043A (en) Data request method and device
CN113641966B (en) Application integration method, system, equipment and medium
CN112261659B (en) Control method and device for terminal and server, terminal and storage medium
CN116820354B (en) Data storage method, data storage device and data storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230406

Address after: Room 802, Information Building, 13 Linyin North Street, Pinggu District, Beijing, 101299

Applicant after: Beijing youzhuju Network Technology Co.,Ltd.

Address before: No. 715, 7th floor, building 3, 52 Zhongguancun South Street, Haidian District, Beijing 100081

Applicant before: Beijing infinite light field technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication

Application publication date: 20200821