CN112416211A - Opening control method and device of application permission, electronic equipment and storage medium - Google Patents

Opening control method and device of application permission, electronic equipment and storage medium Download PDF

Info

Publication number
CN112416211A
CN112416211A CN202011286952.6A CN202011286952A CN112416211A CN 112416211 A CN112416211 A CN 112416211A CN 202011286952 A CN202011286952 A CN 202011286952A CN 112416211 A CN112416211 A CN 112416211A
Authority
CN
China
Prior art keywords
application
opening
permission
authority
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011286952.6A
Other languages
Chinese (zh)
Inventor
刘旭东
王恒
宋茹
温玉东
张奎
施恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202011286952.6A priority Critical patent/CN112416211A/en
Publication of CN112416211A publication Critical patent/CN112416211A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04847Interaction techniques to control parameter settings, e.g. interaction with sliders or dials

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses an opening control method and device of application permission, electronic equipment and a storage medium, and relates to the technical field of computer technology, artificial intelligence and permission management. The specific implementation scheme is as follows: covering a target layer on a currently displayed application permission opening interface by an automatic opening instruction according to the application permission, wherein the target layer does not respond to user operation; acquiring an application authority list to be started matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list; and updating the current application authority opening progress in real time in the execution process of each user simulation instruction set, and prompting the application authority opening progress on the target layer. According to the scheme of the embodiment of the application, the automatic opening of the application permission is realized, the opening progress of the application permission can be displayed in real time, and the opening process of the application permission cannot be stopped due to misoperation of a user.

Description

Opening control method and device of application permission, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to but not limited to, a method and an apparatus for controlling opening of an application permission, an electronic device, and a storage medium.
Background
With the development of mobile internet, it is increasingly popular to access internet services through mobile terminals such as smart phones, notebook computers, tablet computers, and the like. However, the application programs in the intelligent terminal are numerous, and particularly, many game application programs are easy to allow teenagers to indulge in the application programs, so that negative effects on learning and growth are generated. Therefore, how to manage and control the use of the mobile terminal by teenagers is widely researched.
In order to realize the management and control of the parents on the use of the mobile terminal by the teenagers through the mobile terminal, when the teenagers start an application program through the mobile terminal, multiple application authorities (for example, 12-28 items) need to be opened according to different models of the mobile terminal, and the opening of each application authority needs to be successfully opened by performing multiple click operations, so that the opening of all the authorities needs to take a lot of time.
At the present stage, in order to solve the problem that it takes long time for a user to manually open the user permission, a method for automatically opening the application permission is designed, but in the process of automatically opening the application permission, the problems that the user mistakenly touches the mobile terminal to cause the failure of opening the application permission, the opening progress of the application permission cannot be checked, and the like exist.
Disclosure of Invention
The embodiment of the application provides an opening control method and device of application permission, electronic equipment and a storage medium.
According to an aspect of the embodiments of the present application, a method for controlling opening of an application authority is provided, including:
according to an automatic opening instruction of the application authority, covering a target layer on a currently displayed application authority opening interface, wherein user operation is not responded to the target layer;
acquiring an application authority list to be started matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list;
and updating the current application permission opening progress in real time in the execution process of each user simulation instruction set, and prompting the application permission opening progress on the target layer.
According to another aspect of the embodiments of the present application, there is provided an opening control device for application authority, including:
the target layer covering module is used for covering a target layer on a currently displayed application permission opening interface according to an automatic opening instruction of application permission, wherein the target layer does not respond to user operation;
the application authority list acquisition module is used for acquiring an application authority list to be started, which is matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list;
and the application permission opening progress updating module is used for updating the current application permission opening progress in real time in the execution process of each user simulation instruction set and prompting the application permission opening progress on the target layer.
According to another aspect of embodiments of the present application, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the method for controlling the opening of the application permission described in any embodiment of the present application.
According to another aspect of the embodiments of the present application, there is provided a non-transitory computer-readable storage medium storing computer instructions, wherein the computer instructions are configured to cause the computer to execute the method for controlling the opening of the application authority according to any one of the embodiments of the present application.
According to the technical scheme of the embodiment of the application, the problems that the user mistakenly touches the mobile terminal to cause the failure of opening the application permission and cannot check the opening progress of the application permission are solved, the automatic opening of the application permission can be realized, the opening progress of the application permission can be displayed in real time, and the opening process of the application permission cannot be stopped due to the misoperation of the user.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they necessarily limit the scope of the embodiments of the present application. Other features of the embodiments of the present application will become readily apparent from the following description.
Drawings
The drawings are included to provide a further understanding of the present solution and are not intended to limit the embodiments of the present application. Wherein:
fig. 1 is a schematic diagram of an opening control method of application permissions according to an embodiment of the present application;
fig. 2 is a schematic diagram of another method for controlling the opening of application rights according to an embodiment of the present application;
FIG. 3 is a diagram illustrating another method for controlling the opening of application permissions according to an embodiment of the present application;
FIG. 4 is a diagram illustrating another method for controlling the opening of application permissions according to an embodiment of the present application;
FIG. 5A is a flowchart illustrating opening of application permissions according to an embodiment of the present application;
FIG. 5B is a diagram illustrating an application permission opening progress according to an embodiment of the present application;
FIG. 6 is a schematic structural diagram of an apparatus for controlling the opening of application rights according to an embodiment of the present application;
fig. 7 is a block diagram of an electronic device for implementing an application authority opening control method according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic diagram of a method for controlling opening of application permissions according to an embodiment of the present application, where the present embodiment is applicable to a case where opening control is performed on application permissions of application programs installed in a mobile terminal, and the method may be performed by an apparatus for controlling opening of application permissions, where the apparatus may be implemented by software and/or hardware and is specifically configured in the mobile terminal; the mobile terminal related in the embodiment may be a smart phone, a tablet computer, a notebook computer, or the like. Specifically, referring to fig. 1, the method specifically includes the following steps:
and S110, according to the automatic opening instruction of the application authority, covering a target layer on the currently displayed application authority opening interface.
And no response to user operation is made on the target layer. For example, if the user clicks the target layer, the target layer does not respond to the user's clicking operation.
In this embodiment, the application right may be an access right of a target application installed in the mobile terminal, for example, a right to access a phone, a camera, an address book, and other application data, and is not limited in this embodiment. The target application related in this embodiment may be a management application, a social application, an entertainment application, or a video application, and the like, which is not limited in this embodiment.
The automatic opening instruction of the application permission can comprise the use permission of opening the mobile terminal hardware equipment; the method also can comprise the steps of starting the access authority of each application program installed on the mobile terminal; the method may also include a use right for starting the mobile terminal hardware device and an access right for each application installed on the mobile terminal, which is not limited in this embodiment. For example, the automatic opening instruction of the application authority may be: the access right of opening the phone, the access right of the camera, the access right of the application program A and the access right of the application program B.
In an optional implementation manner of this embodiment, the target application program may cover a target layer on the currently displayed application permission opening interface according to the automatic opening instruction of the application permission, where all application permissions to be opened by the target application program may be seen in the application permission opening interface.
It should be noted that, in this embodiment, the target layer may completely cover the currently displayed application permission opening interface; the currently displayed application permission opening interface can be partially covered; for example, a target layer having a width the same as that of the currently displayed application permission opening interface and a length equal to half of that of the currently displayed application permission opening interface may be covered in the middle of the currently displayed application permission opening interface.
In an optional implementation manner of this embodiment, the target layer may be a mask layer, and it can be understood that the mask layer may block the currently displayed application permission open interface.
And S120, acquiring an application authority list to be started matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list.
The application permission list can include all application permissions to be opened for the target application program; for example, the phone authority, the storage authority, and the authority to access data of each application program are not limited in the present embodiment.
The user operation simulation instruction set corresponding to the application authority can comprise instructions corresponding to all user operations for starting the application authority corresponding to the user operation simulation instruction set; for example, if the application right is a right to open data for accessing the application program a, the user operation simulation instruction set corresponding to the application right may include instructions corresponding to all manual click operations for opening the application right by the user.
In an optional implementation manner of this embodiment, after the target application program covers the target layer on the currently displayed application permission opening interface according to the automatic opening instruction of the application permission, the application permission list to be opened, which is matched with the automatic opening instruction, may be further obtained.
Further, a user operation simulation instruction set corresponding to each application permission in the obtained application permission list can be executed, and then opening operation is performed on each application permission in the application permission list.
Exemplarily, if the application permission list includes an application permission a, an application permission B and an application permission C; then the user operation simulation instruction set corresponding to the application authority a, the user operation simulation instruction set corresponding to the application authority B, and the user operation simulation instruction set corresponding to the application authority C may be executed in sequence.
And S130, updating the current application permission opening progress in real time in the execution process of each user simulation instruction set, and prompting the application permission opening progress on a target layer.
In an optional implementation manner of this embodiment, in the process of executing the user operation simulation instruction set corresponding to each application permission in the application permission list, the current application permission opening progress may be updated in real time, and the opening progress of the application permission is prompted on the target layer, so that the user knows the opening condition of the application permission.
In a specific example of this embodiment, the application permission list includes 10 application permissions in total, and the opening schedule may be updated in real time in the opening process of each application permission, where the opening schedule may include: the name of the currently updated application right, and how many opening work of the application right has been completed, for example, the currently updated application right is a telephone right, and opening of 6 application rights has been completed.
According to the scheme of the embodiment, a target layer is covered on a currently displayed application permission opening interface through an automatic opening instruction according to the application permission, wherein user operation is not responded to the target layer; acquiring an application authority list to be started matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list; in the execution process of each user simulation instruction set, the current application permission opening progress is updated in real time, and the application permission opening progress is prompted on the target layer, so that the problems that the user mistakenly touches the mobile terminal to cause application permission opening failure and cannot check the application permission opening progress can be solved, the automatic opening of the application permission can be realized, the opening progress of the application permission can be displayed in real time, and the opening process of the application permission cannot be stopped due to misoperation of the user.
Fig. 2 is a schematic diagram of another method for controlling the opening of application permissions according to an embodiment of the present application, which is a further refinement of the foregoing technical solution, and the technical solution in the embodiment may be combined with various alternatives in one or more of the foregoing embodiments. As shown in fig. 2, the method for controlling the opening of the application authority includes the following steps:
and S210, according to the automatic opening instruction of the application permission, covering a target layer on the currently displayed application permission opening interface.
And S220, acquiring an application authority list to be opened matched with the automatic opening instruction.
And S230, requesting a user operation simulation instruction set corresponding to each application authority in the application authority list to be started from the server.
Wherein, each user operation simulation instruction set is used for simulating at least one user operation required to be executed by the user for manually opening the matched application authority.
In an optional implementation manner of this embodiment, after the to-be-opened application permission list matched with the automatic opening instruction is obtained, the server may further request a user operation simulation instruction set corresponding to each application permission in the to-be-opened application permission list.
For example, if the obtained application permission list includes an application permission a, an application permission B, an application permission C, and an application permission D, a request instruction may be sent to the server to obtain a user operation simulation instruction set corresponding to the application permission a, the application permission B, the application permission C, and the application permission D.
The method has the advantages that the user operation simulation instruction sets corresponding to the application authorities in the application authority list to be opened do not need to be locally generated, the user operation simulation instruction sets corresponding to the application authorities in the application authority list to be opened can be rapidly acquired, and the opening time of the application authorities can be shortened.
In another optional implementation manner of this embodiment, user operation simulation instruction sets corresponding to the application permissions in the application permission list to be opened may also be obtained in each user operation simulation instruction set locally stored in the target application program.
And S240, executing user operation simulation instruction sets corresponding to the application authorities in the application authority list.
And S250, updating the current application permission opening progress in real time in the execution process of each user simulation instruction set, and prompting the application permission opening progress on a target layer.
In an optional implementation manner of this embodiment, in the process of executing the simulation instruction set for each user, updating the current application permission opening progress in real time may include: acquiring a target application authority matched with a currently executed target user simulation instruction set in real time; and if the currently acquired first target application authority is determined to be different from the second target application authority acquired at the previous acquisition moment, updating the current application authority opening progress according to the first target application authority.
In this embodiment, in the process of executing each obtained user simulation instruction set, the target application permission matched with the currently executed target user simulation instruction set can be obtained in real time; for example, if the currently executed target user simulation instruction set is a, the target application permission a matching the target user simulation instruction set a may be further obtained.
Optionally, if it is determined that the currently acquired first target application permission is different from the second target application permission acquired at the previous acquisition time, the current application permission opening progress may be further updated according to the first target application permission.
For example, if the currently acquired first target application permission is application permission a and the second target application permission acquired at the previous time is application permission B, the current application permission opening progress may be updated to application permission a.
In this embodiment, the application permission opening progress may include: the position of the currently opened first target application permission in all application permissions in the application permission list, the name of the first target application permission and the permission description information of the first target application permission.
For example, if the application permission list includes 10 application permissions, the position of the first target application permission in all the application permissions in the application permission list may be determined according to the sequence or serial number of each application permission included in the application permission list; the authority description information of the first target application authority may correspond to a function of the first application authority; for example, if the first target application authority is a telephone authority, the authority description information corresponding to the first target application authority may be: the system is used for identifying incoming and outgoing calls, intercepting harassment or reporting, and the like.
The method has the advantages that the user can comprehensively know the opening progress of the application permission, and meanwhile, the description information of each application permission can be displayed for the user, and a basis is provided for the user to know each application permission.
According to the scheme of the embodiment, in the execution process of each user simulation instruction set acquired from the server, the target application permission matched with the currently executed target user simulation instruction set can be acquired in real time; and if the currently acquired first target application permission is determined to be different from the second target application permission acquired at the previous acquisition moment, updating the current application permission opening progress according to the first target application permission, updating the opening progress of the application permission in real time, and providing a basis for subsequently providing the opening progress of the application permission for the user.
Fig. 3 is a schematic diagram of another method for controlling the opening of application permissions according to an embodiment of the present application, which is a further refinement of the foregoing technical solution, and the technical solution in the embodiment may be combined with various alternatives in one or more of the foregoing embodiments. As shown in fig. 3, the method for controlling the opening of the application authority includes the following steps:
and S310, according to the automatic opening instruction of the application authority, covering a target layer on the currently displayed application authority opening interface.
S320, acquiring an application authority list to be started matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list.
S330, after the user operation simulation instruction sets corresponding to all the application authorities in the application authority list are executed, whether the third target application authority which is not started successfully exists is detected.
In an optional implementation manner of this embodiment, after the user operation instruction sets corresponding to all the application permissions in the application permission list are executed, whether a third target application permission that is not successfully opened exists may be further detected.
For example, after the user operation instruction sets corresponding to all the application permissions in the application permission list are executed, it may be detected whether all the application permissions in the application permission list are successfully opened, and if an application permission that is not successfully opened exists, the application permission is the third target application permission in this embodiment.
It should be noted that the third target application authority related in this embodiment may be one application authority or multiple application authorities, and this embodiment is not limited thereto.
S340, popping up a manual opening authority interface, and displaying each third target application authority on a manual opening authority limit surface.
In an optional implementation manner of this embodiment, if it is detected that third target application permissions that are not successfully opened exist after user operation instruction sets corresponding to all application permissions in the application permission list are executed, a manual opening permission interface may be further popped up, and each third target application permission is displayed in the popped-up manual opening permission boundary plane.
In another optional implementation manner of this embodiment, the displaying each third target application right in the manual opening right boundary surface may include: detecting whether a fourth target application permission which cannot be automatically started through the automatic starting instruction exists; and if so, displaying the third target application permission and the fourth target application permission on the manual opening permission boundary surface.
Optionally, all application permissions in the application permission list may be detected, and it is determined whether a fourth target application permission that cannot be automatically opened through the automatic opening instruction exists; if the fourth target application permission which cannot be automatically opened through the automatic opening instruction exists, the third target application permission and the fourth target application permission can be further displayed on the popped manual opening permission boundary surface.
The method has the advantages that the user can check the application authorities which are not successfully and automatically opened and cannot be automatically opened in the popped manual opening authority interface, and can further select whether the application authorities need to be manually opened or not.
In the scheme of this embodiment, after the user operation simulation instruction sets corresponding to all the application authorities in the application authority list are executed, whether a third target application authority which is not started successfully exists is detected; if yes, popping up a manual opening authority interface, and displaying each third target application authority on the manual opening authority boundary surface, so that a user can check unsuccessfully opened application authorities in the popped manual opening authority interface, and can further select whether unsuccessfully opened application authorities need to be manually opened.
Fig. 4 is a schematic diagram of another method for controlling the opening of application permissions according to an embodiment of the present application, which is a further refinement of the foregoing technical solution, and the technical solution in the embodiment may be combined with various alternatives in one or more of the foregoing embodiments. As shown in fig. 4, the method for controlling the opening of the application authority includes the following steps:
s410, dividing an application permission opening interface into an operation forbidden area and an operation reserved area; and covering the target layer on the operation forbidden area in the application permission opening interface.
Wherein, the target layer is a mask layer with a set transparency; the transparency may be set to 80%, 70%, 50%, or the like, and is not limited in this embodiment.
The method has the advantages that the phenomenon of abnormal opening of the application permission caused by misoperation of a user can be prevented, the mask layer is provided with certain transparency, the user can see the opening process of the application permission, and the trust risk caused by invisibility can be avoided.
In an optional implementation manner of this embodiment, after receiving the automatic opening instruction of the application permission, the application permission opening interface may be divided into operation prohibited areas, the operation areas are reserved, and the target layer is covered in the operation prohibited areas in the application permission opening interface.
It can be understood that the target layer is overlaid on the operation-prohibited area, that is, the operation of the user is not responded to on the target layer.
S420, acquiring an application authority list to be started matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list.
And S430, in the process of executing each user simulation instruction set, if an automatic start interruption instruction is detected in the reserved operation area, interrupting the currently executed user operation simulation instruction set.
In an optional implementation manner of this embodiment, in the process of executing the user operation simulation instruction sets corresponding to the application permissions in the application permission list, if an automatically-started interrupt instruction is detected in the reserved area of the application permission start interface, the currently-executed user operation simulation instruction set is interrupted, that is, the start operation of the application permission that is not started in the application permission list is stopped.
According to the scheme of the embodiment, the application permission opening interface is divided into an operation forbidden area and an operation reserved area; covering the target layer on an operation forbidden area in an application permission opening interface; in the process of executing each user simulation instruction set, if the automatic starting interruption instruction is detected in the reserved operation area, the currently executed user operation simulation instruction set is interrupted, the application permission starting operation can be interrupted in real time, and the operation experience can be enhanced.
It should be noted that the method for controlling the opening of the application permission according to each embodiment of the present application may be executed by an application management application, and the application management application may be used to manage the use of each application installed in the mobile terminal.
The advantage of such setting is that after the application authority of the application management application program is opened, the application program installed in the mobile terminal can be managed through the application management application program, that is, the management and control of using the mobile terminal by teenagers can be realized, for example, a certain game application program can be set to be used only at 8 o 'clock to 9 o' clock at night through the application management application program.
For better understanding of the present application, fig. 5 is a flowchart for opening application permissions according to an embodiment of the present application, which mainly includes the following steps:
s510, a preparation stage.
The calling end involved in the preparation stage is an application authority opening interface involved in the application; the external interface can be an authority opening button on an application authority opening interface; the configuration file can contain all user operation simulation instruction sets with the permission to be opened.
S520, judging whether an automatic authorization scheme exists.
If yes, go to S521;
if not, go to S530.
And S521, guiding the user to grant auxiliary functions.
And S522, jumping to the auxiliary function page.
S523, detecting an authorization result.
And S524, automatic authorization.
The automatic authorization involved in this step is the opening control method of the application authority involved in this application.
And S525, whether the authorization is completed or not.
If yes, returning to S510;
if not, go to S530.
S530, checking the application authority list.
If the authorization of the application authority is not finished, whether the application authority which is authorized is contained in the application authority list can be continuously checked.
And S540, determining whether the guidance needs to be displayed.
If yes, go to S550;
if not, return to S510.
And S550, displaying the authorized guide.
And S560, jumping to a corresponding authorization page.
And S570, detecting an authorization result.
In this embodiment, by detecting the authorization result, all authorized application permissions of the application management class application program can be checked.
Fig. 5B is a diagram illustrating an opening progress of an application authority according to an embodiment of the application, and referring to fig. 5B, 510 is the opening progress of the application authority at the last time, and 520 is the opening progress of the application authority at the current time. It should be noted that, in fig. 5, 500 included in 510 and 520 is a target layer (a mask layer with a set transparency) referred to in this application, and the area is an operation-prohibited area, except for a part of the area where an operation area is reserved.
In this embodiment, in the execution process of each user simulation instruction set, the opening progress of the current application permission may be updated in real time, as shown in fig. 5B, the application permission opened at the last time is a telephone permission, positions of all application permissions (all application permissions are 9 application permissions) in the application permission list are 2, and description information of the application permission is used to identify an incoming and outgoing call, perform harassment interception, report, or the like; the application authority started at the current moment is a storage authority, the positions of the application authorities in all the application authorities in the application authority list are 3, and the description information of the application authority is used for scanning stored photos and files to judge the cleaning function.
The scheme of the embodiment can help the user to reduce the click authorization operation of at least 8-12 application authorities, help the user to reduce the operation time cost, reduce the waiting time and improve the user experience. Meanwhile, the number of opened application authorities can be enriched, so that the management capability of the product is stronger and controllable; and through the semitransparent shade, the phenomenon that misoperation is caused in the process of granting the application authority, so that the authorization is stopped can be avoided.
Fig. 6 is a schematic structural diagram of an apparatus for controlling opening of application authority according to an embodiment of the present application, and referring to fig. 6, the apparatus for controlling opening of application authority includes: the system comprises a target layer covering module 610, an application authority list obtaining module 620 and an application authority opening progress updating module 630.
The target layer covering module 610 is configured to cover a target layer on a currently displayed application permission opening interface according to an automatic opening instruction of an application permission, where a user operation is not responded to the target layer;
an application permission list obtaining module 620, configured to obtain an application permission list to be opened that is matched with the automatic opening instruction, and execute a user operation simulation instruction set corresponding to each application permission in the application permission list;
an application permission opening progress updating module 630, configured to update the current application permission opening progress in real time during execution of each user simulation instruction set, and prompt the application permission opening progress on the target layer.
According to the scheme of the embodiment, a target layer is covered on a currently displayed application permission opening interface through a target layer covering module, wherein user operation is not responded to the target layer; acquiring an application authority list to be started matched with the automatic starting instruction through an application authority list acquisition module, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list; the current application permission opening progress is updated in real time by the application permission opening progress updating module in the execution process of each user simulation instruction set, and the application permission opening progress is prompted on the target layer, so that the problems that the application permission is failed to be opened due to the fact that a user mistakenly touches a mobile terminal and the application permission opening progress cannot be checked are solved, automatic opening of the application permission can be achieved, the opening progress of the application permission can be displayed in real time, and the opening process of the application permission cannot be stopped due to misoperation of the user.
Optionally, the device for controlling the opening of the application authority further includes:
the simulation instruction set request module is used for requesting a user operation simulation instruction set corresponding to each application authority in the application authority list to be started from a server;
wherein, each user operation simulation instruction set is used for simulating at least one user operation required to be executed by the user for manually opening the matched application authority.
Optionally, the application permission opening progress updating module 630 is specifically configured to:
acquiring a target application authority matched with a currently executed target user simulation instruction set in real time;
and if the currently acquired first target application authority is determined to be different from the second target application authority acquired at the previous acquisition moment, updating the current application authority opening progress according to the first target application authority.
Optionally, the permission opening schedule includes at least one of the following:
the position of the currently opened first target application permission in all application permissions in the application permission list, the name of the first target application permission and the permission description information of the first target application permission.
Optionally, the device for controlling the opening of the application authority further includes:
the third target application permission detection module is used for detecting whether a third target application permission which is not started successfully exists;
if yes, popping up a manual opening authority interface, and displaying the third target application authority on the manual opening authority interface.
Optionally, the third target application permission detecting module is further configured to:
detecting whether a fourth target application permission which cannot be automatically started through the automatic starting instruction exists;
and if so, displaying the third target application permission and the fourth target application permission on the manual permission opening interface.
Optionally, the target layer coverage module 610 is specifically configured to:
dividing the application permission opening interface into an operation forbidden area and an operation reserved area;
covering the target layer on the operation forbidden area in the application permission opening interface;
the opening control device of the application authority further comprises: interrupt module for
And in the process of executing each user simulation instruction set, if an automatic starting interruption instruction is detected in the reserved operation area, interrupting the currently executed user operation simulation instruction set.
Optionally, the device for controlling the opening of the application permission is configured in an application management application, and the application management application is used for managing the use of each application installed in the mobile terminal.
Optionally, the target layer involved in this embodiment is a mask layer with a set transparency.
The device for controlling the opening of the application permission can execute the method for controlling the opening of the application permission provided by any embodiment of the application, and has corresponding functional modules and beneficial effects of the execution method. For details of the technology that are not described in detail in this embodiment, reference may be made to the method for controlling the opening of the application authority provided in any embodiment of the present application.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
Fig. 7 is a block diagram of an electronic device according to an embodiment of the present application, illustrating a method for controlling the opening of an application authority. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 7, the electronic apparatus includes: one or more processors 701, a memory 702, and interfaces for connecting the various components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 7, one processor 701 is taken as an example.
The memory 702 is a non-transitory computer readable storage medium as provided herein. The memory stores instructions executable by at least one processor, so that the at least one processor executes the opening control method of the application authority provided by the application. The non-transitory computer-readable storage medium of the present application stores computer instructions for causing a computer to execute the opening control method of application authority provided by the present application.
The memory 702 is a non-transitory computer readable storage medium, and can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the opening control method for application permissions in the embodiment of the present application (for example, the target layer covering module 610, the application permission list obtaining module 620, and the application permission opening progress updating module 630 shown in fig. 6). The processor 701 executes various functional applications and data processing of the server by running the non-transitory software programs, instructions, and modules stored in the memory 702, that is, implements the opening control method of the application authority in the above method embodiment.
The memory 702 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data and the like created according to use of the electronic device that implements the opening control method of application authority of the embodiment of the present application. Further, the memory 702 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 702 may optionally include a memory remotely disposed from the processor 701, and these remote memories may be connected to an electronic device implementing the opening control method of application authority of the embodiment of the present application through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device implementing the method for controlling the opening of the application permission according to the embodiment of the present application may further include: an input device 703 and an output device 704. The processor 701, the memory 702, the input device 703 and the output device 704 may be connected by a bus or other means, and fig. 7 illustrates an example of a connection by a bus.
The input device 703 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the control electronics for opening of application rights, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointer stick, one or more mouse buttons, a track ball, a joystick, or other input devices. The output devices 704 may include a display device, auxiliary lighting devices (e.g., LEDs), and tactile feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the problems that the user mistakenly touches the mobile terminal to cause the failure of opening the application permission and cannot check the opening progress of the application permission are solved, the automatic opening of the application permission can be realized, the opening progress of the application permission can be displayed in real time, and the opening process of the application permission cannot be stopped due to the misoperation of the user.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (20)

1. A method for controlling opening of application authority comprises the following steps:
according to an automatic opening instruction of the application authority, covering a target layer on a currently displayed application authority opening interface, wherein user operation is not responded to the target layer;
acquiring an application authority list to be started matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list;
and updating the current application permission opening progress in real time in the execution process of each user simulation instruction set, and prompting the application permission opening progress on the target layer.
2. The method of claim 1, wherein before executing the user operation simulation instruction set corresponding to each application permission in the application permission list, the method further comprises:
requesting a user operation simulation instruction set corresponding to each application permission in the application permission list to be opened from a server;
wherein, each user operation simulation instruction set is used for simulating at least one user operation required to be executed by the user for manually opening the matched application authority.
3. The method of claim 1, wherein the updating the current application permission opening progress in real time during the execution of each user simulation instruction set comprises:
acquiring a target application authority matched with a currently executed target user simulation instruction set in real time;
and if the currently acquired first target application authority is determined to be different from the second target application authority acquired at the previous acquisition moment, updating the current application authority opening progress according to the first target application authority.
4. The method of claim 3, wherein the application permission opening schedule comprises at least one of:
the position of the currently opened first target application permission in all application permissions in the application permission list, the name of the first target application permission and the permission description information of the first target application permission.
5. The method of claim 1, wherein after executing the user operation simulation instruction sets respectively corresponding to all application authorities in the application authority list, further comprising:
detecting whether a third target application authority which is not started successfully exists;
if yes, popping up a manual opening authority interface, and displaying the third target application authority on the manual opening authority interface.
6. The method of claim 5, wherein exposing each of the third target application permissions at the manual opening permission interface comprises:
detecting whether a fourth target application permission which cannot be automatically started through the automatic starting instruction exists;
and if so, displaying the third target application permission and the fourth target application permission on the manual permission opening interface.
7. The method according to claim 1, wherein overlaying a target layer on a currently displayed application permission opening interface comprises:
dividing the application permission opening interface into an operation forbidden area and an operation reserved area;
covering the target layer on the operation forbidden area in the application permission opening interface;
the method further comprises the following steps:
and in the process of executing each user simulation instruction set, if an automatic starting interruption instruction is detected in the reserved operation area, interrupting the currently executed user operation simulation instruction set.
8. The method of claim 1, wherein the method is performed by an application management class application for use management of applications installed within the mobile terminal.
9. The method according to any of claims 1-8, wherein the target layer is a mask layer with a set transparency.
10. An opening control device for application authority, comprising:
the target layer covering module is used for covering a target layer on a currently displayed application permission opening interface according to an automatic opening instruction of application permission, wherein the target layer does not respond to user operation;
the application authority list acquisition module is used for acquiring an application authority list to be started, which is matched with the automatic starting instruction, and executing a user operation simulation instruction set corresponding to each application authority in the application authority list;
and the application permission opening progress updating module is used for updating the current application permission opening progress in real time in the execution process of each user simulation instruction set and prompting the application permission opening progress on the target layer.
11. The apparatus of claim 10, wherein the means for controlling the opening of the application authority further comprises:
the simulation instruction set request module is used for requesting a user operation simulation instruction set corresponding to each application authority in the application authority list to be started from a server;
wherein, each user operation simulation instruction set is used for simulating at least one user operation required to be executed by the user for manually opening the matched application authority.
12. The apparatus of claim 10, wherein the application permission opening progress update module is specifically configured to:
acquiring a target application authority matched with a currently executed target user simulation instruction set in real time;
and if the currently acquired first target application authority is determined to be different from the second target application authority acquired at the previous acquisition moment, updating the current application authority opening progress according to the first target application authority.
13. The apparatus of claim 12, wherein the permission opening schedule comprises at least one of:
the position of the currently opened first target application permission in all application permissions in the application permission list, the name of the first target application permission and the permission description information of the first target application permission.
14. The apparatus of claim 10, wherein the means for controlling the opening of the application authority further comprises:
the third target application permission detection module is used for detecting whether a third target application permission which is not started successfully exists;
if yes, popping up a manual opening authority interface, and displaying the third target application authority on the manual opening authority interface.
15. The apparatus of claim 14, wherein the third target application permission detection module is further configured to:
detecting whether a fourth target application permission which cannot be automatically started through the automatic starting instruction exists;
and if so, displaying the third target application permission and the fourth target application permission on the manual permission opening interface.
16. The apparatus according to claim 10, wherein the target layer overlay module is specifically configured to:
dividing the application permission opening interface into an operation forbidden area and an operation reserved area;
covering the target layer on the operation forbidden area in the application permission opening interface;
the device further comprises: interrupt module for
And in the process of executing each user simulation instruction set, if an automatic starting interruption instruction is detected in the reserved operation area, interrupting the currently executed user operation simulation instruction set.
17. The apparatus according to claim 10, wherein the apparatus is configured in an application management application for managing usage of each application installed in the mobile terminal.
18. The apparatus according to any of claims 10-17, wherein the target layer is a mask layer with a set transparency.
19. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of controlling the opening of application rights of any of claims 1-9.
20. A non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the opening control method of application authority of any one of claims 1 to 9.
CN202011286952.6A 2020-11-17 2020-11-17 Opening control method and device of application permission, electronic equipment and storage medium Pending CN112416211A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011286952.6A CN112416211A (en) 2020-11-17 2020-11-17 Opening control method and device of application permission, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011286952.6A CN112416211A (en) 2020-11-17 2020-11-17 Opening control method and device of application permission, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112416211A true CN112416211A (en) 2021-02-26

Family

ID=74831514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011286952.6A Pending CN112416211A (en) 2020-11-17 2020-11-17 Opening control method and device of application permission, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112416211A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060069915A1 (en) * 2004-09-29 2006-03-30 Sysmex Corporation Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium
US20060265760A1 (en) * 2005-05-23 2006-11-23 Valery Daemke Methods and systems for managing user access to computer software application programs
CN103677578A (en) * 2013-12-16 2014-03-26 天津三星通信技术研究有限公司 Partial shielding method for screen and portable terminal with adoption of method
CN105701398A (en) * 2015-12-30 2016-06-22 北京金山安全软件有限公司 Method and device for opening auxiliary function permission and electronic equipment
CN106484303A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method preventing maloperation and electronic equipment
CN106569707A (en) * 2016-10-21 2017-04-19 深圳众思科技有限公司 Touch control screen-based touch control shielding method and terminal
CN107016281A (en) * 2017-03-23 2017-08-04 北京金山安全软件有限公司 Permission setting method and device of application program and electronic equipment
CN107943531A (en) * 2017-11-03 2018-04-20 珠海市君天电子科技有限公司 A kind of authority control method, user terminal, electronic equipment and storage medium
CN108920912A (en) * 2018-06-20 2018-11-30 北京金山安全软件有限公司 Authorization interface skipping method and device and electronic equipment

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060069915A1 (en) * 2004-09-29 2006-03-30 Sysmex Corporation Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium
US20060265760A1 (en) * 2005-05-23 2006-11-23 Valery Daemke Methods and systems for managing user access to computer software application programs
CN103677578A (en) * 2013-12-16 2014-03-26 天津三星通信技术研究有限公司 Partial shielding method for screen and portable terminal with adoption of method
CN105701398A (en) * 2015-12-30 2016-06-22 北京金山安全软件有限公司 Method and device for opening auxiliary function permission and electronic equipment
CN106569707A (en) * 2016-10-21 2017-04-19 深圳众思科技有限公司 Touch control screen-based touch control shielding method and terminal
CN106484303A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method preventing maloperation and electronic equipment
CN107016281A (en) * 2017-03-23 2017-08-04 北京金山安全软件有限公司 Permission setting method and device of application program and electronic equipment
CN107943531A (en) * 2017-11-03 2018-04-20 珠海市君天电子科技有限公司 A kind of authority control method, user terminal, electronic equipment and storage medium
CN108920912A (en) * 2018-06-20 2018-11-30 北京金山安全软件有限公司 Authorization interface skipping method and device and electronic equipment

Similar Documents

Publication Publication Date Title
US11093715B2 (en) Method and system for learning and enabling commands via user demonstration
EP3227777B1 (en) Application launching and switching interface
EP2775416B1 (en) Apparatus and method for configuring password and for releasing lock
CN110262715B (en) Information processing method and device, computer readable storage medium and electronic equipment
US9720557B2 (en) Method and apparatus for providing always-on-top user interface for mobile application
US11175823B2 (en) Method and apparatus for controlling terminal device using gesture control function, and non-transitory computer-readable storage medium
CN110620844B (en) Program starting method, device, equipment and storage medium
CN112269508B (en) Display method and device and electronic equipment
CN113794795B (en) Information sharing method and device, electronic equipment and readable storage medium
US20210234862A1 (en) Device interaction method, method for managing permission, interactive device and user terminal
US11281761B2 (en) Method and system for using a plurality of accounts in an instant messaging application
CN108804915A (en) Virus method for cleaning, storage device and electric terminal
CN111831986A (en) Unlocking method and device based on gesture password
US11689757B2 (en) Method and apparatus for providing video streams
CN113434226A (en) Communication method, communication device, electronic equipment and readable storage medium
CN111857514A (en) Device control method, device, electronic device and storage medium
WO2023103901A1 (en) Application management method and apparatus, and electronic device
CN111368275A (en) Robot control method, device, equipment and storage medium
CN112416211A (en) Opening control method and device of application permission, electronic equipment and storage medium
CN111723343B (en) Interactive control method and device of electronic equipment and electronic equipment
CN110750408B (en) Method, device and apparatus for controlling USB debug mode switch, and storage medium
CN112988426A (en) Message processing method and device
CN113138786A (en) Application updating method and device
CN105824864A (en) Quick communication method and terminal
CN111552537A (en) Theme switching method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination