CN116720172A - Verification method and device for system permission, computer equipment and readable storage medium - Google Patents
Verification method and device for system permission, computer equipment and readable storage medium Download PDFInfo
- Publication number
- CN116720172A CN116720172A CN202310980326.4A CN202310980326A CN116720172A CN 116720172 A CN116720172 A CN 116720172A CN 202310980326 A CN202310980326 A CN 202310980326A CN 116720172 A CN116720172 A CN 116720172A
- Authority
- CN
- China
- Prior art keywords
- verification
- application program
- time stamp
- authority
- rights
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 143
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000004590 computer program Methods 0.000 claims description 14
- 230000015654 memory Effects 0.000 claims description 13
- 230000000903 blocking effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000005291 magnetic effect Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a verification method of system authority. The verification method of the system authority comprises the following steps: acquiring a time stamp cache passing the verification of the authority of the system used by the application program last time according to the request of the application program; judging whether the time stamp is expired according to the time stamp and the current time stamp of the system; if yes, verifying the application program using system permission again; and if not, the application program passes the verification of the system permission. The application also discloses a verification device of the system authority, computer equipment and a computer readable storage medium. When the application program requests to use the system rights, whether the time stamp passing the last time of using the system rights verification of the cached application program is expired is judged, if not, the verification of the application program using the system rights is not performed any more, and the problem that the system is blocked due to the fact that the high-frequency system rights verification of the application program is performed is avoided.
Description
Technical Field
The present application relates to the field of application technologies, and in particular, to a system authority verification method, a system authority verification device, a computer device, and a computer readable storage medium.
Background
In the Android system, APP (Application) needs to perform permission judgment before accessing some systems API (Application Programming Interface), and first judges whether the user grants relevant permission required by the App to access the API. If there is grant of the relevant authority, the API is accessed, and if the user does not grant, the authority application is performed. For example, before positioning, it is necessary to determine whether the user grants positioning authority, background positioning authority, whether the user turns on the GPS switch, and the like. In some scenes, permission judgment is frequently carried out, and some performance problems may be brought about, so that the system is blocked.
Disclosure of Invention
To solve at least one technical problem in the background art, embodiments of the present application provide a system authority verification method, a system authority verification device, a computer device, and a computer readable storage medium.
The verification method of the system authority of the embodiment of the application comprises the following steps:
acquiring a time stamp cache passing the verification of the system authority last time the application program is used according to the request of the application program;
judging whether the time stamp is expired according to the time stamp and the current time stamp of the system;
if yes, re-verifying the application program to use the system authority;
and if not, the application program uses the system authority to verify passing.
In some embodiments, determining whether the timestamp has expired according to the timestamp and a current timestamp of the system comprises:
calculating the valid time stamp passing verification according to the time stamp and the valid period passing verification;
and determining whether the valid timestamp is earlier than the current timestamp.
In some embodiments, the duration of the expiration date corresponds to the type of system rights;
or the duration of the validity period corresponds to the kind of the application program.
In some embodiments, after re-verifying the application program using the system right, the method for verifying the system right further includes:
if the verification result is that the verification is passed, inquiring the value of the effective period;
and determining the effective period according to user input.
In some embodiments, the method for verifying system rights further includes:
and if the timestamp passing the verification of the system permission used by the application program last time does not exist, the verification of the system permission used by the application program is carried out again.
In some embodiments, the number of the system authorities is a plurality, and the plurality of the system authorities are ordered according to a set order;
after the application program passes the verification by using the system authority, the verification method of the system authority further comprises the following steps:
and after the current system authority passes the verification, updating a time stamp which is arranged behind the current system authority and passes the verification of the system authority.
In some embodiments, the number of the system authorities is a plurality, and the plurality of the system authorities are ordered according to a set order; after re-verifying the application program to use the system authority, the verification method of the system authority further comprises the following steps:
and if the verification result of the current system permission is that the verification is not passed, the time stamp cache using the system permission arranged in front of the current system permission is emptied.
The verification device of the system authority of the embodiment of the application comprises:
the acquisition module is used for acquiring a timestamp cache passing the verification of the system authority last time the application program is used according to the request of the application program;
the judging module is used for judging whether the time stamp is expired according to the time stamp and the current time stamp of the system;
and the verification module is used for verifying the application program to use the system permission again if yes; and if not, the application program uses the system authority to verify passing.
The computer device according to an embodiment of the present application includes: one or more processors; a memory; and one or more computer programs, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, the one or more computer programs configured to: and executing the verification method of the system authority according to any embodiment of the application.
The non-transitory computer readable storage medium of an embodiment of the present application stores a computer program that, when executed by one or more processors, causes the processors to execute the method for verifying system rights according to any of the embodiments of the present application.
In the verification method, the verification device, the computer device and the computer readable storage medium for the system permission, when the application program requests to use the system permission, the cached time stamp passed by the verification of the application program for last use of the system permission is judged to be expired, and if not, the application program is not verified to use the system permission any more, so that the problem of system blocking caused by high-frequency system permission verification of the application program is avoided.
Additional aspects and advantages of embodiments of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flowchart of a system authority verification method according to a first embodiment of the present application;
FIG. 2 is a flowchart illustrating one of the steps of a system authority verification method according to a second embodiment of the present application;
FIG. 3 is a flowchart illustrating a method for verifying system rights according to a third embodiment of the present application;
FIG. 4 is a flowchart of a method for verifying system rights according to a fourth embodiment of the present application;
FIG. 5 is a flowchart of a system authority verification method according to a fifth embodiment of the present application;
FIG. 6 is a schematic block diagram of a verification device for system rights according to a sixth embodiment of the present application;
FIG. 7 is a schematic diagram of a computer-readable storage medium in communication with a processor in accordance with certain embodiments of the application;
FIG. 8 is a schematic diagram of a computer device according to some embodiments of the application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for explaining the embodiments of the present application and are not to be construed as limiting the embodiments of the present application.
Referring to fig. 1, fig. 1 is a flowchart of a system authority verification method according to a first embodiment of the present application, where the system authority verification method according to the embodiment of the present application includes the steps of:
01: acquiring a time stamp cache passing the verification of the authority of the system used by the application program last time according to the request of the application program;
02: judging whether the time stamp is expired according to the time stamp and the current time stamp of the system;
03: if yes, verifying the application program using system permission again;
04: if not, the application program passes the verification of the system permission.
In the verification method of the system permission in the embodiment of the application, when the application program requests to use the system permission, the cached timestamp passed by the last time of the application program using the system permission verification is judged to be expired, if not, the application program using the system permission is not verified any more, the verification frequency is reduced, and the problem of system blocking caused by the high-frequency system permission verification of the application program is avoided.
In step 01, a timestamp buffer that the application program passes the verification of the last time using the system permission is obtained according to the request of the application program, specifically, during the use process of the application program, the application program may request the use of the system permission to perform related services, for example, request the use of the positioning permission, the camera permission, the access system file permission, the access address book permission, the background positioning permission, etc., and before the application program uses the system permission, the application program needs to pass the verification of the use system permission. In this step, the timestamp passed by the verification of the system authority last time the application program uses is cached in the system, and when the application program requests again this time, the timestamp is acquired to perform the subsequent judgment step.
In step 02, it is determined whether the timestamp has expired according to the timestamp and the current timestamp of the system, specifically, the current timestamp reflects the current time of the system, the timestamp reflects the time when the permission of the application program for using the system last time passes verification, and it may be determined whether the timestamp has expired according to the timestamp and the current timestamp, that is, whether the result of the last verification passes has expired, and it may be further determined whether to perform the verification again according to the determination result.
In step 03, if the application program usage system permission is verified again, if the result of the last verification has expired, the application program usage system permission needs to be verified again, for example, the re-pop-window asks the user whether the verification is passed or not.
In step 04, if the application program passes the verification of the system permission, if the result of the last verification passes the verification is not expired, the verification of the application program for using the system permission is not needed again, the result of the last verification passes is directly used, the same application program is prevented from using the same system permission to perform multiple verification operations in a short time, system resources are saved, and the system is prevented from being blocked. Of course, after step 04 is implemented, the buffer memory of the timestamp that the application program uses the system permission to verify is updated to reflect the time that the application program uses the system permission to verify, and the next time the timestamp is judged to expire, the next time the timestamp is based on the current time.
Referring to fig. 2, fig. 2 is a flowchart illustrating one step of a system authority verification method according to a second embodiment of the present application, and in some embodiments, step 02: judging whether the time stamp is expired according to the time stamp and the current time stamp of the system, comprising the following steps:
021: calculating the valid time stamp passing verification according to the time stamp and the valid period passing verification;
022: it is determined whether the valid timestamp is earlier than the current timestamp.
In step 021, calculating the valid time stamp of the verification passing according to the time stamp and the valid period of the verification passing, wherein the valid period can refer to the longest time length that the result of the verification passing can be reserved, and the result of the verification passing can be reused without performing verification operation. In one example, the duration of the validity period corresponds to the type of the system rights, that is, the validity periods of different system rights may be different, for example, the validity period of the use positioning rights is a first duration, the validity period of the use camera rights is a second duration, and the like, which is not limited herein. In another example, the duration of the validity period corresponds to the type of the application, that is, the validity periods of different types of application may be different, for example, the validity period of the instant messaging application using the system rights (all system rights or the designated system rights) is a third duration, the validity period of the video application using the system rights (all system rights or the designated system rights) is a fourth duration, and the like, which is not limited herein. Therefore, different effective periods are respectively set according to the types of the system authorities or the types of the application programs, the effective periods can be adaptively adjusted according to different use requirements, importance degrees and the like, and the use experience of users is improved. Of course, different kinds of system rights, or valid periods corresponding to different kinds of application programs may be individually set by the user, or may be default settings of the system, which is not limited herein.
In step 022, it is determined whether the valid time stamp is earlier than the current time stamp, and it can be understood that the valid period is exceeded if the valid time stamp is earlier than the current time stamp, the verification result is invalid, the verification needs to be performed again, and the valid period is not exceeded if the valid time stamp is later than the current time stamp, and the verification result is still valid. By judging the effective timestamp and the current timestamp in advance, verification operation is not needed for each application program request, system processing resources are saved, and system blocking is prevented.
Referring to fig. 3, fig. 3 is a flowchart of a system authority verification method according to a third embodiment of the present application, and in some embodiments, after step 03, the system authority verification method further includes the steps of:
05: if the verification result is that the verification is passed, inquiring the value of the valid period;
and 06: according to the user input, a validity period is determined.
In steps 05 and 06, if the verification result is that the verification is passed, the value of the valid period is queried, specifically, when the verification is performed again on the application program using system authority, and the value of the valid period of the user can be queried together, so that the verification is not required to be performed again on the same application program using the same system authority within the valid period, and the personalized wish of the user is fully reflected.
In some embodiments, the method for verifying system rights further comprises the steps of: if there is no time stamp passing the last time of using the system permission verification by the application program, the system permission of the application program is re-verified, that is, if the application program is the application program which is used in the system for the first time, or the application program initially requests a certain kind of system permission, or the time stamp buffer passing the last time of using the system permission verification by the application program is lost, or the application program never uses the system permission verification to pass the reason, so that there is no time stamp passing the last time of using the system permission verification by the application program, the time stamp is not needed to be acquired, and the system permission of the application program is directly re-verified.
Referring to fig. 4, fig. 4 is a flow chart of a system authority verification method according to a fourth embodiment of the present application, in some embodiments, the number of system authorities is multiple, and the multiple system authorities are ordered according to a set order, after step 03, the system authority verification method further includes step 07: after the current system authority passes the verification, updating the time stamp of the verification passing of the system authority arranged behind the current system authority. In another example, step 07 may also be performed after step 04.
Specifically, the plurality of system authorities are ordered according to a set order, for example, the order may be set by a user, or the order may be set by a system by default, in an example, the plurality of system authorities may be ordered according to the security level, after the security level-high system authorities are verified, it is indicated that the user has higher trust degree on the application program, and the time stamp of the verification passing corresponding to the system authority with relatively lower security level arranged at the back may also be updated, so that the time stamp of the system authorities may be updated in batches, so that more system authorities may be prevented from being verified in subsequent use, and the possibility of system blocking is further reduced.
Referring to fig. 5, fig. 5 is a flow chart of a system authority verification method according to a fifth embodiment of the present application, in some embodiments, the number of system authorities is multiple, and the multiple system authorities are ordered according to a set order, after step 03, the system authority verification method further includes step 08: and if the verification result of the current system permission is that the verification is not passed, the time stamp cache using the system permission arranged in front of the current system permission is emptied.
Specifically, the plurality of system authorities are ordered according to a set order, in an example, the plurality of system authorities may be ordered according to the level of security, after the verification of the system authorities with low security is failed, it is indicated that the user has low trust degree on the application program, and the time stamp of the verification passing corresponding to the system authority with higher security in front may be emptied, so that the system authorities with higher security are prevented from being mistakenly considered to pass the verification, and relevant information of the user is effectively protected.
Referring to fig. 6, fig. 6 is a schematic block diagram of a system authority verification apparatus 10 according to a sixth embodiment of the present application, and in some embodiments, the system authority verification apparatus 10 includes an obtaining module 11, a judging module 12, and a verification module 13. The obtaining module 11 may be configured to implement step 01, that is, the obtaining module 11 may be configured to obtain, according to a request of an application, a timestamp cache that the application passes by using the system permission verification last time. The determining module 12 may be used to implement step 02, i.e. the determining module 12 may be used to determine whether the time stamp has expired according to the time stamp and the current time stamp of the system. The verification module 13 may be used to implement step 03 and step 04, i.e., if the verification module 13 is used, the verification module may be used to verify the application program usage system authority again; and if not, the application program passes the verification of the system permission.
With continued reference to fig. 6, in some embodiments, the determining module 12 may be configured to implement steps 021 and 022, i.e., the determining module 12 may be configured to calculate a valid timestamp of the verification passing according to the timestamp and the valid period of the verification passing; and determining whether the valid timestamp is earlier than the current timestamp.
With continued reference to fig. 6, in some embodiments, the verification module 13 may be configured to implement steps 05 and 06, i.e., the verification module 13 may be configured to query the value of the validity period if the verification result is verification passing; and determining the effective period according to the user input.
With continued reference to fig. 6, in some embodiments, the verification module 13 may be configured to re-verify the application's usage system rights if there is no timestamp that the application's last usage system rights verified.
With continued reference to fig. 6, in some embodiments, the verification module 13 may be configured to implement step 07, i.e., the verification module 13 may update the timestamp of the passing system rights arranged after the current system rights pass.
With continued reference to fig. 6, in some embodiments, the verification module 13 may be configured to implement step 08, i.e., the verification module 13 may be configured to empty the timestamp cache using the system permissions that are ranked before the current system permissions if the verification result for the current system permissions is that the verification is failed.
It should be noted that, details of implementation and effects achieved when the system permission verification device implements the system permission verification method according to any embodiment of the present application may refer to the above description of the system permission verification method, which is not repeated herein.
In addition, referring to fig. 7, an embodiment of the present application provides a computer readable storage medium, where a computer program is stored, where the computer program is executed by a processor to implement the method for verifying system rights according to any one of the foregoing embodiments. The computer readable storage medium includes, but is not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks, ROMs (Read-Only memories), RAMs (Random Access Memory, random access memories), EPROMs (Erasable Programmable Read-Only memories), EEPROMs (Electrically Erasable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards. That is, a storage device includes any medium that stores or transmits information in a form readable by a device (e.g., computer, cell phone), and may be read-only memory, magnetic or optical disk, etc.
The content of the method embodiment of the present application is applicable to the storage medium embodiment, and functions of the storage medium embodiment are the same as those of the method embodiment, and beneficial effects achieved by the method are the same as those achieved by the method, and detailed description of the method embodiment is omitted herein.
In addition, referring to fig. 8, the embodiment of the present application further provides a computer device, where the computer device in this embodiment may be a server, a personal computer, a network device, or other devices. The computer device includes one or more processors, memory, and one or more computer programs. Wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors. One or more computer programs are configured to perform the method of verifying system permissions described in any of the embodiments above.
In the description of the present specification, reference to the terms "one embodiment," "some embodiments," "illustrative embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and further implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the application, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the application.
Claims (10)
1. The verification method of the system permission is characterized by comprising the following steps of:
acquiring a time stamp cache passing the verification of the system authority last time the application program is used according to the request of the application program;
judging whether the time stamp is expired according to the time stamp and the current time stamp of the system;
if yes, re-verifying the application program to use the system authority;
and if not, the application program uses the system authority to verify passing.
2. The method for verifying system permissions according to claim 1, wherein determining whether the timestamp has expired based on the timestamp and a current timestamp of a system comprises:
calculating the valid time stamp passing verification according to the time stamp and the valid period passing verification;
and determining whether the valid timestamp is earlier than the current timestamp.
3. The method according to claim 2, wherein the duration of the validity period corresponds to the kind of the system right;
or the duration of the validity period corresponds to the kind of the application program.
4. The method for verifying system rights according to claim 2, wherein after re-verifying the application program using the system rights, the method for verifying system rights further comprises:
if the verification result is that the verification is passed, inquiring the value of the effective period;
and determining the effective period according to user input.
5. The method for verifying system rights according to claim 1, wherein the method for verifying system rights further comprises:
and if the timestamp passing the verification of the system permission used by the application program last time does not exist, the verification of the system permission used by the application program is carried out again.
6. The method for verifying system rights according to claim 1, wherein the number of system rights is plural, and the plural system rights are ordered in a set order;
after the application program passes the verification by using the system authority, the verification method of the system authority further comprises the following steps:
and after the current system authority passes the verification, updating a time stamp which is arranged behind the current system authority and passes the verification of the system authority.
7. The method for verifying system rights according to claim 1, wherein the number of system rights is plural, and the plural system rights are ordered in a set order; after re-verifying the application program to use the system authority, the verification method of the system authority further comprises the following steps:
and if the verification result of the current system permission is that the verification is not passed, the time stamp cache using the system permission arranged in front of the current system permission is emptied.
8. A system authority verification apparatus, characterized in that the system authority verification apparatus comprises:
the acquisition module is used for acquiring a timestamp cache passing the verification of the system authority last time the application program is used according to the request of the application program;
the judging module is used for judging whether the time stamp is expired according to the time stamp and the current time stamp of the system;
and the verification module is used for verifying the application program to use the system permission again if yes; and if not, the application program uses the system authority to verify passing.
9. A computer device, comprising:
one or more processors;
a memory;
and one or more computer programs, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, the one or more computer programs configured to: a method of verifying system rights according to any one of claims 1 to 7.
10. A non-transitory computer-readable storage medium storing a computer program, characterized in that the computer program, when executed by one or more processors, causes the processors to perform the verification method of system rights of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310980326.4A CN116720172B (en) | 2023-08-07 | 2023-08-07 | Verification method and device for system permission, computer equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310980326.4A CN116720172B (en) | 2023-08-07 | 2023-08-07 | Verification method and device for system permission, computer equipment and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116720172A true CN116720172A (en) | 2023-09-08 |
CN116720172B CN116720172B (en) | 2024-01-30 |
Family
ID=87868276
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310980326.4A Active CN116720172B (en) | 2023-08-07 | 2023-08-07 | Verification method and device for system permission, computer equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116720172B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104268463A (en) * | 2014-09-16 | 2015-01-07 | 中国科学院信息工程研究所 | Method and device for managing calling authority of camera |
CN107277016A (en) * | 2017-06-22 | 2017-10-20 | 郑州云海信息技术有限公司 | A kind of method and device of authorization check |
WO2019196224A1 (en) * | 2018-04-09 | 2019-10-17 | 平安科技(深圳)有限公司 | Regulation information processing method and apparatus, computer device and storage medium |
CN110532803A (en) * | 2019-09-03 | 2019-12-03 | 三星电子(中国)研发中心 | Private data guard method and device |
CN110765426A (en) * | 2019-10-22 | 2020-02-07 | 深圳市康冠智能科技有限公司 | Equipment permission setting method, device, equipment and computer storage medium |
US20200067962A1 (en) * | 2018-08-24 | 2020-02-27 | California Institute Of Technology | Model based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics |
CN110866053A (en) * | 2019-10-16 | 2020-03-06 | 平安普惠企业管理有限公司 | Method and device for dynamically configuring cache deadline, computer equipment and storage medium |
CN111901342A (en) * | 2020-07-28 | 2020-11-06 | 平安科技(深圳)有限公司 | Authority application verification method, device, equipment and storage medium |
CN112560009A (en) * | 2020-12-22 | 2021-03-26 | Oppo广东移动通信有限公司 | Authentication method, terminal, client and computer storage medium |
CN112948143A (en) * | 2021-03-04 | 2021-06-11 | 北京奇艺世纪科技有限公司 | Application program calling method and device and calling system |
CN112989401A (en) * | 2019-12-13 | 2021-06-18 | 北京金山云网络技术有限公司 | Authority management method and device, electronic equipment and storage medium |
CN113271296A (en) * | 2021-04-28 | 2021-08-17 | 北京沃东天骏信息技术有限公司 | Login authority management method and device |
CN113328861A (en) * | 2017-08-23 | 2021-08-31 | 西安万像电子科技有限公司 | Authority verification method, device and system |
CN113656789A (en) * | 2021-10-18 | 2021-11-16 | 北京新氧科技有限公司 | Debugging tool starting control method and device, electronic equipment and storage medium |
CN115544468A (en) * | 2021-06-29 | 2022-12-30 | 上海擎感智能科技有限公司 | User privacy authorization method, device and storage medium |
-
2023
- 2023-08-07 CN CN202310980326.4A patent/CN116720172B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104268463A (en) * | 2014-09-16 | 2015-01-07 | 中国科学院信息工程研究所 | Method and device for managing calling authority of camera |
CN107277016A (en) * | 2017-06-22 | 2017-10-20 | 郑州云海信息技术有限公司 | A kind of method and device of authorization check |
CN113328861A (en) * | 2017-08-23 | 2021-08-31 | 西安万像电子科技有限公司 | Authority verification method, device and system |
WO2019196224A1 (en) * | 2018-04-09 | 2019-10-17 | 平安科技(深圳)有限公司 | Regulation information processing method and apparatus, computer device and storage medium |
US20200067962A1 (en) * | 2018-08-24 | 2020-02-27 | California Institute Of Technology | Model based methodology for translating high-level cyber threat descriptions into system-specific actionable defense tactics |
CN110532803A (en) * | 2019-09-03 | 2019-12-03 | 三星电子(中国)研发中心 | Private data guard method and device |
CN110866053A (en) * | 2019-10-16 | 2020-03-06 | 平安普惠企业管理有限公司 | Method and device for dynamically configuring cache deadline, computer equipment and storage medium |
CN110765426A (en) * | 2019-10-22 | 2020-02-07 | 深圳市康冠智能科技有限公司 | Equipment permission setting method, device, equipment and computer storage medium |
CN112989401A (en) * | 2019-12-13 | 2021-06-18 | 北京金山云网络技术有限公司 | Authority management method and device, electronic equipment and storage medium |
CN111901342A (en) * | 2020-07-28 | 2020-11-06 | 平安科技(深圳)有限公司 | Authority application verification method, device, equipment and storage medium |
CN112560009A (en) * | 2020-12-22 | 2021-03-26 | Oppo广东移动通信有限公司 | Authentication method, terminal, client and computer storage medium |
CN112948143A (en) * | 2021-03-04 | 2021-06-11 | 北京奇艺世纪科技有限公司 | Application program calling method and device and calling system |
CN113271296A (en) * | 2021-04-28 | 2021-08-17 | 北京沃东天骏信息技术有限公司 | Login authority management method and device |
CN115544468A (en) * | 2021-06-29 | 2022-12-30 | 上海擎感智能科技有限公司 | User privacy authorization method, device and storage medium |
CN113656789A (en) * | 2021-10-18 | 2021-11-16 | 北京新氧科技有限公司 | Debugging tool starting control method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN116720172B (en) | 2024-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040190B (en) | Scheduling method, device and computer readable storage medium | |
US20070197197A1 (en) | Apparatus and methods for managing time sensitive application privileges on a wireless device | |
CN108710681B (en) | File acquisition method, device, equipment and storage medium | |
CN109196891B (en) | Method, terminal and server for managing subscription data set | |
CN106254528B (en) | Resource downloading method and caching device | |
CN106656455B (en) | Website access method and device | |
CN107026879B (en) | Data caching method and background application system | |
CN111177741A (en) | Pre-authorization data access method and device based on enterprise browser | |
CN116720172B (en) | Verification method and device for system permission, computer equipment and readable storage medium | |
CN113282626A (en) | Redis-based data caching method and device, computer equipment and storage medium | |
CN110365640A (en) | A kind of method and apparatus of control single-page application routing | |
CN109076126B (en) | Permission updating method and terminal equipment | |
CN110741617A (en) | Resource updating method and device, computer equipment and storage medium | |
CN110087201B (en) | Information processing method, device and storage medium | |
CN111611555B (en) | Physical layer authorization and access method and device | |
CN108306859B (en) | Method, apparatus and computer-readable storage medium for limiting server access volume | |
KR102183591B1 (en) | Visitor permission management method, device, terminal, server and storage medium | |
CN112733133A (en) | Access control method, device and storage medium for embedded universal integrated circuit card | |
US11316949B2 (en) | Access management to user related data | |
CN117742923B (en) | Distributed concurrency request control method, device, equipment and medium | |
CN116033187B (en) | Video processing system, method, device, electronic equipment and storage medium | |
CN112597451B (en) | Method and device for distributing application program | |
CN113489726B (en) | Flow limiting method and device | |
CN114417283A (en) | Authority matching method and device for Internet of vehicles users, client and storage medium | |
CN112837019A (en) | Express delivery track data pushing method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |