WO2016127447A1 - 一种安装应用的方法及终端 - Google Patents
一种安装应用的方法及终端 Download PDFInfo
- Publication number
- WO2016127447A1 WO2016127447A1 PCT/CN2015/073434 CN2015073434W WO2016127447A1 WO 2016127447 A1 WO2016127447 A1 WO 2016127447A1 CN 2015073434 W CN2015073434 W CN 2015073434W WO 2016127447 A1 WO2016127447 A1 WO 2016127447A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- user
- target system
- access
- permission
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method and a terminal for installing an application.
- mobile terminals such as mobile phones or tablet computers can provide more and more help in the life, work and entertainment of users. Since many user data stored in a mobile terminal involves personal privacy or trade secrets, once compromised, it may cause a large loss to the user or the enterprise. Therefore, the security performance of mobile terminals is becoming more and more important.
- the technical problem to be solved by the embodiments of the present invention is to provide a method and a terminal for installing an application. To solve the problem of poor terminal security performance.
- an embodiment of the present invention provides a method for installing an application, including:
- the target system includes a standard system or/and a security system
- the method further includes:
- the loading the application in the corresponding target system according to the access authority of the application includes:
- the application is loaded.
- the method further includes:
- the access permission configuration information of the application is saved in the application permission table according to a preset sorting rule.
- the method further includes:
- the application is not the last application to be loaded, it is sequentially determined according to the application permission table whether to load other applications after the application.
- the embodiment of the present invention further provides a terminal for installing an application, including:
- a prompting unit configured to prompt the user to select a target system to be installed by the application when the user installs the application, the target system comprising a standard system or/and a security system;
- a configuration unit configured to configure access rights of the application according to a target system selected by the user
- a mounting unit configured to install the application to an application storage area shared by the standard system and the security system;
- a loading unit configured to load the application in a corresponding target system according to the access authority of the application.
- the prompting unit is further configured to prompt the user to select a target system to which the application is transferred or copied, if receiving an application transfer or copy instruction input by the user;
- the configuration unit is further configured to modify an access right of the application according to a target system transferred or copied by the user selected by the user;
- the loading unit is further configured to load the application in a corresponding target system according to the modified access right of the application.
- the loading unit is specifically configured to:
- the application is loaded.
- the configuration unit is further configured to:
- the access permission configuration information of the application is saved in the application permission table according to a preset sorting rule.
- the loading unit is further configured to: if the application permission table includes access permission configuration information of at least two applications,
- the application is not the last application to be loaded, it is sequentially determined according to the application permission table whether to load other applications after the application.
- the application of the standard system cannot access the user data in the security system, thereby ensuring the security of the specific user data and improving The security of the terminal; the application is installed in the application storage area shared by the standard system and the security system, which can realize the transfer and replication of the application under different systems, can fully meet the different needs of users in different periods, and improve the applicability of the terminal. .
- FIG. 1 is a schematic flow chart of a method for installing an application according to an embodiment of the present invention
- FIG. 2 is a display diagram of a terminal interface for installing an application by using the method shown in FIG. 1;
- FIG. 3 is a schematic flow chart of the application after the application is installed by using the method shown in FIG. 1;
- FIG. 4 is a display diagram of a terminal interface of the application after the application is installed by using the method shown in FIG. 1;
- FIG. 5 is a schematic flowchart of loading an application after installing an application by using the method shown in FIG. 1;
- FIG. 6 is a schematic diagram of the composition of a terminal for installing an application according to an embodiment of the present invention.
- FIG. 1 is a schematic flowchart of a first embodiment of a method for installing an application according to the present invention
- FIG. 2 is a diagram showing a terminal interface for installing an application by using the method shown in FIG.
- the method includes the following steps:
- the target system includes a standard system or/and a security system.
- the standard system is a system used by a user in a normal situation, and may be an Android system, an IOS system, or a WP system.
- the security system may also be an Android.
- System, IOS system or WP system the standard system can only access the user data storage area corresponding to the standard system.
- the security system can be configured to access only the user data storage area corresponding to the security system, or can be configured to access two data storages simultaneously. User data for the zone. In this embodiment, the security system can only access the user data storage area corresponding to the security system for illustration. However, the application storage area of the standard system and the security system is shared.
- the selection of the target system herein may be either single selection or dual selection. When the number of systems is three or more, it may also be multiple selection, and no limitation is made herein.
- the user installs the application the user is prompted to choose to install the application in a standard system or a security system or both in a standard system and a security system.
- the application can only be read by the standard system, and can only access the user data storage area corresponding to the standard system, and if the user selects the application installation, In a security system, the application can only be read by the security system and can only access the user data storage area corresponding to the security system.
- the access permission configuration information of the application can be saved in the application storage area or in a storage area accessible by other standard systems and security systems, and is not limited herein.
- the terminal is currently running under the standard system, only the application installed in the standard system can be loaded. If an application can only be accessed under the security system, the application does not need to be loaded. The situation in the security system is similar. Let me repeat.
- the terminal display interface shown in FIG. 2 When the user installs the application, the terminal provides the target system for the user to select. The selection here may be either single selection or dual selection. After the target system is selected, You can install it by clicking the install button.
- the installation interface and the operation mode shown in FIG. 2 are only one of the modes for installing the application in the embodiment of the present invention, and any other interface and operation mode that prompts the user to select the target system to install are all within the scope of protection of the present invention.
- the interface and operation mode shown in Figure 2 are relatively simple and convenient.
- the application of the standard system cannot access the user data in the security system, and cannot be accessed by the security system.
- the security of the specific user data is ensured, and the security of the terminal is improved; the application is installed in the application storage area shared by the standard system and the security system, and the application can be transferred and copied under different systems, which can fully satisfy the user in different periods. Different needs have improved the applicability of the terminal.
- the method of the present invention is equally applicable to two or more systems, and only need to configure different user data storages for multiple systems. Zones, and configure the same application storage area, and then configure corresponding access rights for applications under different systems, and an application that matches its access rights can be loaded in a certain system.
- FIG. 3 is a schematic diagram of a process of installing an application after the application is performed by using the method shown in FIG. 1.
- FIG. 4 is a terminal interface display diagram of the application after the application is installed by using the method shown in FIG. In this embodiment, the method includes the following steps:
- a specific operation and display interface that can be implemented can refer to FIG. 4.
- the user can long press the X application icon, and the terminal prompts the user to uninstall the application or transfer the application to the xx system or copy to the xx system, and only needs the user to slide the application icon. Go to the corresponding area of the terminal display interface.
- the xx system can be either a standard system or a security system. When the application of the security system is copied or transferred to a standard application, it can be implemented after verifying the identity of the user.
- FIG. 5 is a schematic flowchart of loading an application after installing an application by using the method shown in FIG. 1.
- the method includes the following steps:
- the preset collation here may be the order in which the applications are installed, the order in which the applications access the data, or other order in which the terminals are started and the data is accessed.
- the application permission table here includes the application name and its corresponding access rights, and the application permission table can be stored in an application storage area or an area accessible by other standard systems and security systems.
- step S506. Determine whether the currently running system has permission to load the application. If yes, perform the steps S507, otherwise step S509 is performed.
- step S508. Determine, according to the application permission table, whether the application is the last application to be loaded. If yes, the loading is stopped, otherwise step S509 is performed.
- FIG. 6 it is a schematic diagram of a component of a terminal for installing an application according to an embodiment of the present invention.
- the terminal includes:
- the prompting unit 100 is configured to prompt the user to select a target system to be installed by the application when the user installs the application, where the target system includes a standard system or/and a security system;
- the configuration unit 200 is configured to configure access rights of the application according to a target system selected by the user;
- the installation unit 300 is configured to install the application to an application storage area shared by the standard system and the security system;
- the loading unit 400 is configured to load the application in a corresponding target system according to the access authority of the application.
- the storage area of the terminal may be divided into a user data storage area of a standard system, a user data storage area of the security system, and an application storage area shared by the standard system and the security system.
- the storage area can be configured locally on the terminal or in the cloud server.
- the prompting unit 100 is further configured to prompt the user to select a target system for application transfer or replication if receiving an application transfer or copy instruction input by the user;
- the configuration unit 200 is further configured to modify an access right of the application according to a target system transferred or copied by an application selected by a user;
- the loading unit 400 is further configured to load the application in a corresponding target system according to the modified access right of the application.
- the loading unit 400 is specifically configured to:
- the application is loaded.
- the configuration unit 200 is further configured to:
- the access permission configuration information of the application is saved in the application permission table according to a preset sorting rule.
- the loading unit 400 is further configured to:
- the application is not the last application to be loaded, it is sequentially determined according to the application permission table whether to load other applications after the application.
- the above prompting unit 100, the configuration unit 200, the mounting unit 300, and the loading unit 400 may exist independently or may be integrated.
- the prompting unit 100, the configuration unit 200, the mounting unit 300, or the loading unit 400 may be independent of the installation application in the form of hardware.
- the processor of the terminal is separately provided, and the setting form may be in the form of a microprocessor; it may also be embedded in the processor of the device in hardware form, or may be stored in the memory of the device in software to facilitate the device.
- the processor calls the operations corresponding to the above prompting unit 100, configuration unit 200, mounting unit 300, and loading unit 400.
- the mounting unit 300 may be a processor of the device, and the functions of the prompting unit 100, the configuration unit 200, and the loading unit 400 may be Embedded in the processor, it can also be set independently of the processor, or can be stored in the memory in the form of software, and the function is called by the processor.
- the embodiment of the invention does not impose any limitation.
- the above processor may be a central processing unit (CPU), a microprocessor, a single chip microcomputer, or the like.
- the present invention has the following advantages:
- the application of the standard system cannot access the user data in the security system, thereby ensuring the security of the specific user data and improving The security of the terminal; the application is installed in the application storage area shared by the standard system and the security system, which can realize the transfer and replication of the application under different systems, can fully meet the different needs of users in different periods, and improve the applicability of the terminal. .
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
本发明实施例公开了一种安装应用的方法,包括:当用户安装应用时,提示用户选择应用安装的目标系统,所述目标系统包括标准系统或/和安全系统;根据用户选定的目标系统配置所述应用的访问权限;将所述应用安装至所述标准系统和所述安全系统共用的应用存储区;根据所述应用的访问权限在对应的目标系统中加载所述应用。本发明实施例还公开了一种安装应用的终端。采用本发明,可提升终端的安全性和适用性。
Description
本申请要求于2015年02月13日提交中国专利局,申请号为CN 201510076844.9、发明名称为“一种安装应用的方法及终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及通信技术领域,尤其涉及一种安装应用的方法及终端。
随着移动终端的飞速发展,移动终端如手机或者平板电脑等,在用户的生活、工作、娱乐等方面可提供越来越多的帮助。由于移动终端中存储的很多用户数据涉及个人隐私或商业机密,一旦泄密,可能对用户或企业造成较大的损失。因此,移动终端的安全性能正变得越来越重要。
发明内容
本发明实施例所要解决的技术问题在于,提供一种安装应用的方法及终端。以解决终端安全性能差的问题。
为了解决上述技术问题,本发明实施例提供了一种安装应用的方法,包括:
当用户安装应用时,提示用户选择应用安装的目标系统,所述目标系统包括标准系统或/和安全系统;
根据用户选定的目标系统配置所述应用的访问权限;
将所述应用安装至所述标准系统和所述安全系统共用的应用存储区;
根据所述应用的访问权限在对应的目标系统中加载所述应用。
其中,所述方法还包括:
若接收到用户输入的应用转移或复制指令,则提示用户选择应用转移或复制的目标系统;
根据用户选定的应用转移或复制的目标系统修改所述应用的访问权限;
根据所述应用修改后的访问权限在对应的目标系统中加载所述应用。
其中,所述根据所述应用的访问权限在对应的目标系统中加载所述应用,包括:
查询所述应用的访问权限;
判断当前运行的系统是否有权限加载所述应用;
若当前运行的系统有权限加载所述应用,则加载所述应用。
其中,在所述根据用户选定的目标系统配置所述应用的访问权限之后,还包括:
将所述应用的访问权限配置信息按照预设排序规则保存在应用权限表中。
其中,若所述应用权限表中包括至少两个应用的访问权限配置信息,则所述根据所述应用的访问权限在对应的目标系统中加载所述应用之后,还包括:
根据所述应用权限表判断所述应用是否为最后一个待加载的应用;
若所述应用不是最后一个待加载的应用,则根据所述应用权限表依次确定是否加载排在所述应用之后的其他应用。
相应地,本发明实施例还提供了一种安装应用的终端,包括:
提示单元,用于当用户安装应用时,提示用户选择应用安装的目标系统,所述目标系统包括标准系统或/和安全系统;
配置单元,用于根据用户选定的目标系统配置所述应用的访问权限;
安装单元,用于将所述应用安装至所述标准系统和所述安全系统共用的应用存储区;
加载单元,用于根据所述应用的访问权限在对应的目标系统中加载所述应用。
其中,所述提示单元还用于若接收到用户输入的应用转移或复制指令,则提示用户选择应用转移或复制的目标系统;
所述配置单元还用于根据用户选定的应用转移或复制的目标系统修改所述应用的访问权限;
所述加载单元还用于根据所述应用修改后的访问权限在对应的目标系统中加载所述应用。
其中,所述加载单元具体用于:
查询所述应用的访问权限;
判断当前运行的系统是否有权限加载所述应用;
若当前运行的系统有权限加载所述应用,则加载所述应用。
其中,所述配置单元还用于:
在根据用户选定的目标系统配置所述应用的访问权限之后,将所述应用的访问权限配置信息按照预设排序规则保存在应用权限表中。
其中,若所述应用权限表中包括至少两个应用的访问权限配置信息,则所述加载单元还用于:
根据所述应用权限表判断所述应用是否为最后一个待加载的应用;
若所述应用不是最后一个待加载的应用,则根据所述应用权限表依次确定是否加载排在所述应用之后的其他应用。
实施本发明实施例,具有如下有益效果:
通过配置标准系统和安全系统供用户安装应用时选择,并根据用户的选择为应用配置不同的访问权限,标准系统的应用无法访问安全系统中的用户数据,从而确保了特定用户数据的安全,提升了终端的安全性;将应用安装在标准系统和安全系统共用的应用存储区,可实现应用在不同系统下的转移和复制,可充分满足用户在不同时期的不同需求,提升了终端的适用性。
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例安装应用的方法的流程示意图;
图2是采用图1所示方法安装应用的终端界面显示图;
图3是采用图1所示方法安装应用后转移应用的流程示意图;
图4是采用图1所示方法安装应用后转移应用的终端界面显示图;
图5是采用图1所示方法安装应用后加载应用的流程示意图;
图6是本发明实施例安装应用的终端的组成示意图。
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
请一并参照图1和图2,图1为本发明安装应用的方法的第一实施例的流程示意图,图2为采用图1所示方法安装应用的终端界面显示图。在本实施例中,所述方法包括以下步骤:
S101,当用户安装应用时,提示用户选择应用安装的目标系统。
其中,所述目标系统包括标准系统或/和安全系统,标准系统即用户常规情况下使用的系统,其可以是安卓系统、IOS系统或WP系统,此处不作任何限制,安全系统同样可以是安卓系统、IOS系统或WP系统,标准系统只能访问标准系统对应的用户数据存储区,安全系统可以配置为只能访问安全系统对应的用户数据存储区,也可以配置为可同时访问两个数据存储区的用户数据。本实施例中以安全系统仅能访问安全系统对应的用户数据存储区进行举例说明。但是标准系统和安全系统的应用存储区共用。
需要说明的是,此处目标系统的选择可以是单选也可以是双选,当系统数量为三个或以上时,也可以是多选,此处不作任何限定。当用户安装应用时,提示用户选择将应用安装在标准系统或安全系统或同时安装在标准系统和安全系统中。
S102,根据用户选定的目标系统配置所述应用的访问权限。
具体地,若用户选定所述应用安装在标准系统中,则所述应用只能被标准系统访问读取,并且只能访问标准系统对应的用户数据存储区,若用户选定所述应用安装在安全系统中,则所述应用只能被安全系统访问读取,并且只能访问安全系统对应的用户数据存储区。
应用的访问权限配置信息可以保存在应用存储区中,也可以保存在其他标准系统和安全系统均可访问的存储区域,此处不作任何限定。
S103,将所述应用安装至所述标准系统和所述安全系统共用的应用存储区。
由于应用安装在所述标准系统和所述安全系统共用的应用存储区,因此可满足用户的以下需求:
把一些涉及个人安全隐私的应用安装到安全系统;
涉及保密信息的应用安装到安全系统;
将标准系统下的应用转移到安全系统;
将应用同时安装到两个系统;
将安全系统的应用移出到标准系统;此时可配置操作验证密码或其他验证用户身份的方式来确保应用从安全系统移出到标准系统的安全性。
从而在确保终端安全性的基础上,提升终端的适用性。
S104,根据所述应用的访问权限在对应的目标系统中加载所述应用。
例如,若终端当前运行在标准系统下,则只能加载安装在标准系统中的应用,若某应用只能在安全系统下访问,则无需加载该应用,安全系统中的情况类似,此处不再赘述。
为了便于理解,可参照图2所示终端显示界面,当用户安装应用时,终端提供目标系统给用户选择,此处的选择可以是单选,也可以是双选,当选定目标系统之后,可点击安装按钮进行安装。
需要说明的是,图2所示安装界面及操作方式只是本发明实施例安装应用的其中一种方式,其他任意通过提示用户选择目标系统安装的界面及操作方式均在本发明所述保护的范围之内,图2所示界面及操作方式较为简洁方便。
通过配置标准系统和安全系统供用户安装应用时选择,并根据用户的选择为应用配置不同的访问权限,标准系统的应用无法访问安全系统中的用户数据,也无法被安全系统访问读取,从而确保了特定用户数据的安全,提升了终端的安全性;将应用安装在标准系统和安全系统共用的应用存储区,可实现应用在不同系统下的转移和复制,可充分满足用户在不同时期的不同需求,提升了终端的适用性。
需要说明的是,虽然在本实施例中仅以标准系统和安全系统进行说明,但是对于两个以上的系统,本发明所述方法同样适用,只需为多个系统分别配置不同的用户数据存储区,并配置相同的应用存储区,再为不同系统下的应用配置对应的访问权限,在某个系统在加载符合其访问权限的应用即可。
请一并参照图3和图4,图3是采用图1所示方法安装应用后转移应用的流程示意图,图4是采用图1所示方法安装应用后转移应用的终端界面显示图。在本实施例中,所述方法包括以下步骤:
S301,若接收到用户输入的应用转移或复制指令,则提示用户选择应用转移或复制的目标系统。
S302,根据用户选定的应用转移或复制的目标系统修改所述应用的访问权限。
S303,根据所述应用修改后的访问权限在对应的目标系统中加载所述应用。
一种可实施的具体操作及显示界面可参照图4,用户可长按X应用图标,终端提示用户是卸载应用或将应用转移到xx系统或复制到xx系统,只需要用户将该应用图标滑动到终端显示界面的对应区域即可。如,需要将X应用复制到xx系统时,只需要将X应用滑动至区域C即可。此处xx系统可以是标准系统,也可以是安全系统,当将安全系统的应用复制或转移到标准应用时,可在验证用户身份后实施。
请参照图5,为采用图1所示方法安装应用后加载应用的流程示意图,在本实施例中,所述方法包括以下步骤:
S501,当用户安装应用时,提示用户选择应用安装的目标系统。
S502,根据用户选定的目标系统配置所述应用的访问权限。
S503,将所述应用的访问权限配置信息按照预设排序规则保存在应用权限表中。
此处的预设排序规则可以是应用安装的先后顺序、应用访问数据重要性的顺序或其他涉及终端启动、访问数据的顺序。此处的应用权限表中包括应用名称及其对应的访问权限,应用权限表可存储在应用存储区或其他标准系统和安全系统均可访问的区域。
S504,将所述应用安装至所述标准系统和所述安全系统共用的应用存储区。
S505,查询所述应用的访问权限。
S506,判断当前运行的系统是否有权限加载所述应用。若是,则执行步骤
S507,否则执行步骤S509。
S507,加载所述应用。
S508,根据所述应用权限表判断所述应用是否为最后一个待加载的应用。若是,则停止加载,否则执行步骤S509。
S509,根据所述应用权限表依次确定是否加载排在所述应用之后的其他应用。
请参照图6,为本发明实施例安装应用的终端的组成示意图,在本实施例中,所述终端包括:
提示单元100,用于当用户安装应用时,提示用户选择应用安装的目标系统,所述目标系统包括标准系统或/和安全系统;
配置单元200,用于根据用户选定的目标系统配置所述应用的访问权限;
安装单元300,用于将所述应用安装至所述标准系统和所述安全系统共用的应用存储区;
加载单元400,用于根据所述应用的访问权限在对应的目标系统中加载所述应用。
其中,终端的存储区可以分为标准系统的用户数据存储区、安全系统的用户数据存储区以及标准系统和安全系统共用的应用存储区。上述存储区可以配置在终端本地,也可以配置在云端服务器。
可选地,所述提示单元100还用于若接收到用户输入的应用转移或复制指令,则提示用户选择应用转移或复制的目标系统;
所述配置单元200还用于根据用户选定的应用转移或复制的目标系统修改所述应用的访问权限;
所述加载单元400还用于根据所述应用修改后的访问权限在对应的目标系统中加载所述应用。
可选地,所述加载单元400具体用于:
查询所述应用的访问权限;
判断当前运行的系统是否有权限加载所述应用;
若当前运行的系统有权限加载所述应用,则加载所述应用。
可选地,所述配置单元200还用于:
在根据用户选定的目标系统配置所述应用的访问权限之后,将所述应用的访问权限配置信息按照预设排序规则保存在应用权限表中。
若所述应用权限表中包括至少两个应用的访问权限配置信息,则所述加载单元400还用于:
根据所述应用权限表判断所述应用是否为最后一个待加载的应用;
若所述应用不是最后一个待加载的应用,则根据所述应用权限表依次确定是否加载排在所述应用之后的其他应用。
以上提示单元100、配置单元200、安装单元300和加载单元400可以独立存在,也可以集成设置,提示单元100、配置单元200、安装单元300或加载单元400可以以硬件的形式独立于安装应用的终端的处理器单独设置,且设置形式可以是微处理器的形式;也可以以硬件形式内嵌于该装置的处理器中,还可以以软件形式存储于该装置的存储器中,以便于该装置的处理器调用执行以上提示单元100、配置单元200、安装单元300和加载单元400对应的操作。
例如,在本发明安装应用的终端的实施例(图6所示的实施例)中,安装单元300可以为该装置的处理器,而提示单元100、配置单元200和加载单元400的功能可以内嵌于该处理器中,也可以独立于处理器单独设置,也可以以软件的形式存储于存储器中,由处理器调用实现其功能。本发明实施例不做任何限制。以上处理器可以为中央处理单元(CPU)、微处理器、单片机等。
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
通过上述实施例的描述,本发明具有以下优点:
通过配置标准系统和安全系统供用户安装应用时选择,并根据用户的选择为应用配置不同的访问权限,标准系统的应用无法访问安全系统中的用户数据,从而确保了特定用户数据的安全,提升了终端的安全性;将应用安装在标准系统和安全系统共用的应用存储区,可实现应用在不同系统下的转移和复制,可充分满足用户在不同时期的不同需求,提升了终端的适用性。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,
是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,简称ROM)或随机存储记忆体(Random Access Memory,简称RAM)等。
以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。
Claims (10)
- 一种安装应用的方法,其特征在于,包括:当用户安装应用时,提示用户选择应用安装的目标系统,所述目标系统包括标准系统或/和安全系统;根据用户选定的目标系统配置所述应用的访问权限;将所述应用安装至所述标准系统和所述安全系统共用的应用存储区;根据所述应用的访问权限在对应的目标系统中加载所述应用。
- 如权利要求所述1的方法,其特征在于,所述方法还包括:若接收到用户输入的应用转移或复制指令,则提示用户选择应用转移或复制的目标系统;根据用户选定的应用转移或复制的目标系统修改所述应用的访问权限;根据所述应用修改后的访问权限在对应的目标系统中加载所述应用。
- 如权利要求1所述的方法,其特征在于,所述根据所述应用的访问权限在对应的目标系统中加载所述应用,包括:查询所述应用的访问权限;判断当前运行的系统是否有权限加载所述应用;若当前运行的系统有权限加载所述应用,则加载所述应用。
- 如权利要求1所述的方法,其特征在于,在所述根据用户选定的目标系统配置所述应用的访问权限之后,还包括:将所述应用的访问权限配置信息按照预设排序规则保存在应用权限表中。
- 如权利要求4所述的方法,其特征在于,若所述应用权限表中包括至少两个应用的访问权限配置信息,则所述根据所述应用的访问权限在对应的目标系统中加载所述应用之后,还包括:根据所述应用权限表判断所述应用是否为最后一个待加载的应用;若所述应用不是最后一个待加载的应用,则根据所述应用权限表依次确定是否加载排在所述应用之后的其他应用。
- 一种安装应用的终端,其特征在于,包括:提示单元,用于当用户安装应用时,提示用户选择应用安装的目标系统,所述目标系统包括标准系统或/和安全系统;配置单元,用于根据用户选定的目标系统配置所述应用的访问权限;安装单元,用于将所述应用安装至所述标准系统和所述安全系统共用的应用存储区;加载单元,用于根据所述应用的访问权限在对应的目标系统中加载所述应用。
- 如权利要求6所述的终端,其特征在于,所述提示单元还用于若接收到用户输入的应用转移或复制指令,则提示用户选择应用转移或复制的目标系统;所述配置单元还用于根据用户选定的应用转移或复制的目标系统修改所述应用的访问权限;所述加载单元还用于根据所述应用修改后的访问权限在对应的目标系统中加载所述应用。
- 如权利要求6所述的终端,其特征在于,所述加载单元具体用于:查询所述应用的访问权限;判断当前运行的系统是否有权限加载所述应用;若当前运行的系统有权限加载所述应用,则加载所述应用。
- 如权利要求6所述的终端,其特征在于,所述配置单元还用于:在根据用户选定的目标系统配置所述应用的访问权限之后,将所述应用的访问权限配置信息按照预设排序规则保存在应用权限表中。
- 如权利要求所述9所述的终端,其特征在于,若所述应用权限表中包括至少两个应用的访问权限配置信息,则所述加载单元还用于:根据所述应用权限表判断所述应用是否为最后一个待加载的应用;若所述应用不是最后一个待加载的应用,则根据所述应用权限表依次确定是否加载排在所述应用之后的其他应用。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510076844.9 | 2015-02-13 | ||
CN201510076844.9A CN104657658A (zh) | 2015-02-13 | 2015-02-13 | 一种安装应用的方法及终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016127447A1 true WO2016127447A1 (zh) | 2016-08-18 |
Family
ID=53248769
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/073434 WO2016127447A1 (zh) | 2015-02-13 | 2015-02-28 | 一种安装应用的方法及终端 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104657658A (zh) |
WO (1) | WO2016127447A1 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106295410B (zh) * | 2015-06-05 | 2019-04-12 | 宇龙计算机通信科技(深圳)有限公司 | 双系统下载文件的方法及其装置 |
CN106354399A (zh) * | 2015-07-16 | 2017-01-25 | 阿里巴巴集团控股有限公司 | 应用权限配置方法、装置及电子设备 |
CN105653310B (zh) * | 2015-08-28 | 2019-08-02 | 宇龙计算机通信科技(深圳)有限公司 | 应用安装方法、装置及电子设备 |
CN106815518B (zh) * | 2015-11-30 | 2020-08-25 | 华为技术有限公司 | 一种应用安装方法及电子设备 |
CN105653317A (zh) * | 2015-12-24 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | 一种应用程序下载安装方法及终端设备 |
CN106056000B (zh) * | 2016-06-24 | 2019-12-24 | 北京奇虎科技有限公司 | 基于系统权限的移动设备存储分区配置方法及装置 |
CN108710795B (zh) * | 2018-04-18 | 2021-01-26 | Oppo广东移动通信有限公司 | 信息提示方法、装置、移动终端及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102200922A (zh) * | 2011-04-06 | 2011-09-28 | 宇龙计算机通信科技(深圳)有限公司 | 应用程序安装方法和终端 |
CN103347116A (zh) * | 2012-11-09 | 2013-10-09 | 北京深思洛克软件技术股份有限公司 | 一种在智能手机中设置多安全模式的系统和方法 |
CN103870306A (zh) * | 2014-02-21 | 2014-06-18 | 北京奇虎科技有限公司 | 基于智能终端设备安装应用程序的方法与装置 |
CN104268454A (zh) * | 2014-09-28 | 2015-01-07 | 酷派软件技术(深圳)有限公司 | 用于终端的应用程序的管理方法及装置 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1331047C (zh) * | 2004-05-14 | 2007-08-08 | 联想(北京)有限公司 | 基本输入输出系统和操作系统同步更新的方法 |
US8321836B2 (en) * | 2007-06-21 | 2012-11-27 | Microsoft Corporation | Late bound programmatic assistance |
CN103309754B (zh) * | 2012-03-15 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | 终端和数据分区管理方法 |
CN103856485B (zh) * | 2014-02-14 | 2017-05-10 | 武汉天喻信息产业股份有限公司 | 可信用户界面安全指示器的初始化系统及方法 |
-
2015
- 2015-02-13 CN CN201510076844.9A patent/CN104657658A/zh active Pending
- 2015-02-28 WO PCT/CN2015/073434 patent/WO2016127447A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102200922A (zh) * | 2011-04-06 | 2011-09-28 | 宇龙计算机通信科技(深圳)有限公司 | 应用程序安装方法和终端 |
CN103347116A (zh) * | 2012-11-09 | 2013-10-09 | 北京深思洛克软件技术股份有限公司 | 一种在智能手机中设置多安全模式的系统和方法 |
CN103870306A (zh) * | 2014-02-21 | 2014-06-18 | 北京奇虎科技有限公司 | 基于智能终端设备安装应用程序的方法与装置 |
CN104268454A (zh) * | 2014-09-28 | 2015-01-07 | 酷派软件技术(深圳)有限公司 | 用于终端的应用程序的管理方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN104657658A (zh) | 2015-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016127447A1 (zh) | 一种安装应用的方法及终端 | |
AU2013209946B2 (en) | File system access for one or more sandboxed applications | |
US10681050B2 (en) | Ephemeral applications | |
US10121018B2 (en) | Secure data synchronization | |
JP6140177B2 (ja) | モバイルデバイス上でリモートポリシーを適用し、共有する技法 | |
US10586076B2 (en) | System and method for controlling access to OS resources | |
JP6412140B2 (ja) | リモートリソースへのアクセスを確実に許可すること | |
US10165007B2 (en) | Securing data usage in computing devices | |
EP3370449B1 (en) | Method and device for configuring security indication information | |
US20160232374A1 (en) | Permission control method and apparatus | |
US20150365469A1 (en) | System and method for integrating web and native applications from web-based contexts | |
US10831915B2 (en) | Method and system for isolating application data access | |
US20120023139A1 (en) | Intelligent attached storage | |
US20150046706A1 (en) | System and Method for Controlling Access to Encrypted Files | |
US20230061527A1 (en) | Launcher application with connectivity detection for shared mobile devices | |
US11831788B2 (en) | Systems and methods for secure access with heartbeat monitoring to native cloud services to computers outside the cloud | |
EP3151154B1 (en) | Data access control based on storage validation | |
US9591553B1 (en) | Content access based on mobile device geographical location | |
US10614211B2 (en) | Bringing a non-isolated application into an isolation layer with an isolated application | |
US20190068572A1 (en) | Customizable secondary verification in a multi-tenant system | |
US20230403280A1 (en) | System, Method, and Apparatus for Control of Remote Desktop Connections | |
US20240242182A1 (en) | Dynamic meeting space configuration based on content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15881609 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 09/01/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15881609 Country of ref document: EP Kind code of ref document: A1 |