WO2016173245A1 - 权限管理方法和装置 - Google Patents
权限管理方法和装置 Download PDFInfo
- Publication number
- WO2016173245A1 WO2016173245A1 PCT/CN2015/095158 CN2015095158W WO2016173245A1 WO 2016173245 A1 WO2016173245 A1 WO 2016173245A1 CN 2015095158 W CN2015095158 W CN 2015095158W WO 2016173245 A1 WO2016173245 A1 WO 2016173245A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- terminal
- event
- permission
- module
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
Definitions
- the present disclosure relates to the field of communications, and in particular, to a rights management method and apparatus.
- the application on the desktop can usually be modified by some specific operations, such as a long press operation.
- some specific operations such as a long press operation.
- the probability that the smart handheld terminal is mishandled by the non-native user is also increased.
- the present disclosure provides a rights management method and apparatus.
- a rights management method comprising:
- the user When the user is an unauthorized user, the user is disabled to modify the configuration for the terminal.
- the touch operation includes a long press operation
- the acquiring the fingerprint information of the user based on the touch operation performed by the user on the preset interface of the terminal includes:
- the touched event is a long press event
- the touch point of the long press event is acquired, and the fingerprint information of the user is obtained at the location of the touch point.
- the method further includes:
- the terminal When the terminal has been unlocked, it starts listening for a touch event of the user for the preset interface of the terminal.
- the preset interface includes a visible area of a screen of the terminal.
- disabling the configuration modification permission of the user for the terminal includes:
- the configuration modification authority corresponding to the configuration modification event is disabled.
- the method further includes:
- the prompt message is output to the user through the preset interface.
- the configuration modification permission includes a permission of the mobile application icon, a permission of the newly created folder, a permission to move the application out of the folder, a permission to delete the application, and a permission to modify the system setting.
- a rights management apparatus comprising:
- An acquiring module configured to acquire fingerprint information of the user based on a touch operation performed by the user on a preset interface of the terminal;
- a determining module configured to determine, according to the obtained fingerprint information, whether the user is an authorized user
- the module is disabled, and when the user is an unauthorized user, the user is disabled to modify the configuration for the terminal.
- the touch operation includes a long press operation
- the obtaining module includes:
- a monitoring sub-module configured to monitor a touch event of a preset interface of the user for the terminal
- a first determining sub-module configured to determine whether the monitored touch event is a long press event
- the acquiring sub-module is configured to acquire a touch point of the long-press event when the monitored touch event is a long-press event, and acquire the fingerprint information of the user at the location of the touch point.
- the obtaining module further includes:
- a second determining sub-module configured to determine whether the terminal has been unlocked before the monitoring sub-module monitors a touch event of the preset interface of the terminal; when the terminal has been unlocked, start the The listening sub-module monitors a user's touch event for the preset interface of the terminal.
- the preset interface includes a visible area of a screen of the terminal.
- the disabling module includes:
- a third determining sub-module configured to determine, when the user is an unauthorized user, whether the touch operation triggers a configuration modification event for the terminal;
- the sub-module is disabled, configured to disable the configuration modification permission corresponding to the configuration modification event when the touch operation triggers a configuration modification event for the terminal.
- the disabling module further includes:
- the output sub-module is configured to output a prompt message to the user through the preset interface after the configuration modification permission corresponding to the configuration modification event is disabled.
- the configuration modification permission includes a permission of the mobile application icon, a permission of the newly created folder, a permission to move the application out of the folder, a permission to delete the application, and a permission to modify the system setting.
- a rights management apparatus including:
- a memory for storing processor executable instructions
- processor is configured to:
- the fingerprint information of the user is obtained by a touch operation on the preset interface of the user, and the user is determined to be an authorized user according to the obtained fingerprint information;
- the user's configuration modification permission for the terminal is disabled, so that the non-native user cannot obtain the permission to modify the terminal configuration when using the user's terminal, thereby increasing the security of the terminal.
- FIG. 1 is a schematic flowchart diagram of a rights management method according to an exemplary embodiment
- FIG. 2 is a schematic flowchart diagram of another rights management method according to an exemplary embodiment
- FIG. 3 is a schematic diagram of interaction of a system desktop according to an exemplary embodiment
- FIG. 4 is a schematic diagram of interaction on another system desktop according to an exemplary embodiment
- FIG. 5 is a schematic block diagram of a rights management apparatus according to an exemplary embodiment
- FIG. 6 is a schematic block diagram of another rights management apparatus according to an exemplary embodiment
- FIG. 7 is a schematic block diagram of another rights management apparatus according to an exemplary embodiment.
- FIG. 8 is a schematic block diagram of another rights management apparatus according to an exemplary embodiment
- FIG. 9 is a schematic block diagram of another rights management apparatus according to an exemplary embodiment.
- FIG. 10 is a schematic structural diagram of the rights management apparatus according to an exemplary embodiment.
- first, second, third, etc. may be used in the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
- first information may also be referred to as second information without departing from the scope of the present disclosure.
- second information may also be referred to as first information.
- word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination.”
- the present disclosure provides a rights management method for obtaining fingerprint information of the user based on a touch operation on the preset interface of the user, and determining whether the user is an authorized user according to the obtained fingerprint information;
- the configuration modification permission of the user for the terminal is disabled, so that the non-native user cannot obtain the permission to modify the terminal configuration when using the user's terminal, thereby increasing the security of the terminal.
- FIG. 1 is a method for managing rights according to an exemplary embodiment, which is applied to a terminal, and includes the following steps:
- step 101 the fingerprint information of the user is obtained based on a touch operation of the user on the preset interface of the terminal;
- the terminal may include a touch-type mobile terminal; for example, the mobile terminal may be a user's smartphone or tablet.
- step 102 it is determined whether the user is an authorized user according to the obtained fingerprint information
- step 103 when the user is an unauthorized user, the configuration modification authority of the user for the terminal is disabled.
- the user can usually modify the application on the desktop of the terminal system through some specific touch operations; for example, taking the MIUI system of Huawei Company as an example, the user can press and hold the application icon on the desktop of the system. Triggers the deletion, dragging, etc. of the application.
- an identity authentication mechanism may be introduced in the management of the existing configuration modification authority, and the user is obtained by a touch operation on the preset interface of the terminal when the user uses the terminal on a daily basis.
- the fingerprint information is then authenticated by the obtained fingerprint information, and the user who is authenticated as an unauthorized user can disable the configuration modification permission of the user for the terminal.
- the pre-preparation can include a visible area of the screen of the terminal.
- the fingerprint sensing chip When implemented from a technical level, the fingerprint sensing chip may be implanted in the visible area of the screen of the terminal in advance, and once the fingerprint sensing chip is implanted in the visible area of the screen, the entire screen of the terminal at this time
- the fingerprint information of the user can be collected as a fingerprint identification area, so that when the user uses the terminal daily, the user is directed to the end
- the touch operation of any area in the end screen can be used to obtain the fingerprint information of the user.
- the user's finger When the user's fingerprint information is obtained, the user's finger is generally required to be completely pressed on the screen of the terminal. Therefore, when the fingerprint information of the user is obtained from the touch operation of the user's daily use terminal, the user can be monitored by the user in the unlocked state. The long press event in the visible area of the screen of the terminal acquires fingerprint information of the user.
- the terminal may first determine whether it is currently in the unlocked state. If it is currently in the unlocked state, it may start to monitor the touch event of the user for the preset interface in real time, and determine whether the monitored touch event is a long press event, if the monitored event is The touch event is a long press event, and the touch point of the long press event can be acquired at this time, and then the fingerprint information of the user can be obtained by the fingerprint sensor chip corresponding to the touch point position.
- the obtained fingerprint information may be matched with the fingerprint information of the authorized user pre-recorded in the terminal system, and the obtained fingerprint information and the pre-recorded authorization in the terminal system are obtained. If the user's fingerprint information matches, the user who is currently using the terminal is an authorized user. For the authorized user, the user may not be restricted in configuration modification rights.
- the obtained fingerprint information does not match the fingerprint information of the authorized user that is pre-recorded in the terminal system, the user who is currently using the terminal is an unauthorized user, and for the unauthorized user, the configuration of the user may be modified. Permissions are restricted.
- the user when the user performs configuration modification on the terminal, it is usually triggered by some specific touch events of the user; for example, as described above, the user can perform long by using an application icon on the system desktop of the terminal. Press the operation to trigger the deletion, dragging, etc. of the application. Therefore, when the configuration modification permission of the unauthorized user is restricted, the configuration modification permission corresponding to the configuration modification event triggered by the touch operation of the user may be disabled.
- the configuration modification permission may include permission of the mobile application icon, permission of the newly created folder, permission to move the application out of the folder, permission to delete the application, and permission to modify the system setting.
- the terminal may first determine whether the touch operation of the user triggers the configuration modification event. If the user's touch operation triggers a configuration modification event, the configuration modification permission corresponding to the configuration modification event may be disabled. For example, suppose the user attempts to delete the application by long-pressing the application icon on the desktop of the terminal system. When the terminal monitors the long-press event in the background, the application triggered by the long-press event can be disabled in the background. The application deletion permission corresponding to the deletion event is deleted. After the application deletion permission is disabled, the user cannot perform the deletion operation for the application by long pressing the application icon on the desktop of the terminal system.
- the disabled permission type may not be limited to the permission of the mobile application icon described above, the permission of the newly created folder, the permission to move the application out of the folder, and the deletion of the application.
- the rights and the rights to modify the system settings may also be one or a combination of the various rights described above. Those skilled in the art may flexibly use the actual application scenarios according to actual needs.
- the configuration modification permission for the unauthorized user is prohibited.
- the touch event pre-established in the system of the terminal and the corresponding configuration modification event may be modified.
- the trigger relationship between the two is achieved.
- a trigger relationship between a long press event and an event of deleting, dragging, or the like on an icon on a system desktop is usually established in advance in the terminal system, and the terminal monitors the user in the background for the system desktop.
- events such as deletion, dragging, etc. of the application icon can be triggered immediately. Therefore, when the permission to delete or drag the icon on the desktop of the system triggered by the long press operation of the user is disabled, the trigger relationship pre-established in the system of the terminal may be modified or deleted. The trigger relationship becomes invalid to achieve.
- the prompt message may be output to the user through the preset interface to prompt the user.
- the prompt message may be a prompt box prompting the user not to modify the permission, or a prompt box prompting the user to perform fingerprint verification again.
- the user deletes or drags the application icon on the desktop of the terminal system by using a long press operation.
- the terminal obtains the fingerprint information of the user by listening to the user's long press event, and then authenticates by fingerprint information.
- the user is an unauthorized user.
- a text box "You do not have permission to edit the desktop” can be output on the desktop of the terminal system to prompt the user that there is no permission to edit the desktop.
- a text box of “Please press the desktop to regain desktop editing permission” may be outputted on the desktop of the terminal system to prompt the user that there is no permission to edit the desktop, and the terminal may be long pressed again.
- the terminal when the terminal disables the configuration modification permission of the unauthorized user, when the authorized user uses the terminal again, the long-press event of the visible area of the screen of the terminal for the terminal can still be monitored by the user.
- the fingerprint information of the user is obtained, and the identity of the user is authenticated by matching the obtained fingerprint information with the fingerprint information of the authorized user pre-recorded in the system. If the authentication is passed, the terminal will not The user's configuration modification permission is subject to any restrictions, and the user can modify the configuration of the terminal normally.
- the identity authentication mechanism is introduced in the management of the configuration modification authority, and the fingerprint information of the user is obtained by a touch operation on the preset interface of the user, and the fingerprint information is determined according to the acquired fingerprint information. Whether the user is an authorized user; when the user is an unauthorized user, the user is disabled to modify the configuration of the terminal, so that the non-native user cannot obtain the permission to modify the terminal when using the user's terminal, thereby Increased security for terminal use.
- FIG. 2 is a method for managing rights according to an exemplary embodiment, which is applied to a terminal. Includes the following steps:
- step 201 the touch event of the user for the preset interface of the terminal is monitored
- the terminal may include a touch-type mobile terminal; for example, the mobile terminal may be a user's smartphone or tablet.
- step 202 it is determined whether the monitored touch event is a long press event
- step 203 when the monitored touch event is a long press event, the touch point of the long press event is acquired, and the fingerprint information of the user is acquired at the location of the touch point;
- step 204 it is determined whether the user is an authorized user according to the obtained fingerprint information
- step 205 when the user is an unauthorized user, determining whether the long press event triggers a configuration modification event for the terminal;
- step 206 when the long press event triggers a configuration modification event for the terminal, the configuration modification permission corresponding to the configuration modification event is disabled.
- the user can usually modify the application on the desktop of the terminal system through some specific touch operations; for example, taking the MIUI system of Huawei Company as an example, the user can press and hold the application icon on the desktop of the system. Triggers the deletion, dragging, etc. of the application.
- an identity authentication mechanism may be introduced in the management of the existing configuration modification authority, and the user is obtained by a touch operation on the preset interface of the terminal when the user uses the terminal on a daily basis.
- the fingerprint information is then authenticated by the obtained fingerprint information, and the user who is authenticated as an unauthorized user can disable the configuration modification permission of the user for the terminal.
- the pre-preparation can include a visible area of the screen of the terminal.
- the fingerprint sensing chip When implemented from a technical level, the fingerprint sensing chip may be implanted in the visible area of the screen of the terminal in advance, and once the fingerprint sensing chip is implanted in the visible area of the screen, the entire screen of the terminal at this time
- the fingerprint information of the user can be collected as the fingerprint identification area, so that when the user uses the terminal, the touch operation of the user on any one of the terminal screens can be used to obtain the fingerprint information of the user.
- the user's finger When the user's fingerprint information is obtained, the user's finger is generally required to be completely pressed on the screen of the terminal. Therefore, when the fingerprint information of the user is obtained from the touch operation of the user's daily use terminal, the user can be monitored in the unlocked state. The user's fingerprint information is acquired for a long press event in the visible area of the screen of the terminal.
- the terminal may first determine whether it is currently in an unlocked state. If it is currently in an unlocked state, it may start to monitor the touch event of the user for the preset interface in real time, and determine whether the monitored touch event is a long press event. If the touch event is a long press event, the touch point of the long press event can be obtained at this time, and then the fingerprint information of the user can be obtained by the fingerprint sensor chip corresponding to the touch point position.
- the obtained fingerprint information may be matched with the fingerprint information of the authorized user pre-recorded in the terminal system, and the obtained fingerprint information and the pre-recorded authorization in the terminal system are obtained. If the user's fingerprint information matches, the user who is currently using the terminal is an authorized user. For the authorized user, the user may not be restricted in configuration modification rights.
- the obtained fingerprint information does not match the fingerprint information of the authorized user that is pre-recorded in the terminal system, the user who is currently using the terminal is an unauthorized user, and for the unauthorized user, the configuration of the user may be modified. Permissions are restricted.
- the user when the user performs configuration modification on the terminal, it is usually triggered by some specific touch events of the user; for example, as described above, the user can perform long by using an application icon on the system desktop of the terminal. Press the operation to trigger the deletion, dragging, etc. of the application. Therefore, when the configuration modification permission of the unauthorized user is restricted, the configuration modification permission corresponding to the configuration modification event triggered by the touch operation of the user may be disabled.
- the configuration modification permission may include permission of the mobile application icon, permission of the newly created folder, permission to move the application out of the folder, permission to delete the application, and permission to modify the system setting.
- the terminal may first determine whether the touch operation of the user triggers the configuration modification event. If the user's touch operation triggers a configuration modification event, the configuration modification permission corresponding to the configuration modification event may be disabled. For example, suppose the user attempts to delete the application by long-pressing the application icon on the desktop of the terminal system. When the terminal monitors the long-press event in the background, the application triggered by the long-press event can be disabled in the background. The application deletion permission corresponding to the deletion event is deleted. After the application deletion permission is disabled, the user cannot perform the deletion operation for the application by long pressing the application icon on the desktop of the terminal system.
- the disabled permission type may not be limited to the permission of the mobile application icon described above, the permission of the newly created folder, the permission to move the application out of the folder, and the deletion of the application.
- the rights and the rights to modify the system settings may also be one or a combination of the various rights described above. Those skilled in the art may flexibly use the actual application scenarios according to actual needs.
- the configuration modification permission for the unauthorized user is disabled. You can disable only the permissions of the mobile app icon, the permissions of the new folder, the permissions to move the app out of the folder, and the permissions to delete the app.
- the configuration modification permission of the unauthorized user is disabled, in addition to the permission of the mobile application icon, the permission of the newly created folder, In addition to the permission to remove the folder and the permission to delete the application, you can also disable the permission to modify the system settings.
- the configuration modification event triggered by the touch operation of the user is disabled.
- the modification permission is configured, the trigger relationship between the touch event pre-established in the system of the terminal and the corresponding configuration modification event is modified.
- a trigger relationship between a long press event and an event of deleting, dragging, or the like on an icon on a system desktop is usually established in advance in the terminal system, and the terminal monitors the user in the background for the system desktop.
- events such as deletion, dragging, etc. of the application icon can be triggered immediately. Therefore, when the permission to delete or drag the icon on the desktop of the system triggered by the long press operation of the user is disabled, the trigger relationship pre-established in the system of the terminal may be modified or deleted. The trigger relationship becomes invalid to achieve.
- the prompt message may be output to the user through the preset interface to prompt the user.
- the prompt message may be a prompt box prompting the user not to modify the permission, or a prompt box prompting the user to perform fingerprint verification again.
- the user deletes or drags the application icon on the desktop of the terminal system by using a long press operation, and assumes that the terminal obtains the fingerprint information of the user by listening to the user's long press event.
- the user is an unauthorized user by fingerprint information matching.
- a text box of “You do not have permission to edit the desktop” as shown in FIG. 3 may be output on the desktop of the terminal system to prompt the user.
- the user does not have permission to edit the desktop.
- a text box of “Please press the desktop to regain desktop editing permission” as shown in FIG. 4 may be outputted on the desktop of the terminal system to prompt the user that the user has no permission to edit the desktop.
- Fingerprint authentication is performed by long-pressing the visible area of the screen of the terminal to obtain the authority for desktop editing.
- the terminal when the terminal disables the configuration modification permission of the unauthorized user, when the authorized user uses the terminal again, the long-press event of the visible area of the screen of the terminal for the terminal can still be monitored by the user.
- the fingerprint information of the user is obtained, and the identity of the user is authenticated by matching the obtained fingerprint information with the fingerprint information of the authorized user pre-recorded in the system. If the authentication is passed, the terminal will not The user's configuration modification permission is subject to any restrictions, and the user can modify the configuration of the terminal normally.
- the identity authentication mechanism is introduced in the management of the configuration modification authority, and the fingerprint information of the user is obtained by a touch operation on the preset interface of the user, and the fingerprint information is determined according to the acquired fingerprint information. Whether the user is an authorized user; when the user is an unauthorized user, the user is disabled to modify the configuration of the terminal, so that the non-native user cannot obtain the permission to modify the terminal when using the user's terminal, thereby Increased security for terminal use.
- the present disclosure also provides an embodiment of an apparatus.
- FIG. 5 is a schematic block diagram of a rights management apparatus according to an exemplary embodiment.
- a rights management apparatus 500 includes: an obtaining module 501, a determining module 502, and a disabling module 503; wherein:
- the obtaining module 501 is configured to acquire fingerprint information of the user based on a touch operation performed by the user on a preset interface of the terminal;
- the determining module 502 is configured to determine, according to the obtained fingerprint information, whether the user is an authorized user;
- the disabling module 503 is configured to disable the user's configuration modification rights for the terminal when the user is an unauthorized user.
- the identity authentication mechanism is introduced in the management of the configuration modification authority, and the fingerprint information of the user is obtained by a touch operation on the preset interface of the user, and the fingerprint information is determined according to the acquired fingerprint information. Whether the user is an authorized user; when the user is an unauthorized user, the user is disabled to modify the configuration of the terminal, so that the non-native user cannot obtain the permission to modify the terminal when using the user's terminal, thereby Increased security for terminal use.
- FIG. 6 is a block diagram of another apparatus according to an exemplary embodiment of the present disclosure.
- the embodiment is based on the foregoing embodiment shown in FIG. 5, and the touch operation includes a long press operation;
- the obtaining module 501 can include a listening submodule 501A, a first determining submodule 501B, and an obtaining submodule 501C; wherein:
- the monitoring sub-module 501A is configured to monitor a touch event of a user for a preset interface of the terminal;
- the first determining sub-module 501B is configured to determine whether the monitored touch event is a long press event
- the acquiring sub-module 501C is configured to acquire a touch point of the long-press event when the monitored touch event is a long-press event, and acquire fingerprint information of the user at the location of the touch point.
- FIG. 7 is a block diagram of another apparatus according to an exemplary embodiment of the present disclosure.
- the implementation module is further configured to include the second Judging sub-module 501D; wherein:
- the second determining sub-module 501D is configured to determine whether the terminal has been unlocked before the monitoring sub-module 501A listens to a touch event of the preset interface of the terminal; when the terminal has been unlocked At this time, the listening sub-module 501A starts to listen to the touch event of the user for the preset interface of the terminal.
- the preset interface includes a visible area of a screen of the terminal.
- the configuration of the second judging sub-module 501D shown in the foregoing apparatus embodiment shown in FIG. 7 may also be included in the foregoing apparatus embodiment of FIG. 5, and the disclosure is not limited thereto.
- FIG. 8 is a block diagram of another apparatus according to an exemplary embodiment of the present disclosure.
- the disabling module 503 may include a third determination.
- the third determining sub-module 503A is configured to determine, when the user is an unauthorized user, whether the touch operation triggers a configuration modification event for the terminal;
- the disabling submodule 503B is configured to disable the configuration modification authority corresponding to the configuration modification event when the touch operation triggers a configuration modification event for the terminal.
- FIG. 9 is a block diagram of another apparatus according to an exemplary embodiment of the present disclosure.
- the embodiment may further include an output module based on the foregoing embodiment shown in FIG. Module 503C; wherein:
- the outgoing sub-module 503C is configured to output a prompt message to the user through the preset interface after the configuration modification permission corresponding to the configuration modification event is disabled.
- the configuration modification permission includes a permission of the mobile application icon, a permission to create a new folder, a permission to move the application out of the folder, a permission to delete the application, and a permission to modify the system setting.
- the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
- the device embodiments described above are merely illustrative, wherein the modules described as separate components may or may not be physically separate, and the components displayed as modules may or may not be physical modules, ie may be located A place, or it can be distributed to multiple network modules. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
- the present disclosure further provides a rights management apparatus, where the apparatus includes:
- a memory for storing processor executable instructions
- processor is configured to:
- the user When the user is an unauthorized user, the user is disabled to modify the configuration for the terminal.
- the present disclosure also provides a terminal, the terminal including a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be executed by one or more processors
- the one or more programs include instructions for performing the following operations:
- the user When the user is an unauthorized user, the user is disabled to modify the configuration for the terminal.
- FIG. 10 is a schematic structural diagram of a rights management apparatus according to an exemplary embodiment.
- the device 1000 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, and a fitness device. Equipment, personal digital assistants, etc.
- apparatus 1000 can include one or more of the following components: processing component 1001, memory 1002, Power component 1003, multimedia component 1004, audio component 1005, input/output (I/O) interface 1006, sensor component 1007, and communication component 1008.
- processing component 1001 memory 1002, Power component 1003, multimedia component 1004, audio component 1005, input/output (I/O) interface 1006, sensor component 1007, and communication component 1008.
- memory 1002 memory 1002, Power component 1003, multimedia component 1004, audio component 1005, input/output (I/O) interface 1006, sensor component 1007, and communication component 1008.
- I/O input/output
- Processing component 1001 typically controls the overall operation of device 1000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 1001 can include one or more processors 1009 to execute instructions to perform all or part of the steps of the above described methods.
- processing component 1001 can include one or more modules to facilitate interaction between component 1001 and other components.
- processing component 1001 can include a multimedia module to facilitate interaction between multimedia component 1004 and processing component 1001.
- the memory 1002 is configured to store various types of data to support operation at the device 1000. Examples of such data include instructions for any application or method operating on device 1000, contact data, phone book data, messages, pictures, videos, and the like.
- the memory 1002 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM Programmable Read Only Memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk
- Optical Disk Optical Disk
- Power component 1003 provides power to various components of device 1000.
- Power component 1003 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1000.
- the multimedia component 1004 includes a screen between the device 1000 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 1004 includes a front camera and/or a rear camera. When the device 1000 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 1005 is configured to output and/or input an audio signal.
- the audio component 1005 includes a microphone (MIC) that is configured to receive an external audio signal when the device 1000 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 1002 or transmitted via communication component 1008.
- the audio component 1005 also includes a speaker for outputting an audio signal.
- the I/O interface 1002 provides an interface between the processing component 1001 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 1007 includes one or more sensors for providing device 1000 with various aspects of status assessment.
- sensor assembly 1007 can detect an open/closed state of device 1000, relative positioning of components, such as the display and keypad of device 1000, and sensor component 1007 can also detect changes in position of one component of device 1000 or device 1000. , the presence or absence of contact of the user with the device 1000, the orientation or acceleration of the device 1000 /Deceleration and temperature change of device 1000.
- the sensor assembly 1007 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 1007 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor assembly 1007 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 1008 is configured to facilitate wired or wireless communication between device 1000 and other devices.
- the device 1000 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- communication component 1008 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
- the communication component 1008 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- apparatus 1000 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 1002 comprising instructions executable by processor 1009 of apparatus 1000 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
- enabling the mobile terminal to perform a rights management method including:
- the user When the user is an unauthorized user, the user is disabled to modify the configuration for the terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
- Collating Specific Patterns (AREA)
- Facsimiles In General (AREA)
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (15)
- 一种权限管理方法,其特征在于,所述方法包括:基于用户在终端的预设界面上的触摸操作来获取所述用户的指纹信息;根据获取到的指纹信息判断该用户是否为授权用户;当所述用户为非授权用户时,禁用该用户针对所述终端的配置修改权限。
- 如权利要求1所述的方法,其特征在于,所述触摸操作包括长按操作;所述基于用户在终端的预设界面上的触摸操作来获取所述用户的指纹信息包括:监听用户针对所述终端的预设界面的触摸事件;判断监听到的触摸事件是否为长按事件;当监听到的触摸事件为长按事件时,获取所述长按事件的触摸点,并在所述触摸点的位置获取所述用户的指纹信息。
- 如权利要求2所述的方法,其特征在于,所述监听用户针对所述终端的预设界面的触摸事件之前,所述方法还包括:判断所述终端是否已被解锁;当所述终端已被解锁时,开始监听用户针对所述终端的预设界面的触摸事件。
- 如权利要求1~3任一所述的方法,其特征在于,所述预设界面包括所述终端的屏幕的可见区域。
- 如权利要求1所述的方法,其特征在于,所述当所述用户为非授权用户时,禁用该用户针对所述终端的配置修改权限包括:当所述用户为非授权用户时,判断所述触摸操作是否触发了针对所述终端的配置修改事件;当所述触摸操作触发了针对所述终端的配置修改事件时,禁用所述配置修改事件对应的配置修改权限。
- 如权利要求5所述的方法,其特征在于,所述方法还包括:当禁用了所述配置修改事件对应的配置修改权限后,通过所述预设界面向用户输出提示消息。
- 如权利要求1或5所述的方法,其特征在于,所述配置修改权限包括移动应用图标的权限、新建文件夹的权限、将应用移出文件夹的权限、删除应用的权限以及对系统设置进行修改的权限。
- 一种权限管理装置,其特征在于,所述装置包括:获取模块,用于基于用户在终端的预设界面上的触摸操作来获取所述用户的指纹信息;判断模块,用于根据获取到的指纹信息判断该用户是否为授权用户;禁用模块,用于在所述用户为非授权用户时,禁用该用户针对所述终端的配置修改权限。
- 如权利要求8所述的装置,其特征在于,所述触摸操作包括长按操作;所述获取模块包括:监听子模块,用于监听用户针对所述终端的预设界面的触摸事件;第一判断子模块,用于判断监听到的触摸事件是否为长按事件;获取子模块,用于在监听到的触摸事件为长按事件时,获取所述长按事件的触摸点,并在所述触摸点的位置获取所述用户的指纹信息。
- 如权利要求9所述的装置,其特征在于,所述获取模块还包括:第二判断子模块,用于在所述监听子模块监听用户针对所述终端的预设界面的触摸事件之前,判断所述终端是否已被解锁;当所述终端已被解锁时,开始由所述监听子模块监听用户针对所述终端的预设界面的触摸事件。
- 如权利要求8~10任一所述的装置,其特征在于,所述预设界面包括所述终端的屏幕的可见区域。
- 如权利要求8所述的装置,其特征在于,所述禁用模块包括:第三判断子模块,用于在所述用户为非授权用户时,判断所述触摸操作是否触发了针对所述终端的配置修改事件;禁用子模块,用于在所述触摸操作触发了针对所述终端的配置修改事件时,禁用所述配置修改事件对应的配置修改权限。
- 如权利要求12所述的装置,其特征在于,所述禁用模块还包括:输出子模块,用于在禁用了所述配置修改事件对应的配置修改权限后,通过所述预设界面向用户输出提示消息。
- 如权利要求8或12所述的装置,其特征在于,所述配置修改权限包括移动应用图标的权限、新建文件夹的权限、将应用移出文件夹的权限、删除应用的权限以及对系统设置进行修改的权限。
- 一种权限管理装置,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:基于用户在终端的预设界面上的触摸操作来获取所述用户的指纹信息;根据获取到的指纹信息判断该用户是否为授权用户;当所述用户为非授权用户时,禁用该用户针对所述终端的配置修改权限。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MX2016001551A MX357088B (es) | 2015-04-28 | 2015-11-20 | Metodo y dispositivo para la gestion de permisos. |
RU2016103765A RU2625425C1 (ru) | 2015-04-28 | 2015-11-20 | Способ и устройство для управления полномочиями |
JP2017514782A JP2017518598A (ja) | 2015-04-28 | 2015-11-20 | 権限管理方法、装置、プログラムおよび記録媒体 |
BR112016001646-7A BR112016001646B1 (pt) | 2015-04-28 | 2015-11-20 | Método e dispositivo para gestão de permissão. |
KR1020167001678A KR20160137940A (ko) | 2015-04-28 | 2015-11-20 | 권한 관리 방법, 장치, 프로그램 및 컴퓨터 판독가능한 기록매체 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510209637.6 | 2015-04-28 | ||
CN201510209637.6A CN104765552B (zh) | 2015-04-28 | 2015-04-28 | 权限管理方法和装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016173245A1 true WO2016173245A1 (zh) | 2016-11-03 |
Family
ID=53647418
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/095158 WO2016173245A1 (zh) | 2015-04-28 | 2015-11-20 | 权限管理方法和装置 |
Country Status (9)
Country | Link |
---|---|
US (1) | US10075445B2 (zh) |
EP (1) | EP3089065B1 (zh) |
JP (1) | JP2017518598A (zh) |
KR (1) | KR20160137940A (zh) |
CN (1) | CN104765552B (zh) |
BR (1) | BR112016001646B1 (zh) |
MX (1) | MX357088B (zh) |
RU (1) | RU2625425C1 (zh) |
WO (1) | WO2016173245A1 (zh) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104765552B (zh) | 2015-04-28 | 2019-04-19 | 小米科技有限责任公司 | 权限管理方法和装置 |
CN106354399A (zh) * | 2015-07-16 | 2017-01-25 | 阿里巴巴集团控股有限公司 | 应用权限配置方法、装置及电子设备 |
GB2540961B (en) * | 2015-07-31 | 2019-09-18 | Arm Ip Ltd | Controlling configuration data storage |
CN105205410B (zh) * | 2015-09-14 | 2018-06-26 | 维沃移动通信有限公司 | 数据管理方法及终端 |
CN105117663B (zh) * | 2015-09-23 | 2018-07-06 | 广东欧珀移动通信有限公司 | 一种应用的加密对象显示方法及装置 |
CN105335641B (zh) * | 2015-10-16 | 2018-06-19 | 宇龙计算机通信科技(深圳)有限公司 | 一种基于指纹识别的身份验证方法及装置 |
CN106611113A (zh) * | 2015-10-21 | 2017-05-03 | 中兴通讯股份有限公司 | 一种安全环境构建方法和装置 |
CN105278812B (zh) * | 2015-10-27 | 2019-04-30 | 深圳市金立通信设备有限公司 | 一种界面调整方法及终端 |
CN105677214A (zh) * | 2015-12-30 | 2016-06-15 | 小米科技有限责任公司 | 应用程序管理方法及装置 |
CN106445596B (zh) * | 2016-09-27 | 2020-01-14 | 依偎科技(南昌)有限公司 | 一种设置项的管理方法及装置 |
CN108255533B (zh) * | 2016-12-28 | 2021-12-17 | 平安科技(深圳)有限公司 | 系统配置更改方法及装置 |
CN106843727B (zh) * | 2017-01-05 | 2020-06-09 | 北京数科网维技术有限责任公司 | 防止文字误删除方法和系统 |
US11095678B2 (en) * | 2017-07-12 | 2021-08-17 | The Boeing Company | Mobile security countermeasures |
CN107609372A (zh) * | 2017-09-07 | 2018-01-19 | 广东欧珀移动通信有限公司 | 指纹识别方法、装置、移动终端及存储介质 |
US10803288B2 (en) * | 2018-04-24 | 2020-10-13 | International Business Machines Corporation | Methods and systems for accessing computing systems with biometric identification |
CN108803959A (zh) * | 2018-04-28 | 2018-11-13 | 上海爱优威软件开发有限公司 | 一种快速管理应用图标的方法及终端 |
CN108681427B (zh) * | 2018-05-28 | 2020-06-30 | 维沃移动通信有限公司 | 一种访问权限控制的方法及终端设备 |
CN109766680B (zh) * | 2018-12-27 | 2021-01-08 | 维沃移动通信有限公司 | 权限控制方法及终端 |
CN110826040A (zh) * | 2019-11-06 | 2020-02-21 | 北京知道创宇信息技术股份有限公司 | 权限控制方法、装置、电子设备及存储介质 |
CN111259360B (zh) * | 2020-02-14 | 2022-03-18 | 珠海格力电器股份有限公司 | 终端设备的触摸屏状态控制方法、装置及终端设备 |
CN112199255A (zh) * | 2020-10-15 | 2021-01-08 | Oppo广东移动通信有限公司 | 权限使用监控方法、装置、设备及存储介质 |
US20220319352A1 (en) * | 2021-04-01 | 2022-10-06 | Motorola Mobility Llc | Automatically Entering A Demonstration Mode For A Device Based On Audio Conversation |
US12079639B2 (en) * | 2021-04-01 | 2024-09-03 | Motorola Mobility Llc | Automatically changing device property values for a secondary user of a device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488924A (zh) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | 一种终端的解锁处理方法、装置及设备 |
CN103577739A (zh) * | 2013-11-15 | 2014-02-12 | 青岛尚慧信息技术有限公司 | 一种智能移动终端及其设置及访问控制方法 |
CN104469717A (zh) * | 2014-12-25 | 2015-03-25 | 广东欧珀移动通信有限公司 | 短信发送方法及装置 |
CN104765552A (zh) * | 2015-04-28 | 2015-07-08 | 小米科技有限责任公司 | 权限管理方法和装置 |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0593386A3 (en) * | 1992-10-16 | 1996-07-31 | Ibm | Method and apparatus for accessing touch screen desktop objects via fingerprint recognition |
JPH09297609A (ja) * | 1996-05-01 | 1997-11-18 | Kayaba Ind Co Ltd | グラフィックパネル式操作装置 |
JP2000090052A (ja) * | 1998-09-10 | 2000-03-31 | Toshiba Corp | コンピュータ装置 |
JP3663075B2 (ja) * | 1999-04-05 | 2005-06-22 | シャープ株式会社 | 情報処理装置 |
JP4193123B2 (ja) * | 2003-06-16 | 2008-12-10 | 村田機械株式会社 | 文書処理装置及び文書処理方法 |
JP4230843B2 (ja) * | 2003-07-31 | 2009-02-25 | 京セラミタ株式会社 | 画像形成装置 |
JP4177858B2 (ja) | 2006-05-18 | 2008-11-05 | 株式会社カシオ日立モバイルコミュニケーションズ | 指紋認証機能付き携帯端末装置及びプログラム |
KR101549556B1 (ko) * | 2009-03-06 | 2015-09-03 | 엘지전자 주식회사 | 휴대 단말기 및 그 제어방법 |
GB0908456D0 (en) * | 2009-05-18 | 2009-06-24 | L P | Touch screen, related method of operation and systems |
US8924858B2 (en) * | 2010-11-01 | 2014-12-30 | Massachusetts Institute Of Technology | Touch-based system for transferring data |
TWI490789B (zh) * | 2011-05-03 | 2015-07-01 | Synaptics Inc | 指紋感測器及整合指紋感測器的電子顯示器 |
EP2631762A1 (en) * | 2012-02-24 | 2013-08-28 | Research In Motion Limited | Method and apparatus for providing an option to enable multiple selections |
US20130287272A1 (en) * | 2012-04-29 | 2013-10-31 | Yang Lu | Methods and Apparatus of Integrating Fingerprint Imagers with Touch Panels and Displays |
US20140292666A1 (en) * | 2013-03-26 | 2014-10-02 | Mobile Identity Management and Biometrics consortium | Method and Apparatuses of User Interaction Control with Touch Display Device Integrated with Fingerprint Imager |
KR102020345B1 (ko) * | 2012-08-22 | 2019-11-04 | 삼성전자 주식회사 | 터치스크린을 구비하는 단말에서 홈 화면의 구성 방법 및 장치 |
KR102127927B1 (ko) | 2013-07-30 | 2020-07-09 | 엘지전자 주식회사 | 이동 단말기, 스마트 워치 및 이동 단말기와 스마트 워치간 보안 인증방법 |
KR101474733B1 (ko) | 2014-04-02 | 2014-12-22 | (주)이미지스테크놀로지 | 개선된 패턴 구조를 갖는 지문 인식 일체형 정전용량 터치스크린 |
CN104008319B (zh) * | 2014-05-14 | 2017-11-24 | 深圳市汇顶科技股份有限公司 | 基于指纹识别的终端及其待机状态下的登录方法、系统 |
-
2015
- 2015-04-28 CN CN201510209637.6A patent/CN104765552B/zh active Active
- 2015-11-20 BR BR112016001646-7A patent/BR112016001646B1/pt active IP Right Grant
- 2015-11-20 WO PCT/CN2015/095158 patent/WO2016173245A1/zh active Application Filing
- 2015-11-20 MX MX2016001551A patent/MX357088B/es active IP Right Grant
- 2015-11-20 KR KR1020167001678A patent/KR20160137940A/ko active Search and Examination
- 2015-11-20 RU RU2016103765A patent/RU2625425C1/ru active
- 2015-11-20 JP JP2017514782A patent/JP2017518598A/ja active Pending
-
2016
- 2016-03-17 US US15/073,363 patent/US10075445B2/en active Active
- 2016-04-26 EP EP16167047.6A patent/EP3089065B1/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488924A (zh) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | 一种终端的解锁处理方法、装置及设备 |
CN103577739A (zh) * | 2013-11-15 | 2014-02-12 | 青岛尚慧信息技术有限公司 | 一种智能移动终端及其设置及访问控制方法 |
CN104469717A (zh) * | 2014-12-25 | 2015-03-25 | 广东欧珀移动通信有限公司 | 短信发送方法及装置 |
CN104765552A (zh) * | 2015-04-28 | 2015-07-08 | 小米科技有限责任公司 | 权限管理方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
US20160323282A1 (en) | 2016-11-03 |
US10075445B2 (en) | 2018-09-11 |
MX2016001551A (es) | 2017-02-09 |
CN104765552A (zh) | 2015-07-08 |
BR112016001646B1 (pt) | 2022-10-25 |
MX357088B (es) | 2018-06-25 |
RU2625425C1 (ru) | 2017-07-13 |
EP3089065B1 (en) | 2018-08-29 |
CN104765552B (zh) | 2019-04-19 |
EP3089065A1 (en) | 2016-11-02 |
JP2017518598A (ja) | 2017-07-06 |
BR112016001646A2 (pt) | 2017-08-01 |
KR20160137940A (ko) | 2016-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016173245A1 (zh) | 权限管理方法和装置 | |
US10706173B2 (en) | Method and device for displaying notification information | |
EP3413549B1 (en) | Method and device for displaying notification information | |
US9904774B2 (en) | Method and device for locking file | |
KR101723556B1 (ko) | 스마트 장면 삭제방법, 장치, 프로그램 및 기록매체 | |
WO2015196708A1 (zh) | 文件锁定方法和装置 | |
WO2016023367A1 (zh) | 访问认证方法、装置及系统 | |
US20170289181A1 (en) | Payment method, apparatus and medium | |
WO2017080076A1 (zh) | 监控系统分区文件的方法及装置 | |
WO2017177595A1 (zh) | 数据迁移方法及装置 | |
CN104376273A (zh) | 一种数据访问控制方法和装置 | |
WO2016015403A1 (zh) | 一种接入wi-fi网络的方法及装置 | |
CN104391712B (zh) | 关机方法和装置 | |
CN109992946A (zh) | 解锁应用程序的方法、装置及计算机可读存储介质 | |
US10706307B2 (en) | Methods and devices for processing fingerprint information | |
WO2017185568A1 (zh) | 一种管理应用程序的方法和装置 | |
WO2021017141A1 (zh) | 一种控制门禁的方法、装置及介质 | |
WO2018049609A1 (zh) | 权限控制方法及装置 | |
WO2018072193A1 (zh) | 控制应用自启动的方法及装置 | |
CN104360875B (zh) | 隐私模式启动方法和装置 | |
EP3460717A1 (en) | Method, apparatus, terminal, and computer-readable storage medium for processing fingerprints | |
WO2018049611A1 (zh) | 权限控制方法及装置 | |
WO2017148138A1 (zh) | 指纹验证方法及装置 | |
US9674768B2 (en) | Method and device for accessing wireless network | |
WO2017201692A1 (zh) | 应用加密方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 20167001678 Country of ref document: KR Kind code of ref document: A Ref document number: 2017514782 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2016/001551 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2016103765 Country of ref document: RU Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15890620 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112016001646 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112016001646 Country of ref document: BR Kind code of ref document: A2 Effective date: 20160126 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15890620 Country of ref document: EP Kind code of ref document: A1 |