WO2017008676A1 - 应用权限配置方法、装置及电子设备 - Google Patents

应用权限配置方法、装置及电子设备 Download PDF

Info

Publication number
WO2017008676A1
WO2017008676A1 PCT/CN2016/089078 CN2016089078W WO2017008676A1 WO 2017008676 A1 WO2017008676 A1 WO 2017008676A1 CN 2016089078 W CN2016089078 W CN 2016089078W WO 2017008676 A1 WO2017008676 A1 WO 2017008676A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
policy
authorization policy
configuration
authority
Prior art date
Application number
PCT/CN2016/089078
Other languages
English (en)
French (fr)
Inventor
马向阳
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2017008676A1 publication Critical patent/WO2017008676A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Definitions

  • the application relates to the field of application rights management, and specifically relates to an application rights configuration method.
  • the application also provides an application authority configuration device and an electronic device.
  • Mobile terminals are becoming more and more popular, and mobile applications are increasingly powerful. In order to facilitate user's use, many mobile terminal devices allow users to install mobile applications themselves, and the security of mobile applications becomes increasingly important.
  • the Android system because it is an open development platform, the permission control of the mobile application access system function is relatively loose, and most of the permissions can be obtained only by the application developer declaration. Therefore, mobile applications can usually enjoy a variety of access to system functions, such as: permissions related to user payment categories, including sending text messages, making calls, surfing the Internet, etc.; user privacy information rights, including access to message records, contact information, calls Recording, etc.; mobile terminal device communication class permissions, including establishing a WIFI connection, a Bluetooth connection, and the like.
  • the user needs to find and start the corresponding rights management program, find the application to be configured, and then find the permission to be configured from among the numerous rights, and then perform the operation of opening or closing to grant or cancel the corresponding application for the application. permission. It can be seen that the existing application rights configuration process steps are cumbersome and inefficient.
  • the embodiment of the present application provides an application permission configuration method to solve the problem that the existing application rights configuration process is cumbersome and inefficient.
  • the embodiment of the present application further provides an application authority configuration apparatus, and an electronic device.
  • the application provides an application permission configuration method, including:
  • the authorization policy is a member of a preset authorization policy set.
  • the preset permission configuration triggering operation includes: long pressing an application icon, double clicking an application icon, three clicking an application icon, using a finger touch application icon with specific fingerprint information, or a touch application in a permission configuration mode. icon.
  • the preset permission configuration triggering operation is to touch the application icon in the permission configuration mode, before the receiving the touch operation on the application icon, performing the following switching operation of the access permission configuration mode:
  • the method is implemented on a device with a touch screen, and the touch screen integrates a fingerprint sensor function;
  • Determining whether the performer of the touch operation has configuration rights includes:
  • the selecting operation of receiving an authorization policy for the application includes:
  • the selecting operation of receiving an authorization policy for the application is: receiving a selection operation of a different state application icon displayed in a loop;
  • the different status application icons include: application icons of different colors, application icons of different sizes, or application icons with different status identifiers.
  • the selecting operation of receiving the different state application icons for the cyclic display includes:
  • the loop displays application icons of different states, including:
  • an application icon different from a current state of the current state is displayed in a preset cyclic display order
  • the acquiring an application icon state selected during the cyclic display process includes: if a touch operation on the application icon is not received within a preset time period, the currently displayed application icon state is the selected application icon status.
  • the loop displays application icons of different states, including:
  • the acquiring the icon state of the application selected during the loop display process comprises: receiving the selection operation of the state of the application icon in the cyclic display process.
  • the setting the corresponding rights for the application according to the selected authorization policy includes:
  • the setting the corresponding permission for the application according to the selected authorization policy further includes:
  • the setting the rights in the permission set for the application includes: setting the rights included in the intersection for the application.
  • the authorization policy set includes: a set of authorization policies based on application requirements, or a set of authorization policies based on risk division;
  • the application requirement-based authorization policy set includes the following authorization policies: a common policy, a trust policy, and an untrust policy;
  • the risk-based authorization policy set includes the following authorization policies: a low-risk strategy, a medium-risk strategy, and a high-risk strategy.
  • the application icon is displayed in a preset manner, and the preset manner includes: highlighting, or blinking display.
  • the preset authorization policy set is at least two.
  • the selecting operation of receiving an authorization policy for the application includes: receiving a selection operation of an authorization policy of the application in the selected authorization policy set.
  • the application icon includes: an application icon displayed on a desktop.
  • the application further provides an application authority configuration apparatus, including:
  • a touch operation receiving unit configured to receive a touch operation on the application icon
  • the touch operation determining unit is configured to determine whether the touch operation received by the touch operation receiving unit is consistent with the preset permission configuration triggering operation;
  • a policy selection receiving unit configured to: when the output of the touch operation determining unit is YES, receive a selection operation of an authorization policy of the application;
  • the application permission setting unit is configured to select an authorization policy output by the receiving unit according to the policy, and set a corresponding authority for the application.
  • the device when the preset permission configuration triggering operation is to click an application icon in the rights configuration mode, the device includes any one of the following units:
  • a first mode switching receiving unit configured to receive a touch operation on a mode switching area preset in the display screen before triggering the touch operation receiving unit to work;
  • the second mode switching receiving unit is configured to receive a selection operation for the menu item for mode switching in the system menu before triggering the touch operation receiving unit to work.
  • the device includes:
  • the privilege verification unit is configured to: when the output of the touch operation determining unit is YES, verify whether the executor of the touch operation has configuration authority, and when yes, trigger the policy selection receiving unit to work.
  • the device is deployed on a device with a touch screen, and the touch screen integrates a fingerprint sensor function;
  • the configuration authority verification unit includes:
  • the fingerprint information acquisition subunit is configured to acquire fingerprint information collected when the touch operation receiving unit works
  • the configuration authority determining sub-unit is configured to determine whether the fingerprint information matches the pre-stored fingerprint information with the configuration authority, and if yes, determine that the performer has the configuration authority.
  • the policy selection receiving unit is specifically configured to:
  • the policy selection receiving unit is specifically configured to: receive a selection operation of the different state application icons displayed in the loop, and determine, according to the selected application icon state, and the corresponding relationship between the preset application icon state and the authorization policy.
  • the selected authorization policy; the policy selection receiving unit includes:
  • a loop display subunit for cyclically displaying application icons of different states
  • a state acquisition subunit for acquiring an application icon state selected during a loop display process
  • the policy determining subunit is configured to determine, according to the state of the application icon acquired by the state acquiring subunit, and the corresponding relationship between the preset application icon state and the authorization policy, the selected authorization policy.
  • the loop display subunit is specifically configured to: when receiving a touch operation on the application icon, display an application icon different from a current state of a current state according to a preset cyclic display order;
  • the state obtaining sub-unit is specifically configured to determine whether a touch operation on the application icon is not received within a preset time period, and if yes, the currently displayed application icon state is the selected application icon state.
  • the loop display sub-unit is specifically configured to automatically cycle display application icons of different states according to preset time intervals
  • the state obtaining sub-unit is specifically configured to receive a selection operation on an application icon state during the cyclic display process.
  • the application permission setting unit includes:
  • a permission set obtaining subunit configured to acquire a permission set corresponding to an authorization policy output by the policy selection receiving unit
  • the permission setting execution subunit is configured to set the permission set for the application to obtain the permission in the permission set acquired by the subunit.
  • the application permission setting unit further includes:
  • An intersection calculation subunit configured to calculate an intersection of the permission set obtained by the permission set acquisition subunit and the permission set required by the application
  • the permission setting execution sub-unit is specifically configured to set, for the application, the rights included in the intersection calculated by the intersection calculation sub-unit.
  • the device includes:
  • the icon highlighting unit is configured to display the preset mode when the output of the touch operation determining unit is YES
  • the application icon is shown, and then the policy selection receiving unit is triggered to work.
  • the device includes:
  • a set selection receiving unit configured to: when the output of the touch operation determining unit is YES, receive a selection operation of the authorization policy set to which the application belongs, and trigger the policy selection receiving unit to work;
  • the policy selection receiving unit is specifically configured to receive a selection operation of an authorization policy of the application in the selected authorization policy set.
  • the application further provides an electronic device, including:
  • a memory for storing an application rights configuration program, when the program is read and executed by the processor, performing the following operations: receiving a touch operation on the application icon; and triggering the touch operation and the preset permission configuration
  • the user selects an authorization policy for the application, and sets a corresponding authority for the application according to the selected authorization policy.
  • the authorization policy is a member of the preset authorization policy set.
  • the application permission configuration method provided by the present application when the received touch operation on the application icon is consistent with the preset permission configuration triggering operation, receives a selection operation of the authorization policy for the application, and according to the selected authorization policy, The application sets the corresponding permissions.
  • the application can be directly granted the corresponding permission set according to the authorization policy selected by the user on the interface including the application icon, thereby simplifying the permission configuration step, improving the configuration efficiency, and realizing the rapid configuration of the application authority. .
  • FIG. 2 is a flowchart of a process for determining a selected authorization policy by receiving a selection operation of a different state application icon for cyclic display according to an embodiment of the present application;
  • FIG. 3 is a flowchart of a process for setting a corresponding authority for an application according to a selected authorization policy according to an embodiment of the present application
  • FIG. 4 is a schematic diagram of an embodiment of an application authority configuration apparatus of the present application.
  • FIG. 5 is a schematic diagram of an embodiment of an electronic device of the present application.
  • an application authority configuration method an application authority configuration device, and an electronic device are respectively provided, which are described in detail in the following embodiments.
  • the application authority configuration method and device provided by the embodiments of the present application can be applied to mobile terminal devices such as smart phones, palmtop computers, and tablet computers, and can also be applied to other electronic devices such as computers and applications that can be installed to implement applications. Quick configuration of permissions for user convenience.
  • FIG. 1 is a flowchart of an embodiment of an application authority configuration method according to the present application. The method includes the following steps:
  • Step 101 Receive a touch operation on an application icon.
  • the technical solution of the present application when the received touch operation for the application icon is consistent with the preset permission configuration triggering operation, receives a selection operation of the authorization policy for the application, and uses the selected authorization policy as the application. Set the appropriate permissions to enable quick configuration of application permissions.
  • the permission is for an application (also called an application) installed in an electronic device such as a mobile terminal, and refers to whether the application has the right to access the system function.
  • the access system functions include, but are not limited to, accessing private data, using a hardware module such as a camera device, or establishing a communication connection such as WiFi or Bluetooth.
  • a hardware module such as a camera device
  • establishing a communication connection such as WiFi or Bluetooth.
  • an app can only access system features that have been granted permissions, such as granting an app permission to use a camera device, which can take a photo or record a video with the camera, otherwise the app can't do this.
  • the authorization policy is a member of the authorization policy set, and the authorization policy set and various authorization policies it contains are preset. In order to facilitate the understanding of the technical solution, before the step 101 is described, the authorization policy set and the authorization policy are further described.
  • Each authorization policy in the authorization policy set corresponds to a policy that is an application authorization.
  • the technical solution grants a permission set corresponding to the policy to the corresponding application according to the authorization policy selected by the user, thereby implementing the application.
  • Quick authorization may be preset according to actual needs, for example, an authorization policy set based on the application requirement may be set, or an authorization policy set based on the risk division may be set.
  • the set of authorization policies based on the application requirements may include the following authorization policies: a common policy, a trust policy, and an untrust policy.
  • the general policy refers to granting the application the normal permission. For example, in the process of installing the application, the application applies for 10 access system functions, and the user selects 5 grants from the user, and when the common policy is used, the application can be granted. These 5 custom permissions are customized by the user; the trust mode refers to granting all the permissions required by the application. For example, in the Android system, each application will declare it in its corresponding AndroidManifest.xml. The required permissions, when the trust policy is adopted, the application can be granted all the rights it declares; the untrusted policy means that none of the permissions required by the application is granted, and the authorization policy can usually be adopted for applications whose source is unknown. .
  • the risk-based authorization policy set may include the following authorization policies: a low-risk strategy, a medium-risk strategy, and a high-risk strategy.
  • the rights to access system functions may be divided into the following two categories: 1) Basic and simple Permissions, such as: access to calendars, browsing files and other simple permissions; 2) risky permissions, such as: making calls, reading text messages, sending text messages, etc. may divulge user privacy or consume user wealth.
  • the low-risk strategy refers to granting only basic and simple permissions to the application; the medium-risk strategy means that a small amount of risky authority can be granted on the basis of granting the basic and simple permissions of the application; the high-risk strategy refers to Based on granting the application basic and simple permissions, you can grant a large number of risky permissions to your application.
  • the permission set corresponding to the low risk, medium risk, and high risk strategy may be uniformly set for all applications in advance. Considering the different functions of different applications, the requirements for accessing system functions are not the same. Therefore, it is also possible to set the permission sets corresponding to low-risk, medium-risk, and high-risk strategies for each application.
  • any one of the authorization policy sets may be preset according to the foregoing manner, or may be according to the required authorization policy.
  • an application policy-based authorization policy set is adopted, and the set includes the following authorization policies: a common policy, a trust policy, and an untrust policy.
  • the application icon generally refers to an application icon displayed on the screen, including an application icon displayed on the application desktop. Since the application desktop usually contains multiple application icons and can also be turned over, users can easily find the application that wants to configure the permissions on the desktop and touch the corresponding application icon.
  • the touch operation in the technical solution generally refers to a touch or control operation on the screen, including: a touch operation on the touch screen device, or a click operation on the non-touch device by an external device such as a mouse. If the user wants to configure the rights of an application, the user can start the touch operation on the application icon of the application. In this case, the touch operation on the application icon is received.
  • Step 102 Determine whether the touch operation is consistent with the preset permission configuration triggering operation. If they are consistent, perform step 103.
  • step 101 If the touch operation received in step 101 is consistent with the preset permission configuration triggering operation, the user wishes to initiate the rights configuration process. In this case, step 103 is performed.
  • the permission configuration triggering operation is usually preset, and may include: long pressing an application icon, double-clicking the application drawing Mark, triple-click the app icon, use the finger touch app icon with specific fingerprint information, or touch the app icon in the rights configuration mode.
  • the long-pressing, double-clicking, and three-click application icons are all relatively easy to understand, and are not described here. The following two types of permission configuration triggering operations and related implementation modes are further described.
  • the preset permission configuration triggering operation is to use a finger touch application icon with specific fingerprint information
  • the touch screen receiving the touch needs to integrate the function of the fingerprint sensor, and on the other hand, the execution is performed.
  • the user may be prompted to input a fingerprint image of the finger for triggering the permission configuration through the fingerprint sensor, and extract the fingerprint feature value, that is, the fingerprint information, from the fingerprint image, and then store the fingerprint information, then in this step,
  • the fingerprint information obtained during the step of receiving the touch operation may be compared with the pre-stored fingerprint information for triggering the permission configuration. If the two are successfully matched, the user wishes to perform the permission configuration operation on the application.
  • the specific implementation manner may be: before performing the step 101, receiving a switching operation of the access permission configuration mode performed by the user, for example, A control prompting the user to enter the permission configuration mode is displayed in the preset area of the display screen, and the user clicks the control to indicate that the permission configuration mode is to be entered; or a menu item for switching the permission configuration mode is added in the system menu, and the user selects The menu item indicates that the permission configuration mode is to be entered; the mode switching gesture may also be preset, and the user performing the screen touch operation consistent with the gesture also indicates that the permission configuration mode is to be entered, and the mode switching gesture includes: the finger is on the left and right sides of the screen.
  • the two sides are slid and the sliding distance exceeds the preset length, or the finger slides from the outside of the screen to the inside of the screen and the sliding distance exceeds the preset length, and the preset length can be set to a value of 1 cm, 2 cm, etc. according to specific needs.
  • the method receives the corresponding touch or selection operation, thereby entering the permission configuration mode. On the basis of this, if the touch operation on the application icon is received in step 101, the user is indicated. It is desirable to perform a rights configuration operation on the application.
  • the touched application icon may be highlighted in a preset manner, thereby explicitly notifying The user's selected object.
  • the preset manner includes: highlighting or blinking display, and other methods may be used as long as it can be distinguished from other application icons.
  • this step it is determined that the received touch operation is consistent with the preset permission configuration triggering operation, and then the permission configuration mode is entered, and the subsequent step 103 is performed to receive the selection operation of the authorization policy of the application.
  • Step 103 Receive a selection operation of an authorization policy of the application.
  • the user brings unnecessary loss.
  • the above verification process may be further simplified: when the user touches the application icon in step 101, the user may be acquired.
  • the fingerprint information if the fingerprint information matches the pre-stored fingerprint information with the configuration authority, indicates that the current operator has the configuration authority. In this way, the user can be authenticated without additional prompts, which simplifies the user's operation process and ensures the security configuration process.
  • the selection operation of receiving the authorization policy for the application in this step may be implemented in multiple manners in a specific implementation. Here are a few ways to do it:
  • the input authorization policy identifier can be received.
  • the specific implementation manner may be: when the authorization policy set is preset, the corresponding identifier is specified for each authorization policy, for example, 0 corresponding to the common policy, 1 corresponding to the trusted policy, and 2 corresponding to the untrusted policy, then this step may be selected.
  • Application icon displaying a prompt for inputting authorization policy information, and corresponding input controls, such as a text input box, or a drop-down list containing various authorization policies, so as to receive an authorization policy identifier input by the user or selected, thereby obtaining the user The authorization policy selected for the application.
  • the selection operation of the different state application icons of the cyclic display may also be received, and the selected authorization policy is determined according to the selected application icon state and the correspondence between the preset application icon state and the authorization policy.
  • the different status application icons include: application icons of different colors, application icons of different sizes, or application icons with different status identifiers.
  • the small icon corresponds to the untrusted policy
  • the medium size icon corresponds to the common policy
  • the large icon corresponds to the trust policy
  • the corresponding relationship between the different status identifiers displayed on the application icon and the authorization policy can also be set:
  • the identifier 1 corresponds to the trust policy
  • the identifier 2 corresponds to the untrust policy.
  • the selected one in the step 101 by the touch operation can be performed in this step.
  • the icon the different states of the icon are displayed cyclically, and the state of the application icon selected by the user is obtained, and the authorization policy selected by the user can be determined according to the state of the application icon.
  • the steps 103-1 to 103-3 are included, which will be described below with reference to FIG.
  • Step 103-1 cyclically displaying application icons of different states.
  • the loop display process can be either automated or user driven.
  • the specific implementation can be used in the following two ways:
  • an application icon different from the next state of the current state is displayed in a preset cyclic display order.
  • the preset cycle display order is: common policy -> trust policy -> untrusted policy -> common strategy, and different colors in the above examples are used to represent different authorization policies, then if the current application is in a common strategy, then The application icon may be displayed as an initial state of yellow; after receiving the user's touch, the color of the icon is updated to be a color corresponding to the trust policy, that is, a green icon is displayed; if the user touch is received again, the display is The icon color corresponding to the policy is not trusted, that is, the red icon is displayed. In the above manner, the application icon cyclically displays different colors according to the user's touch operation.
  • Step 103-2 Acquire an application icon state selected during the loop display process.
  • the status of the application icon selected in the cyclic display process may be acquired by: if the touch operation on the application icon is not received within the preset time period, the current display is performed.
  • the app icon status is the selected app icon status.
  • the state of the application icon selected in the loop display process can be obtained by receiving a selection operation on the state of the application icon during the loop display process, for example, if the icon of the application icon is received
  • the touch operation indicates that the user selects the state of the application icon when being touched.
  • the selection operation may be to end the long press operation, namely: The status of the icon selected by the user at the end of the long press operation is detected.
  • the cyclic display process may be stopped.
  • Step 103-3 Determine the selected authorization policy according to the selected application icon state and the corresponding relationship between the preset application icon state and the authorization policy.
  • the status of the application icon can be determined according to the preset
  • the correspondence between the rights policies is used to know the authorization policy selected by the user for the application.
  • Step 104 Set corresponding permissions for the application according to the selected authorization policy.
  • the authorization policy selected by the user for the application is obtained.
  • the two steps of obtaining the permission set corresponding to the authorization policy and setting the permission for the application are implemented to implement the application permission. Quick configuration. The above process will be further described below with reference to FIG.
  • Step 104-1 Obtain a permission set corresponding to the authorization policy.
  • the permission set corresponding to the authorization policy is first obtained.
  • the following is an example.
  • an application policy-based authorization policy set is adopted. If the authorization policy selected in step 103 is the trust mode, it indicates that the application can be granted all the permissions it needs. Then, in this step, the permission set required by the application can be obtained. For example, in the Android system, by reading the AndroidManifest.xml file corresponding to the application, the respective permissions required by the application are obtained. The respective rights collectively constitute the set of rights.
  • the permission set corresponding to the authorization policy may be acquired in a corresponding manner. For example, if a risk-based authorization policy set is adopted, and the authorization policy selected in step 103 is a low-risk policy, in this step, basic and simple rights can be selected from the system-provided rights to constitute the rights. set. If the permission set corresponding to the low, medium, and high risk policies is set in advance for each application in advance according to step 101, the step may directly obtain the preset preset for the application. The set of permissions corresponding to the low risk strategy.
  • Step 104-2 Set the rights in the permission set for the application.
  • the permission setting interface provided by the system may be invoked to grant the application the respective rights in the permission set obtained through step 104-1, thereby completing the quick configuration of the application rights.
  • the method is implemented on a smart phone using an Android system, and then the permission setting interface provided by the Android system can be called to complete the above configuration process.
  • the permission set corresponding to the selected authorization policy acquired in step 104-1 is a universal permission set for all applications, such as a universal permission set for a low risk policy.
  • the intersection of the permission set obtained in step 104-1 and the permission set required by the application may be calculated first, and then The permissions are set for the application with the permissions of the intersection.
  • a set of authorization policies is preset, and the corresponding application is authorized according to the authorization policy selected by the user from the set.
  • two or more authorization policy sets may be preset, and when the touch operation of the application icon is received by the user, and the touch operation is consistent with the preset permission configuration trigger operation, The user is prompted to select among a plurality of preset authorization policy sets, for example, cyclically displaying different status application icons representing different authorization policy sets. After the user selects an authorization policy set, the user is further prompted to select the authorization policy. Select a specific authorization policy in the collection and authorize the application according to the user's choice. In this way, users can be given more choices, so that more flexible and diverse authorization policies can be used to configure permissions for applications.
  • the application permission configuration method provided by the present application can directly grant a corresponding permission set to an application according to an authorization policy selected by the user on an interface including an application icon, such as an application desktop, thereby simplifying the permission configuration step and improving the configuration. Efficiency, enabling rapid configuration of application permissions.
  • an application authority configuration method is provided.
  • the application further provides an application authority configuration apparatus.
  • FIG. 4 is a schematic diagram of an embodiment of an application authority configuration apparatus according to the present application. Since the device embodiment is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment. The device embodiments described below are merely illustrative.
  • An application authority configuration device of the embodiment includes: a touch operation receiving unit 401, configured to receive a touch operation on an application icon; and a touch operation determining unit 402, configured to determine, by the touch operation receiving unit, Whether the touch operation is consistent with the preset permission configuration triggering operation; the policy selection receiving unit 403 is configured to: when the output of the touch operation determining unit is yes, receive a selection operation of the authorization policy of the application; The setting unit 404 is configured to select an authorization policy output by the receiving unit according to the policy, and set a corresponding authority for the application.
  • the device when the preset permission configuration triggering operation is to click an application icon in the rights configuration mode, the device includes any one of the following units:
  • a first mode switching receiving unit configured to receive a touch operation on a mode switching area preset in the display screen before triggering the touch operation receiving unit to work;
  • the second mode switching receiving unit is configured to receive a selection operation for the menu item for mode switching in the system menu before triggering the touch operation receiving unit to work.
  • the device includes:
  • the privilege verification unit is configured to: when the output of the touch operation determining unit is YES, verify whether the executor of the touch operation has configuration authority, and when yes, trigger the policy selection receiving unit to work.
  • the device is deployed on a device with a touch screen, and the touch screen integrates a fingerprint sensor function;
  • the configuration authority verification unit includes:
  • the fingerprint information acquisition subunit is configured to acquire fingerprint information collected when the touch operation receiving unit works
  • the configuration authority determining sub-unit is configured to determine whether the fingerprint information matches the pre-stored fingerprint information with the configuration authority, and if yes, determine that the performer has the configuration authority.
  • the policy selection receiving unit is specifically configured to:
  • the policy selection receiving unit is specifically configured to: receive a selection operation of the different state application icons displayed in the loop, and determine, according to the selected application icon state, and the corresponding relationship between the preset application icon state and the authorization policy.
  • the selected authorization policy; the policy selection receiving unit includes:
  • a loop display subunit for cyclically displaying application icons of different states
  • a state acquisition subunit for acquiring an application icon state selected during a loop display process
  • the policy determining subunit is configured to determine, according to the state of the application icon acquired by the state acquiring subunit, and the corresponding relationship between the preset application icon state and the authorization policy, the selected authorization policy.
  • the loop display subunit is specifically configured to: when receiving a touch operation on the application icon, display an application icon different from a current state of a current state according to a preset cyclic display order;
  • the state obtaining sub-unit is specifically configured to determine whether a touch operation on the application icon is not received within a preset time period, and if yes, the currently displayed application icon state is the selected application icon state.
  • the loop display sub-unit is specifically configured to automatically cycle display application icons of different states according to preset time intervals
  • the state obtaining sub-unit is specifically configured to receive a selection operation on an application icon state during the cyclic display process.
  • the application permission setting unit includes:
  • a permission set obtaining subunit configured to acquire a permission set corresponding to an authorization policy output by the policy selection receiving unit
  • the permission setting execution subunit is configured to set the permission set for the application to obtain the permission in the permission set acquired by the subunit.
  • the application permission setting unit further includes:
  • An intersection calculation subunit configured to calculate an intersection of the permission set obtained by the permission set acquisition subunit and the permission set required by the application
  • the permission setting execution sub-unit is specifically configured to set, for the application, the rights included in the intersection calculated by the intersection calculation sub-unit.
  • the device includes:
  • the icon highlighting unit is configured to display the application icon in a preset manner when the output of the touch operation determining unit is YES, and trigger the policy selection receiving unit to work.
  • the device includes:
  • a set selection receiving unit configured to: when the output of the touch operation determining unit is YES, receive a selection operation of the authorization policy set to which the application belongs, and trigger the policy selection receiving unit to work;
  • the policy selection receiving unit is specifically configured to receive a selection operation of an authorization policy of the application in the selected authorization policy set.
  • an application authority configuration method and an application authority configuration apparatus are provided.
  • the application further provides an electronic device; the electronic device implementation is as follows:
  • FIG. 5 shows a schematic diagram of an embodiment of an electronic device of the present application.
  • the electronic device includes: a display 501; a processor 502; a memory 503;
  • the memory 503 is configured to store an application rights configuration program, and when executed by the processor, the program performs the following operations: receiving a touch operation on an application icon; when the touch operation and the preset permission When the configuration triggering operation is consistent, the user selects an authorization policy for the application, and sets a corresponding authority for the application according to the selected authorization policy.
  • the authorization policy is a member of the preset authorization policy set. .
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is computer readable A qualitative example.
  • Computer readable media including both permanent and non-persistent, removable and non-removable media may be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
  • computer readable media does not include non-transitory computer readable media, such as modulated data signals and carrier waves.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

一种应用权限配置方法,一种应用权限配置装置,以及一种电子设备。其中,所述方法包括:接收对应用图标的触控操作;当所述触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限;其中,所述授权策略是预设的授权策略集合中的成员。采用上述方法,可以直接在应用桌面等包含应用图标的界面上,根据用户所选的授权策略为应用授予相应的权限集合,从而简化权限配置步骤,提高配置效率,实现了对应用权限的快速配置。

Description

应用权限配置方法、装置及电子设备
本申请要求2015年07月16日递交的申请号为201510420513.2、发明名称为“应用权限配置方法、装置及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及应用权限管理领域,具体涉及一种应用权限配置方法。本申请同时提供一种应用权限配置装置,以及一种电子设备。
背景技术
移动终端日益普及,移动应用功能日益强大,为了方便用户的使用,很多移动终端设备允许用户自行安装移动应用,移动应用程序的安全性从而变得日益重要。例如,在Android系统中,由于是开放的开发平台,对移动应用访问系统功能的权限控制比较宽松,绝大部分的权限只需应用开发者声明即可获取。因此移动应用通常可以享有多种访问系统功能的权限,例如:涉及用户付费类的权限,包括发送短信、拨打电话、上网等;用户隐私信息类权限,包括存取消息记录、联系人信息、通话记录等;移动终端设备通讯类权限,包括建立WIFI连接、蓝牙连接等。
由于在现实中存在一些非法移动应用,通过使用涉及其实际功能以外的其他权限,致使用户的隐私数据被非法获取、移动终端设备的通讯功能被非法使用、照相等关键功能被非法利用,而这些都可能导致用户的重大损失。
针对上述情况,很多移动终端设备都具有权限配置功能,例如,“LBE安全大师”中的“权限管理”功能,通过这些权限配置功能,允许用户对每个移动应用逐一设置其是否具有访问某系统功能的权限。
采用上述方式,用户需要找到并启动相应的权限管理程序,找到需要配置的应用,再从众多的权限中找到需要配置的权限,然后执行开启或者关闭的操作,从而为所述应用授予或者取消相应的权限。由此可见,现有的应用权限配置过程步骤繁琐,效率低下。
发明内容
本申请实施例提供一种应用权限配置方法,以解决现有的应用权限配置过程步骤繁琐、效率低下的问题。本申请实施例还提供一种应用权限配置装置,以及一种电子设备。
本申请提供一种应用权限配置方法,包括:
接收对应用图标的触控操作;
当所述触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限;
其中,所述授权策略是预设的授权策略集合中的成员。
可选的,所述预设的权限配置触发操作包括:长按应用图标、双击应用图标、三击应用图标、采用具有特定指纹信息的手指触控应用图标、或者在权限配置模式下触控应用图标。
可选的,当所述预设的权限配置触发操作为在权限配置模式下触控应用图标时,在所述接收对应用图标的触控操作之前,执行下述进入权限配置模式的切换操作:
接收对显示屏幕中预设的模式切换区域的触控操作;或者,
接收对系统菜单中的用于进行模式切换的菜单项的选择操作;或者,
接收与预设的模式切换手势相同的触控操作。
可选的,当所述触控操作与预设的权限配置触发操作一致时,执行下述操作:
验证所述触控操作的执行者是否具备配置权限;若具备,则执行所述接收对所述应用的授权策略的选择操作。
可选的,所述方法在具有触摸屏的设备上实施、并且所述触摸屏集成了指纹传感器功能;
所述验证所述触控操作的执行者是否具备配置权限,包括:
获取在接收所述触控操作时采集到的指纹信息;
判断所述指纹信息与预存的具备配置权限的指纹信息是否相符;若相符,则判定所述执行者具备配置权限。
可选的,所述接收对所述应用的授权策略的选择操作包括:
接收输入的授权策略标识;或者,
接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
可选的,所述接收对所述应用的授权策略的选择操作为:接收对循环显示的不同状态应用图标的选择操作;
所述不同状态应用图标包括:不同颜色的应用图标、不同大小的应用图标、或者带不同状态标识的应用图标。
可选的,所述接收对循环显示的不同状态应用图标的选择操作包括:
循环显示不同状态的应用图标;
获取在循环显示过程中被选中的应用图标状态。
可选的,所述循环显示不同状态的应用图标,包括:
每当接收对所述应用图标的触控操作,则按照预设的循环显示顺序显示不同于当前状态的下一状态的应用图标;
所述获取在循环显示过程中被选中的应用图标状态包括:如果在预设时间段内未接收到对所述应用图标的触控操作,则当前显示的应用图标状态即为被选中的应用图标状态。
可选的,所述循环显示不同状态的应用图标,包括:
按照预设的时间间隔,自动循环显示不同状态的应用图标;
所述获取在循环显示过程中被选中的应用图标状态包括:在上述循环显示过程中,接收对应用图标状态的选取操作。
可选的,所述根据所选的授权策略为所述应用设置相应的权限包括:
获取与所述授权策略对应的权限集合;
为所述应用设置所述权限集合中的权限。
可选的,所述根据所选的授权策略为所述应用设置相应的权限还包括:
计算所述与授权策略对应的权限集合与所述应用所要求的权限集合的交集;
所述为所述应用设置所述权限集合中的权限包括:为所述应用设置所述交集中包含的权限。
可选的,所述授权策略集合包括:基于应用需求的授权策略集合、或者基于风险划分的授权策略集合;
所述基于应用需求的授权策略集合包括以下授权策略:普通策略、信任策略、以及不信任策略;
所述基于风险划分的授权策略集合包括以下授权策略:低风险策略、中风险策略、以及高风险策略。
可选的,当所述触控操作与预设的权限配置触发操作一致时,在接收对所述应用的授权策略的选择操作之前,执行下述操作:
采用预设方式显示所述应用图标,所述预设方式包括:高亮显示、或者闪烁显示。
可选的,所述预设的授权策略集合至少为两个;
当所述触控操作与预设的权限配置触发操作一致时,在执行所述接收对所述应用的授权策略的选择操作之前,执行下述操作:
接收对所述应用所属授权策略集合的选择操作;
所述接收对所述应用的授权策略的选择操作包括:接收对所述应用在所选授权策略集合中的授权策略的选择操作。
可选的,所述应用图标包括:在桌面上显示的应用图标。
相应的,本申请还提供一种应用权限配置装置,包括:
触控操作接收单元,用于接收对应用图标的触控操作;
触控操作判断单元,用于判断所述触控操作接收单元接收的触控操作与预设的权限配置触发操作是否一致;
策略选择接收单元,用于当所述触控操作判断单元的输出为是时,接收对所述应用的授权策略的选择操作;
应用权限设置单元,用于根据所述策略选择接收单元输出的授权策略,为所述应用设置相应的权限。
可选的,当所述预设的权限配置触发操作为在权限配置模式下点击应用图标时,所述装置包括下列任一单元:
第一模式切换接收单元,用于在触发所述触控操作接收单元工作之前,接收对显示屏幕中预设的模式切换区域的触控操作;或者,
第二模式切换接收单元,用于在触发所述触控操作接收单元工作之前,接收对系统菜单中的用于进行模式切换的菜单项的选择操作。
可选的,所述装置包括:
配置权限验证单元,用于当所述触控操作判断单元的输出为是时,验证所述触控操作的执行者是否具备配置权限,并在具备时,触发所述策略选择接收单元工作。
可选的,所述装置部署在具有触摸屏的设备上、并且所述触摸屏集成了指纹传感器功能;
所述配置权限验证单元包括:
指纹信息获取子单元,用于获取触控操作接收单元工作时采集到的指纹信息;
配置权限判断子单元,用于判断所述指纹信息与预存的具备配置权限的指纹信息是否相符,若相符,则判定所述执行者具备配置权限。
可选的,所述策略选择接收单元具体用于,
接收输入的授权策略标识;或者,
接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
可选的,所述策略选择接收单元具体用于,接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略;所述策略选择接收单元包括:
循环显示子单元,用于循环显示不同状态的应用图标;
状态获取子单元,用于获取在循环显示过程中被选中的应用图标状态;
策略确定子单元,用于根据所述状态获取子单元获取的应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
可选的,所述循环显示子单元具体用于,每当接收对所述应用图标的触控操作,则按照预设的循环显示顺序显示不同于当前状态的下一状态的应用图标;
所述状态获取子单元具体用于,判断是否在预设时间段内未接收到对所述应用图标的触控操作,若是,则当前显示的应用图标状态即为被选中的应用图标状态。
可选的,所述循环显示子单元具体用于,按照预设的时间间隔,自动循环显示不同状态的应用图标;
所述状态获取子单元具体用于,在上述循环显示过程中,接收对应用图标状态的选取操作。
可选的,所述应用权限设置单元包括:
权限集合获取子单元,用于获取与所述策略选择接收单元输出的授权策略对应的权限集合;
权限设置执行子单元,用于为所述应用设置所述权限集合获取子单元获取的权限集合中的权限。
可选的,所述应用权限设置单元还包括:
交集计算子单元,用于计算所述权限集合获取子单元获取的权限集合与所述应用所要求的权限集合的交集;
所述权限设置执行子单元具体用于,为所述应用设置所述交集计算子单元计算得到的交集中包含的权限。
可选的,所述装置包括:
图标突出显示单元,用于当所述触控操作判断单元的输出为是时,采用预设方式显 示所述应用图标,并随后触发所述策略选择接收单元工作。
可选的,所述装置包括:
集合选择接收单元,用于当所述触控操作判断单元的输出为是时,接收对所述应用所属授权策略集合的选择操作,并触发所述策略选择接收单元工作;
所述策略选择接收单元具体用于,接收对所述应用在所选授权策略集合中的授权策略的选择操作。
此外,本申请还提供一种电子设备,包括:
显示器;
处理器;
存储器,用于存储应用权限配置程序,所述程序在被所述处理器读取执行时,执行如下操作:接收对应用图标的触控操作;当所述触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限;其中,所述授权策略是预设的授权策略集合中的成员。
与现有技术相比,本申请具有以下优点:
本申请提供的应用权限配置方法,当接收的对应用图标的触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限。采用上述方法,可以直接在应用桌面等包含应用图标的界面上,根据用户所选的授权策略为应用授予相应的权限集合,从而简化权限配置步骤,提高配置效率,实现了对应用权限的快速配置。
附图说明
图1是本申请的一种应用权限配置方法的实施例的流程图;
图2是本申请实施例提供的通过接收对循环显示的不同状态应用图标的选择操作、确定所选授权策略的处理流程图;
图3是本申请实施例提供的根据所选授权策略为应用设置相应权限的处理流程图;
图4是本申请的一种应用权限配置装置的实施例的示意图;
图5是本申请的一种电子设备的实施例的示意图。
具体实施方式
在下面的描述中阐述了很多具体细节以便于充分理解本申请。但是,本申请能够以 很多不同于在此描述的其它方式来实施,本领域技术人员可以在不违背本申请内涵的情况下做类似推广,因此,本申请不受下面公开的具体实施的限制。
在本申请中,分别提供了一种应用权限配置方法、一种应用权限配置装置、以及一种电子设备,在下面的实施例中逐一进行详细说明。
本申请实施例所提供的应用权限配置方法和装置可应用于智能手机、掌上电脑、平板电脑等移动终端设备中,也可以应用于计算机等其他可以安装应用程序的电子设备中,以实现对应用权限的快速配置,方便用户的使用。
请参考图1,其为本申请的一种应用权限配置方法的实施例的流程图。所述方法包括如下步骤:
步骤101、接收对应用图标的触控操作。
本申请的技术方案,当接收的针对应用图标的触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限,从而实现对应用权限的快速配置。
其中所述权限,是针对安装在移动终端等电子设备中的应用(也称应用程序)而言的,是指应用是否具备访问系统功能的权利。所述访问系统功能包括但不局限于:存取隐私数据、使用摄像装置等硬件模块、或者建立WiFi、蓝牙等通讯连接。通常情况下,应用只能访问被授予了权限的系统功能,例如,为某应用授予使用摄像装置的权限,该应用就可以利用摄像装置拍摄照片或者录制视频,否则该应用无法执行上述操作。
所述授权策略是授权策略集合中的成员,所述授权策略集合以及其包含的各种授权策略是预先设定的。为了便于理解本技术方案,在描述步骤101之前,先对授权策略集合和授权策略作进一步的说明。
所述授权策略集合中的每个授权策略,分别对应一种为应用授权的策略,本技术方案根据用户所选的授权策略,为相应的应用授予该策略对应的权限集合,从而实现对应用的快速授权。在具体实施时,可以根据实际的需要,预先设置好授权策略集合,例如:可以设置基于应用需求的授权策略集合,也可以设置基于风险划分的授权策略集合。
基于应用需求的授权策略集合可以包括以下授权策略:普通策略、信任策略和不信任策略。所述普通策略是指,授予应用常规的权限,例如在安装应用的过程中,应用申请10个访问系统功能的权限,用户从中筛选了5个给予授权,那么采用普通策略时,可以给应用授予这5个由用户定制的常规权限;信任模式是指,授予应用它所要求的所有权限,例如在Android系统中,每个应用都会在其对应的AndroidManifest.xml中申明其 所需的权限,那么采用信任策略时,可以为应用授予其申明的所有权限;不信任策略是指,不授予应用所要求的任一种权限,通常对于来源不明的应用可以采用这种授权策略。
基于风险划分的授权策略集合可以包括以下授权策略:低风险策略、中风险策略和高风险策略,采用这种方式,可以预先将访问系统功能的权限划分为以下两类:1)基本而简单的权限,例如:访问日历、浏览文件等简单权限;2)有风险的权限,例如:拨打电话、读取短信、发送短信等可能泄露用户隐私或者消耗用户财富的权限。所述低风险策略是指,只授予应用基本而简单的权限;中风险策略是指,在授予应用基本而简单的权限的基础上,还可以授予应用少量有风险的权限;高风险策略是指,在授予应用基本而简单的权限的基础上,可以授予应用大量有风险的权限。在具体实施时,可以预先为所有的应用统一设定低风险、中风险以及高风险策略对应的权限集合。考虑到不同应用的功能不同,访问系统功能的需求也不尽相同,因此也可以针对每个应用,分别设定低风险、中风险、高风险策略所对应的权限集合。
上面列举了两种授权策略集合以及每种集合中包含的授权策略,在具体实施本申请的技术方案时,可以参照上述方式预先设定其中任意一种授权策略集合,也可以根据所需授权策略的性质,预先设定不同于上述方式的其他授权策略集合。为了便于描述,在本实施例中,采用基于应用需求的授权策略集合,所述集合包括以下授权策略:普通策略、信任策略和不信任策略。
预先设定好授权策略集合后,就可以在本步骤101中接收对应用图标的触控操作。所述应用图标通常是指在屏幕上显示的应用图标,其中包括在应用桌面上显示的应用图标。由于应用桌面上通常包含多个应用图标,而且还可以翻页显示,因此用户可以在桌面上方便地找到希望进行权限配置的应用程序并触控相应的应用图标。
本技术方案中的触控操作,通常指对屏幕的触摸或控制操作,包括:对触摸屏设备的触摸操作,或者用鼠标等外接设备对非触屏设备的点击等操作。如果用户希望对某个应用进行权限配置,可以通过对所述应用的应用图标的触控操作来启动,这时本步骤就会接收到对所述应用图标的触控操作。
步骤102、判断所述触控操作是否与预设的权限配置触发操作一致,若一致,执行步骤103。
如果步骤101接收的触控操作与预设的权限配置触发操作一致,说明用户希望启动权限配置过程,这种情况下执行步骤103。
所述权限配置触发操作通常是预先设置的,可以包括:长按应用图标、双击应用图 标、三击应用图标、采用具有特定指纹信息的手指触控应用图标、或者在权限配置模式下触控应用图标。其中长按、双击以及三击应用图标等方式都是比较易于理解的操作方式,不在此作赘述,下面对其他两种权限配置触发操作及相关实施方式作进一步描述。
如果所述预设的权限配置触发操作是,采用具有特定指纹信息的手指触控应用图标,那么具体实现时,一方面,接收触控的触摸屏需要集成指纹传感器的功能,另一方面,在执行步骤101之前,可以提示用户通过指纹传感器输入用于触发权限配置的手指的指纹图像,并从指纹图像中提取指纹特征值,即指纹信息,然后存储所述指纹信息,那么在本步骤中,就可以用在步骤101接收触控操作过程中获取的指纹信息与预存的用于触发权限配置的指纹信息进行比对,如两者匹配成功,说明用户希望执行对所述应用的权限配置操作。
如果所述预设的权限配置触发操作是,在权限配置模式下点击应用图标,那么具体实现方式可以是,在执行所述步骤101之前,接收用户执行的进入权限配置模式的切换操作,例如可以在显示屏幕的预设区域中显示提示用户进入权限配置模式的控件,用户点击该控件就表明要进入权限配置模式;也可以在系统菜单中添加用于进行权限配置模式切换的菜单项,用户选择该菜单项就表明要进入权限配置模式;也可以预先设置模式切换手势,用户执行与所述手势一致的屏幕触控操作也表明要进入权限配置模式,所述模式切换手势包括:手指在屏幕左右两侧边缘滑动且滑动距离超过预设长度、或者手指从屏幕外侧向屏幕内侧滑动且滑动距离超过预设长度,所述预设长度可以根据具体需要设置为1厘米、2厘米等数值。
如果用户执行了上述操作,本方法就会接收到相应的触控或者选择操作,从而进入权限配置模式,在此基础上,如果在步骤101中接收到对应用图标的触控操作,就表明用户希望执行对所述应用的权限配置操作。
优选的,在所述触控操作与预设的权限配置触发操作一致的情况下,为了使用户界面更为友好,可以采用预设的方式突出显示所述被触控的应用图标,从而明确告知用户其选定的对象。所述预设方式包括:高亮显示或者闪烁显示,也可以采用其它方式,只要能够与其它应用图标相区别都是可以的。
本步骤判断出接收的触控操作与预设的权限配置触发操作一致,就可以进入权限配置模式,执行后续的步骤103接收对所述应用的授权策略的选择操作。
步骤103、接收对所述应用的授权策略的选择操作。
优选的,为了避免本技术方案提供的应用权限配置方法被恶意操作者使用,给合法 用户带来不必要的损失,在执行本步骤之前,可以先验证执行所述触控操作的用户是否具备配置权限,并在具备所述权限的情况下执行后续操作。例如,可以提示用户输入密码,当输入的密码与预先设置的相应密码一致时,认为当前用户具备配置权限;也可以通过提示用户在指纹传感器上输入指纹图像,获取指纹信息,并将获取的指纹信息与预先存储的具备配置权限的指纹信息进行比对,如果两者相符,则说明当前的操作者具备配置权限。
进一步地,如果本技术方案在具有触摸屏的设备上实施、并且所述触摸屏集成了指纹传感器功能,那么上述验证过程可以进一步简化:在步骤101接收用户对应用图标的触控操作时,可以获取用户的指纹信息,如果所述指纹信息与预存的具备配置权限的指纹信息相符,则说明当前的操作者具备配置权限。采用这种方式,可以不用再额外提示用户进行身份验证,可以简化用户的操作流程,在保证安全性的同时,使权限配置过程更为快捷。
本步骤所述的接收对所述应用的授权策略的选择操作,在具体实施中可以采用多种方式实现。这里列举几种方式:
可以接收输入的授权策略标识。具体实现方式可以是,在预先设定授权策略集合时,为每种授权策略指定相应的标识,例如:0对应普通策略、1对应信任策略、2对应不信任策略,那么本步骤可以针对所选的应用图标,显示输入授权策略信息的提示、以及对应的输入控件,例如:文本输入框,或者是包含各种授权策略的下拉列表,从而可以接收用户输入或者选择的授权策略标识,从而获知用户为所述应用选择的授权策略。
还可以接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。这种方式用户界面友好,易于用户理解,因此本实施例在下文中重点对这种实施方式进行描述。
所述不同状态应用图标,包括:不同颜色的应用图标、不同大小的应用图标、或者带不同状态标识的应用图标。用户可以预先设置每种状态所对应的授权策略,例如,可以设置不同颜色图标与授权策略的对应关系:黄色图标对应普通策略,绿色图标对应信任策略,红色图标对应不信任策略;也可以设置不同大小图标与授权策略的对应关系:小图标对应不信任策略,中等大小图标对应普通策略,大图标对应信任策略;还可以设置在应用图标上显示的不同状态标识与授权策略的对应关系:标识0对应普通策略、标识1对应信任策略、标识2对应不信任策略。
预先进行上述设置后,就可以在本步骤中针对在步骤101中通过触控操作选定的应 用图标,循环显示所述图标的不同状态,并获取被用户选中的应用图标状态,根据所述应用图标状态就可以确定用户所选的授权策略。具体说包括步骤103-1至步骤103-3,下面结合附图2进行说明。
步骤103-1、循环显示不同状态的应用图标。
循环显示过程可以是自动执行的,也可以是基于用户驱动的。具体实现时可以采用以下两种方式:
1)每当接收对所述应用图标的触控操作,则按照预设的循环显示顺序显示不同于当前状态的下一状态的应用图标。例如:预设的循环显示顺序为:普通策略—〉信任策略—〉不信任策略—〉普通策略,并且采用上述例子中的不同颜色代表不同的授权策略,那么如果当前应用处于普通策略,则所述应用图标可以显示为黄色的初始状态;在接收用户触控后,则更新所述图标的颜色为与信任策略对应的颜色,即,显示绿色图标;如果再次接收到用户触控,则显示与不信任策略对应的图标颜色,即,显示红色图标。采用上述方式,所述应用图标就会根据用户的触控操作,循环显示不同颜色。
2)按照预设的时间间隔,循环显示不同状态的应用图标。例如:预先设定的时间间隔为3秒,那么每隔3秒,所述应用图标的状态就会发生一次变更。采用这种方式,在不需要用户参与的情况下,自动地循环显示不同状态的应用图标。
步骤103-2、获取在循环显示过程中被选中的应用图标状态。
在采用上述方式1)的情况下,可以通过以下方式获取在循环显示过程中被选中的应用图标状态:如果在预设时间段内未接收到对所述应用图标的触控操作,则当前显示的应用图标状态即为被选中的应用图标状态。
在采用上述方式2)的情况下,可以通过以下方式获取在循环显示过程中被选中的应用图标状态:在循环显示过程中,接收对应用图标状态的选取操作,例如,如果接收到对应用图标的触控操作,表明用户选择了被触控时的应用图标状态。需要说明的是,如果用户在步骤101中通过长按应用图标启动权限配置过程,并且在应用图标的循环显示过程中依然保持长按状态,那么所述选取操作可以是结束长按操作,即:检测到长按操作结束时的图标状态即为用户选取的图标状态。具体实施时,在接收对应用图标状态的选取操作后,可以停止循环显示过程。
步骤103-3、根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
在步骤103-2中获取被选中的应用图标状态后,可以根据预设的应用图标状态与授 权策略之间的对应关系,获知用户为所述应用选择的授权策略。
步骤104、根据所选的授权策略为所述应用设置相应的权限。
执行到本步骤,已经获取了用户为所述应用选择的授权策略,本步骤通过获取与所述授权策略对应的权限集合以及为所述应用设置权限这两个步骤,实现对所述应用权限的快速配置。下面结合附图3对上述过程作进一步说明。
步骤104-1:获取与所述授权策略对应的权限集合。
由于采用不同的授权策略为应用授予的权限是不同的,因此要先获取与所述授权策略对应的权限集合。下面举例说明。
在本实施例中采用基于应用需求的授权策略集合,如果在步骤103中所选的授权策略为信任模式,说明可以为应用授予其所需的所有权限。那么在本步骤中可以获取应用所需的权限集合,例如,在Android系统中,通过读取与所述应用对应的AndroidManifest.xml文件,从中获取所述应用声明的、其所需的各个权限,所述各个权限共同组成了所述权限集合。
在其他实施方式中,可以采用相应的方式获取与所述授权策略对应的权限集合。例如,如果采用基于风险划分的授权策略集合,并且在步骤103中所选的授权策略为低风险策略,那么在本步骤中可以从系统提供的权限中选择基本而且简单的权限,组成所述权限集合。如果如步骤101所述在预先设定授权策略集合时,预先针对每个应用设置了低、中、高三种风险策略分别对应的权限集合,那么本步骤就可以直接获取为本应用预置的与低风险策略对应的权限集合。
步骤104-2:为所述应用设置所述权限集合中的权限。
具体实现时,可以调用系统提供的权限设置接口,为所述应用授予通过步骤104-1获取的权限集合中的各个权限,从而完成对应用权限的快速配置。例如,本方法在采用Android系统的智能手机上实施,那么可以调用Android系统提供的权限设置接口完成上述配置过程。
需要说明的是,在其他实施方式中,如果在步骤104-1中获取的与所选授权策略对应的权限集合是针对所有应用的通用权限集合,例如针对低风险策略的通用权限集合,那么在这种情况下,为了避免给应用授予其不需要的额外权限、造成不必要的安全隐患,可以先计算在步骤104-1中获取的权限集合与所述应用所要求的权限集合的交集,然后用所述交集中的权限为所述应用进行权限设置。
至此,通过上述步骤101-步骤104对本实施例进行了详细的描述。在本实施例中, 预先设置了一个授权策略集合,并根据用户从所述集合中选择的授权策略,为相应的应用授权。在其他实施方式中,可以预先设置两个或者两个以上的授权策略集合,当接收到用户对应用图标的触控操作、且所述触控操作与预设的权限配置触发操作一致时,可以先提示用户在预设的多个授权策略集合中进行选择,例如:循环显示代表不同授权策略集合的不同状态应用图标,用户选择了某个授权策略集合后,再进一步提示用户在所选授权策略集合中选择具体的授权策略,并根据用户的选择为应用授权。采用这种方式可以为用户提供更多的选择机会,从而可以采用更为灵活多样的授权策略为应用进行权限配置。
综上所述,本申请提供的应用权限配置方法,可以直接在应用桌面等包含应用图标的界面上,根据用户所选的授权策略为应用授予相应的权限集合,从而简化权限配置步骤,提高配置效率,实现了对应用权限的快速配置。
在上述的实施例中,提供了一种应用权限配置方法,与之相对应的,本申请还提供一种应用权限配置装置。请参看图4,其为本申请的一种应用权限配置装置的实施例的示意图。由于装置实施例基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。下述描述的装置实施例仅仅是示意性的。
本实施例的一种应用权限配置装置,包括:触控操作接收单元401,用于接收对应用图标的触控操作;触控操作判断单元402,用于判断所述触控操作接收单元接收的触控操作与预设的权限配置触发操作是否一致;策略选择接收单元403,用于当所述触控操作判断单元的输出为是时,接收对所述应用的授权策略的选择操作;应用权限设置单元404,用于根据所述策略选择接收单元输出的授权策略,为所述应用设置相应的权限。
可选的,当所述预设的权限配置触发操作为在权限配置模式下点击应用图标时,所述装置包括下列任一单元:
第一模式切换接收单元,用于在触发所述触控操作接收单元工作之前,接收对显示屏幕中预设的模式切换区域的触控操作;或者,
第二模式切换接收单元,用于在触发所述触控操作接收单元工作之前,接收对系统菜单中的用于进行模式切换的菜单项的选择操作。
可选的,所述装置包括:
配置权限验证单元,用于当所述触控操作判断单元的输出为是时,验证所述触控操作的执行者是否具备配置权限,并在具备时,触发所述策略选择接收单元工作。
可选的,所述装置部署在具有触摸屏的设备上、并且所述触摸屏集成了指纹传感器功能;
所述配置权限验证单元包括:
指纹信息获取子单元,用于获取触控操作接收单元工作时采集到的指纹信息;
配置权限判断子单元,用于判断所述指纹信息与预存的具备配置权限的指纹信息是否相符,若相符,则判定所述执行者具备配置权限。
可选的,所述策略选择接收单元具体用于,
接收输入的授权策略标识;或者,
接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
可选的,所述策略选择接收单元具体用于,接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略;所述策略选择接收单元包括:
循环显示子单元,用于循环显示不同状态的应用图标;
状态获取子单元,用于获取在循环显示过程中被选中的应用图标状态;
策略确定子单元,用于根据所述状态获取子单元获取的应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
可选的,所述循环显示子单元具体用于,每当接收对所述应用图标的触控操作,则按照预设的循环显示顺序显示不同于当前状态的下一状态的应用图标;
所述状态获取子单元具体用于,判断是否在预设时间段内未接收到对所述应用图标的触控操作,若是,则当前显示的应用图标状态即为被选中的应用图标状态。
可选的,所述循环显示子单元具体用于,按照预设的时间间隔,自动循环显示不同状态的应用图标;
所述状态获取子单元具体用于,在上述循环显示过程中,接收对应用图标状态的选取操作。
可选的,所述应用权限设置单元包括:
权限集合获取子单元,用于获取与所述策略选择接收单元输出的授权策略对应的权限集合;
权限设置执行子单元,用于为所述应用设置所述权限集合获取子单元获取的权限集合中的权限。
可选的,所述应用权限设置单元还包括:
交集计算子单元,用于计算所述权限集合获取子单元获取的权限集合与所述应用所要求的权限集合的交集;
所述权限设置执行子单元具体用于,为所述应用设置所述交集计算子单元计算得到的交集中包含的权限。
可选的,所述装置包括:
图标突出显示单元,用于当所述触控操作判断单元的输出为是时,采用预设方式显示所述应用图标,并触发所述策略选择接收单元工作。
可选的,所述装置包括:
集合选择接收单元,用于当所述触控操作判断单元的输出为是时,接收对所述应用所属授权策略集合的选择操作,并触发所述策略选择接收单元工作;
所述策略选择接收单元具体用于,接收对所述应用在所选授权策略集合中的授权策略的选择操作。
在上述的实施例中,提供了一种应用权限配置方法以及一种应用权限配置装置,此外,本申请还提供了一种电子设备;所述电子设备实施例如下:
请参考图5,其示出了本申请的一种电子设备的实施例的示意图。
所述电子设备,包括:显示器501;处理器502;存储器503;
所述存储器503用于存储应用权限配置程序,所述程序在被所述处理器读取执行时,执行如下操作:接收对应用图标的触控操作;当所述触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限;其中,所述授权策略是预设的授权策略集合中的成员。
本申请虽然以较佳实施例公开如上,但其并不是用来限定本申请,任何本领域技术人员在不脱离本申请的精神和范围内,都可以做出可能的变动和修改,因此本申请的保护范围应当以本申请权利要求所界定的范围为准。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介 质的示例。
1、计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括非暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
2、本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。

Claims (29)

  1. 一种应用权限配置方法,其特征在于,包括:
    接收对应用图标的触控操作;
    当所述触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限;
    其中,所述授权策略是预设的授权策略集合中的成员。
  2. 根据权利要求1所述的应用权限配置方法,其特征在于,所述预设的权限配置触发操作包括:长按应用图标、双击应用图标、三击应用图标、采用具有特定指纹信息的手指触控应用图标、或者在权限配置模式下触控应用图标。
  3. 根据权利要求2所述的应用权限配置方法,其特征在于,当所述预设的权限配置触发操作为在权限配置模式下触控应用图标时,在所述接收对应用图标的触控操作之前,执行下述进入权限配置模式的切换操作:
    接收对显示屏幕中预设的模式切换区域的触控操作;或者,
    接收对系统菜单中的用于进行模式切换的菜单项的选择操作;或者,
    接收与预设的模式切换手势相同的触控操作。
  4. 根据权利要求1所述的应用权限配置方法,其特征在于,当所述触控操作与预设的权限配置触发操作一致时,执行下述操作:
    验证所述触控操作的执行者是否具备配置权限;若具备,则执行所述接收对所述应用的授权策略的选择操作。
  5. 根据权利要求4所述的应用权限配置方法,其特征在于,所述方法在具有触摸屏的设备上实施、并且所述触摸屏集成了指纹传感器功能;
    所述验证所述触控操作的执行者是否具备配置权限,包括:
    获取在接收所述触控操作时采集到的指纹信息;
    判断所述指纹信息与预存的具备配置权限的指纹信息是否相符;若相符,则判定所述执行者具备配置权限。
  6. 根据权利要求1所述的应用权限配置方法,其特征在于,所述接收对所述应用的授权策略的选择操作包括:
    接收输入的授权策略标识;或者,
    接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
  7. 根据权利要求6所述的应用权限配置方法,其特征在于,所述接收对所述应用的授权策略的选择操作为:接收对循环显示的不同状态应用图标的选择操作;
    所述不同状态应用图标包括:不同颜色的应用图标、不同大小的应用图标、或者带不同状态标识的应用图标。
  8. 根据权利要求7所述的应用权限配置方法,其特征在于,所述接收对循环显示的不同状态应用图标的选择操作包括:
    循环显示不同状态的应用图标;
    获取在循环显示过程中被选中的应用图标状态。
  9. 根据权利要求8所述的应用权限配置方法,其特征在于,所述循环显示不同状态的应用图标,包括:
    每当接收对所述应用图标的触控操作,则按照预设的循环显示顺序显示不同于当前状态的下一状态的应用图标;
    所述获取在循环显示过程中被选中的应用图标状态包括:如果在预设时间段内未接收到对所述应用图标的触控操作,则当前显示的应用图标状态即为被选中的应用图标状态。
  10. 根据权利要求8所述的应用权限配置方法,其特征在于,所述循环显示不同状态的应用图标,包括:
    按照预设的时间间隔,自动循环显示不同状态的应用图标;
    所述获取在循环显示过程中被选中的应用图标状态包括:在上述循环显示过程中,接收对应用图标状态的选取操作。
  11. 根据权利要求1所述的应用权限配置方法,其特征在于,所述根据所选的授权策略为所述应用设置相应的权限包括:
    获取与所述授权策略对应的权限集合;
    为所述应用设置所述权限集合中的权限。
  12. 根据权利要求11所述的应用权限配置方法,其特征在于,所述根据所选的授权策略为所述应用设置相应的权限还包括:
    计算所述与授权策略对应的权限集合与所述应用所要求的权限集合的交集;
    所述为所述应用设置所述权限集合中的权限包括:为所述应用设置所述交集中包含的权限。
  13. 根据权利要求1-12任一项所述的应用权限配置方法,其特征在于,所述授权 策略集合包括:基于应用需求的授权策略集合、或者基于风险划分的授权策略集合;
    所述基于应用需求的授权策略集合包括以下授权策略:普通策略、信任策略、以及不信任策略;
    所述基于风险划分的授权策略集合包括以下授权策略:低风险策略、中风险策略、以及高风险策略。
  14. 根据权利要求1-12任一项所述的应用权限配置方法,其特征在于,当所述触控操作与预设的权限配置触发操作一致时,在接收对所述应用的授权策略的选择操作之前,执行下述操作:
    采用预设方式显示所述应用图标,所述预设方式包括:高亮显示、或者闪烁显示。
  15. 根据权利要求1-12任一项所述的应用权限配置方法,其特征在于,所述预设的授权策略集合至少为两个;
    当所述触控操作与预设的权限配置触发操作一致时,在执行所述接收对所述应用的授权策略的选择操作之前,执行下述操作:
    接收对所述应用所属授权策略集合的选择操作;
    所述接收对所述应用的授权策略的选择操作包括:接收对所述应用在所选授权策略集合中的授权策略的选择操作。
  16. 根据权利要求1-12任一项所述的应用权限配置方法,其特征在于,所述应用图标包括:在桌面上显示的应用图标。
  17. 一种应用权限配置装置,其特征在于,包括:
    触控操作接收单元,用于接收对应用图标的触控操作;
    触控操作判断单元,用于判断所述触控操作接收单元接收的触控操作与预设的权限配置触发操作是否一致;
    策略选择接收单元,用于当所述触控操作判断单元的输出为是时,接收对所述应用的授权策略的选择操作;
    应用权限设置单元,用于根据所述策略选择接收单元输出的授权策略,为所述应用设置相应的权限。
  18. 根据权利要求17所述的应用权限配置装置,其特征在于,当所述预设的权限配置触发操作为在权限配置模式下点击应用图标时,所述装置包括下列任一单元:
    第一模式切换接收单元,用于在触发所述触控操作接收单元工作之前,接收对显示屏幕中预设的模式切换区域的触控操作;或者,
    第二模式切换接收单元,用于在触发所述触控操作接收单元工作之前,接收对系统菜单中的用于进行模式切换的菜单项的选择操作。
  19. 根据权利要求17所述的应用权限配置装置,其特征在于,包括:
    配置权限验证单元,用于当所述触控操作判断单元的输出为是时,验证所述触控操作的执行者是否具备配置权限,并在具备时,触发所述策略选择接收单元工作。
  20. 根据权利要求19所述的应用权限配置装置,其特征在于,所述装置部署在具有触摸屏的设备上、并且所述触摸屏集成了指纹传感器功能;
    所述配置权限验证单元包括:
    指纹信息获取子单元,用于获取触控操作接收单元工作时采集到的指纹信息;
    配置权限判断子单元,用于判断所述指纹信息与预存的具备配置权限的指纹信息是否相符,若相符,则判定所述执行者具备配置权限。
  21. 根据权利要求17所述的应用权限配置装置,其特征在于,所述策略选择接收单元具体用于,
    接收输入的授权策略标识;或者,
    接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
  22. 根据权利要求21所述的应用权限配置装置,其特征在于,所述策略选择接收单元具体用于,接收对循环显示的不同状态应用图标的选择操作,并根据所选应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略;所述策略选择接收单元包括:
    循环显示子单元,用于循环显示不同状态的应用图标;
    状态获取子单元,用于获取在循环显示过程中被选中的应用图标状态;
    策略确定子单元,用于根据所述状态获取子单元获取的应用图标状态、以及预设的应用图标状态与授权策略的对应关系确定所选的授权策略。
  23. 根据权利要求22所述的应用权限配置装置,其特征在于,所述循环显示子单元具体用于,每当接收对所述应用图标的触控操作,则按照预设的循环显示顺序显示不同于当前状态的下一状态的应用图标;
    所述状态获取子单元具体用于,判断是否在预设时间段内未接收到对所述应用图标的触控操作,若是,则当前显示的应用图标状态即为被选中的应用图标状态。
  24. 根据权利要求22所述的应用权限配置装置,其特征在于,所述循环显示子单 元具体用于,按照预设的时间间隔,自动循环显示不同状态的应用图标;
    所述状态获取子单元具体用于,在上述循环显示过程中,接收对应用图标状态的选取操作。
  25. 根据权利要求17所述的应用权限配置装置,其特征在于,所述应用权限设置单元包括:
    权限集合获取子单元,用于获取与所述策略选择接收单元输出的授权策略对应的权限集合;
    权限设置执行子单元,用于为所述应用设置所述权限集合获取子单元获取的权限集合中的权限。
  26. 根据权利要求25所述的应用权限配置装置,其特征在于,所述应用权限设置单元还包括:
    交集计算子单元,用于计算所述权限集合获取子单元获取的权限集合与所述应用所要求的权限集合的交集;
    所述权限设置执行子单元具体用于,为所述应用设置所述交集计算子单元计算得到的交集中包含的权限。
  27. 根据权利要求17-26任一项所述的应用权限配置装置,其特征在于,包括:
    图标突出显示单元,用于当所述触控操作判断单元的输出为是时,采用预设方式显示所述应用图标,并触发所述策略选择接收单元工作。
  28. 根据权利要求17-26任一项所述的应用权限配置装置,其特征在于,包括:
    集合选择接收单元,用于当所述触控操作判断单元的输出为是时,接收对所述应用所属授权策略集合的选择操作,并触发所述策略选择接收单元工作;
    所述策略选择接收单元具体用于,接收对所述应用在所选授权策略集合中的授权策略的选择操作。
  29. 一种电子设备,其特征在于,包括:
    显示器;
    处理器;
    存储器,用于存储应用权限配置程序,所述程序在被所述处理器读取执行时,执行如下操作:接收对应用图标的触控操作;当所述触控操作与预设的权限配置触发操作一致时,接收对所述应用的授权策略的选择操作,并根据所选的授权策略为所述应用设置相应的权限;其中,所述授权策略是预设的授权策略集合中的成员。
PCT/CN2016/089078 2015-07-16 2016-07-07 应用权限配置方法、装置及电子设备 WO2017008676A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510420513.2 2015-07-16
CN201510420513.2A CN106354399A (zh) 2015-07-16 2015-07-16 应用权限配置方法、装置及电子设备

Publications (1)

Publication Number Publication Date
WO2017008676A1 true WO2017008676A1 (zh) 2017-01-19

Family

ID=57756837

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/089078 WO2017008676A1 (zh) 2015-07-16 2016-07-07 应用权限配置方法、装置及电子设备

Country Status (2)

Country Link
CN (1) CN106354399A (zh)
WO (1) WO2017008676A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199255A (zh) * 2020-10-15 2021-01-08 Oppo广东移动通信有限公司 权限使用监控方法、装置、设备及存储介质
CN112817498A (zh) * 2021-02-23 2021-05-18 Oppo广东移动通信有限公司 应用权限管理方法、装置、存储介质以及终端

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108009412A (zh) * 2017-12-26 2018-05-08 华勤通讯技术有限公司 应用事项的授权方法及电子设备
CN108427886B (zh) * 2018-01-25 2020-06-02 上海掌门科技有限公司 一种应用程序访问权限设置方法、系统、设备及可读介质
CN109241765B (zh) * 2018-07-17 2022-06-17 奇酷互联网络科技(深圳)有限公司 移动终端和应用程序的权限管理方法、装置
CN109214207A (zh) * 2018-08-22 2019-01-15 郑州云海信息技术有限公司 多用户访问的网络中权限的管理方法和装置
CN109255214B (zh) * 2018-09-13 2021-03-19 广东电网有限责任公司 一种权限配置方法及装置
CN109542282B (zh) * 2018-10-30 2021-02-23 维沃移动通信有限公司 一种界面显示方法及终端设备
CN109766680B (zh) * 2018-12-27 2021-01-08 维沃移动通信有限公司 权限控制方法及终端
CN110032422B (zh) * 2019-04-19 2021-09-24 维沃移动通信有限公司 一种应用管理方法、终端设备及计算机可读存储介质
CN111382418B (zh) * 2020-03-06 2023-07-14 Oppo广东移动通信有限公司 应用程序权限管理方法、装置、存储介质与电子设备
CN117251085B (zh) * 2023-11-20 2024-03-19 北京小米移动软件有限公司 设备应用的定位方法、装置、电子设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156222A (zh) * 2014-08-29 2014-11-19 诚迈科技(南京)股份有限公司 自定义Android设备桌面的方法
CN104461261A (zh) * 2014-12-05 2015-03-25 上海斐讯数据通信技术有限公司 管理移动终端默认应用的系统及方法
CN104657658A (zh) * 2015-02-13 2015-05-27 深圳酷派技术有限公司 一种安装应用的方法及终端

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101549557B1 (ko) * 2009-03-10 2015-09-03 엘지전자 주식회사 휴대 단말기 및 그 제어방법
KR101549558B1 (ko) * 2009-03-18 2015-09-03 엘지전자 주식회사 휴대 단말기 및 그 제어방법
CN102340398A (zh) * 2010-07-27 2012-02-01 中国移动通信有限公司 安全策略设置、确定方法、应用程序执行操作方法及装置
KR101802760B1 (ko) * 2011-06-27 2017-12-28 엘지전자 주식회사 이동 단말기 및 그 제어방법
CN102214104A (zh) * 2011-07-20 2011-10-12 宇龙计算机通信科技(深圳)有限公司 基于Android的应用程序管理方法及系统
CN103176727B (zh) * 2011-12-23 2016-01-27 宇龙计算机通信科技(深圳)有限公司 应用程序的启动方法及通信终端
EP2869176A3 (en) * 2013-10-10 2015-06-24 Lg Electronics Inc. Mobile terminal and method of controlling therefor
CN103886237A (zh) * 2014-03-26 2014-06-25 深圳市亚略特生物识别科技有限公司 具有指纹传感器和触摸屏的电子设备的控制方法及系统
CN103905651A (zh) * 2014-04-30 2014-07-02 北京邮电大学 智能终端中应用权限管理方法及系统
CN104217150B (zh) * 2014-08-21 2019-01-08 百度在线网络技术(北京)有限公司 一种用于调用应用的方法与装置
CN104751071B (zh) * 2015-03-16 2019-01-15 联想(北京)有限公司 一种信息处理方法及电子设备
CN104765552B (zh) * 2015-04-28 2019-04-19 小米科技有限责任公司 权限管理方法和装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156222A (zh) * 2014-08-29 2014-11-19 诚迈科技(南京)股份有限公司 自定义Android设备桌面的方法
CN104461261A (zh) * 2014-12-05 2015-03-25 上海斐讯数据通信技术有限公司 管理移动终端默认应用的系统及方法
CN104657658A (zh) * 2015-02-13 2015-05-27 深圳酷派技术有限公司 一种安装应用的方法及终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199255A (zh) * 2020-10-15 2021-01-08 Oppo广东移动通信有限公司 权限使用监控方法、装置、设备及存储介质
CN112817498A (zh) * 2021-02-23 2021-05-18 Oppo广东移动通信有限公司 应用权限管理方法、装置、存储介质以及终端

Also Published As

Publication number Publication date
CN106354399A (zh) 2017-01-25

Similar Documents

Publication Publication Date Title
WO2017008676A1 (zh) 应用权限配置方法、装置及电子设备
KR102356549B1 (ko) 디바이스 내의 폴더를 암호화하는 시스템 및 방법
US10073985B2 (en) Apparatus and method for trusted execution environment file protection
EP3792797B1 (en) Apparatus amd method for configuring access to applications
KR102223609B1 (ko) 전자 기기간 콘텐트 공유 방법 및 장치
WO2016023367A1 (zh) 访问认证方法、装置及系统
US20140101434A1 (en) Cloud-based file distribution and management using real identity authentication
US20160328602A1 (en) Method, device, and system for displaying user interface
US8954736B2 (en) Limiting the functionality of a software program based on a security model
WO2016155072A1 (zh) 一种应用隐藏、打开方法及装置
US9547607B2 (en) Brokering application access for peripheral devices
WO2017177571A1 (zh) 一种执行业务处理的方法、装置及系统
KR102337990B1 (ko) 권한 설정 토큰을 이용하는 전자 장치
WO2018107727A1 (zh) 一种信息处理方法、装置及终端
US11475123B2 (en) Temporary removal of software programs to secure mobile device
EP3469545A1 (en) Architecture for performing actions in a third-party service by an email client
EP2410455A1 (en) Intelligent attached storage
KR20160131886A (ko) 전자 장치 및 그의 정보 보호 방법
Vecchiato et al. The perils of Android security configuration
WO2015058584A1 (zh) 基于悬浮操作板的应用间通讯方法和装置
WO2016059564A1 (en) Partial access screen lock
WO2016180234A1 (zh) 一种安全环境构建方法和装置
CN104021076B (zh) 应用测试方法及路由器
WO2016179590A1 (en) Method for delegated authentication, access control and confirmation of irreversible commands in a storage device
EP3117357B1 (en) System and method of encrypting folder in device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16823823

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16823823

Country of ref document: EP

Kind code of ref document: A1