WO2019228492A1 - 权限开启方法、终端设备及计算机可读介质 - Google Patents

权限开启方法、终端设备及计算机可读介质 Download PDF

Info

Publication number
WO2019228492A1
WO2019228492A1 PCT/CN2019/089471 CN2019089471W WO2019228492A1 WO 2019228492 A1 WO2019228492 A1 WO 2019228492A1 CN 2019089471 W CN2019089471 W CN 2019089471W WO 2019228492 A1 WO2019228492 A1 WO 2019228492A1
Authority
WO
WIPO (PCT)
Prior art keywords
permission
opening
target
page
jump
Prior art date
Application number
PCT/CN2019/089471
Other languages
English (en)
French (fr)
Inventor
蔡增辉
路飞云
Original Assignee
上海连尚网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海连尚网络科技有限公司 filed Critical 上海连尚网络科技有限公司
Publication of WO2019228492A1 publication Critical patent/WO2019228492A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Definitions

  • the present application relates to the technical field of rights management, and in particular, to a method for enabling rights, a terminal device, and a computer-readable medium.
  • a variety of applications can be installed in terminal devices such as mobile phones and tablet computers, and these applications can fully expand the functions of the terminal device.
  • an application In order for an application to implement certain functions, it needs to have corresponding system permissions. For example, when an application needs to implement the function of popping up a floating window on a terminal device, it needs to enable the floating window permission; for another example, when the application needs to implement the function of recommending an address book friend to a user, it needs to have Permissions, etc.
  • a guide message is displayed, and the user is guided to manually enable the system permission through the guide information.
  • the guidance information is usually displayed in the form of a combination of text, pictures or graphics. Since enabling system permissions usually requires more steps, the user's operation of enabling system permissions according to the boot information is complicated. During the operation, because the user does not know the system permissions to be opened, the same permission name, purely mechanical guidance, etc. Will cause trouble to the user's operation, and because the operation steps are complicated, the user often cannot accurately find the page that opens the permission, resulting in failure to open the permission.
  • the purpose of this application is to provide a method, device, and terminal device for enabling permissions to solve the current system permission usually requiring more steps.
  • the user's operation of enabling system permissions according to the boot information is complicated and prone to errors. Operational issues.
  • the first aspect of the present application provides a permission opening method, including: obtaining a permission opening request for a target permission; querying a permission jump path matching the target permission according to the permission opening request; and jumping according to the permission The path jumps to the permission opening page of the target permission; and the target permission is opened on the permission opening page through a simulation operation.
  • the permission opening request carries adaptation information
  • the adaptation information includes model information and / or system information
  • the permission jump path matching the target permission includes querying a permission jump path that matches the target permission and the adaptation information according to the permission opening request.
  • the jumping to the permission opening page of the target permission according to the permission jumping path includes: determining whether the permission jumping path includes a transition page; if yes , Jumping to the transition page according to the permission jump path, and then jumping from the transition page to the permission opening page of the target permission.
  • the method before the obtaining the permission opening request for the target permission, the method further includes: providing a permission opening list, where the permission opening list is provided with multiple system permissions to be opened; After detecting a user's operation of turning on all system permissions in the permission opening list, generating a permission opening request for each system permission in the permission opening list; selecting a system permission to be opened from the permission opening list as Target authority
  • the method further includes: determining whether there is a system permission to be opened in the permission opening list; If there is, select the next system permission to be opened from the permission opening list as the target permission, and jump to the step of obtaining the permission opening request for the target permission.
  • the method before the querying a permission jump path that matches the target permission according to the permission opening request, the method further includes: registering permissions in an operating system to enable auxiliary functions
  • the permission opening auxiliary function includes an auxiliary function for assisting a user to open a system permission; and opening the target permission on the permission opening page through a simulation operation includes: using the permission opening auxiliary function to perform a simulation operation to The permission opening page opens the target permission.
  • the method before querying a permission jump path that matches the target permission according to the permission opening request, the method further includes: judging whether a permission opening auxiliary function is enabled; if not, Then jump to the auxiliary function opening interface, and guide the user to open the permission to open the auxiliary function by displaying a prompt message.
  • performing the simulation operation by using the permission opening auxiliary function to open the target permission on the permission opening page includes: using the permission opening auxiliary function, and opening the permission Find a permission switch corresponding to the target permission on the page; and perform a simulated click operation on the permission switch to enable the target permission.
  • the performing a simulated click operation on the permission switch to enable the target permission includes: performing a simulated click operation on the permission switch; if the device responds to the Simulate a click operation to pop up a permission to open a pop-up window, then search for a permission switch corresponding to the target permission in the permission-open pop-up window; perform a simulated click operation on the permission switch in the permission-open pop-up window to open the permission switch Target permissions.
  • the second aspect of the present application provides a permission opening device, which includes: a permission request obtaining module for obtaining a permission opening request for a target permission; a jump path query module for querying the target according to the permission opening request A permission jump path with matching permissions; a page jump module for jumping to a permission to open a page according to the permission jump path; a simulation opening module for opening a page at the permission through a simulation operation Turn on the target permission.
  • the permission opening request carries adaptation information
  • the adaptation information includes model information and / or system information
  • the jump path query module includes: a jump A path query unit is configured to query a permission jump path that matches the target permission and the adaptation information according to the permission opening request.
  • the page jump module includes: a transition page judging unit for judging whether the permission jump path includes a transition page; and a transition jump unit for , Jumping to the transition page according to the permission jump path, and then jumping from the transition page to the permission opening page of the target permission.
  • the permission enabling device further includes: a permission list providing module for providing a permission enabling list, where the permission enabling list is provided with multiple system permissions to be enabled;
  • An opening request generation module is configured to generate a permission opening request for each system permission in the permission opening list after detecting a user's operation to open all system permissions in the permission opening list;
  • a target permission selection module is used to A system permission to be opened is selected as the target permission in the permission opening list;
  • a permission detection module is not enabled to determine whether there is a system permission to be opened in the permission opening list;
  • a target permission reselection module is used if there is , Then select the next system permission to be opened from the permission opening list as the target permission, and jump to the step of obtaining the permission opening request for the target permission.
  • the permission enabling device further includes an auxiliary function registration module for registering the permission enabling auxiliary function in the operating system, and the permission enabling auxiliary function includes a function for assisting a user.
  • the permission enabling device further includes: an auxiliary function detection module for determining whether the permission enabling auxiliary function is turned on; and an auxiliary function enabling module for skipping if not. Go to the auxiliary function opening interface, and guide the user to open the permission to open the auxiliary function by displaying a prompt message.
  • the auxiliary function simulation operation unit includes: a permission switch search subunit, configured to enable an auxiliary function by using a permission, and search for the target permission in the permission opening page A corresponding permission switch; and a simulated click subunit, configured to perform a simulated click operation on the permission switch to enable the target permission.
  • the simulated click subunit includes: a page switch click subunit for performing a simulated click operation on the permission switch; a pop-up switch search subunit for The device responds to the simulated click operation to pop up a permission to open a popup window, and then searches for the permission switch corresponding to the target permission in the permission open popup window; the popup switch click subunit is used to open the popup window for the permission The permission switch performs a simulated click operation to enable the target permission.
  • a third aspect of the present application provides a terminal device, including: a memory, a processor, and a computer program stored on the memory and executable on the processor.
  • the processor executes the application when the processor runs the computer program.
  • the method of opening permissions provided in the first aspect.
  • a fourth aspect of the present application provides a computer-readable medium having computer-readable instructions stored thereon, the computer-readable instructions being executable by a processor to implement the permission opening method provided by the first aspect of the present application.
  • the permission opening method provided in the first aspect of the present application includes: obtaining a permission opening request for a target permission; querying a permission jump path that matches the target permission according to the permission opening request; and according to the permission jump path Jump to the permission opening page of the target permission; open the target permission on the permission opening page through a simulation operation.
  • the permission opening method provided in this application can automatically jump to the permission opening page of the target permission by querying the permission jump path of the target permission, and can automatically complete the opening of the target permission through simulation operations, thereby achieving the convenience of the system permission.
  • the automatic opening of the system does not require the user to manually start the system permission according to the guidance information, which can effectively simplify the manual operation of the system permission opening, improve the efficiency of the system permission opening, and is more convenient and quick.
  • the authority enabling device provided in the second aspect of the present application, the terminal device provided in the third aspect, and the computer-readable medium provided in the fourth aspect have the same beneficial effects as the authority enabling method provided in the first aspect above, and have the same benefits. effect.
  • FIG. 1 is a schematic diagram of an application scenario of a permission opening method according to an embodiment of the present application
  • FIG. 2 shows a flowchart of a permission opening method according to an embodiment of the present application
  • FIG. 3 shows a flowchart of a corresponding permission opening method according to a first specific embodiment provided by an embodiment of the present application
  • FIG. 4 shows a flowchart of a permission opening method corresponding to a specific second embodiment provided by an embodiment of the present application
  • FIG. 5 is a flowchart of a method for enabling a permission according to a third specific embodiment provided by an embodiment of the present application.
  • FIG. 6 is a flowchart of a method for enabling a permission according to a specific embodiment 4 provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a permission opening device according to an embodiment of the present application.
  • FIG. 8 shows a schematic diagram of a terminal device according to an embodiment of the present application.
  • FIG. 1 illustrates a schematic diagram of an application scenario of a permission opening method provided in an embodiment of the present application.
  • an operating system such as Android operation
  • a terminal device such as a mobile phone System, iOS operating system, Windows operating system, etc.
  • system permissions such as the limit of access to the address book, the right to obtain location information, the right to use cellular data, etc.
  • client installed in the above terminal device
  • FIG. 1 is only an example of a terminal device, and this application can also be applied to other terminal devices, which is not limited in this application.
  • Figure 1 shows a description of some restricted functions and corresponding system permissions of a WiFi connection software client.
  • the WiFi connection software client needs to enable the auto-start permission if it wants to automatically recognize the free WiFi function.
  • the WiFi signal detector you need to enable the permission of the floating window.
  • the permission opening method provided in this application is applied to the client and replaces the large number of manual operations that need to be performed by the user through an automated processing process, thereby achieving fast and accurate opening of system permissions.
  • the embodiment of the present application further provides a permission opening device and a terminal device corresponding to the permission opening method.
  • FIG. 2 illustrates a flowchart of a permission opening method according to an embodiment of the present application.
  • the permission opening method includes the following steps:
  • Step S101 Obtain a permission opening request for a target permission.
  • the target authority may be any system authority in the operating system, such as floating window authority, notification bar authority, self-starting authority, etc.
  • the operating system may be Android operating system or iOS operation. System, or other operating systems that require applications to open system permissions, this embodiment of the application does not specifically limit
  • Step S102 Query a permission jump path that matches the target permission according to the permission opening request.
  • a permission jump path database may be generated in advance based on a large amount of sample data, historical data, and the like, and each system permission is recorded in the permission jump path database.
  • Corresponding permission jump path exemplary, in this step, a permission jump path that matches the target permission may be queried from a preset permission jump path database according to identification information such as the name and identification code of the target permission.
  • a configuration file may also be generated in advance based on a large amount of sample data, historical data, and the like, and a permission jump path corresponding to each system permission may be recorded in the configuration file.
  • the authority jump path that matches the target authority may be queried from the configuration file according to identification information such as the name and identification code of the target authority.
  • the permission jump paths of system permissions may be different.
  • the permission opening request may be Carrying adaptation information, the adaptation information including model information and / or system information, in one example, the querying a permission jump path that matches the target permission according to the permission opening request may be This is achieved by: querying a permission jump path that matches the target permission and the adaptation information according to the permission opening request.
  • the model information may include information such as the brand and model of the terminal device, and the system information may include information such as the version of the operating system in the terminal device.
  • the querying the permission jump path matching the target permission and the adaptation information may be querying the permission jump path database for the target permission and the applicable permission.
  • the permission jump path that matches the configuration information may also be a query in the configuration file for a permission jump path that matches the target permission and the adaptation information.
  • corresponding configuration files can also be configured for different model series, models, or operating system versions. Accordingly, in some examples, this step can first load the model series, model, or model of the current terminal device. The configuration file corresponding to the operating system version, and then query the permission jump path that matches the target permission from the configuration file.
  • the authority jump path of the target authority cannot be found.
  • the user may be guided to manually open the target authority by displaying the guidance information.
  • the permission jump path of the target permission of the information so that when other users subsequently use the terminal device corresponding to the adaptation information, the client can smoothly find the permission jump path of the target permission and automatically open the target permission.
  • Step S103 Jump to the permission opening page of the target permission according to the permission jump path.
  • the jump according to the permission jump path to the target permission can be implemented by: determining whether the permission jump path includes a transition page; if so, jumping to the transition page according to the permission jump path, and then jumping from the transition page to The target permission opens the page.
  • the transition page is provided with a trigger control for the permission opening page to jump to the target permission. Accordingly, the transition from the transition page to the permission opening page for the target permission can be performed in the following ways: Realization: using the permission opening auxiliary function, in the transition page to find the trigger control of the permission opening page that jumps to the target permission; and performing a simulated click operation on the trigger control to jump to the permission of the target permission Open the page.
  • Step S104 Open the target permission on the permission opening page through a simulation operation.
  • the accessibility service is A service provided by the Android system itself inherits the Service class. This service provides an enhanced user interface. It was originally designed to help people with disabilities or people who may temporarily be unable to fully interact with the device. Later, the service was gradually expanded.
  • functions such as simulated operations and shortcut operations on terminal devices, where the simulated operations refer to the system's simulation of user's operation events to achieve automated operations, such as simulating user's search, click, and drag operations.
  • This application mainly uses two simulated operation functions provided by the service: finding interface elements and implementing simulated clicks.
  • the search interface elements provided by the auxiliary function provided by the operating system and the function of simulating a click can be used to enable the target permission on the permission opening page through a simulation operation.
  • the method may further include: registering permission in an operating system Turning on the auxiliary function, the permission opening auxiliary function includes an auxiliary function for assisting a user to open a system permission; accordingly, opening the target permission on the permission opening page through a simulation operation may be achieved by using the permission:
  • the auxiliary function is enabled to perform a simulation operation to enable the target permission on the permission opening page.
  • the method may further include: judging whether the permission enabling auxiliary function is enabled; if not, jumping to the auxiliary function enabling interface, and displaying the prompt information to guide the user to open the These permissions enable accessibility.
  • the prompt information may be displayed in the form of a combination of text, pictures, or graphics.
  • the use of the permission opening auxiliary function to perform a simulation operation to open the target permission on the permission opening page can be implemented by: Searching for a permission switch corresponding to the target permission in the permission opening page; and performing a simulated click operation on the permission switch to enable the target permission.
  • the permission opening Finding the permission switch corresponding to the target permission in the page can be implemented by: finding the permission switch of the target permission in the permission opening page according to the adaptation information.
  • a permission switch search database can be set in advance, and the location and / or display form of the permission switch of each system permission is recorded in the database corresponding to different adaptation information. Based on this, the permission switch can be opened according to the adaptation information. Find the permission switch for the target permission on the page.
  • the searching for the permission switch corresponding to the target permission in the permission opening page may be to extract keywords based on the name of the target permission, and then search for the keyword in the permission opening page through keyword retrieval.
  • Target the permission item corresponding to the permission and then find the permission switch corresponding to the permission item (for example, the permission switch is generally set to the right of the permission item, and can be searched based on sample data or historical data).
  • the foregoing implementation manner can be applied to various models and operating systems to quickly find the permission switch of the target permission, which can effectively reduce the steps for the user to find the permission switch, thereby improving the efficiency and accuracy of opening the target permission.
  • the performing a simulated click operation on the permission switch to turn on the target permission can be implemented by: Simulate a click operation; if the device pops up a permission to open a pop-up window in response to the simulated click operation, find the permission switch corresponding to the target permission in the permission-open pop-up window; and open the permission in the pop-up window for the permission
  • the switch performs a simulated click operation to enable the target permission.
  • the method may further include: providing a permission opening list, and the permission opening list is provided with a plurality of system permissions to be opened; after monitoring a user's operation of opening all system permissions in the permission opening list, generating A permission opening request for each system permission in the permission opening list; selecting a system permission to be opened as a target permission from the permission opening list; and correspondingly, opening the permission on the permission opening page through the simulation operation.
  • the target permission may further include: determining whether there is a system permission to be opened in the permission opening list; if so, selecting the next system permission to be opened from the permission opening list as the target permission, and jumping to The step of obtaining a permission opening request for a target permission.
  • a button indicating "one-click enable” may be provided on the display interface of the permission enable list.
  • a permission enable request for each system permission in the permission enable list may be generated.
  • the program automatically jumps to the permission opening page of the target permission according to the permission jump path of the target permission.
  • the program retrieves the permission switch of the permission item corresponding to the target permission according to the keyword on the permission opening page, and simulates clicking. Action Turn on the target permission.
  • steps S101-S104 can be performed for each system permission to be opened in the permission opening list.
  • click a "One-click Open” button to automatically help the user to open the software application.
  • Multiple system permissions users do not need to click to open one by one, to achieve multiple opening of multiple system permissions, it is convenient for users to open important permissions, so that subsequent functions can reach users smoothly, increase the user's active opportunities, and provide users with more Multi-business services can greatly reduce the complexity of operations for users to open multiple system permissions, improve the efficiency and accuracy of permission opening, and further improve the user experience and user satisfaction.
  • the method may further include: displaying the target in the permission opening list after the target permission is successfully opened or failed to be opened.
  • the current on / off status of the permission may be displayed.
  • the foregoing is an exemplary description of the permission opening method provided in the embodiment of the present application.
  • the permission opening method provided in this application can automatically jump to the permission opening page of the target permission by querying the permission jump path of the target permission. And through the simulation operation can automatically complete the opening of the target permissions, so as to achieve the convenient and fast automatic opening of the system permissions, compared to the prior art, does not require users to manually operate the system permissions to start according to the guidance information, which can effectively simplify the system permissions
  • the manual operation of opening can improve the opening efficiency of system permissions, and it is more convenient and quick.
  • FIG. 3 to FIG. 6 show specific embodiments of the permission enabling method corresponding to different types of mobile phones.
  • the same or similar content as the method shown in FIG. 2 can be understood by referring to the description of the embodiment corresponding to FIG. 2 above. To repeat, the following briefly describes each in conjunction with the drawings.
  • FIG. 3 shows a flowchart of a corresponding permission opening method according to a specific embodiment 1 provided in the embodiment of the present application.
  • the permission opening method can be used to enable one system authority or perform multiple system authority batches. On, it is applicable to A-type mobile phones.
  • the permission opening method of A-type mobile phones has the following characteristics:
  • the permission opening method includes the following steps S201 to S210:
  • Step S201 Obtain a permission opening list, where there are multiple system permissions to be opened in the permission opening list;
  • Step S202 determine whether the permission-enabled auxiliary function is enabled; if not, go to step S203, and if yes, go to step S204;
  • Step S203 Jump to the auxiliary function page, and guide the user to turn on the permission to enable the auxiliary function;
  • Step S204 Take a permission to be opened from the permission list that needs to be opened as the target permission;
  • Step S205 Query a permission jump path that matches the target permission and the adaptation information of the mobile phone;
  • Step S206 Jump to the permission opening page of the target permission according to the permission jump path
  • Step S207 Find the permission switch of the target permission on the permission opening page according to the adaptation information model of the mobile phone
  • Step S208 Perform a simulated click operation on the permission switch to enable the target permission
  • Step S209 Check whether there is a system permission to be opened in the permission opening list. If there is, go to step S204; if not, go to step S210.
  • Step S210 The process ends.
  • FIG. 4 shows a flowchart of a permission enabling method corresponding to the specific embodiment 2 provided in the embodiment of the present application.
  • the permission enabling method can be used to enable one system authority or perform multiple system authority batches. On, it is applicable to B-type mobile phones.
  • the permission opening method of B-type mobile phones has the following characteristics:
  • the same or similar content of the specific embodiment 2 as the specific embodiment 1 shown in FIG. 3 may refer to the detailed description in FIG. 3, which is not repeated here, and only the differences are described.
  • steps S201 to S205 and steps 207 to 210 can be referred to the detailed description in FIG. 3.
  • the difference between the specific embodiment 2 and the specific embodiment 1 shown in FIG. 3 is that Because the B-type mobile phone is restricted by the mobile phone system, it cannot directly jump to the permission opening page. Therefore, instead of step S206 in the first embodiment by using steps S211 and S212, you can first jump to The transition page, and then the transition page jumps to the permission opening page of the target permission.
  • FIG. 5 shows a flowchart of a permission enabling method corresponding to the third specific embodiment provided in the embodiment of the present application.
  • the permission enabling method may be used to enable one system authority or perform multiple system authority batches. On, it applies to C-type mobile phones.
  • the permission opening method of C-type mobile phones has the following characteristics:
  • steps S201 to S207 and steps 209 to 210 can be referred to the detailed description in FIG. 3.
  • steps S213 and S214 are used instead of step S208 in the first embodiment, and a simulated click operation can be performed on the permission switch when the device pops up the permission. After opening the pop-up window, query the permission switch in the pop-up permission opening pop-up window and perform a simulated click operation to turn on the target permission.
  • FIG. 6 shows a flowchart of a permission enabling method corresponding to the specific embodiment 4 provided in the embodiment of the present application.
  • the permission enabling method may be used to enable one system authority or perform multiple system authority batches. On, it is applicable to D-type mobile phones.
  • the permission opening method of D-type mobile phones has the following characteristics:
  • the content of the fourth embodiment is the same as or similar to that of the first embodiment shown in FIG. 3, and reference may be made to the detailed description in FIG. 3, which is not repeated here, and only the differences are described.
  • steps S201 to S205, step 207, and steps 209 to 210 can be referred to the detailed description in FIG. 3.
  • This specific embodiment 4 is different from the specific embodiment 1 shown in FIG. 3. The point is that because the D-type mobile phone is restricted by the mobile phone system, it cannot directly jump to the permission opening page, and pop-up window interference may occur during the permission opening process. Therefore, steps S211 and S212 are used instead of step S206 in the first embodiment.
  • step S213 and step S214 are used instead of step S208 in the first embodiment.
  • the simulated click operation can be performed on the permission switch. After the device pops up the permission to open the pop-up window, query the permission switch in the pop-up permission open pop-up window and perform the simulated click operation to open the target permission.
  • a permission opening method is provided.
  • this application also provides a permission opening device.
  • the authority opening device provided in the embodiment of the present application may implement the methods shown in FIG. 2 to FIG. 6 described above, and the authority opening device may be implemented by software, hardware, or a combination of software and hardware.
  • the authority enabling device may include integrated or separate functional modules or units to perform corresponding steps in the foregoing methods.
  • FIG. 7 is a schematic diagram of a permission opening device according to an embodiment of the present application. Since the device embodiment is basically similar to the method embodiment, it is described relatively simply. For the relevant part, refer to the description of the method embodiment. The device embodiments described below are only schematic.
  • a permission opening device 2 provided in an embodiment of the present application includes:
  • a permission request obtaining module 21 configured to obtain a permission opening request for a target permission
  • a jump path query module 22 configured to query a permission jump path that matches the target permission according to the permission opening request
  • a page jump module 23 configured to jump to a permission to open a page according to the permission jump path
  • the simulation opening module 24 is configured to enable the target permission on the permission opening page through a simulation operation.
  • the permission opening request carries adaptation information
  • the adaptation information includes model information and / or system information
  • the jump path query module 22 includes:
  • a jump path query unit is configured to query a permission jump path that matches the target permission and the adaptation information according to the permission opening request.
  • the page jump module 23 includes:
  • a transition page judgment unit configured to determine whether a transition page is included in the permission jump path
  • a transition jump unit is configured to, if yes, jump to the transition page according to the permission jump path, and then jump from the transition page to the permission start page of the target permission.
  • the authority opening device 2 further includes:
  • the permission list providing module is used to provide a permission opening list, and the permission opening list is provided with multiple system permissions to be opened;
  • the opening request generating module is configured to generate a permission opening request for each system permission in the permission opening list after monitoring a user's operation of opening all system permissions in the permission opening list;
  • a target permission selection module configured to select a system permission to be opened as a target permission from the permission opening list
  • the permission detection module is not turned on, and is used to determine whether there are system permissions to be turned on in the permission opening list;
  • the target permission reselection module is used to select, from the permission opening list, the next system permission to be opened as the target permission, and jump to the step of obtaining a permission opening request for the target permission.
  • the authority opening device 2 further includes:
  • An auxiliary function registration module configured to register a permission to enable an auxiliary function in the operating system, the permission enabling auxiliary function includes an auxiliary function for assisting a user to enable a system permission;
  • the analog opening module 24 includes:
  • the auxiliary function simulation operation unit is configured to use a permission to open an auxiliary function to perform a simulation operation to enable the target permission on the permission opening page.
  • the authority opening device 2 further includes:
  • Auxiliary function detection module used to determine whether the permission to enable auxiliary functions is enabled
  • the auxiliary function enabling module is configured to jump to the auxiliary function enabling interface if not, and guide the user to open the permission to enable the auxiliary function by displaying a prompt message.
  • the auxiliary function simulation operation unit includes:
  • a permission switch search subunit configured to enable an auxiliary function by using a permission, and search for a permission switch corresponding to the target permission in the permission opening page;
  • the simulated click sub-unit is configured to perform a simulated click operation on the permission switch to enable the target permission.
  • the simulated click subunit includes:
  • a page switch click subunit configured to perform a simulated click operation on the permission switch
  • a pop-up switch search subunit configured to: if the device pops up a permission to open a pop-up window in response to the simulated click operation, search the permission switch corresponding to the target permission in the permission-open pop-up window;
  • the pop-up switch click sub-unit is configured to perform a simulated click operation on the permission switch in the pop-up window to enable the target permission.
  • the authority opening device 2 provided in the embodiment of the present application has the same beneficial effects as the authority opening method provided in the foregoing embodiment of the present application because of the same inventive concept.
  • the terminal device may be any computing device with data processing capabilities, such as a mobile phone, Mobile terminals such as notebook computers and tablet computers, such as car navigation, virtual reality (VR) devices, and augmented reality (AR) devices.
  • the terminal device may adopt an Android operating system or an iOS operating system.
  • FIG. 8 is a schematic diagram of a terminal device according to an embodiment of the present application. As shown in FIG.
  • the terminal device 3 includes: a processor 30, a memory 31, a bus 32, and a communication interface 33, and the processor 30, the communication interface 33, and the memory 31 are connected through a bus 32; There is a computer program that can be run on the processor 30. When the processor 30 runs the computer program, the permission opening method provided in this application is performed.
  • the memory 31 may include a high-speed random access memory (RAM: Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
  • RAM Random Access Memory
  • non-volatile memory such as at least one disk memory.
  • the communication connection between the network element of the system and at least one other network element is achieved through at least one communication interface 33 (which may be wired or wireless), and the Internet, a wide area network, a local network, a metropolitan area network, and the like can be used.
  • the bus 32 may be an ISA bus, a PCI bus, an EISA bus, or the like.
  • the bus can be divided into an address bus, a data bus, a control bus, and the like.
  • the memory 31 is configured to store a program, and the processor 30 executes the program after receiving an execution instruction.
  • the permission opening method disclosed in any one of the foregoing embodiments of the present application may be applied to the processor 30. Alternatively, it may be implemented by the processor 30.
  • the processor 30 may be an integrated circuit chip and has a signal processing capability. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 30 or an instruction in the form of software.
  • the above-mentioned processor 30 may be a general-purpose processor, including a central processing unit (CPU), a network processor (Network Processor) (NP), etc .; it may also be a digital signal processor (DSP), an application specific integrated circuit (ASIC), ready-made programmable gate array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • CPU central processing unit
  • NP Network Processor
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA ready-made programmable gate array
  • Various methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the steps of the method disclosed in combination with the embodiments of the present application may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • a software module may be located in a mature storage medium such as a random access memory, a flash memory, a read-only memory, a programmable read-only memory, or an electrically erasable programmable memory, a register, and the like.
  • the storage medium is located in the memory 31, and the processor 30 reads the information in the memory 31 and completes the steps of the foregoing method in combination with its hardware.
  • the terminal device provided by the embodiment of the present application and the permission opening method provided by the embodiment of the present application have the same beneficial effects because of the same inventive concept.
  • each block in the flowchart or block diagram may represent a module, a program segment, or a part of code, which contains one or more components for implementing a specified logical function Executable instructions.
  • the functions labeled in the blocks may also occur in a different order than those labeled in the drawings. For example, two consecutive blocks may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagrams and / or flowcharts, and combinations of blocks in the block diagrams and / or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or action. , Or it can be implemented with a combination of dedicated hardware and computer instructions.
  • the disclosed apparatus and method may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the units is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be through some communication interfaces, indirect coupling or communication connection of the device or unit, and may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each of the units may exist separately physically, or two or more units may be integrated into one unit.
  • the functions are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially a part that contributes to the existing technology or a part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application.
  • the foregoing storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种权限开启方法、终端设备及计算机可读介质。其中,权限开启方法包括:获取针对目标权限的权限开启请求(S101);根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径(S102);根据所述权限跳转路径跳转到所述目标权限的权限开启页面(S103);通过模拟操作在所述权限开启页面开启所述目标权限(S104)。该方法通过查询目标权限的权限跳转路径即可自动跳转到目标权限的权限开启页面,且通过模拟操作即可自动完成目标权限的开启,从而实现系统权限的方便快捷的自动化开启,相较于现有技术,不需要用户根据引导信息手动操作进行系统权限的开启,可以有效简化系统权限开启的人工操作,提高系统权限的开启效率,更加方便快捷。

Description

权限开启方法、终端设备及计算机可读介质 技术领域
本申请涉及权限管理技术领域,具体涉及一种权限开启方法、终端设备及计算机可读介质。
背景技术
诸如手机、平板电脑之类的终端设备中可安装各式各样的应用程序,这些应用程序可以充分扩展终端设备的功能。
应用程序为实现某些功能,需要具备相应的系统权限。例如,当应用程序需要实现在终端设备弹出悬浮窗的功能时,其需要开启悬浮窗权限;又如,当应用程序需要实现向用户推荐通讯录好友的功能时,其需要具备获取通讯录信息的权限,等等。
在现有技术中,当应用程序需要开启某一系统权限时,会显示引导信息,通过引导信息引导用户手动开启该系统权限。其中,引导信息通常以文字、图片或者图文结合的形式展示。由于开启系统权限通常需要较多步骤的操作,用户根据引导信息开启系统权限操作复杂,在操作过程中,由于用户对要开启的系统权限并不了解,雷同的权限名称、纯机械式的引导等都会给用户的操作带来困扰,且由于操作步骤复杂,用户经常无法准确地找到开启权限的页面,从而导致权限开启失败。
发明内容
鉴于上述问题,本申请的目的是通过提供一种权限开启方法、装置及终端设备,以解决目前开启系统权限通常需要较多步骤的操作,用户根据引导信息开启系统权限操作复杂,且容易产生误操作的问题。
本申请第一方面提供一种权限开启方法,包括:获取针对目标权限的权限开启请求;根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径;根据所述权限跳转路径跳转到所述目标权限的权限开启页面;通过模拟操作在所述权限开启页面开启所述目标权限。
本申请第一方面的一个变更实施方式中,所述权限开启请求携带有适配信息, 所述适配信息包括机型信息和/或系统信息;所述根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径,包括:根据所述权限开启请求,查询与所述目标权限及所述适配信息相匹配的权限跳转路径。
本申请第一方面的另一个变更实施方式中,所述根据所述权限跳转路径跳转到所述目标权限的权限开启页面,包括:判断所述权限跳转路径中是否包含过渡页面;若是,则根据所述权限跳转路径跳转到所述过渡页面,再由所述过渡页面跳转到所述目标权限的权限开启页面。
本申请第一方面的再一个变更实施方式中,在所述获取针对目标权限的权限开启请求之前,还包括:提供权限开启列表,所述权限开启列表中设有多个待开启的系统权限;在监测到用户开启所述权限开启列表中的所有系统权限的操作后,生成针对所述权限开启列表中各个系统权限的权限开启请求;从所述权限开启列表中选择一个待开启的系统权限作为目标权限;
本申请第一方面的又一个变更实施方式中,在所述通过模拟操作在所述权限开启页面开启所述目标权限之后,还包括:判断所述权限开启列表中是否还有待开启的系统权限;若有,则从所述权限开启列表中选择下一个待开启的系统权限作为目标权限,跳转到所述获取针对目标权限的权限开启请求的步骤。
本申请第一方面的又一个变更实施方式中,在所述根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径之前,还包括:在操作系统中注册权限开启辅助功能,所述权限开启辅助功能包括用于辅助用户开启系统权限的辅助功能;所述通过模拟操作在所述权限开启页面开启所述目标权限,包括:利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限。
本申请第一方面的又一个变更实施方式中,在根据所述权限开启请求查询与所述目标权限相匹配的权限跳转路径之前,还包括:判断权限开启辅助功能是否已开启;若否,则跳转到辅助功能开启界面,以及通过显示提示信息引导用户打开所述权限开启辅助功能。
本申请第一方面的又一个变更实施方式中,所述利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限,包括:利用权限开启辅助功能,在所述权限开启页面内查找与所述目标权限对应的权限开关;以及,针对所述权限开关进行模拟点击操作,以开启所述目标权限。
本申请第一方面的又一个变更实施方式中,所述针对所述权限开关进行模拟点击操作,以开启所述目标权限,包括:针对所述权限开关进行模拟点击操作;若设 备响应于所述模拟点击操作弹出权限开启弹窗,则在所述权限开启弹窗中查找所述目标权限对应的权限开关;针对所述权限开启弹窗中的所述权限开关进行模拟点击操作,以开启所述目标权限。
本申请第二方面提供一种权限开启装置,包括:权限请求获取模块,用于获取针对目标权限的权限开启请求;跳转路径查询模块,用于根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径;页面跳转模块,用于根据所述权限跳转路径跳转到所述目标权限的权限开启页面;模拟开启模块,用于通过模拟操作在所述权限开启页面开启所述目标权限。
本申请第二方面的一个变更实施方式中,所述权限开启请求携带有适配信息,所述适配信息包括机型信息和/或系统信息;所述跳转路径查询模块,包括:跳转路径查询单元,用于根据所述权限开启请求,查询与所述目标权限及所述适配信息相匹配的权限跳转路径。
本申请第二方面的另一个变更实施方式中,所述页面跳转模块,包括:过渡页面判断单元,用于判断所述权限跳转路径中是否包含过渡页面;过渡跳转单元,用于若是,则根据所述权限跳转路径跳转到所述过渡页面,再由所述过渡页面跳转到所述目标权限的权限开启页面。
本申请第二方面的再一个变更实施方式中,所述权限开启装置,还包括:权限列表提供模块,用于提供权限开启列表,所述权限开启列表中设有多个待开启的系统权限;开启请求生成模块,用于在监测到用户开启所述权限开启列表中的所有系统权限的操作后,生成针对所述权限开启列表中各个系统权限的权限开启请求;目标权限选取模块,用于从所述权限开启列表中选择一个待开启的系统权限作为目标权限;未开启权限检测模块,用于判断所述权限开启列表中是否还有待开启的系统权限;目标权限重选模块,用于若有,则从所述权限开启列表中选择下一个待开启的系统权限作为目标权限,跳转到所述获取针对目标权限的权限开启请求的步骤。
本申请第二方面的又一个变更实施方式中,所述权限开启装置,还包括:辅助功能注册模块,用于在操作系统中注册权限开启辅助功能,所述权限开启辅助功能包括用于辅助用户开启系统权限的辅助功能;所述模拟开启模块,包括:辅助功能模拟操作单元,用于利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限。
本申请第二方面的又一个变更实施方式中,所述权限开启装置,还包括:辅助功能检测模块,用于判断权限开启辅助功能是否已开启;辅助功能开启模块,用于 若否,则跳转到辅助功能开启界面,以及通过显示提示信息引导用户打开所述权限开启辅助功能。
本申请第二方面的又一个变更实施方式中,所述辅助功能模拟操作单元,包括:权限开关查找子单元,用于利用权限开启辅助功能,在所述权限开启页面内查找与所述目标权限对应的权限开关;以及,模拟点击子单元,用于针对所述权限开关进行模拟点击操作,以开启所述目标权限。
本申请第二方面的又一个变更实施方式中,所述模拟点击子单元,包括:页面开关点击子单元,用于针对所述权限开关进行模拟点击操作;弹窗开关查找子单元,用于若设备响应于所述模拟点击操作弹出权限开启弹窗,则在所述权限开启弹窗中查找所述目标权限对应的权限开关;弹窗开关点击子单元,用于针对所述权限开启弹窗中的所述权限开关进行模拟点击操作,以开启所述目标权限。
本申请第三方面提供一种终端设备,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器运行所述计算机程序时执行本申请第一方面提供的权限开启方法。
本申请第四方面提供一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现本申请第一方面提供的权限开启方法。
本申请第一方面提供的权限开启方法,包括:获取针对目标权限的权限开启请求;根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径;根据所述权限跳转路径跳转到所述目标权限的权限开启页面;通过模拟操作在所述权限开启页面开启所述目标权限。本申请提供的权限开启方法,通过查询目标权限的权限跳转路径即可自动跳转到目标权限的权限开启页面,且通过模拟操作即可自动完成目标权限的开启,从而实现系统权限的方便快捷的自动化开启,相较于现有技术,不需要用户根据引导信息手动操作进行系统权限的开启,可以有效简化系统权限开启的人工操作,提高系统权限的开启效率,更加方便快捷。
本申请第二方面提供的权限开启装置、第三方面提供的终端设备、第四方面提供的计算机可读介质,与上述第一方面提供的权限开启方法出于相同的发明构思,具有相同的有益效果。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是 对本申请的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了本申请实施方式所提供的一种权限开启方法的应用场景示意图;
图2示出了本申请实施方式所提供的一种权限开启方法的流程图;
图3示出了本申请实施方式所提供的具体实施例一对应的权限开启方法的流程图;
图4示出了本申请实施方式所提供的具体实施例二对应的权限开启方法的流程图;
图5示出了本申请实施方式所提供的具体实施例三对应的权限开启方法的流程图;
图6示出了本申请实施方式所提供的具体实施例四对应的权限开启方法的流程图;
图7示出了本申请实施方式所提供的一种权限开启装置的示意图;
图8示出了本申请实施方式所提供的一种终端设备的示意图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施方式。虽然附图中显示了本公开的示例性实施方式,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施方式所限制。相反,提供这些实施方式是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
需要注意的是,除非另有说明,本申请使用的技术术语或者科学术语应当为本申请所属领域技术人员所理解的通常意义。
请参考图1,其示出了本申请实施方式所提供的一种权限开启方法的应用场景示意图,结合图1所示,为了满足安全管理的需要,手机等终端设备的操作系统(如Android操作系统、iOS操作系统、Windows操作系统等)设置了大量的系统权限(如访问通讯录权的限、获取位置信息的权限、使用蜂窝数据的权限等等),安装于上述终端设备中的客户端(应用程序)如果要实现某些功能,往往需要通知用户手动开启相应的系统权限。需要说明的是,图1所示的手机仅为终端设备的举例,本申请还可以应用于其它终端设备,本申请对此并不限定。图1示出了一款WiFi连接软件客户端的部分受限功能及对应系统权限的说明,如图所示,该WiFi连接软件客户端若要实现自动识别免费WiFi的功能需要开启自启动权限,若要实现WiFi信 号探测器的功能需要开启悬浮窗权限,若要实现附近免费WiFi提醒的功能则要开启通知权限。
在现有技术中,用户若要开启某个系统权限,需要根据引导信息在操作系统中依次执行大量的手动操作才可实现,在一个典型的示例中,用户需要执行“进入设置页面——找到权限管理界面——在大量的应用列表中找到目标应用——在目标应用的权限列表中找到目标系统权限——点击权限开关”等一系列操作(以上仅为示例性说明,不同的机型、系统版本可能存在差异),步骤繁杂,尤其是在大量的应用列表中查找目标应用以及在权限列表中查找目标系统权限的步骤,犹如大海捞针,给用户带来很大的不便,效率较低且容易出错。
本申请提供的权限开启方法即是应用于客户端中,通过自动化处理流程替代上述需要用户执行的大量手动操作,从而实现系统权限的快速、精准开启。相应的,本申请实施方式还提供了与所述权限开启方法对应的权限开启装置及终端设备,下面结合附图对本申请的实施例进行说明。
请参考图2,其示出了本申请实施方式所提供的一种权限开启方法的流程图,所述权限开启方法包括以下步骤:
步骤S101:获取针对目标权限的权限开启请求。
本申请实施例中,所述目标权限可以是操作系统中的任何系统权限,例如悬浮窗权限、通知栏权限、自启动权限等等,所述操作系统可以是Android操作系统,也可以是iOS操作系统,亦或是其他需要应用程序申请开启系统权限的操作系统,本申请实施例不做具体限定
步骤S102:根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径。
具体地,由于不同系统权限的权限开启页面不同,本申请实施例中,可以预先根据大量的样本数据、历史数据等生成权限跳转路径数据库,所述权限跳转路径数据库中记录有各个系统权限对应的权限跳转路径。示例性地,本步骤中,可以根据目标权限的名称、标识码等标识信息从预设的权限跳转路径数据库中查询与所述目标权限相匹配的权限跳转路径。
此外,在另一些实施方式中,也可以预先根据大量的样本数据、历史数据等生成配置文件,在该配置文件中记录各个系统权限对应的权限跳转路径。示例性地,本步骤中,可以根据目标权限的名称、标识码等标识信息从所述配置文件中查询与所述目标权限相匹配的权限跳转路径。
考虑到,不同的机型、不同的操作系统、甚至同一操作系统的不同版本,其中系统权限的权限跳转路径也可能不同,在本申请实施例的一些实施方式中,所述权限开启请求可携带有适配信息,所述适配信息包括机型信息和/或系统信息,在一个示例中,所述根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径,可以通过以下方式实现:根据所述权限开启请求,查询与所述目标权限及所述适配信息相匹配的权限跳转路径。其中,所述机型信息可以包括终端设备的品牌、型号等信息,所述系统信息可以包括终端设备中操作系统的版本等信息。通过上述实施方式,本申请实施方式可以适用于更多的终端设备和操作系统,满足各种终端设备的用户方便快捷开启系统权限的要求,提高用户体验和满意度。
结合前述实施方式的说明,所述查询与所述目标权限及所述适配信息相匹配的权限跳转路径,可以是在所述权限跳转路径数据库中查询与所述目标权限及所述适配信息相匹配的权限跳转路径,也可以是在所述配置文件中查询与所述目标权限及所述适配信息相匹配的权限跳转路径。
考虑到部分品牌的智能终端所采用的操作系统是在Android原生操作系统的基础上各自进行优化后得到的,彼此之间存在较多差异,但同一品牌的不同机型所采用的各个版本的操作系统之间差别较小,因此,在一个示例中,可以针对不同的手机品牌分别配置对应的配置文件,这样可以大幅降低单个配置文件中记载的信息量(相较于单个配置文件中记载多种品牌的权限跳转路径的方式),在实际应用中,仅需加载该品牌对应的配置文件,即可从中查询目标权限的权限跳转路径,可有效提高查询效率。
类似的,还可以针对不同的机型系列、机型或者操作系统版本分别配置对应的配置文件,相应的,在一些示例中,本步骤可以先加载与当前终端设备的机型系列、机型或者操作系统版本对应的配置文件,然后从所述配置文件中查询与所述目标权限相匹配的权限跳转路径,以上均为本申请实施例的合理变更实施方式,均在本申请的保护范围之内。
另外,需要说明的是,由于智能终端产品更新较快,对于部分机型或者操作系统版本,可能存在查找不到所述目标权限的权限跳转路径的情形,对于上述情形,在一些示例中,若查找不到所述目标权限的权限跳转路径的情形,则可以通过显示引导信息的方式,引导用户手动开启目标权限。此外,还可以进一步向服务器发送表示当前终端设备的适配信息缺少目标权限的权限跳转路径的警示信息,以使客户端的开发人员根据上述警示信息,能够及时补充对应于当前终端设备的适配信息的 目标权限的权限跳转路径,从而方便其他用户在后续使用该适配信息对应的终端设备时,客户端能够顺利查找到目标权限的权限跳转路径,并自动开启目标权限。
步骤S103:根据所述权限跳转路径跳转到所述目标权限的权限开启页面。
具体地,在部分机型中,可以根据所述权限跳转路径直接跳转到所述目标权限的权限开启页面,但对于另一部分机型,可能需要经过过渡页面才能跳转到目标权限的权限开启页面。
在一个示例中,为了适用于该另一部分机型,提高本申请的适用范围,在本申请实施例的一些变更实施方式中,所述根据所述权限跳转路径跳转到所述目标权限的权限开启页面,可以通过以下方式实现:判断所述权限跳转路径中是否包含过渡页面;若是,则根据所述权限跳转路径跳转到所述过渡页面,再由所述过渡页面跳转到所述目标权限的权限开启页面。
在一些实施方式中,所述过渡页面中设有跳转到目标权限的权限开启页面的触发控件,相应地,所述由过渡页面跳转到所述目标权限的权限开启页面,可以通过以下方式实现:利用权限开启辅助功能,在所述过渡页面中查找跳转到目标权限的权限开启页面的触发控件;以及,针对所述触发控件进行模拟点击操作,以跳转到所述目标权限的权限开启页面。
步骤S104:通过模拟操作在所述权限开启页面开启所述目标权限。
为了方便用户进行操作系统的管理、操控,现有技术中,大部分操作系统都提供了辅助功能以帮助用户实现对终端设备更便捷的操控,以Android系统为例,辅助功能(Accessibility Service)是Android系统提供的一种服务,本身是继承Service类的,这个服务提供了增强的用户界面,其初始是旨在帮助残障人士或者可能暂时无法与设备充分交互的人们,后来该服务被逐步扩展用来实现对终端设备的模拟操作、快捷操作等功能,其中,所述模拟操作是指由系统模拟用户的操作事件,从而实现自动化操作,例如模拟用户的查找、点击、拖动等操作,本申请实施例主要用到了该服务提供的两种模拟操作功能:查找界面元素和实现模拟点击。具体的,本申请实施例中,即可以利用操作系统提供的辅助功能提供的查找界面元素和模拟点击的功能,通过模拟操作在所述权限开启页面开启所述目标权限。
基于上述说明,在本申请实施例的一些实施方式中,在所述根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径之前,还可以包括:在操作系统中注册权限开启辅助功能,所述权限开启辅助功能包括用于辅助用户开启系统权限的辅助功能;相应地,所述通过模拟操作在所述权限开启页面开启所述目标权限, 可以通过以下方式实现:利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限。
考虑到辅助功能是可以开启和关闭的,且在日常生活中大多处于关闭状态,为了使用权限开启辅助功能实现本申请的目的,在本申请实施例的一些实施方式中,在根据所述权限开启请求查询与所述目标权限相匹配的权限跳转路径之前,还可以包括:判断权限开启辅助功能是否已开启;若否,则跳转到辅助功能开启界面,以及通过显示提示信息引导用户打开所述权限开启辅助功能。
其中,所述提示信息可以以文字、图片或者图文结合的形式展示。
基于上述说明,在本申请实施例的一些实施方式中,所述利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限,可以通过以下方式实现:利用权限开启辅助功能,在所述权限开启页面内查找与所述目标权限对应的权限开关;以及,针对所述权限开关进行模拟点击操作,以开启所述目标权限。
考虑到不同的操作系统、机型中,目标权限对应的权限开关在权限开启页面内的展示形式、位置可能不同,因此,在本申请实施例的一些实施方式中,所述在所述权限开启页面内查找与所述目标权限对应的权限开关,可以通过以下方式实现:根据适配信息在权限开启页面中查找目标权限的权限开关。
具体地,可以预先设置权限开关查找数据库,所述数据库中对应于不同的适配信息记载有各个系统权限的权限开关的位置和/或展示形式,基于此,即可根据适配信息在权限开启页面中查找目标权限的权限开关。
此外,所述在所述权限开启页面内查找与所述目标权限对应的权限开关,可以是根据目标权限的名称提取出关键字,然后通过关键字检索在所述权限开启页面内查找与所述目标权限对应的权限项,进而找到该权限项对应的权限开关(例如,权限开关一般设于权限项的右侧,可以根据样本数据或历史数据进行查找)。
通过上述实施方式,可以适用于各种机型、操作系统快速查找到目标权限的权限开关,可以有效减少用户查找权限开关的步骤,从而提高开启目标权限的效率和准确率。
考虑到,在部分机型或者操作系统中,在点击权限开启页面内的权限开关时,会弹出权限开启弹窗,以供用户在所述权限开启弹窗中开启系统权限,为了在上述情况下实现对目标权限的开启,在本申请实施例的一些变更实施方式中,所述针对所述权限开关进行模拟点击操作,以开启所述目标权限,可以通过以下方式实现:针对所述权限开关进行模拟点击操作;若设备响应于所述模拟点击操作弹出权限开 启弹窗,则在所述权限开启弹窗中查找所述目标权限对应的权限开关;针对所述权限开启弹窗中的所述权限开关进行模拟点击操作,以开启所述目标权限。
考虑到,在一些实际应用场景中,应用程序可能需要开启多个系统权限,为了实现对多个系统权限的批量开启,在本申请实施例的一些实施方式中,在所述获取针对目标权限的权限开启请求之前,还可以包括:提供权限开启列表,所述权限开启列表中设有多个待开启的系统权限;在监测到用户开启所述权限开启列表中的所有系统权限的操作后,生成针对所述权限开启列表中各个系统权限的权限开启请求;从所述权限开启列表中选择一个待开启的系统权限作为目标权限;相应地,在所述通过模拟操作在所述权限开启页面开启所述目标权限之后,还可以包括:判断所述权限开启列表中是否还有待开启的系统权限;若有,则从所述权限开启列表中选择下一个待开启的系统权限作为目标权限,跳转到所述获取针对目标权限的权限开启请求的步骤。
具体地,可以在所述权限开启列表的展示界面,提供一表示“一键开启”的按钮,当用户点击该按钮后,即可生成针对所述权限开启列表中各个系统权限的权限开启请求,此时,可以检测权限开启辅助功能是否开启,若未开启,可以跳转到“辅助权限”开启页面,并通过显示提示信息引导用户打开所述权限开启辅助功能,用户打开“权限开启辅助功能”后即可停止操作,程序根据目标权限的权限跳转路径自动跳转至目标权限的权限开启页面,然后,程序在权限开启页面根据关键字检索到目标权限对应的权限项的权限开关,模拟点击操作开启目标权限。
通过上述实施方式,可以针对权限开启列表中的各个待开启的系统权限分别执行步骤S101-S104,在用户授权的情况,点击一个“一键开启”按钮,即可自动帮用户开启软件所申请的多个系统权限,不需要用户一个一个地去点击开启,实现对多个系统权限的批量开启,可以方便用户开启重要权限,以便后续功能顺利触达用户,增加用户活跃的机会,给用户提供更多业务服务,可以大幅降低用户开启多个系统权限的操作复杂度,提高权限开启效率和准确性,进一步提升用户体验和提高用户满意度。
此外,为了使用户实时的了解系统权限的开关状态,在本申请实施例的一些实施方式中,还可以包括:在目标权限开启成功或开启失败后,在所述权限开启列表中显示所述目标权限当前的开关状态。通过上述实施方式,可以使用户实时的了解系统权限的开关状态,进一步提升用户体验,增强用户满意度。
以上,为本申请实施方式提供的一种述权限开启方法的示例性说明,本申请提 供的权限开启方法,通过查询目标权限的权限跳转路径即可自动跳转到目标权限的权限开启页面,且通过模拟操作即可自动完成目标权限的开启,从而实现系统权限的方便快捷的自动化开启,相较于现有技术,不需要用户根据引导信息手动操作进行系统权限的开启,可以有效简化系统权限开启的人工操作,提高系统权限的开启效率,更加方便快捷。
下面结合图3至图6对本申请的方案做进一步说明。图3至图6给出了对应于不同类型手机的权限开启方法的具体实施例,与图2所示方法相同或相似的内容,可以参照上述图2对应的实施例说明进行理解,部分内容不再赘述,下面结合附图分别进行简要说明。
具体实施例一:
请参考图3,其示出了本申请实施方式所提供的具体实施例一对应的权限开启方法的流程图,所述权限开启方法可用于对一个系统权限进行开启或对多个系统权限批量进行开启,其适用于A型手机,A型手机的权限开启方式具有以下特征:
a)可以直接跳转至权限开启页面,不受手机系统约束;
b)权限开启方式简单,开启时不会出现弹窗干扰。
如图3所示,所述权限开启方法包括以下步骤S201至S210:
步骤S201:获取权限开启列表,所述权限开启列表中设有多个待开启的系统权限;
步骤S202:判断权限开启辅助功能是否开启,若否,跳转到步骤S203,若是,跳转到步骤S204;
步骤S203:跳转至辅助功能页面,引导用户开启权限开启辅助功能;
步骤S204:从需要开启的权限列表中取出一个待开启的权限作为目标权限;
步骤S205:查询与所述目标权限及手机的适配信息相匹配的权限跳转路径;
步骤S206:根据所述权限跳转路径跳转到所述目标权限的权限开启页面;
步骤S207:根据手机的适配信息型号在权限开启页面中找到目标权限的权限开关;
步骤S208:针对所述权限开关进行模拟点击操作,以开启所述目标权限;
步骤S209:检查权限开启列表中是否存在待开启的系统权限,若有,则跳转到步骤S204,若无,跳转到步骤S210。
步骤S210:流程结束。
具体实施例二:
请参考图4,其示出了本申请实施方式所提供的具体实施例二对应的权限开启方法的流程图,所述权限开启方法可用于对一个系统权限进行开启或对多个系统权限批量进行开启,其适用于B型手机,B型手机的权限开启方式具有以下特征:
a)受手机系统约束,不能直接跳转至权限开启页面,需要先跳转至一个或多个中间过渡页面,再从过渡页面跳转至权限开启页面;
b)权限开启方式简单,开启时不会出现弹窗干扰。
如图4所示,本具体实施例二与图3所示的具体实施例一相同或相似的内容可以参考图3中的详细描述,此处不再赘述,仅对不同之处进行说明。图4所示具体实施例二中,步骤S201至步骤S205以及步骤207至步骤210可以参考图3中的详细描述,本具体实施例二与图3所示的具体实施例一的不同之处在于,由于B型手机受手机系统约束,不能直接跳转至权限开启页面,因此,采用步骤S211和步骤S212替代具体实施例一中的步骤S206,即可先根据所述权限跳转路径跳转到过渡页面,再由过渡页面跳转到所述目标权限的权限开启页面。
具体实施例三:
请参考图5,其示出了本申请实施方式所提供的具体实施例三对应的权限开启方法的流程图,所述权限开启方法可用于对一个系统权限进行开启或对多个系统权限批量进行开启,其适用于C型手机,C型手机的权限开启方式具有以下特征:
a)可以直接跳转至权限开启页面,不受手机系统约束;
b)权限开启过程会出现弹窗干扰。
如图5所示,本具体实施例三与图3所示的具体实施例一相同或相似的内容可以参考图3中的详细描述,此处不再赘述,仅对不同之处进行说明。图5所示具体实施例三中,步骤S201至步骤S207以及步骤209至步骤210可以参考图3中的详细描述,本具体实施例三与图3所示的具体实施例一的不同之处在于,由于C型手机的权限开启过程会出现弹窗干扰,因此,采用步骤S213和步骤S214替代具体实施例一中的步骤S208,即可在针对所述权限开关进行模拟点击操作,当设备弹出权限开启弹窗后,再在弹出的权限开启弹窗中查询权限开关并进行模拟点击操作,以开启目标权限。
具体实施例四:
请参考图6,其示出了本申请实施方式所提供的具体实施例四对应的权限开启方法的流程图,所述权限开启方法可用于对一个系统权限进行开启或对多个系统权限批量进行开启,其适用于D型手机,D型手机的权限开启方式具有以下特征:
a)可以直接跳转至权限开启页面,不受手机系统约束;
b)权限开启过程会出现弹窗干扰。
如图6所示,本具体实施例四与图3所示的具体实施例一相同或相似的内容可以参考图3中的详细描述,此处不再赘述,仅对不同之处进行说明。图6所示具体实施例四中,步骤S201至步骤S205、步骤207以及步骤209至步骤210可以参考图3中的详细描述,本具体实施例四与图3所示的具体实施例一的不同之处在于,由于D型手机受手机系统约束,不能直接跳转至权限开启页面,且权限开启过程会出现弹窗干扰,因此,采用步骤S211和步骤S212替代具体实施例一中的步骤S206,即可先根据所述权限跳转路径跳转到过渡页面,再由过渡页面跳转到所述目标权限的权限开启页面,另外,采用步骤S213和步骤S214替代具体实施例一中的步骤S208,即可在针对所述权限开关进行模拟点击操作,当设备弹出权限开启弹窗后,再在弹出的权限开启弹窗中查询权限开关并进行模拟点击操作,以开启目标权限。
在上述的实施例中,提供了一种权限开启方法,与之相对应的,本申请还提供一种权限开启装置。本申请实施例提供的权限开启装置可以实施上述图2至图6所示的方法,该权限开启装置可以通过软件、硬件或软硬结合的方式来实现。例如,该权限开启装置可以包括集成的或分开的功能模块或单元来执行上述各方法中的对应步骤。请参考图7,其为本申请实施方式所提供的一种权限开启装置的示意图。由于装置实施例基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。下述描述的装置实施例仅仅是示意性的。
如图7所示,本申请实施例提供的一种权限开启装置2,包括:
权限请求获取模块21,用于获取针对目标权限的权限开启请求;
跳转路径查询模块22,用于根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径;
页面跳转模块23,用于根据所述权限跳转路径跳转到所述目标权限的权限开启页面;
模拟开启模块24,用于通过模拟操作在所述权限开启页面开启所述目标权限。
在本申请实施例提供的一个变更实施方式中,所述权限开启请求携带有适配信息,所述适配信息包括机型信息和/或系统信息;
所述跳转路径查询模块22,包括:
跳转路径查询单元,用于根据所述权限开启请求,查询与所述目标权限及所述 适配信息相匹配的权限跳转路径。
在本申请实施例提供的另一个变更实施方式中,所述页面跳转模块23,包括:
过渡页面判断单元,用于判断所述权限跳转路径中是否包含过渡页面;
过渡跳转单元,用于若是,则根据所述权限跳转路径跳转到所述过渡页面,再由所述过渡页面跳转到所述目标权限的权限开启页面。
在本申请实施例提供的再一个变更实施方式中,所述权限开启装置2,还包括:
权限列表提供模块,用于提供权限开启列表,所述权限开启列表中设有多个待开启的系统权限;
开启请求生成模块,用于在监测到用户开启所述权限开启列表中的所有系统权限的操作后,生成针对所述权限开启列表中各个系统权限的权限开启请求;
目标权限选取模块,用于从所述权限开启列表中选择一个待开启的系统权限作为目标权限;
未开启权限检测模块,用于判断所述权限开启列表中是否还有待开启的系统权限;
目标权限重选模块,用于若有,则从所述权限开启列表中选择下一个待开启的系统权限作为目标权限,跳转到所述获取针对目标权限的权限开启请求的步骤。
在本申请实施例提供的又一个变更实施方式中,所述权限开启装置2,还包括:
辅助功能注册模块,用于在操作系统中注册权限开启辅助功能,所述权限开启辅助功能包括用于辅助用户开启系统权限的辅助功能;
所述模拟开启模块24,包括:
辅助功能模拟操作单元,用于利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限。
在本申请实施例提供的又一个变更实施方式中,所述权限开启装置2,还包括:
辅助功能检测模块,用于判断权限开启辅助功能是否已开启;
辅助功能开启模块,用于若否,则跳转到辅助功能开启界面,以及通过显示提示信息引导用户打开所述权限开启辅助功能。
在本申请实施例提供的又一个变更实施方式中,所述辅助功能模拟操作单元,包括:
权限开关查找子单元,用于利用权限开启辅助功能,在所述权限开启页面内查找与所述目标权限对应的权限开关;以及,
模拟点击子单元,用于针对所述权限开关进行模拟点击操作,以开启所述目标 权限。
在本申请实施例提供的又一个变更实施方式中,所述模拟点击子单元,包括:
页面开关点击子单元,用于针对所述权限开关进行模拟点击操作;
弹窗开关查找子单元,用于若设备响应于所述模拟点击操作弹出权限开启弹窗,则在所述权限开启弹窗中查找所述目标权限对应的权限开关;
弹窗开关点击子单元,用于针对所述权限开启弹窗中的所述权限开关进行模拟点击操作,以开启所述目标权限。
本申请实施例提供的权限开启装置2,与本申请前述实施例提供的权限开启方法出于相同的发明构思,具有相同的有益效果。
在上述的实施例中,提供了一种权限开启方法及装置,与之相对应的,本申请还提供一种终端设备,所述终端设备可以是任何具有数据处理能力的计算设备,例如手机、笔记本电脑、平板电脑等移动终端,又如车载导航、虚拟现实(VR)设备、增强现实(AR)设备等。所述终端设备可以采用Android操作系统,也可以采用iOS操作系统等。请参考图8,图8为本申请实施例提供的一种终端设备的示意图。如图8所示,所述终端设备3包括:处理器30,存储器31,总线32和通信接口33,所述处理器30、通信接口33和存储器31通过总线32连接;所述存储器31中存储有可在所述处理器30上运行的计算机程序,所述处理器30运行所述计算机程序时执行本申请提供的权限开启方法。
其中,存储器31可能包含高速随机存取存储器(RAM:Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。通过至少一个通信接口33(可以是有线或者无线)实现该系统网元与至少一个其他网元之间的通信连接,可以使用互联网、广域网、本地网、城域网等。
总线32可以是ISA总线、PCI总线或EISA总线等。所述总线可以分为地址总线、数据总线、控制总线等。其中,存储器31用于存储程序,所述处理器30在接收到执行指令后,执行所述程序,前述本申请实施例任一实施方式揭示的所述权限开启方法可以应用于处理器30中,或者由处理器30实现。
处理器30可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器30中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器30可以是通用处理器,包括中央处理器(Central Processing  Unit,简称CPU)、网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(DSP)、专用集成电路(ASIC)、现成可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器31,处理器30读取存储器31中的信息,结合其硬件完成上述方法的步骤。
本申请实施例提供的终端设备与本申请实施例提供的权限开启方法出于相同的发明构思,具有相同的有益效果。
需要说明的是,附图中的流程图和框图显示了根据本申请的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,又例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些通信接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上各实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述各实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围,其均应涵盖在本申请的权利要求和说明书的范围当中。

Claims (11)

  1. 一种权限开启方法,其特征在于,包括:
    获取针对目标权限的权限开启请求;
    根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径;
    根据所述权限跳转路径跳转到所述目标权限的权限开启页面;
    通过模拟操作在所述权限开启页面开启所述目标权限。
  2. 根据权利要求1所述的权限开启方法,其特征在于,所述权限开启请求携带有适配信息,所述适配信息包括机型信息和/或系统信息;
    所述根据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径,包括:
    根据所述权限开启请求,查询与所述目标权限及所述适配信息相匹配的权限跳转路径。
  3. 根据权利要求1或2所述的权限开启方法,其特征在于,所述根据所述权限跳转路径跳转到所述目标权限的权限开启页面,包括:
    判断所述权限跳转路径中是否包含过渡页面;
    若是,则根据所述权限跳转路径跳转到所述过渡页面,再由所述过渡页面跳转到所述目标权限的权限开启页面。
  4. 根据权利要求1至3中任一项所述的权限开启方法,其特征在于,在所述获取针对目标权限的权限开启请求之前,还包括:
    提供权限开启列表,所述权限开启列表中设有多个待开启的系统权限;
    在监测到用户开启所述权限开启列表中的所有系统权限的操作后,生成针对所述权限开启列表中各个系统权限的权限开启请求;
    从所述权限开启列表中选择一个待开启的系统权限作为目标权限。
  5. 根据权利要求4所述的权限开启方法,其特征在于,在所述通过模拟操作在所述权限开启页面开启所述目标权限之后,还包括:
    判断所述权限开启列表中是否还有待开启的系统权限;
    若有,则从所述权限开启列表中选择下一个待开启的系统权限作为目标权限,跳转到所述获取针对目标权限的权限开启请求的步骤。
  6. 根据权利要求1至3中任一项所述的权限开启方法,其特征在于,在所述根 据所述权限开启请求,查询与所述目标权限相匹配的权限跳转路径之前,还包括:
    在操作系统中注册权限开启辅助功能,所述权限开启辅助功能包括用于辅助用户开启系统权限的辅助功能;
    所述通过模拟操作在所述权限开启页面开启所述目标权限,包括:
    利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限。
  7. 根据权利要求6所述的权限开启方法,其特征在于,在根据所述权限开启请求查询与所述目标权限相匹配的权限跳转路径之前,还包括:
    判断权限开启辅助功能是否已开启;
    若否,则跳转到辅助功能开启界面,以及通过显示提示信息引导用户打开所述权限开启辅助功能。
  8. 根据权利要求6或7所述的权限开启方法,其特征在于,所述利用权限开启辅助功能进行模拟操作,以在所述权限开启页面开启所述目标权限,包括:
    利用权限开启辅助功能,在所述权限开启页面内查找与所述目标权限对应的权限开关;以及,
    针对所述权限开关进行模拟点击操作,以开启所述目标权限。
  9. 根据权利要求8所述的权限开启方法,其特征在于,所述针对所述权限开关进行模拟点击操作,以开启所述目标权限,包括:
    针对所述权限开关进行模拟点击操作;
    若设备响应于所述模拟点击操作弹出权限开启弹窗,则在所述权限开启弹窗中查找所述目标权限对应的权限开关;
    针对所述权限开启弹窗中的所述权限开关进行模拟点击操作,以开启所述目标权限。
  10. 一种终端设备,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,所述处理器运行所述计算机程序时执行权利要求1-9任一项所述的权限开启方法。
  11. 一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现如权利要求1至9中任一项所述的方法。
PCT/CN2019/089471 2018-05-31 2019-05-31 权限开启方法、终端设备及计算机可读介质 WO2019228492A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810549385.5 2018-05-31
CN201810549385.5A CN108875354A (zh) 2018-05-31 2018-05-31 权限开启方法、终端设备及计算机可读介质

Publications (1)

Publication Number Publication Date
WO2019228492A1 true WO2019228492A1 (zh) 2019-12-05

Family

ID=64336230

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/089471 WO2019228492A1 (zh) 2018-05-31 2019-05-31 权限开启方法、终端设备及计算机可读介质

Country Status (2)

Country Link
CN (1) CN108875354A (zh)
WO (1) WO2019228492A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875354A (zh) * 2018-05-31 2018-11-23 上海连尚网络科技有限公司 权限开启方法、终端设备及计算机可读介质
CN109657453B (zh) * 2018-11-29 2022-02-25 拉扎斯网络科技(上海)有限公司 权限设置方法、装置、移动终端和计算机可读存储介质
CN110619195B (zh) * 2018-12-25 2021-07-06 北京时光荏苒科技有限公司 一种权限申请处理方法、装置、设备及存储介质
CN109858200A (zh) * 2018-12-25 2019-06-07 北京奇安信科技有限公司 一种优化软件激活的处理方法及终端
CN109697356B (zh) * 2018-12-27 2021-07-23 北京金山安全软件有限公司 应用软件权限适配方法及装置
CN110780944B (zh) * 2019-10-22 2023-08-29 上海掌门科技有限公司 一种应用权限的启动方法、设备及机器可读存储介质
CN113034165B (zh) * 2019-12-09 2023-10-31 腾讯科技(深圳)有限公司 数据处理方法和装置、存储介质及电子装置
CN112084488A (zh) * 2020-08-27 2020-12-15 广州新视展投资咨询有限公司 应用权限管理方法、装置及系统
CN116150794B (zh) * 2023-04-14 2023-07-04 深圳依时货拉拉科技有限公司 权限处理方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106228063A (zh) * 2016-07-27 2016-12-14 北京金山安全软件有限公司 辅助功能权限操控方法、装置及终端设备
CN106599680A (zh) * 2016-12-22 2017-04-26 北京猎豹移动科技有限公司 一种设置应用程序权限的方法、装置及电子设备
CN107943531A (zh) * 2017-11-03 2018-04-20 珠海市君天电子科技有限公司 一种权限控制方法、用户终端、电子设备以及存储介质
CN108875354A (zh) * 2018-05-31 2018-11-23 上海连尚网络科技有限公司 权限开启方法、终端设备及计算机可读介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335132B (zh) * 2014-06-13 2020-03-24 阿里巴巴集团控股有限公司 一种自定义应用程序功能的方法、装置以及系统
CN105354489B (zh) * 2015-10-29 2019-05-10 小米科技有限责任公司 权限授予方法及装置
CN106778117B (zh) * 2016-09-18 2019-04-30 腾讯科技(深圳)有限公司 权限开启方法、装置及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106228063A (zh) * 2016-07-27 2016-12-14 北京金山安全软件有限公司 辅助功能权限操控方法、装置及终端设备
CN106599680A (zh) * 2016-12-22 2017-04-26 北京猎豹移动科技有限公司 一种设置应用程序权限的方法、装置及电子设备
CN107943531A (zh) * 2017-11-03 2018-04-20 珠海市君天电子科技有限公司 一种权限控制方法、用户终端、电子设备以及存储介质
CN108875354A (zh) * 2018-05-31 2018-11-23 上海连尚网络科技有限公司 权限开启方法、终端设备及计算机可读介质

Also Published As

Publication number Publication date
CN108875354A (zh) 2018-11-23

Similar Documents

Publication Publication Date Title
WO2019228492A1 (zh) 权限开启方法、终端设备及计算机可读介质
TWI790443B (zh) 用於機器學習模型建立之技術
US10789078B2 (en) Method and system for inputting information
US10120876B2 (en) Unguided application crawling architecture
WO2019214336A1 (zh) 一种内容推送方法、装置及机器可读存储介质
US20180232438A1 (en) Title display method and apparatus
US9443017B2 (en) System and method for displaying search results
US20160342449A1 (en) Data exchange across multiple computing devices through a proactive intelligent clipboard
US20240143904A1 (en) Human-Computer Interaction Method And Apparatus Thereof
CN107133165B (zh) 浏览器兼容性检测方法及装置
US11356498B2 (en) Method and a device for sharing a hosted application
CN112487150B (zh) 档案管理方法、系统、存储介质及电子设备
CN109284321B (zh) 数据加载方法、装置、计算设备和计算机可读存储介质
CN109343926A (zh) 应用程序图标的显示方法、装置、终端和存储介质
WO2016146004A1 (zh) 一种信息查找、标识方法及其装置
US10175958B2 (en) Acquiring identification of an application lifecycle management entity associated with similar code
US20180137281A1 (en) Software analysis system, software analysis method, and software analysis program
CN107257971B (zh) 用于从相关应用提供数据的情境敏感框架
CN110489032B (zh) 用于电子书的词典查询方法及电子设备
CN113434063A (zh) 一种信息显示方法、装置及设备
US11657093B1 (en) Systems and methods for producing message search recommendations
US20180025359A1 (en) Customer journey optimized pre-fetching
JP2014130546A (ja) ファイル管理プログラム、ファイル管理装置およびファイル管理方法
CN112241461B (zh) 一种用于生成书籍的人物关系图的方法与设备
CN111142735B (zh) 一种软件页面的创建方法、装置、终端设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19810615

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19/03/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19810615

Country of ref document: EP

Kind code of ref document: A1