WO2020024793A1 - 一种信息处理方法、终端和计算机可读存储介质 - Google Patents

一种信息处理方法、终端和计算机可读存储介质 Download PDF

Info

Publication number
WO2020024793A1
WO2020024793A1 PCT/CN2019/096240 CN2019096240W WO2020024793A1 WO 2020024793 A1 WO2020024793 A1 WO 2020024793A1 CN 2019096240 W CN2019096240 W CN 2019096240W WO 2020024793 A1 WO2020024793 A1 WO 2020024793A1
Authority
WO
WIPO (PCT)
Prior art keywords
permission
information
authority
application
operation instruction
Prior art date
Application number
PCT/CN2019/096240
Other languages
English (en)
French (fr)
Inventor
丁乐乐
郑小红
陈瑜
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2020024793A1 publication Critical patent/WO2020024793A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Definitions

  • the present invention relates to the field of electronic technology, and in particular, to an information processing method, a terminal, and a computer-readable storage medium.
  • embodiments of the present invention provide an information processing method, a terminal, and a computer-readable storage medium, which solves the problem of exposing individual privacy with unnecessary permissions, and guarantees user data security.
  • An embodiment of the present invention provides an information processing method, including:
  • the authority information includes: necessary authority information and non-essential authority information;
  • the method After obtaining the permission information required by the installed application, the method includes:
  • the necessary authority information and the non-essential authority information are arranged and displayed on the display interface in different display formats.
  • the receiving an operation instruction on the permission information and identifying the permission information according to the operation instruction includes:
  • the display interface includes: a first region, a second region, and a third region; wherein the first region displays the necessary authority information and the necessary authority arranged in different display formats.
  • Non-essential permission information
  • the receiving an operation instruction on the authority information and identifying the authority information according to the operation instruction includes:
  • the method includes:
  • the returning the data instructed by the permission call instruction to the application according to the identifier of the target permission indicated by the permission call instruction includes:
  • the identification bit corresponding to the target authority is the second identification bit, obtaining the format of the target data, simulating and generating false data with the same format as the target data according to the format of the target data, and returning the False data to the application.
  • the method further includes:
  • An embodiment of the present invention provides a terminal, where the terminal includes:
  • An installation and operation module configured to obtain permission information required by the installed application during the process of installing the application
  • a permission management module configured to receive an operation instruction on the permission information; and further configured to identify the permission information according to the operation instruction, and the identifier is used to distinguish necessary permission information from non-essential permission information;
  • the authority processing module is configured to return the data instructed by the authority calling instruction to the application according to the identifier of the target authority indicated by the authority calling instruction during the use of the application.
  • the authority information includes: necessary authority information and non-essential authority information;
  • the authority management module is further configured to arrange and display the necessary authority information and the unnecessary authority information in different display formats on a display interface.
  • An embodiment of the present invention provides a computer-readable storage medium.
  • the computer-readable storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to implement any one of the foregoing. Steps of the information processing method described in the item.
  • FIG. 1 is a schematic flowchart of an information processing method according to an embodiment of the present invention
  • FIG. 2 is a first example of displaying permission information according to an embodiment of the present invention
  • FIG. 3 is a second example of displaying permission information according to an embodiment of the present invention.
  • FIG. 4 is a third example of displaying permission information according to an embodiment of the present invention.
  • FIG. 5 is a fourth example of displaying permission information according to an embodiment of the present invention.
  • FIG. 6 is a diagram illustrating an example of a rights management process according to an embodiment of the present invention.
  • FIG. 7 is a diagram of an example of data transmission provided by an embodiment of the present invention.
  • FIG. 8 is a first schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 9 is a second schematic structural diagram of a terminal according to an embodiment of the present invention.
  • An embodiment of the present invention provides an information processing method. As shown in FIG. 1, the method may include:
  • Step 101 In the process of installing an application, obtain permission information required by the installed application.
  • the authority information includes necessary authority information and non-essential authority information.
  • the method provided by the embodiment of the present invention is executed by a terminal.
  • the terminal obtains permission information required by the installed application.
  • the terminal may be an electronic device capable of installing applications, such as a mobile phone, a tablet computer, and the like.
  • the terminal may include a central processing module, an installation and operation module, a permission processing module, and a permission management module.
  • the permission management module is mainly used to manage the permissions for installing applications.
  • the authority processing module mainly processes related data according to the flag bits in the authority management module.
  • the central processing module is used for data exchange.
  • the method includes:
  • the necessary authority information and the non-essential authority information are arranged and displayed on the display interface in different display formats.
  • the terminal obtains all the permission information required by the application installation itself, and displays all the permission information required by the application installation itself on the display interface, as shown in FIG. 2.
  • the non-essential permission information can be arranged and displayed in different display formats.
  • the different display formats here can be different display frames, different display frame backgrounds, or different display fonts.
  • the display in different formats is for the user to be obvious. From the display interface, you can see which are necessary permissions and which are non-essential permissions. Therefore, you can identify the necessary permissions and non-essential permissions.
  • the permissions required by the application are listed on the current display interface, respectively, and the permission management module is called for management.
  • Step 102 Receive an operation instruction on the authority information, and identify the authority information according to the operation instruction.
  • the identifier is used to distinguish necessary authority information and non-essential authority information.
  • the receiving an operation instruction on the permission information and identifying the permission information according to the operation instruction includes:
  • the terminal display interface displays all the permissions required by the application, and the user can indicate that it is a necessary permission by sliding the file management permission to the left. This operation will also increase this permission. An additional flag is 1. The user can also slide the microphone right to indicate that it is an unnecessary permission. This operation will also add an additional flag to 0 for this permission. What needs to be explained here is that although these two operations will distinguish the nature of different permissions, there is no difference between the upper-level applications. The application that plays online videos still gets all the permissions it needs.
  • the display interface includes: a first region, a second region, and a third region; wherein the first region displays the necessary authority information and the necessary authority arranged in different display formats.
  • Non-essential permission information
  • the receiving an operation instruction on the authority information and identifying the authority information according to the operation instruction includes:
  • the method includes:
  • the terminal's permission management module will manage the permissions listed in the installation and operation module, and mark some necessary permissions with a background color, indicating that the required permissions of the application are real permissions, as shown in Figure 3, and will Set the corresponding flag bit to 1; other non-essential permissions are not marked with the background color, indicating that the permissions can be ignored, that is, virtual permissions, and the corresponding flag bit is set to 0.
  • the user can slide the permissions of the current interface left and right to fall into different areas on the left and right sides, as shown in FIG. 4, the left area is the necessary permission information area, and the right area is the non-essential permission information area.
  • the permissions in the two areas can also be dragged to each other, as shown in Figure 5.
  • the rights management module will also appear in the settings of the terminal device. Click on Settings-Rights Management Module to display some applications currently installed by the method provided by the embodiment of the present invention, and click on the corresponding application to appear as shown in Figure 5.
  • the interface shown here can be adjusted by dragging left and right.
  • the permission management module only manages the corresponding permissions, and divides the real permissions and virtual permissions, but it still has all permissions for the application itself. This is not to directly close a permission directly to the application.
  • the operations for processing permissions are in the permissions processing module. It should be noted that this module will generate a database of related permissions and permission flags. Each application app corresponds to a database, which corresponds to different flags of different permissions for the permission processing module to call.
  • Step 103 In the process of using the application, according to the identifier of the target authority indicated by the authority calling instruction, return the data instructed by the authority calling instruction to the application.
  • the permission management process in the specific application installation process After the corresponding permissions are configured, the installation and operation module of the terminal installs and runs related applications. There is no difference between the installation process and normal installation. The permissions required by the application are all there, and the related permissions are not deleted.
  • an instruction instruction is invoked according to the permission
  • the identification of the target permission and returning the data instructed by the permission call instruction to the application includes:
  • the identification bit corresponding to the target authority is the second identification bit, obtaining the format of the target data, simulating and generating false data with the same format as the target data according to the format of the target data, and returning the False data to the application.
  • the application wants to use the permission of the microphone, but since the user adds an additional flag bit to the microphone permission when the application is installed, the underlying data will be based on The previous permission flag judges that if the permission is virtual, that is, non-essential permission information, it returns a correctly used value to the upper layer, indicating that the application has correctly called the microphone, but it actually simulates a false transmission based on the data format obtained.
  • the previous permission flag judges that if the permission is virtual, that is, non-essential permission information, it returns a correctly used value to the upper layer, indicating that the application has correctly called the microphone, but it actually simulates a false transmission based on the data format obtained.
  • the terminal's permission processing module will call up some permissions in the virtual permissions through the central processing module to set specific operations for them.
  • the application calls related permissions, there are three input parameters of the permission processing module. One is which application apk is using the permission, that is, the user of the permission, the second is which permission is used, and the third is This is the data obtained by this permission.
  • the format of the false data is the same as the real data, but the specific information contained in the false data is different from the real data. This can not only ensure the normal operation of the application, but also prevent the leakage of user data and lead to the exposure of privacy.
  • the exemplary specific module diagram shown in Figure 7 has the advantage of integrating the hal layer interface, and the hal data is uniformly handed over to the permission processing module for processing. At the same time, the users with permissions are also entered, which ensures that The data processing will not be messy, and the data of A will not be transmitted to B.
  • the method further includes:
  • the terminal's permission management module provides related permission changing functions, and the permission management module will also interact with the application program to obtain which permissions must be set currently. Set as real permissions to remind users not to make mistakes.
  • the permissions obtained are not changed, but when it is actually used, it will go through the terminal's permission management module to operate to specific permissions, and the permission processing module will also access a certain permission as normal.
  • the same permissions are used to access, but when processing virtual permissions, it will simulate a set of virtual data to the application through the obtained data to ensure its normal operation.
  • a certain application that plays a video requires microphone permissions during installation.
  • the terminal's permission management module will access the microphone and use the obtained data
  • the format simulates the virtual data returned to the application that plays the video.
  • the method provided by the embodiment of the present invention identifies necessary permission information and non-essential permission information of an application, so that when an application invokes permission, different permission information can be identified according to the identifier, and corresponding data is fed back according to different permissions.
  • related applications there is no need to worry about user privacy exposure, thereby avoiding unnecessary privileges from exposing personal privacy and ensuring the security of user data.
  • An embodiment of the present invention further provides a terminal. As shown in FIG. 8, the terminal includes:
  • the installation and operation module 201 is configured to obtain permission information required by the installed application during an application installation process
  • the authority management module 202 is configured to receive an operation instruction on the authority information; and is further configured to identify the authority information according to the operation instruction, and the identifier is used to distinguish necessary authority information from non-essential authority information;
  • the authority processing module 203 is configured to return the data instructed by the authority invocation instruction to the application according to the identifier of the target authority indicated in the authority invocation instruction during the use of the application.
  • the authority information includes: necessary authority information and non-essential authority information;
  • the terminal further includes: the authority management module 202, configured to arrange and display the necessary authority information and the unnecessary authority information in different display formats on a display interface.
  • the authority management module 202 is specifically configured to:
  • the display interface includes: a first region, a second region, and a third region; wherein the first region displays the necessary permission information and the unnecessary permission information arranged in different display formats. ;
  • the authority management module 202 is specifically configured to:
  • the terminal further includes: a permission processing module 203, further configured to generate a database corresponding to the application according to the permission information and an identification bit corresponding to the permission information.
  • a permission processing module 203 further configured to generate a database corresponding to the application according to the permission information and an identification bit corresponding to the permission information.
  • the terminal further includes:
  • the central processing module 204 is configured to call the target permission indicated by the permission call instruction when the permission call instruction is received during the use of the application, and call the target permission indicated by the permission call instruction based on the target permission.
  • the permission processing module 203 is configured to obtain an identification bit corresponding to the target permission in a database corresponding to the application that sends the permission invocation instruction; and is also used when the identification bit corresponding to the target permission is the first identification bit Returning the target data to the application; and further configured to obtain a format of the target data when an identification bit corresponding to the target permission is the second identification bit, and simulate generating and False data with the same format as the target data is returned to the application.
  • the permission management module 202 is further configured to receive a modification operation instruction for the permission information, and modify an identification bit of the permission information according to the modification operation instruction.
  • the terminal provided by the embodiment of the present invention identifies the necessary permission information and non-essential permission information of the application, so that when the application invokes the permission, it can identify different permission information according to the identifier, and feedback corresponding data according to different permissions.
  • the application invokes the permission, it can identify different permission information according to the identifier, and feedback corresponding data according to different permissions.
  • An embodiment of the present invention further provides a terminal 30.
  • the terminal 30 includes a processor 301 and a memory 302;
  • the memory 302 is configured to store a computer program capable of running on the processor
  • the processor 301 is configured to execute the steps of the information processing method described above when the computer program is run.
  • the memory 302 may be a volatile memory or a non-volatile memory, and may also include both volatile and non-volatile memories.
  • the non-volatile memory may be a read-only memory (ROM, Read Only Memory), a programmable read-only memory (PROM, Programmable Read-Only Memory), or an erasable programmable read-only memory (EPROM, Erasable Programmable Read- Only Memory), Electrically Erasable and Programmable Read-Only Memory (EEPROM), Magnetic Random Access Memory (FRAM, ferromagnetic random access memory), Flash Memory (Flash Memory), Magnetic Surface Memory , Compact disc, or read-only compact disc (CD-ROM, Compact Disc-Read-Only Memory); the magnetic surface memory can be a disk memory or a tape memory.
  • the volatile memory may be random access memory (RAM, Random Access Memory), which is used as an external cache.
  • RAM random access memory
  • RAM Random Access Memory
  • many forms of RAM are available, such as Static Random Access Memory (SRAM, Static Random Access Memory), Synchronous Static Random Access Memory (SSRAM, Static Random Access, Memory), Dynamic Random Access DRAM (Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM, Double Data Rate Synchronous Dynamic Random Access Memory), enhanced Type Synchronous Dynamic Random Access Memory (ESDRAM, Enhanced Random Dynamic Access Memory), Synchronous Link Dynamic Random Access Memory (SLDRAM, SyncLink Dynamic Random Access Memory), Direct Memory Bus Random Access Memory (DRRAM, Direct Rambus Random Access Memory) ).
  • the memory 302 described in the embodiments of the present invention is intended to include, but is not limited to, these and any other suitable types of memory.
  • the method disclosed in the foregoing embodiment of the present invention may be applied to the processor 301, or implemented by the processor 301.
  • the processor 301 may be an integrated circuit chip, which has a signal processing capability, and more specifically, has an information processing algorithm built in, that is, has an information processing capability. In the implementation process, each step of the above method may be completed by using hardware integrated logic circuits or instructions in the form of software in the processor 301.
  • the above processor 301 may be a general-purpose processor, a digital signal processor (DSP, Digital Signal Processor), or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like.
  • DSP Digital Signal Processor
  • the processor 301 may implement or execute various methods, steps, and logic block diagrams disclosed in the embodiments of the present invention.
  • a general-purpose processor may be a microprocessor or any conventional processor.
  • the steps of the method disclosed in combination with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or may be performed by using a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a storage medium.
  • the storage medium is located in the memory 302.
  • the processor 301 reads the information in the memory 302 and completes the steps of the foregoing method in combination with its hardware.
  • the terminal may be implemented by one or more application specific integrated circuits (ASIC, Application Specific Integrated Circuit), DSP, programmable logic device (PLD, Programmable Logic Device), complex programmable logic device (CPLD, Complex) Programmable (Logic, Device), Field Programmable Gate Array (FPGA, Field-Programmable Gate Array), general-purpose processor, controller, microcontroller (MCU, Micro Controller), microprocessor (Microprocessor), or other electronic components For performing the aforementioned method.
  • ASIC Application Specific Integrated Circuit
  • DSP programmable logic device
  • PLD Programmable Logic Device
  • CPLD Complex programmable logic device
  • FPGA Field Programmable Gate Array
  • MCU microcontroller
  • Microprocessor Microprocessor
  • an embodiment of the present invention further provides a storage medium, which may specifically be a computer-readable storage medium, such as a memory including a computer program, and the computer program may be executed by a processor of a terminal to complete the foregoing method. Mentioned steps.
  • the computer-readable storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface memory, optical disk, or CD-ROM.
  • An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores one or more programs, and the one or more programs can be executed by one or more processors to implement the above tasks. Steps of an information processing method.
  • An embodiment of the present invention provides an information processing method, a terminal, and a computer-readable storage medium.
  • obtaining permission information required by the installed application obtaining permission information required by the installed application; receiving an operation instruction for the permission information, and The operation instruction identifies the authority information, and the identifier is used to distinguish necessary authority information from non-essential authority information.
  • the authority is returned according to the identifier of the target authority indicated by the authority call instruction, and the authority is returned.
  • the call instruction instructs the application to call the data.
  • the information processing method, the terminal, and the computer-readable storage medium provided by the embodiments of the present invention identify the necessary permission information and non-essential permission information of the application, so that when the application calls the permission, different permission information can be identified according to the identifier, avoiding Unnecessary permissions expose personal privacy and protect user data security.
  • the embodiments of the present invention may be provided as a method, a system, or a computer program product. Therefore, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, magnetic disk memory, optical memory, etc.) containing computer-usable program code.
  • a computer-usable storage media including, but not limited to, magnetic disk memory, optical memory, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing device to work in a particular manner such that the instructions stored in the computer-readable memory produce a manufactured article including an instruction device, the instructions
  • the device implements the functions specified in one or more flowcharts and / or one or more blocks of the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of steps can be performed on the computer or other programmable device to produce a computer-implemented process, which can be executed on the computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flowcharts and / or one or more blocks of the block diagrams.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本发明实施例公开了一种信息处理方法,该方法包括:在安装应用的过程中,获取安装的所述应用需要的权限信息;接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,所述标识用于区别必要权限信息和非必要权限信息,在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。本发明实施例公开了一种终端和计算机可读存储介质,解决了非必要权限暴露个人隐私的问题,保障了用户的数据的安全。

Description

一种信息处理方法、终端和计算机可读存储介质
交叉引用
本发明要求在2018年7月30日提交中国专利局、申请号为201810852826.9、发明名称为“一种信息处理方法、终端和计算机可读存储介质”的中国专利申请的优先权,该申请的全部内容通过引用结合在本发明中。
技术领域
本发明涉及电子技术领域,尤其涉及一种信息处理方法、终端和计算机可读存储介质。
背景技术
随着通信以及电子技术的不断发展,终端业务越来越多,相应的应用程序要求的权限也越来越多,但是个人的隐私也越来越不保密。相关技术中,在安装应用的时候,有些应用需要用到很多权限。例如,安装一个今日头条应用,需要用到麦克风权限、摄像头权限、通讯录权限;而这三种权限其实对于应用来说并不是必须的,有没有通讯录权限并不会影响今日头条的使用,但是应用在安装的时候必须要这个权限,使用时候也必须有这个权限才能打开,这样就存在一个比较严重的问题,即在使用应用程序时候,这些非必要权限难免的会使得用户个人隐私完全暴露,从而影响用户的个人信息安全性。
发明内容
为解决现有存在的技术问题,本发明实施例提供一种信息处理方法、终端和计算机可读存储介质,解决了非必要权限暴露个人隐私的问题,保障了 用户的数据的安全。
为达到上述目的,本发明实施例的技术方案是这样实现的:
本发明实施例提供一种信息处理方法,包括:
在安装应用的过程中,获取安装的所述应用需要的权限信息;
接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,所述标识用于区别必要权限信息和非必要权限信息;
在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。
在一示例性实施例中,所述权限信息包括:必要权限信息和非必要权限信息;
在所述获取安装的所述应用需要的权限信息之后,包括:
将所述必要权限信息和所述非必要权限信息以不同的显示格式排列显示在显示界面。
在一示例性实施例中,所述接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,包括:
接收对所述必要权限信息的第一操作指令,给所述必要权限信息增加第一标识位,所述第一标识位用于标识必要权限信息;
接收对所述非必要权限信息的第二操作指令,给所述非必要权限信息增加第二标识位,所述第二标识位用于标识非必要权限信息。
在一示例性实施例中,所述显示界面包括:第一区域、第二区域和第三区域;其中,所述第一区域中显示以不同的显示格式排列的所述必要权限信息和所述非必要权限信息;
所述接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,包括:
接收对所述第一区域中所述必要权限信息的第三操作指令,根据所述第三操作指令将所述必要权限信息移动到所述第二区域显示,给所述第二区域 中的所述必要权限信息增加第一标识位;
接收对所述第一区域中所述非必要权限信息的第四操作指令,根据所述第四操作指令将所述非必要权限信息移动到所述第三区域显示,给所述第三区域中的所述非必要权限信息增加第二标识位。
在一示例性实施例中,在所述根据所述操作指令对所述权限信息进行标识之后,包括:
根据所述权限信息和与所述权限信息对应的标识位,生成所述应用对应的数据库。
在一示例性实施例中,所述根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用,包括:
当接收到权限调用指令时,调用所述权限调用指令指示的目标权限,基于所述目标权限调用所述权限调用指令指示的所述目标权限中的目标数据;
在发送所述权限调用指令的应用对应的数据库中获取所述目标权限对应的标识位;
当所述目标权限对应的标识位为所述第一标识位时,返回所述目标数据给所述应用;
当所述目标权限对应的标识位为所述第二标识位时,获取所述目标数据的格式,根据所述目标数据的格式模拟生成与所述目标数据的格式相同的虚假数据,返回所述虚假数据给所述应用。
在一示例性实施例中,所述方法还包括:
接收对所述权限信息的修改操作指令,根据所述修改操作指令修改所述权限信息的标识位。
本发明实施例提供一种终端,所述终端包括:
安装运行模块,用于在安装应用的过程中,获取安装的所述应用需要的权限信息;
权限管理模块,用于接收对所述权限信息的操作指令;还用于根据所述 操作指令对所述权限信息进行标识,所述标识用于区别必要权限信息和非必要权限信息;
权限处理模块,用于在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。
在一示例性实施例中,所述权限信息包括:必要权限信息和非必要权限信息;
所述权限管理模块,还用于将所述必要权限信息和所述非必要权限信息以不同的显示格式排列显示在显示界面。
本发明实施例提供一种计算机可读存储介质,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现如上任一项所述的信息处理方法的步骤。
附图说明
在附图(其不一定是按比例绘制的)中,相似的附图标记可在不同的视图中描述相似的部件。具有不同字母后缀的相似附图标记可表示相似部件的不同示例。附图以示例而非限制的方式大体示出了本文中所讨论的各个实施例。
图1为本发明实施例提供的信息处理方法流程示意图;
图2为本发明实施例提供的权限信息显示示例图一;
图3为本发明实施例提供的权限信息显示示例图二;
图4为本发明实施例提供的权限信息显示示例图三;
图5为本发明实施例提供的权限信息显示示例图四;
图6为本发明实施例提供的权限管理流程示例图;
图7为本发明实施例提供的数据传输示例图;
图8为本发明实施例提供的终端结构示意图一;
图9为本发明实施例提供的终端结构示意图二。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。
本发明实施例提供一种信息处理方法,如图1所示,该方法可以包括:
步骤101、在安装应用的过程中,获取安装的所述应用需要的权限信息。
其中,所述权限信息包括:必要权限信息和非必要权限信息。
具体地,本发明实施例提供的方法的执行主体为终端,在终端安装应用的过程中,即终端获取安装的所述应用需要的权限信息。该终端可以为能够安装应用的电子设备,例如手机、平板电脑等。
具体地,该终端可以包括:中央处理模块、安装运行模块、权限处理模块、权限管理模块。其中,权限管理模块主要是用来对安装应用的权限进行管理。权限处理模块主要根据权限管理模块里面的标志位来处理相关数据。中央处理模块用来数据交换。
可选地,在所述获取安装的所述应用需要的权限信息之后,包括:
将所述必要权限信息和所述非必要权限信息以不同的显示格式排列显示在显示界面。
具体地,在安装应用的过程中,终端会获取应用安装本身所需要的所有权限信息,并将应用安装本身所需要的所有权限信息显示在显示界面,如图2所示,对于必要权限信息和非必要权限信息可以不同的显示格式排列显示,这里不同的显示格式可以是不同的显示框、不同的显示框背景,也可以是不同的显示字体等,以不同的格式显示是为了用户能够明显的从显示界面看到哪些是必要权限,哪些是非必要权限,从而,可以对必要权限和非必要权限进行标识操作。
具体地,终端的安装运行模块确定安装某个应用程序之后,会将该应用程序所需要的权限分别列出在当前的显示界面上,同时调用权限管理模块进行管理。
步骤102、接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识。
其中,所述标识用于区别必要权限信息和非必要权限信息。
一种可能的实现方式中,所述接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,包括:
接收对所述必要权限信息的第一操作指令,给所述必要权限信息增加第一标识位,所述第一标识位用于标识必要权限信息;
接收对所述非必要权限信息的第二操作指令,给所述非必要权限信息增加第二标识位,所述第二标识位用于标识非必要权限信息。
具体地,在安装应用的过程中会在终端显示界面弹出应用安装本身所需要的所有权限信息,终端将权限信息一一展现后,用户可以通过选择将相关权限信息区分成必要和非必要。
示例性的,在安装某一个播放视频的应用时候,终端显示界面展现出该应用所要的所有权限后,用户可以通过向左滑动文件管理权限表示其为必要权限,该操作同时会给这个权限增加一个额外的标志位为1,用户也可以通过向右滑动麦克风权限,表示其为非必要权限,该操作同时会给这个权限增加一个额外的标志位为0。在这里需要说明的是这两个操作虽然会区分不同的权限的性质,但是对于上层应用来说并没有任何区别,该播放在线视频的应用拿到的依然是其所需要的所有权限。
一种可能的实现方式中,所述显示界面包括:第一区域、第二区域和第三区域;其中,所述第一区域中显示以不同的显示格式排列的所述必要权限信息和所述非必要权限信息;
所述接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,包括:
接收对所述第一区域中所述必要权限信息的第三操作指令,根据所述第三操作指令将所述必要权限信息移动到所述第二区域显示,给所述第二区域中的所述必要权限信息增加第一标识位;
接收对所述第一区域中所述非必要权限信息的第四操作指令,根据所述第四操作指令将所述非必要权限信息移动到所述第三区域显示,给所述第三区域中的所述非必要权限信息增加第二标识位。
可选地,在所述根据所述操作指令对所述权限信息进行标识之后,包括:
根据所述权限信息和与所述权限信息对应的标识位,生成所述应用对应的数据库。
具体的,终端的权限管理模块会将安装运行模块所列的权限进行管理,给一些必须要的权限标注背景色,表示该应用程序必须要的权限即真实权限,如图3所示,同时会设定相对应的标志位为1;其他非必要的权限不标记背景色,表示可以忽略的权限即虚拟权限,同时设定相对应的标志位为0。用户可以左右滑动当前界面的权限,让其落入到左右两侧不同的区域中,如图4所示,左边区域为必要权限信息区域,右边区域为非必要权限信息区域。当然两侧区域中的权限也可以相互拖拽,如图5所示。
这里,权限管理模块同样会在终端设备的设置出现,点击设置-权限管理模块会出现当前通过本发明实施例提供的方法安装的一些应用程序,点击相对应的应用程序后就会出现如图5所示的界面,此时可以通过左右拖拽的方法即可调整相关权限。
这里需要说明的是,权限管理模块只是针对相对应的权限进行管理,并划分好真实权限和虚拟权限,但是对于应用本身来说还是有所有权限的。这里并不是直接把某个权限对应用程序直接关闭。处理权限的操作在权限处理 模块中。需要说明的是这个模块会把相关权限以及权限的标志位重新生成一个数据库,每个应用app对应一个数据库,其中分别对应着不同权限的不同标志位,供权限处理模块调用使用。
步骤103、在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。
具体应用安装过程中权限管理流程,在配置好相对应的权限之后,终端的安装运行模块进行相关应用的安装、运行。安装过程和正常安装没有任何区别,应用程序所需要的权限都是有的,并没有删除相关权限。
一种可能的实现方式中,在所述根据所述权限信息和与所述权限信息对应的标识位,生成所述应用对应的数据库之后,在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用,包括:
在使用所述应用的过程中,当接收到权限调用指令时,调用所述权限调用指令指示的目标权限,基于所述目标权限调用所述权限调用指令指示的所述目标权限中的目标数据;
在发送所述权限调用指令的应用对应的数据库中获取所述目标权限对应的标识位;
当所述目标权限对应的标识位为所述第一标识位时,返回所述目标数据给所述应用;
当所述目标权限对应的标识位为所述第二标识位时,获取所述目标数据的格式,根据所述目标数据的格式模拟生成与所述目标数据的格式相同的虚假数据,返回所述虚假数据给所述应用。
具体地,在应用使用过程中,例如,打开播放视频应用后,应用想使用麦克风的权限,但是由于在安装该应用时候用户给麦克风权限增加了额外的标志位,所以底层数据上来之后就会根据之前的权限标志判断,如果权限是 虚拟的,即非必要权限信息,则返回一个正确使用的值给上层,表示该应用已经正确调用了麦克风,但是其实是根据得到的数据格式模拟一个虚假的传给应用。
这里,终端的权限处理模块会通过中央处理模块调出虚拟权限里面的一些权限,为其具体设定相关操作。在应用程序调用到相关权限的时候,权限处理模块的入参有三个,一个是具体是哪个应用apk在使用权限,即权限的使用者,第二个是具体是使用哪个权限,第三个则是这个权限获取到的数据data。
具体地,如图6所示,当应用apk使用时需要某个权限时,通过终端的权限处理模块后即会给一个入参即权限的使用者以及应用所需要的权限,然后底层数据上来之后会同样给其一个入参数据data,权限处理模块此时就会根据权限的使用者去调用权限管理模块里面的数据库,读取对应权限的标志位,如果判断其为虚拟权限的时候,即标志位为0,那么就会根据入参数据去模拟一组虚假的数据返回给应用程序后同时删除掉真实数据,具体可以根据入参数据的格式模拟出与该入参数据的格式相同的虚假数据,即虚假数据与真实数据的格式是相同的,但虚假数据与真实数据具体包含的信息是不同的,这样既能够保证了应用程序的正常运行,也能防止泄露用户数据,导致暴露隐私。示例性的如图7所示的具体模块图,这样做的好处就是综合了hal层接口,hal的数据统一交给权限处理模块来处理,同时入参还有权限的使用者,这样就保证了数据处理不会乱,不会把A的数据传给B。
可选地,所述方法还包括:
接收对所述权限信息的修改操作指令,根据所述修改操作指令修改所述权限信息的标识位。
具体地,为了防止用户将某些必要的权限也设定到了虚拟权限,终端的权限管理模块提供了相关的权限改变的功能,并且权限管理模块也会和应用 程序交互来获取当前哪些权限必须设定为真实权限,用来提醒用户不要设定错误。
需要说明的是,对于应用程序来说本身获取的权限是没有变换的,只是在其真正使用时候会经过终端的权限管理模块来进行操作到具体的权限,而权限处理模块也会像正常访问某个权限一样来访问,但是当处理虚拟权限的时候会通过获取到的数据来模拟一组虚拟数据给应用程序来保证其正常运行。
示例性的,某一个播放视频的应用安装时候需要麦克风权限,按照本发明实施例提供的方式将其麦克风权限设定为虚拟权限之后,终端的权限管理模块会去访问麦克风,并根据得到的数据格式模拟出虚拟数据返回给播放视频的应用程序。
本发明实施例提供的方法,对应用的必要权限信息和非必要权限信息进行标识,从而在应用调用权限时,可以根据标识识别不同的权限信息,根据不同的权限反馈相应的数据,这样,在使用相关应用的时候就不用担心用户隐私暴露,从而避免了非必要权限暴露个人隐私,保障了用户的数据的安全。
本发明实施例还提供一种终端,如图8所示,所述终端包括:
安装运行模块201,用于在安装应用的过程中,获取安装的所述应用需要的权限信息;
权限管理模块202,用于接收对所述权限信息的操作指令;还用于根据所述操作指令对所述权限信息进行标识,所述标识用于区别必要权限信息和非必要权限信息;
权限处理模块203,用于在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。
可选地,所述权限信息包括:必要权限信息和非必要权限信息;
所述终端还包括:所述权限管理模块202,用于将所述必要权限信息和 所述非必要权限信息以不同的显示格式排列显示在显示界面。
可选地,所述权限管理模块202,具体用于:
接收对所述必要权限信息的第一操作指令,给所述必要权限信息增加第一标识位,所述第一标识位用于标识必要权限信息;
接收对所述非必要权限信息的第二操作指令,给所述非必要权限信息增加第二标识位,所述第二标识位用于标识非必要权限信息。
可选地,所述显示界面包括:第一区域、第二区域和第三区域;其中,所述第一区域中显示以不同的显示格式排列的所述必要权限信息和所述非必要权限信息;
所述权限管理模块202,具体用于:
接收对所述第一区域中所述必要权限信息的第三操作指令,根据所述第三操作指令将所述必要权限信息移动到所述第二区域显示,给所述第二区域中的所述必要权限信息增加第一标识位;
接收对所述第一区域中所述非必要权限信息的第四操作指令,根据所述第四操作指令将所述非必要权限信息移动到所述第三区域显示,给所述第三区域中的所述非必要权限信息增加第二标识位。
可选地,如图8所示,所述终端还包括:权限处理模块203,还用于根据所述权限信息和与所述权限信息对应的标识位,生成所述应用对应的数据库。
可选地,如图8所示,所述终端还包括:
中央处理模块204,用于在使用所述应用的过程中,当接收到权限调用指令时,调用所述权限调用指令指示的目标权限,基于所述目标权限调用所述权限调用指令指示的所述目标权限中的目标数据;
权限处理模块203,用于在发送所述权限调用指令的应用对应的数据库 中获取所述目标权限对应的标识位;还用于当所述目标权限对应的标识位为所述第一标识位时,返回所述目标数据给所述应用;还用于当所述目标权限对应的标识位为所述第二标识位时,获取所述目标数据的格式,根据所述目标数据的格式模拟生成与所述目标数据的格式相同的虚假数据,返回所述虚假数据给所述应用。
可选地,所述权限管理模块202,还用于接收对所述权限信息的修改操作指令,根据所述修改操作指令修改所述权限信息的标识位。
具体的,本发明实施例提供的终端装置的理解可以参考上述信息处理方法实施例的说明,本发明实施例在此不再赘述。
本发明实施例提供的终端,对应用的必要权限信息和非必要权限信息进行标识,从而在应用调用权限时,可以根据标识识别不同的权限信息,根据不同的权限反馈相应的数据,这样,在使用相关应用的时候就不用担心用户隐私暴露,从而避免了非必要权限暴露个人隐私,保障了用户的数据的安全。
本发明实施例还提供一种终端30,如图9所示,所述终端30包括处理器301和存储器302;其中,
所述存储器302,用于存储能够在所述处理器上运行的计算机程序;
所述处理器301,用于运行所述计算机程序时执行如上所述信息处理方法的步骤。
可以理解,存储器302可以是易失性存储器或非易失性存储器,也可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(ROM,Read Only Memory)、可编程只读存储器(PROM,Programmable Read-Only Memory)、可擦除可编程只读存储器(EPROM,Erasable Programmable Read-Only Memory)、电可擦除可编程只读存储器(EEPROM,Electrically Erasable Programmable Read-Only Memory)、磁性随机存取存储器(FRAM,ferromagnetic random access memory)、快闪存储器(Flash Memory)、 磁表面存储器、光盘、或只读光盘(CD-ROM,Compact Disc Read-Only Memory);磁表面存储器可以是磁盘存储器或磁带存储器。易失性存储器可以是随机存取存储器(RAM,Random Access Memory),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(SRAM,Static Random Access Memory)、同步静态随机存取存储器(SSRAM,Synchronous Static Random Access Memory)、动态随机存取存储器(DRAM,Dynamic Random Access Memory)、同步动态随机存取存储器(SDRAM,Synchronous Dynamic Random Access Memory)、双倍数据速率同步动态随机存取存储器(DDRSDRAM,Double Data Rate Synchronous Dynamic Random Access Memory)、增强型同步动态随机存取存储器(ESDRAM,Enhanced Synchronous Dynamic Random Access Memory)、同步连接动态随机存取存储器(SLDRAM,SyncLink Dynamic Random Access Memory)、直接内存总线随机存取存储器(DRRAM,Direct Rambus Random Access Memory)。本发明实施例描述的存储器302旨在包括但不限于这些和任意其它适合类型的存储器。
上述本发明实施例揭示的方法可以应用于处理器301中,或者由处理器301实现。处理器301可能是一种集成电路芯片,具有信号的处理能力,更具体地,内置有信息处理算法,即具有信息处理能力。在实现过程中,上述方法的各步骤可以通过处理器301中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器301可以是通用处理器、数字信号处理器(DSP,Digital Signal Processor),或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。处理器301可以实现或者执行本发明实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本发明实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于存储器302,处理器301读 取存储器302中的信息,结合其硬件完成前述方法的步骤。
在示例性实施例中,终端可以被一个或多个应用专用集成电路(ASIC,Application Specific Integrated Circuit)、DSP、可编程逻辑器件(PLD,Programmable Logic Device)、复杂可编程逻辑器件(CPLD,Complex Programmable Logic Device)、现场可编程门阵列(FPGA,Field-Programmable Gate Array)、通用处理器、控制器、微控制器(MCU,Micro Controller Unit)、微处理器(Microprocessor)、或其他电子元件实现,用于执行前述方法。
在示例性实施例中,本发明实施例还提供了一种存储介质,具体可以为计算机可读存储介质,例如包括计算机程序的存储器,上述计算机程序可由终端的处理器执行,以完成前述方法所述步骤。计算机可读存储介质可以是FRAM、ROM、PROM、EPROM、EEPROM、Flash Memory、磁表面存储器、光盘、或CD-ROM等存储器。
本发明实施例还提供一种计算机可读存储介质,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现如上任一项所述的信息处理方法的步骤。
本发明实施例提供了一种信息处理方法、终端和计算机可读存储介质,在安装应用的过程中,获取安装的所述应用需要的权限信息;接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,所述标识用于区别必要权限信息和非必要权限信息,在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。本发明实施例提供的信息处理方法、终端和计算机可读存储介质,对应用的必要权限信息和非必要权限信息进行标识,从而在应用调用权限时,可以根据标识识别不同的权限信息,避免了非必要权限暴露个人隐私,保障了用户的数据的安全。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或 计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本发明的部分实施例而已,并非用于限定本发明的保护范围。

Claims (10)

  1. 一种信息处理方法,其特征在于,包括:
    在安装应用的过程中,获取安装的所述应用需要的权限信息;
    接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,所述标识用于区别必要权限信息和非必要权限信息;
    在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。
  2. 根据权利要求1所述的方法,其特征在于,所述权限信息包括:必要权限信息和非必要权限信息;
    在所述获取安装的所述应用需要的权限信息之后,包括:
    将所述必要权限信息和所述非必要权限信息以不同的显示格式排列显示在显示界面。
  3. 根据权利要求2所述的方法,其特征在于,所述接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,包括:
    接收对所述必要权限信息的第一操作指令,给所述必要权限信息增加第一标识位,所述第一标识位用于标识必要权限信息;
    接收对所述非必要权限信息的第二操作指令,给所述非必要权限信息增加第二标识位,所述第二标识位用于标识非必要权限信息。
  4. 根据权利要求2所述的方法,其特征在于,所述显示界面包括:第一区域、第二区域和第三区域;其中,所述第一区域中显示以不同的显示格式排列的所述必要权限信息和所述非必要权限信息;
    所述接收对所述权限信息的操作指令,根据所述操作指令对所述权限信息进行标识,包括:
    接收对所述第一区域中所述必要权限信息的第三操作指令,根据所述第三操作指令将所述必要权限信息移动到所述第二区域显示,给所述第二区域中的所述必要权限信息增加第一标识位;
    接收对所述第一区域中所述非必要权限信息的第四操作指令,根据所述第四操作指令将所述非必要权限信息移动到所述第三区域显示,给所述第三区域中的所述非必要权限信息增加第二标识位。
  5. 根据权利要求1至4任一项所述的方法,其特征在于,在所述根据所述操作指令对所述权限信息进行标识之后,包括:
    根据所述权限信息和与所述权限信息对应的标识位,生成所述应用对应的数据库。
  6. 根据权利要求5所述的方法,其特征在于,所述根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用,包括:
    当接收到权限调用指令时,调用所述权限调用指令指示的目标权限,基于所述目标权限调用所述权限调用指令指示的所述目标权限中的目标数据;
    在发送所述权限调用指令的应用对应的数据库中获取所述目标权限对应的标识位;
    当所述目标权限对应的标识位为所述第一标识位时,返回所述目标数据给所述应用;
    当所述目标权限对应的标识位为所述第二标识位时,获取所述目标数据的格式,根据所述目标数据的格式模拟生成与所述目标数据的格式相同的虚假数据,返回所述虚假数据给所述应用。
  7. 根据权利要求1至4任一项所述的方法,其特征在于,所述方法还包 括:
    接收对所述权限信息的修改操作指令,根据所述修改操作指令修改所述权限信息的标识位。
  8. 一种终端,其特征在于,所述终端包括:
    安装运行模块,用于在安装应用的过程中,获取安装的所述应用需要的权限信息;
    权限管理模块,用于接收对所述权限信息的操作指令;还用于根据所述操作指令对所述权限信息进行标识,所述标识用于区别必要权限信息和非必要权限信息;
    权限处理模块,用于在使用所述应用的过程中,根据权限调用指令指示的目标权限的标识,返回所述权限调用指令指示调用的数据给所述应用。
  9. 根据权利要求8所述终端,其特征在于,所述权限信息包括:必要权限信息和非必要权限信息;
    所述权限管理模块,还用于将所述必要权限信息和所述非必要权限信息以不同的显示格式排列显示在显示界面。
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有一个或者多个程序,所述一个或者多个程序可被一个或者多个处理器执行,以实现如权利要求1至7中任一项所述的信息处理方法的步骤。
PCT/CN2019/096240 2018-07-30 2019-07-16 一种信息处理方法、终端和计算机可读存储介质 WO2020024793A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810852826.9 2018-07-30
CN201810852826.9A CN110781490A (zh) 2018-07-30 2018-07-30 一种信息处理方法、终端和计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2020024793A1 true WO2020024793A1 (zh) 2020-02-06

Family

ID=69230958

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/096240 WO2020024793A1 (zh) 2018-07-30 2019-07-16 一种信息处理方法、终端和计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN110781490A (zh)
WO (1) WO2020024793A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112597483A (zh) * 2020-07-16 2021-04-02 同方股份有限公司 隐私保护方法、装置、智能终端和存储介质
CN112597482A (zh) * 2020-07-16 2021-04-02 同方股份有限公司 隐私保护方法、装置、智能终端和存储介质
CN112597484A (zh) * 2020-07-16 2021-04-02 同方股份有限公司 隐私保护方法、装置、智能终端和存储介质
CN112558912B (zh) * 2020-12-11 2024-03-19 北京百家科技集团有限公司 应用程序及其录音方法、终端设备和存储介质
CN113157210B (zh) * 2021-04-16 2023-04-07 深圳季连科技有限公司 一种基于app功能的隐私权限转移方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060093149A1 (en) * 2004-10-30 2006-05-04 Shera International Ltd. Certified deployment of applications on terminals
CN104200159A (zh) * 2014-09-05 2014-12-10 北京奇虎科技有限公司 配置应用程序的权限的方法及装置
CN104809390A (zh) * 2014-01-26 2015-07-29 中兴通讯股份有限公司 系统安全运行的方法及装置
CN105335649A (zh) * 2015-10-14 2016-02-17 上海斐讯数据通信技术有限公司 一种智能终端应用程序的权限管理方法及系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020515B (zh) * 2012-12-26 2015-07-22 中国人民解放军国防科学技术大学 一种用于操作系统的应用程序执行权限控制方法
CN104036182B (zh) * 2013-03-04 2017-09-29 联想(北京)有限公司 一种信息处理方法、提示方法、服务器及电子设备
CN103761472B (zh) * 2014-02-21 2017-05-24 北京奇虎科技有限公司 基于智能终端设备的应用程序访问方法与装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060093149A1 (en) * 2004-10-30 2006-05-04 Shera International Ltd. Certified deployment of applications on terminals
CN104809390A (zh) * 2014-01-26 2015-07-29 中兴通讯股份有限公司 系统安全运行的方法及装置
CN104200159A (zh) * 2014-09-05 2014-12-10 北京奇虎科技有限公司 配置应用程序的权限的方法及装置
CN105335649A (zh) * 2015-10-14 2016-02-17 上海斐讯数据通信技术有限公司 一种智能终端应用程序的权限管理方法及系统

Also Published As

Publication number Publication date
CN110781490A (zh) 2020-02-11

Similar Documents

Publication Publication Date Title
WO2020024793A1 (zh) 一种信息处理方法、终端和计算机可读存储介质
US10747890B2 (en) System and method of controlling access to content using an accessibility API
WO2019127824A1 (zh) 可视化图表页面实现方法、装置、终端设备及存储介质
WO2021008334A1 (zh) 小程序的数据绑定方法、装置、设备及存储介质
CN107506637B (zh) 信息展示方法和装置、终端及可读存储介质
WO2020155775A1 (zh) 一种基于核心开发环境的应用程序的生成方法及设备
CN111625214A (zh) 音频控制方法、装置、设备及存储介质
EP3926988A1 (en) Third-party access of end-user device assets
CN108874336B (zh) 一种信息处理方法及电子设备
US11481508B2 (en) Data access monitoring and control
TWI686725B (zh) 展現敏感資訊的方法和裝置
US10250642B2 (en) System, method and apparatus for fine-grained privacy specification and verification
CN113655999A (zh) 一种页面控件的渲染方法、装置、设备及存储介质
CN111428570A (zh) 非活体人脸的检测方法、装置、计算机设备及存储介质
CN109857964B (zh) 一种页面操作的热力图绘制方法、装置、存储介质及处理器
CN114995699B (zh) 一种界面交互方法及装置
CN115688102A (zh) 窗口的处理方法、装置、处理器及电子设备
CN108021317B (zh) 用于屏幕编辑的方法及装置
WO2018014400A1 (zh) 一种用户输入管理方法及装置、终端
TW201913370A (zh) 應用程式app的頁面顯示方法及裝置、設備、儲存媒體
WO2016107348A1 (zh) 进程的权限配置方法及装置
CN114691187A (zh) 节点注册方法、装置、计算机设备和存储介质
CN111932192A (zh) 在计算机设备中执行的决策流配置方法及决策流引擎
CN111198899A (zh) 应用程序中实体渲染的开发系统及方法
CN109308163A (zh) 非挥发性记忆体磁区规划方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19843923

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/06/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19843923

Country of ref document: EP

Kind code of ref document: A1