WO2023213289A1 - 应用程序的权限管理方法及装置 - Google Patents

应用程序的权限管理方法及装置 Download PDF

Info

Publication number
WO2023213289A1
WO2023213289A1 PCT/CN2023/092200 CN2023092200W WO2023213289A1 WO 2023213289 A1 WO2023213289 A1 WO 2023213289A1 CN 2023092200 W CN2023092200 W CN 2023092200W WO 2023213289 A1 WO2023213289 A1 WO 2023213289A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
application
permission
content information
application program
Prior art date
Application number
PCT/CN2023/092200
Other languages
English (en)
French (fr)
Inventor
赵尚林
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2023213289A1 publication Critical patent/WO2023213289A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Definitions

  • the present application belongs to the field of computer technology, and specifically relates to an application rights management method and device.
  • microphone usage permission as an example, after an application with voice wake-up function (such as an electronic map, browser or voice assistant, etc.) obtains microphone usage permission, it can wake up the application through specific voice commands and continue to monitor the data obtained by the microphone. Sound and other information.
  • voice wake-up function such as an electronic map, browser or voice assistant, etc.
  • it can wake up the application through specific voice commands and continue to monitor the data obtained by the microphone. Sound and other information.
  • multiple applications with the voice wake-up function may be installed on a mobile terminal. The sound input to the mobile terminal through the microphone will be heard by each application with the voice wake-up function. Monitored.
  • the permission management of existing applications has a greater risk of leaking user information and has poor security.
  • the purpose of the embodiments of this application is to provide a method and device for permission management of application programs, which can solve the problem of poor security.
  • inventions of the present application provide an application rights management method.
  • the method include:
  • the content information determine a target application that matches the content information
  • the first permission matches the target permission, and the first application program is different from the target application program.
  • an application rights management device which includes:
  • a recognition module configured to recognize the content information of the voice input when receiving the user's voice input
  • a determining module configured to determine, according to the content information, a target application that matches the content information
  • a rights management module used to enable the target rights of the target application and close the first rights of the first application
  • the first permission matches the target permission, and the first application program is different from the target application program.
  • inventions of the present application provide an electronic device.
  • the electronic device includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor.
  • the program or instructions are When executed by the processor, the steps of the method described in the first aspect are implemented.
  • embodiments of the present application provide a readable storage medium.
  • Programs or instructions are stored on the readable storage medium.
  • the steps of the method described in the first aspect are implemented. .
  • inventions of the present application provide a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the first aspect. the method described.
  • embodiments of the present application provide a computer program product.
  • the computer program product stores programs or instructions.
  • the program or instructions are executed by a computer, the method of the first aspect is implemented. A step of.
  • embodiments of the present application provide an electronic device configured to implement the steps of the method in the first aspect.
  • Figure 1 is a schematic diagram of the principle of an application rights management method provided by the prior art
  • FIG. 2 is one of the schematic flow diagrams of the application rights management method provided by the embodiment of the present application.
  • FIG. 3 is a schematic diagram of the principle of the application rights management method provided by the embodiment of the present application.
  • Figure 4 is a second schematic flowchart of the application rights management method provided by the embodiment of the present application.
  • Figure 5 is a schematic structural diagram of an application rights management device provided by an embodiment of the present application.
  • Figure 6 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • first, second, etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the figures so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in orders other than those illustrated or described herein, and that "first,”"second,” etc. are distinguished Objects are usually of one type, and the number of objects is not limited. For example, the first object can be one or multiple. Furthermore, say In the specification and claims, “and/or” indicates at least one of the connected objects. The character “/" generally indicates that the related objects are in an "or” relationship.
  • FIG. 2 is one of the schematic flow diagrams of the application rights management method provided by the embodiment of the present application. The following describes the application rights management method provided by the embodiment of the present application with reference to Figure 2. As shown in Figure 2, the method includes: step 201, step 202 and step 203.
  • Step 201 When receiving the user's voice input, identify the content information of the voice input.
  • the execution subject of the application rights management method provided by the embodiment of the present application is the application rights management device.
  • the application's rights management device can be implemented in various forms.
  • the rights management device of the application program described in the embodiment of the present application may include mobile phones, smart phones, notebook computers, digital broadcast receivers, PDAs (Personal Digital Assistants), PADs (Tablets), PMPs (Portable Multimedia players), navigation devices, smart bracelets, smart phones, digital cameras, etc., as well as fixed terminals such as desktop computers, televisions, etc.
  • PDAs Personal Digital Assistants
  • PADs Tablets
  • PMPs Portable Multimedia players
  • navigation devices smart bracelets, smart phones, digital cameras, etc.
  • fixed terminals such as desktop computers, televisions, etc.
  • the rights management device of the application is a mobile terminal.
  • those skilled in the art will understand that the construction according to the embodiments of the present application can also be applied to fixed type terminals.
  • the device when the user needs to use an application installed on the device, he or she can input voice, and the device receives the voice input.
  • the device After receiving the voice input, the device can recognize the content information of the voice input based on any voice recognition method.
  • the above speech recognition method may include at least one of a method based on linguistics and acoustics, a stochastic model method, a method based on artificial neural networks, a probabilistic syntax analysis method, and the like.
  • Step 202 Determine a target application matching the content information based on the content information.
  • the content information of the voice input matches each application program installed on the device.
  • the matching relationship between the input voice and the application program can be set in advance. Based on Describe the pre-configured matching relationship to determine whether the content information of the voice input matches a certain application.
  • the number of application programs matching the voice-input content information may be one or more. All applications matching the voice input content information can be determined as target applications.
  • Step 203 Turn on the target permission of the target application, and turn off the first permission of the first application; wherein, the first permission matches the target permission, and the first application is different from the target application.
  • target permissions can be enabled for each target application, each target application can be awakened, and the first permission of the first application can be closed.
  • the target permissions of the target application can be set in advance, so that after a certain application is determined as the target application, the target permissions of the application are enabled.
  • the target permission may be the permission to use the microphone, the permission to obtain location information, the permission to use the camera, the permission to read and write stored content, and the permission to read call records. It can be understood that the target permission may be a highly sensitive permission. Highly sensitive permissions refer to permissions that easily reveal users' private information.
  • the first permission is the permission that matches the target permission.
  • the first permission may include a target permission, or the first permission may be a permission based on the first permission.
  • the first permission may include the permission to use the microphone, the recording permission (since recording requires the use of a microphone, the recording permission is based on the permission to use the microphone), etc.; in When the target permission is the permission to use the body sensor, the first permission may include the permission to use the body sensor and the permission to obtain the body movement information (since the body movement information needs to be obtained through the data collected by the body sensor, the permission to obtain the body movement information Permissions are based on the use of body sensors), etc.
  • non-target applications cannot obtain the microphone use permission, nor can they obtain the microphone use permission. Further obtain the permissions related to the microphone use permission, so it is impossible to pass Continuously monitors incoming sound through the microphone, thereby reducing the risk of information leakage caused by non-target applications through continuous monitoring of the microphone.
  • the trusted permission management application module of the device has the right to use highly sensitive permissions, and other applications do not have the right to use highly sensitive permissions.
  • the embodiment of the present application realizes dynamic authorization of the target application by enabling the target permission of the target application that matches the voice input, and closing the first permission of the first application that matches the target permission, and the first permission of other applications. When permissions are turned off, it can reduce the risk of non-target applications abusing target permissions and improve user privacy and security.
  • the method further includes: closing the target application if the first input to the target application is not received within a time threshold.
  • the program's target permissions are not limited to:
  • the target permission of the target application is turned on, if the first input to the target application is not received within a time threshold, the target permission of the target application is turned off.
  • the first input may be input for using one or more functions of the target application.
  • the time threshold can be set in advance according to the actual situation. The specific value of the time threshold is not limited in the embodiment of this application.
  • time thresholds corresponding to different applications can be the same or different.
  • the time threshold corresponding to the application can be determined based on the length of historical responses. For example, for application one, users generally respond within 5 seconds after inputting voice input. Then the corresponding time threshold for application one can be set to 5 seconds.
  • the method may further include: receiving a third input; and turning off the target permissions for the target application in response to the third input.
  • the embodiment of the present application closes the target permission of the target application when the first input to the target application is not received within the time threshold, and automatically revokes the permission, so that the target application cannot continue to perform some unnecessary operations based on the target permission. operation, can reduce the non-target application
  • the risk of abusing target permissions can improve user privacy and security.
  • determining a target application matching the content information according to the content information includes: when the content information includes the target keyword, determining the application corresponding to the target keyword as the target application.
  • keywords matched by each application can be preset, and when the voice input content information includes a target keyword, the application matching the target keyword is determined as the target application.
  • different applications can correspond to different keywords, or multiple applications can correspond to the same keyword.
  • the keyword corresponding to the application program can be determined according to the application type, and the map applications (A map application, B map application) can all correspond to the same keyword "navigation”.
  • the keywords matched by each application can be flexibly set according to the user's needs.
  • the embodiment of the present application determines the matching target application through the words contained in the content information, and can determine the target application more efficiently, conveniently, and accurately, thereby enabling the target permissions of the target application to be opened more efficiently and conveniently.
  • the method before recognizing the content information of the voice input, the method further includes: recording the content information of the voice input.
  • the content information of the voice input can be recorded and stored to facilitate subsequent recognition of the content information of the voice input.
  • the content information of the voice input may be recorded in at least one of a cache and a memory of the device.
  • the method further includes: deleting the content information.
  • the voice input content can be Information is deleted to save storage space.
  • the method may include: deleting the voice information when the duration of storing the content information reaches a duration threshold, or the number of stored content information reaches a threshold, to save storage space.
  • the embodiment of the present application stores the content information input by voice and deletes the voice information after determining the target application that matches the content information, so that the content information input by voice can be more conveniently recognized and the storage can be released in a more timely manner. space to achieve more efficient use of storage space.
  • the method before receiving the voice input, the method further includes: receiving a second input; the second input carries information identifying the target application and information identifying the target permissions.
  • a second input can be input, and the device receives the second input.
  • the second input may carry information identifying the target application, so that the target application may be determined based on the second input.
  • the information identifying the application program may be at least one of the name, ID, and unique identification code of the application program in the operating system.
  • information identifying the target permission is used to indicate which permission or permissions the permission is.
  • the target permission of the second application is turned off; the target application is one of the second applications.
  • the target permission After receiving the second input, it is possible to determine which permission or permissions the target permission is based on the information identifying the target permission, thereby determining which applications have enabled the target permission; for each second application including the target application Program, turn off the target permissions to ensure that the target permissions of all applications are turned off before receiving voice input, and only turn on (that is, grant) the target permissions to the target application when the user needs it.
  • the user's voice input to the device is recorded and recognized by the device, and the application will not be triggered to recognize the voice input.
  • voice input can be captured through the device's system voice recorder.
  • the embodiment of the present application closes the target permission for the second application in response to the second input, so that Only the target application that matches the voice input content dynamically obtains the target permissions, and the target permissions of other applications are always turned off, which can reduce the risk of non-target applications abusing the target permissions and improve user privacy security.
  • Figure 4 is a second schematic flowchart of an application rights management method provided by an embodiment of the present application.
  • the method may include the following steps:
  • Step 401 Receive keywords, identification information of the target application, and time threshold.
  • Keywords, target application identification information and time thresholds can be received through user input.
  • Keywords which are target words that match the target application. Keywords can also be used as identification information of target permissions to identify target permissions.
  • Users can add applications that require dynamic authorization to the target list, and set trigger conditions (such as keyword matching) and time thresholds for authorization triggers.
  • trigger conditions such as keyword matching
  • Applications can be managed through target lists.
  • Applications with identification information in the target list are applications subject to dynamic permission control.
  • the granting of target permissions will be revoked by default. If the trigger conditions are not met, the target permissions will not be enabled by default.
  • the trigger condition can mean that the input voice input matches the application.
  • Step 402 Automatically revoke the target permissions of all target applications.
  • target permissions granted to them are revoked by default, and target permissions are not added by default if the trigger conditions are not met.
  • Step 403 Monitor.
  • Highly sensitive permissions are only available in the permission management module, which monitors input sounds and is responsible for coordinating responses to voice inputs. And the permission management module provides unified management and dynamic authorization to prevent third-party applications from continuing illegal monitoring.
  • Step 404 Keyword trigger.
  • the target application is determined based on the keyword matching relationship.
  • the voice input content information is "AA XXXX"
  • it can be determined that the target application matching the voice input content information is the aforementioned application two.
  • Step 405 Enable target permissions for the target application and wake it up.
  • Step 406 Use the normal functions of the target application.
  • the target application When the target application is granted the target permission, the user can normally use the corresponding services provided by the target application.
  • Step 407 Not used beyond the time threshold.
  • the permission management module will revoke the target permissions of the target application again.
  • the execution subject may be a rights management device of the application program.
  • the permission management device of the application program executes the permission management method of the application program as an example to illustrate the permission management device of the application program provided by the embodiment of the present application.
  • Figure 5 is a schematic structural diagram of an application rights management device provided by an embodiment of the present application.
  • the device includes an identification module 501, a determination module 502 and a rights management module 503, wherein:
  • the recognition module 501 is used to recognize the content information of the voice input when receiving the user's voice input;
  • Determining module 502 configured to determine a target application matching the content information according to the content information
  • the rights management module 503 is used to enable the target rights of the target application and close the first rights of the first application;
  • the first permission matches the target permission, and the first application program is different from the target application program.
  • the recognition module 501 can be used to receive voice input and recognize the content information of the voice input based on any voice recognition method.
  • the determination module 502 may be used to determine whether the content information of the voice input matches each application program; determine all applications that match the voice input as target applications.
  • the permission management module 503 can be used to enable the target permission of each target application, wake up each target application, and close the first permission of the first application.
  • the permission management module 503 may be further configured to close the target permission of the target application if the first input to the target application is not received within the time threshold.
  • the determination module 502 may be specifically configured to determine the application program corresponding to the target keyword as the target application program when the content information includes the target keyword.
  • the rights management device may also include:
  • Information recording module used to record the content information of voice input
  • the information deletion module is used to delete the content information after determining the target application matching the content information based on the content information.
  • the application's rights management device may also include:
  • An input module configured to receive a second input; the second input carries information identifying the target application and information identifying the target permissions;
  • the permission management module 503 may be further configured to close the target permission of the second application program in response to the second input; the target application program is one of the second application programs.
  • the embodiment of the present application realizes dynamic authorization of the target application by enabling the target permission of the target application that matches the voice input, and closing the first permission of the first application that matches the target permission, and the first permission of other applications. When permissions are turned off, it can reduce the risk of non-target applications abusing target permissions and improve user privacy and security.
  • the permission management device of the application program in the embodiment of the present application may be an electronic device, or may be a component in the electronic device, such as an integrated circuit or chip.
  • the electronic device may be a terminal or other devices other than the terminal.
  • the electronic device may be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, or a mobile Internet device (Mobile Internet Device).
  • MID augmented reality
  • VR virtual reality
  • PDA personal digital assistants
  • NAS Network Attached Storage
  • PC personal computer
  • TV television
  • teller machine or self-service machine etc.
  • the permission management device of the application program in the embodiment of the present application may be a device with an operating system.
  • the operating system can be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
  • the permission management device of the application program in the embodiment of the present application may be a device, or may be a component, integrated circuit, or chip in the terminal.
  • the device may be a mobile electronic device or a non-mobile electronic device.
  • the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a personal digital assistant (personal digital assistant).
  • UMPC ultra-mobile personal computer
  • assistant, PDA personal digital assistant
  • non-mobile electronic devices can be servers, network attached storage (Network Attached Storage, NAS), personal computers (personal computers, PC), televisions (television, TV), teller machines or self-service machines, etc., this application The examples are not specifically limited.
  • the permission management device of the application program in the embodiment of the present application may be a device with an operating system.
  • the operating system can be an Android operating system, an iOS operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
  • the application rights management apparatus provided by the embodiments of the present application can implement each process implemented by the method embodiments of Figures 2 to 4. To avoid duplication, the details will not be described here.
  • this embodiment of the present application also provides an electronic device 600, including a processor 601 and a memory 602.
  • the memory 602 stores programs or instructions that can be run on the processor 601.
  • each step of the above-mentioned application rights management method embodiment is implemented, and the same technical effect can be achieved. To avoid duplication, the details will not be described here.
  • the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
  • FIG. 7 is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • the electronic device 700 includes but is not limited to: radio frequency unit 701, network module 702, audio output unit 703, input unit 704, sensor 705, display unit 706, user input unit 707, interface unit 708, memory 709, processor 710, etc. part.
  • the electronic device 700 may also include a power supply (such as a battery) that supplies power to various components.
  • the power supply may be logically connected to the processor 710 through a power management system, thereby managing charging, discharging, and function through the power management system. Consumption management and other functions.
  • the structure of the electronic device shown in Figure 7 does not constitute a limitation on the electronic device.
  • the electronic device may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be described again here. .
  • the processor 710 is configured to, when receiving the user's voice input, identify the content information of the voice input;
  • the processor 710 is also configured to determine, according to the content information, a target application that matches the content information;
  • the processor 710 is also configured to enable the target permission of the target application and close the first permission of the first application;
  • the first permission matches the target permission, and the first application program is different from the target application program.
  • the embodiment of the present application realizes dynamic authorization of the target application by enabling the target permission of the target application that matches the voice input, and closing the first permission of the first application that matches the target permission, and the first permission of other applications. When permissions are turned off, it can reduce the risk of non-target applications abusing target permissions and improve user privacy and security.
  • the processor 710 may be further configured to close the target permission of the target application if the first input to the target application is not received within the time threshold.
  • the processor 710 may also be specifically used to determine the application program corresponding to the target keyword as the target application program when the content information includes the target keyword.
  • memory 709 is used to store content information of voice input
  • the processor 710 is also configured to delete the content information after determining the target application matching the content information based on the content information.
  • the user input unit 707 is also used to receive a second input; the second input carries information identifying the target application and information identifying the target permissions;
  • the processor 710 is further configured to close the target permission of the second application program in response to the second input; the target application program is one of the second application programs.
  • the input unit 704 may include a graphics processor (Graphics Processing Unit, GPU) 7041 and a microphone 7042.
  • the graphics processor 7041 is responsible for the image capture device (GPU) in the video capture mode or the image capture mode. Process the image data of still pictures or videos obtained by cameras (such as cameras).
  • the display unit 706 may include a display panel 7061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like.
  • the user input unit 707 includes a touch panel 7071 and at least one of other input devices 7072 .
  • Touch panel 7071 also called touch screen.
  • the touch panel 7071 may include two parts: a touch detection device and a touch controller.
  • Other input devices 7072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
  • Memory 709 may be used to store software programs as well as various data.
  • the memory 709 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.) etc.
  • memory 709 may include volatile memory or non-volatile memory, or memory 709 may include both volatile and non-volatile memory.
  • the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory.
  • Volatile memory can be random access memory (Random Access Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM, SDRAM), Double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM, SLDRAM) and direct Memory bus random access memory (Direct Rambus RAM, DRRAM).
  • Memory 709 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
  • the processor 710 may include one or more processing units; optionally, the processor 710 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above-mentioned modem processor may not be integrated into the processor 710.
  • Embodiments of the present application also provide a readable storage medium, the readable storage medium stores a program or instructions, and when the program or instructions are executed by a processor, each process of the permission management method embodiment of the application program is implemented, and can achieve the same technical effect, so to avoid repetition, we will not repeat them here.
  • the processor is the processor in the electronic device described in the above embodiment.
  • the readable storage medium includes computer readable storage media, such as computer read-only memory ROM, random access memory RAM, magnetic disk or optical disk, etc.
  • An embodiment of the present application further provides a chip.
  • the chip includes a processor and a communication interface.
  • the communication interface is coupled to the processor.
  • the processor is used to run programs or instructions to implement the permission management method of the above application program.
  • Each process of the embodiment can achieve the same technical effect, so to avoid repetition, it will not be described again here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-a-chip or system-on-chip, etc.
  • Embodiments of the present application provide a computer program product.
  • the program product is stored in a storage medium.
  • the program product is executed by at least one processor to implement each process of the above-mentioned application program rights management method embodiment, and can achieve the same The technical effects will not be repeated here to avoid repetition.
  • the embodiment of the present application also provides an electronic device, which is configured to implement each process of the above method embodiment and can achieve the same technical effect. To avoid duplication, the electronic device is not included here. Again.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk , optical disk), including several instructions to cause a terminal (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种应用程序的权限管理方法及装置,属于计算机技术领域。其中,应用程序的权限管理方法包括:在接收到用户的语音输入的情况下,识别所述语音输入的内容信息;根据所述内容信息,确定与所述内容信息匹配的目标应用程序;开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限;其中,所述第一权限与所述目标权限匹配,所述第一应用程序与所述目标应用程序不同。

Description

应用程序的权限管理方法及装置
相关申请的交叉引用
本申请要求于2022年05月06日提交的申请号为202210489624.9,发明名称为“应用程序的权限管理方法及装置”的中国专利申请的优先权,其通过引用方式全部并入本申请。
技术领域
本申请属于计算机技术领域,具体涉及一种应用程序的权限管理方法及装置。
背景技术
目前,应用程序在使用过程中,会根据需求开启某些权限,并持续开启该权限。
以麦克风使用权限为例,具备语音唤醒功能的应用程序(例如电子地图、浏览器或语音助手等)获得麦克风使用权限之后,可以实现通过特定语音指令唤醒该应用程序,并且能够持续监听麦克风获取的声音等信息。如图1所示,以手机等移动终端为例,一个移动终端上可能会安装多个上述具备语音唤醒功能的应用程序,通过麦克风输入该移动终端的声音会被各个具备语音唤醒功能的应用程序监听到。现有应用程序的权限管理存在具有较大的泄露用户的信息的风险,安全性较差。
发明内容
本申请实施例的目的是提供一种应用程序的权限管理方法及装置,能够解决安全性较差的问题。
第一方面,本申请实施例提供了一种应用程序的权限管理方法,该方法 包括:
在接收到用户的语音输入的情况下,识别所述语音输入的内容信息;
根据所述内容信息,确定与所述内容信息匹配的目标应用程序;
开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限;
其中,所述第一权限与所述目标权限匹配,所述第一应用程序与所述目标应用程序不同。
第二方面,本申请实施例提供了一种应用程序的权限管理装置,该装置包括:
识别模块,用于在接收到用户的语音输入的情况下,识别所述语音输入的内容信息;
确定模块,用于根据所述内容信息,确定与所述内容信息匹配的目标应用程序;
权限管理模块,用于开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限;
其中,所述第一权限与所述目标权限匹配,所述第一应用程序与所述目标应用程序不同。
第三方面,本申请实施例提供了一种电子设备,该电子设备包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。
第四方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤。
第五方面,本申请实施例提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如第一方面所述的方法。
第六方面,本申请实施例提供了一种计算机程序产品,该计算机程序产品上存储程序或指令,该程序或指令被计算机执行时实现如第一方面的方法 的步骤。
第七方面,本申请实施例提供了一种电子设备,该电子设备被配置成用于实现如第一方面的方法的步骤。
在本申请实施例中,通过开启与语音输入匹配的目标应用程序的目标权限,并关闭第一应用程序的与目标权限匹配的第一权限,实现对目标应用程序的动态授权,并且其他应用程序的第一权限处于关闭状态,能降低非目标应用程序滥用目标权限的风险,能提升用户的隐私安全。
附图说明
图1是现有技术提供的应用程序的权限管理方法的原理示意图;
图2是本申请实施例提供的应用程序的权限管理方法的流程示意图之一;
图3是本申请实施例提供的应用程序的权限管理方法的原理示意图;
图4是本申请实施例提供的应用程序的权限管理方法的流程示意图之二;
图5是本申请实施例提供的应用程序的权限管理装置的结构示意图;
图6是本申请实施例提供的电子设备的结构示意图;
图7是本申请实施例提供的电子设备的硬件结构示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说 明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的应用程序的权限管理方法及装置进行详细地说明。
图2是本申请实施例提供的应用程序的权限管理方法的流程示意图之一。下面结合图2描述本申请实施例提供的应用程序的权限管理方法。如图2所示,该方法包括:步骤201、步骤202和步骤203。
步骤201、在接收到用户的语音输入的情况下,识别语音输入的内容信息。
可选地,本申请实施例提供的应用程序的权限管理方法的执行主体为应用程序的权限管理装置。
该应用程序的权限管理装置可以以各种形式来实施。例如,本申请实施例中描述的该应用程序的权限管理装置可以包括诸如移动电话、智能电话、笔记本电脑、数字广播接收器、PDA(个人数字助理)、PAD(平板电脑)、PMP(便携式多媒体播放器)、导航装置、智能手环、智能手边、数码相机等等的移动终端以及诸如台式计算机、电视机等等的固定终端。下面,假设该应用程序的权限管理装置是移动终端。然而,本领域技术人员将理解的是,根据本申请实施例的构造也能够应用于固定类型的终端。
本申请实施例中,在用户需要使用该装置安装的某个应用程序的情况下,可以输入语音,该装置接收语音输入。
在接收该语音输入之后,该装置可以基于任一种语音识别方法,识别该语音输入的内容信息。
可选地,上述语音识别方法可以包括基于语言学和声学的方法、随机模型法、基于人工神经网络的方法和概率语法分析法等中的至少一种。
步骤202、根据内容信息,确定与内容信息匹配的目标应用程序。
可选地,识别出该语音输入的内容信息之后,可以判断该语音输入的内容信息是否与该装置上安装的每一应用程序相匹配。
可选地,输入的语音与应用程序之间的匹配关系可以预先设置。基于上 述预先配置的匹配关系,判断该语音输入的内容信息是否与某一应用程序匹配。
需要说明的是,在存在与该语音输入的内容信息匹配的应用程序的情况下,与该语音输入的内容信息匹配的应用程序的数量可以为一个或多个。可以将与该语音输入的内容信息匹配的全部应用程序,确定为目标应用程序。
步骤203、开启目标应用程序的目标权限,并关闭第一应用程序的第一权限;其中,第一权限与目标权限匹配,第一应用程序与目标应用程序不同。
可选地,在确定目标应用程序之后,可以对每一目标应用程序均开启目标权限,唤醒各目标应用程序,并关闭第一应用程序的第一权限。
可选地,可以预先设置目标应用程序的目标权限,因而在某一应用程序被确定为目标应用程序之后,开启该应用程序的目标权限。
示例性地,目标权限可以为使用麦克风的权限、获取位置信息的权限、使用摄像头的权限、读写存储内容的权限和读取通话记录等,能够理解的,目标权限可以是高敏感的权限。高敏感的权限,指容易泄露用户的隐私信息的权限。
可以理解的,第一权限是与目标权限匹配的权限。
可选地,第一权限可以包括目标权限,或者,第一权限可以是以第一权限为基础的权限。
示例性地,在目标权限为使用麦克风的权限的情况下,第一权限可以包括使用麦克风的权限,以及录音权限(由于录音需要使用麦克风,因而录音权限以使用麦克风的权限为基础)等;在目标权限为使用身体传感器的权限的情况下,第一权限可以包括使用身体传感器的权限,以及获取身体运动信息的权限(由于身体运动信息需要通过身体传感器采集的数据获取,因而获取身体运动信息的权限以使用身体传感器为基础)等。
示例性的,以目标权限为麦克风使用权限为例,如图3所示,相对于图1,本申请实施例提供的应用程序的权限管理方法,非目标应用程序无法获得麦克风使用权限,也无法进一步获取麦克风使用权限相关的权限,因而无法通 过麦克风持续监听输入的声音,从而降低了非目标应用程序通过持续监听麦克风导致信息泄露的风险。
可选地,默认情况下,只有该装置受信任的权限管理应用模块具有高敏感的权限的使用权,而其他应用程序不具有高敏感的权限的使用权。
本申请实施例通过开启与语音输入匹配的目标应用程序的目标权限,并关闭第一应用程序的与目标权限匹配的第一权限,实现对目标应用程序的动态授权,并且其他应用程序的第一权限处于关闭状态,能降低非目标应用程序滥用目标权限的风险,能提升用户的隐私安全。
可选地,开启目标应用程序的目标权限,并关闭第一应用程序的第一权限之后,方法还包括:在时间阈值内未接收到对目标应用程序的第一输入的情况下,关闭目标应用程序的目标权限。
可选地,对于目标应用程序,开启目标应用程序的目标权限之后,在时间阈值内未接收到对目标应用程序的第一输入的情况下,关闭目标应用程序的目标权限。
可以理解的,第一输入,可以是用于使用目标应用程序的一项或多项功能的输入。时间阈值,可以根据实际情况预先设置,对于时间阈值的具体值,本申请实施例不进行限定。
可选地,不同应用程序对应的时间阈值可以相同或不同。
可选地,应用程序对应的时间阈值,可以根据历史响应的时长确定。例如,对于应用程序一,用户一般在输入语音输入之后5s内会有响应操作,那么可以将该应用程序一对应的时间阈值设置为5s。
可选地,响应于语音输入,对与语音输入匹配的目标应用程序开启目标权限之后,该方法可以还包括:接收第三输入;响应于第三输入,对目标应用程序关闭目标权限。
本申请实施例通过在时间阈值内未接收到对目标应用程序的第一输入的情况下,关闭目标应用程序的目标权限,通过自动撤销权限,使得目标应用程序不能持续基于目标权限进行一些非必要的操作,能降低非目标应用程序 滥用目标权限的风险,能提升用户的隐私安全。
可选地,根据内容信息,确定与内容信息匹配的目标应用程序,包括:在内容信息包括目标关键词的情况下,将与目标关键词对应的应用程序确定为目标应用程序。
可选地,可以通过语音输入的内容信息包括的词语,判断该语音输入是否与某个应用程序匹配。
可选地,可以预先设置每个应用程序匹配的关键词,在语音输入的内容信息包括目标关键词的情况下,将与该目标关键词匹配的应用程序确定为目标应用程序。
能够理解的,不同应用程序可以对应于不同的关键词,或者,多个应用程序可以对应同一个关键词。例如,可以根据应用类型来确定应用程序对应的关键词,地图类应用(A地图应用,B地图应用)可以均对应于同一个关键词“导航”。
可选地,每个应用程序匹配的关键词可以根据用户的需求灵活设置。
本申请实施例通过内容信息中所包含的词语来确定匹配的目标应用程序,能更高效、方便、准确地确定目标应用程序,从而能更高效、方便地开启目标应用程序的目标权限。
可选地,识别语音输入的内容信息之前,该方法还包括:记录语音输入的内容信息。
可选地,接收语音输入之后,可以对该语音输入的内容信息进行记录和存储,便于后续进行对该语音输入的内容信息的识别。
可选地,该语音输入的内容信息可以记录于该装置的缓存和存储器中的至少一个中。
根据内容信息,确定与内容信息匹配的目标应用程序之后,方法还包括:删除内容信息。
可选地,根据内容信息,确定与该语音输入的内容信息匹配的目标应用程序之后,即已经对该内容信息完成了识别之后,可以将该语音输入的内容 信息删除,以节约存储空间。
可选地,存储语音输入的内容信息之后,该方法可以包括:在存储该内容信息的时长达到时长阈值,或者存储的内容信息的条数得到条数阈值的情况下,可以删除该语音信息,以节约存储空间。
本申请实施例通过存储语音输入的内容信息,并在确定与内容信息匹配的目标应用程序之后,删除语音信息,能更方便地对语音输入的内容信息进行语音识别,并能更及时地释放存储空间,实现更高效地利用存储空间。
可选地,接收语音输入之前,方法还包括:接收第二输入;第二输入携带有标识目标应用程序的信息和标识目标权限的信息。
可选地,本申请实施例中,在用户需要撤销某个或某些目标应用程序的目标权限的情况下,可以输入第二输入,该装置接收第二输入。
可选地,第二输入可以携带有标识目标应用程序的信息,从而可以根据第二输入确定目标应用程序。
可选地,标识应用程序的信息,可以是操作系统中应用程序的名称、ID和唯一识别码等中的至少一项。
可选地,标识目标权限的信息,用于指示该权限是哪一或哪几项权限。
响应于第二输入,关闭第二应用程序的目标权限;目标应用程序是第二应用程序中的一个。
接收第二输入之后,可以基于标识目标权限的信息,确定目标权限是哪一或哪几项权限,从而可以确定哪些应用程序已开启目标权限;对于包括目标应用程序在内的各项第二应用程序,关闭目标权限,以保证在接收到语音输入之前,所有应用程序的目标权限均关闭,在用户需要的时候才开启(即授予)目标应用程序的目标权限。
可选地,关闭第二应用程序的目标权限之后,用户对该装置的语音输入是该装置记录识别的,不会触发应用程序对语音输入进行识别。例如,可以通过装置的系统录音笔来获取语音输入。
本申请实施例通过响应于第二输入,对第二应用程序关闭目标权限,使 得只有与语音输入的内容匹配的目标应用程序动态获得目标权限,其他应用程序的目标权限始终处于关闭状态,能降低非目标应用程序滥用目标权限的风险,能提升用户的隐私安全。
为了便于对本申请上述各实施例的理解,下面通过一个示例描述应用程序的权限管理的过程。
图4是本申请实施例提供的应用程序的权限管理方法的流程示意图之二。示例性地,如图4所示,该方法可以包括以下步骤:
步骤401、接收关键词、目标应用程序的标识信息和时间阈值。
可以通过用户录入的方式,接收关键词、目标应用程序的标识信息和时间阈值。
关键词,即与目标应用程序匹配的目标词语。关键词,也可以作为目标权限的标识信息,用于标识目标权限。
用户可以将需要设定动态授权的应用加入目标列表,并且设置授权触发的触发条件(例如关键词匹配)和时间阈值。
可以通过目标列表管理应用程序。目标列表,可以用于存储应用程序的标识信息。目标列表中存在标识信息的应用程序,属于进行动态权限管控的应用程序,默认撤销目标权限的赋予,不满足触发条件默认不对其开启目标权限。触发条件,可以指输入的语音输入与该应用程序匹配。
示例性地,对于应用程序二,关键词为“XXXX”。
通过设置时间阈值,可以对长时间使用目标权限的应用撤销目标权限。
步骤402、自动撤销所有目标应用程序的目标权限。
对于用户加入目标列表的目标应用程序,默认撤销赋予其的目标权限,不满足触发条件默认不对其添加目标权限。
步骤403、监听。
高敏感权限只有权限管理模块具备,对输入的声音进行监听,并且负责统筹对语音输入进行响应。并且由权限管理模块统一管理和动态授权,防止第三方应用持续非法监听行为。
步骤404、关键词触发。
当触发条件满足,如关键词被触发,用户手机存在多个应用程序具备语音唤醒等功能,根据关键词匹配关系确定目标应用程序。
示例性地,在语音输入的内容信息为“AA XXXX”的情况下,则可以确定与语音输入的内容信息匹配的目标应用程序是前述应用程序二。
步骤405、对目标应用程序开启目标权限并唤醒。
步骤406、目标应用程序正常功能使用。
当目标应用程被授予目标权限,用户可以正常使用目标应用程序提供的对应项服务。
步骤407、超出时间阈值未被使用。
对于超时未使用,即达到用户设定的时间阈值仍未被使用的目标应用程序,或者用户主动输入权限撤销指令的目标应用程序,权限管理模块会再次撤销目标应用程序的目标权限。
本申请实施例提供的应用程序的权限管理方法,执行主体可以为应用程序的权限管理装置。本申请实施例中以应用程序的权限管理装置执行应用程序的权限管理方法为例,说明本申请实施例提供的应用程序的权限管理装置。
图5是本申请实施例提供的应用程序的权限管理装置的结构示意图。可选地,如图5所示,该装置包括识别模块501、确定模块502和权限管理模块503,其中:
识别模块501,用于在接收到用户的语音输入的情况下,识别所述语音输入的内容信息;
确定模块502,用于根据所述内容信息,确定与所述内容信息匹配的目标应用程序;
权限管理模块503,用于开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限;
其中,所述第一权限与所述目标权限匹配,所述第一应用程序与所述目标应用程序不同。
识别模块501可以用于接收语音输入,并基于任一种语音识别方法,识别该语音输入的内容信息。
确定模块502可以用于判断该语音输入的内容信息是否与每一应用程序匹配;将与该语音输入匹配的全部应用程序,确定为目标应用程序。
确定目标应用程序之后,权限管理模块503可以用于开启每一目标应用程序的目标权限,唤醒各目标应用程序,并关闭第一应用程序的第一权限。
可选地,权限管理模块503,可以还用于在时间阈值内未接收到对目标应用程序的第一输入的情况下,关闭目标应用程序的目标权限。
可选地,确定模块502,可以具体用于在内容信息包括目标关键词的情况下,将与目标关键词对应的应用程序确定为目标应用程序。
可选地,该权限管理装置,可以还包括:
信息记录模块,用于记录语音输入的内容信息;
信息删除模块,用于在根据内容信息,确定与内容信息匹配的目标应用程序之后,删除内容信息。
可选地,该应用程序的权限管理装置,可以还包括:
输入模块,用于接收第二输入;第二输入携带有标识目标应用程序的信息和标识所述目标权限的信息;
权限管理模块503,可以还用于响应于第二输入,关闭第二应用程序的目标权限;目标应用程序是第二应用程序中的一个。
本申请实施例通过开启与语音输入匹配的目标应用程序的目标权限,并关闭第一应用程序的与目标权限匹配的第一权限,实现对目标应用程序的动态授权,并且其他应用程序的第一权限处于关闭状态,能降低非目标应用程序滥用目标权限的风险,能提升用户的隐私安全。
本申请实施例中的应用程序的权限管理装置可以是电子设备,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile Internet Device, MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,还可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例中的应用程序的权限管理装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为iOS操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例中的应用程序的权限管理装置可以是装置,也可以是终端中的部件、集成电路、或芯片。该装置可以是移动电子设备,也可以为非移动电子设备。示例性的,移动电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,非移动电子设备可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。
本申请实施例中的应用程序的权限管理装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为iOS操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。
本申请实施例提供的应用程序的权限管理装置能够实现图2至图4的方法实施例实现的各个过程,为避免重复,这里不再赘述。
可选地,如图6所示,本申请实施例还提供一种电子设备600,包括处理器601和存储器602,存储器602上存储有可在所述处理器601上运行的程序或指令,该程序或指令被处理器601执行时实现上述应用程序的权限管理方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。
需要说明的是,本申请实施例中的电子设备包括上述所述的移动电子设备和非移动电子设备。
图7是本申请实施例提供的电子设备的硬件结构示意图。
该电子设备700包括但不限于:射频单元701、网络模块702、音频输出单元703、输入单元704、传感器705、显示单元706、用户输入单元707、接口单元708、存储器709、以及处理器710等部件。
本领域技术人员可以理解,电子设备700还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器710逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图7中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。
其中,处理器710,用于在接收到用户的语音输入的情况下,识别所述语音输入的内容信息;
处理器710,还用于根据所述内容信息,确定与所述内容信息匹配的目标应用程序;
处理器710,还用于开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限;
其中,所述第一权限与所述目标权限匹配,所述第一应用程序与所述目标应用程序不同。
本申请实施例通过开启与语音输入匹配的目标应用程序的目标权限,并关闭第一应用程序的与目标权限匹配的第一权限,实现对目标应用程序的动态授权,并且其他应用程序的第一权限处于关闭状态,能降低非目标应用程序滥用目标权限的风险,能提升用户的隐私安全。
可选地,处理器710,可以还用于在时间阈值内未接收到对目标应用程序的第一输入的情况下,关闭目标应用程序的目标权限。
可选地,处理器710,还可以具体用在内容信息包括目标关键词的情况下,将与目标关键词对应的应用程序确定为目标应用程序。
可选地,存储器709,用于存储语音输入的内容信息;
处理器710,还用于在根据内容信息,确定与内容信息匹配的目标应用程序之后,删除内容信息。
可选地,用户输入单元707,还用于接收第二输入;第二输入携带有标识目标应用程序的信息和标识目标权限的信息;
处理器710,还用于响应于第二输入,关闭第二应用程序的目标权限;目标应用程序是第二应用程序中的一个。
应理解的是,本申请实施例中,输入单元704可以包括图形处理器(Graphics Processing Unit,GPU)7041和麦克风7042,图形处理器7041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元706可包括显示面板7061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板7061。用户输入单元707包括触控面板7071以及其他输入设备7072中的至少一种。触控面板7071,也称为触摸屏。触控面板7071可包括触摸检测装置和触摸控制器两个部分。其他输入设备7072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。
存储器709可用于存储软件程序以及各种数据。存储器709可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等。此外,存储器709可以包括易失性存储器或非易失性存储器,或者,存储器709可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、 双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器709包括但不限于这些和任意其它适合类型的存储器。
处理器710可包括一个或多个处理单元;可选的,处理器710集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器710中。
本申请实施例还提供一种可读存储介质,所述可读存储介质上存储有程序或指令,该程序或指令被处理器执行时实现上述应用程序的权限管理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
其中,所述处理器为上述实施例中所述的电子设备中的处理器。所述可读存储介质,包括计算机可读存储介质,如计算机只读存储器ROM、随机存取存储器RAM、磁碟或者光盘等。
本申请实施例另提供了一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现上述应用程序的权限管理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片、系统芯片、芯片系统或片上系统芯片等。
本申请实施例提供一种计算机程序产品,该程序产品被存储在存储介质中,该程序产品被至少一个处理器执行以实现如上述应用程序的权限管理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。
本申请实施例还提供了一种电子设备,该电子设备被配置成用于实现上述方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不 再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。

Claims (15)

  1. 一种应用程序的权限管理方法,包括:
    在接收到用户的语音输入的情况下,识别所述语音输入的内容信息;
    根据所述内容信息,确定与所述内容信息匹配的目标应用程序;
    开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限;
    其中,所述第一权限与所述目标权限匹配,所述第一应用程序与所述目标应用程序不同。
  2. 根据权利要求1所述的应用程序的权限管理方法,其中,所述开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限之后,所述方法还包括:
    在时间阈值内未接收到对所述目标应用程序的第一输入的情况下,关闭所述目标应用程序的所述目标权限。
  3. 根据权利要求1所述的应用程序的权限管理方法,其中,所述根据所述内容信息,确定与所述内容信息匹配的目标应用程序,包括:
    在所述内容信息包括目标关键词的情况下,将与所述目标关键词对应的应用程序确定为所述目标应用程序。
  4. 根据权利要求1所述的应用程序的权限管理方法,其中,所述识别所述语音输入的内容信息之前,所述方法还包括:
    记录所述语音输入的内容信息;
    所述根据所述内容信息,确定与所述内容信息匹配的目标应用程序之后,所述方法还包括:
    删除所述内容信息。
  5. 根据权利要求1至4任一所述的应用程序的权限管理方法,其中,在接收到用户的语音输入之前,所述方法还包括:
    接收第二输入;所述第二输入携带有标识所述目标应用程序的信息和标识所述目标权限的信息;
    响应于所述第二输入,关闭第二应用程序的目标权限;所述目标应用程序是所述第二应用程序中的一个。
  6. 一种应用程序的权限管理装置,包括:
    识别模块,用于在接收到用户的语音输入的情况下,识别所述语音输入的内容信息;
    确定模块,用于根据所述内容信息,确定与所述内容信息匹配的目标应用程序;
    权限管理模块,用于开启所述目标应用程序的目标权限,并关闭第一应用程序的第一权限;
    其中,所述第一权限与所述目标权限匹配,所述第一应用程序与所述目标应用程序不同。
  7. 根据权利要求6所述的应用程序的权限管理装置,其中所述权限管理模块,还用于在时间阈值内未接收到对所述目标应用程序的第一输入的情况下,关闭所述目标应用程序的所述目标权限。
  8. 根据权利要求6所述的应用程序的权限管理装置,其中,所述确定模块,具体用于在所述内容信息包括目标关键词的情况下,将与所述目标关键词对应的应用程序确定为所述目标应用程序。
  9. 根据权利要求6所述的应用程序的权限管理装置,其中,还包括:
    信息记录模块,用于记录所述语音输入的内容信息;
    信息删除模块,用于在根据所述内容信息,确定与所述内容信息匹配的目标应用程序之后,删除所述内容信息。
  10. 根据权利要求6至9任一所述的应用程序的权限管理装置,其中,还包括:
    输入模块,用于接收第二输入;所述第二输入携带有标识所述目标应用程序的信息和标识所述目标权限的信息;
    所述权限管理模块,还用于响应于所述第二输入,关闭第二应用程序的目标权限;所述目标应用程序是所述第二应用程序中的一个。
  11. 一种电子设备,包括处理器,存储器及存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如权利要求1-5任一项所述的应用程序的权限管理方法。
  12. 一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如权利要求1-5任一项所述的应用程序的权限管理方法。
  13. 一种芯片,所述芯片包括处理器和通信接口,所述通信接口和所述处理器耦合,所述处理器用于运行程序或指令,实现如权利要求1-5任一项所述的应用程序的权限管理方法。
  14. 一种计算机程序产品,所述计算机程序产品被至少一个处理器执行以实现如权利要求1-5任一项所述的应用程序的权限管理方法。
  15. 一种电子设备,所述电子设备被配置成用于执行如权利要求1-5任一项所述的应用程序的权限管理方法。
PCT/CN2023/092200 2022-05-06 2023-05-05 应用程序的权限管理方法及装置 WO2023213289A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210489624.9A CN114880724A (zh) 2022-05-06 2022-05-06 应用程序的权限管理方法及装置
CN202210489624.9 2022-05-06

Publications (1)

Publication Number Publication Date
WO2023213289A1 true WO2023213289A1 (zh) 2023-11-09

Family

ID=82673091

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/092200 WO2023213289A1 (zh) 2022-05-06 2023-05-05 应用程序的权限管理方法及装置

Country Status (2)

Country Link
CN (1) CN114880724A (zh)
WO (1) WO2023213289A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114880724A (zh) * 2022-05-06 2022-08-09 深圳市艾酷通信软件有限公司 应用程序的权限管理方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008160753A (ja) * 2006-12-26 2008-07-10 Nec Corp 携帯端末の機能制限方法及び携帯端末
CN106910499A (zh) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 应用程序的控制方法及装置
CN108877793A (zh) * 2018-05-30 2018-11-23 Oppo广东移动通信有限公司 应用控制方法、装置、存储介质及电子设备
CN109063467A (zh) * 2013-05-27 2018-12-21 华为终端(东莞)有限公司 系统功能调用的方法、装置及终端
CN114880724A (zh) * 2022-05-06 2022-08-09 深圳市艾酷通信软件有限公司 应用程序的权限管理方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008160753A (ja) * 2006-12-26 2008-07-10 Nec Corp 携帯端末の機能制限方法及び携帯端末
CN109063467A (zh) * 2013-05-27 2018-12-21 华为终端(东莞)有限公司 系统功能调用的方法、装置及终端
CN106910499A (zh) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 应用程序的控制方法及装置
CN108877793A (zh) * 2018-05-30 2018-11-23 Oppo广东移动通信有限公司 应用控制方法、装置、存储介质及电子设备
CN114880724A (zh) * 2022-05-06 2022-08-09 深圳市艾酷通信软件有限公司 应用程序的权限管理方法及装置

Also Published As

Publication number Publication date
CN114880724A (zh) 2022-08-09

Similar Documents

Publication Publication Date Title
US9921853B2 (en) Contextual history of computing objects
WO2012065557A1 (zh) 保护设备中存储的数据的方法和相应的设备
WO2018108173A1 (zh) 服务器、可穿戴设备及其相应的权限控制方法和装置
WO2016202241A1 (zh) 应用程序开启方法和应用程序开启系统
WO2023213289A1 (zh) 应用程序的权限管理方法及装置
CN105612485A (zh) 一种运行应用程序的方法及装置
CN108615158B (zh) 风险检测方法、装置、移动终端和存储介质
KR102071530B1 (ko) 디나이얼 발생시 대응 메뉴얼을 제안하는 전자 장치 및 방법
CN112784262A (zh) 数据访问方法、装置、终端及存储介质
WO2023246715A1 (zh) 目标应用的网络连接控制方法、装置和电子设备
CN113360863A (zh) 操作执行方法、装置、电子设备及介质
US20150235040A1 (en) Information processing apparatus and method, information processing system, and program
CN107239236A (zh) 数据写入方法及装置
WO2023202618A1 (zh) 数据发送方法和装置
AU2018256658B2 (en) Contextual history of computing objects
US20230177196A1 (en) Resource management method, computing device, computing equipment, and readable storage medium
WO2023024455A1 (zh) 语音交互方法及电子设备
CN115758425A (zh) 一种安全访问控制方法、装置和可读存储介质
CN114386113A (zh) 一种移动存储设备读写控制方法、装置、设备及存储介质
CN106571134A (zh) 一种防偷录方法及终端
CN107256151A (zh) 页面渲染的处理方法、装置及终端
CN105787302A (zh) 一种应用程序的处理方法、装置及电子设备
WO2019095449A1 (zh) 一种防止个人信息泄露的方法和装置
US20140059701A1 (en) Method of protecting and managing digital contents and apparatus thereof
KR102668238B1 (ko) 전자 장치 및 그 동작 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23799275

Country of ref document: EP

Kind code of ref document: A1