CN106096425A - System permission starting method, device and equipment - Google Patents
System permission starting method, device and equipment Download PDFInfo
- Publication number
- CN106096425A CN106096425A CN201610394290.1A CN201610394290A CN106096425A CN 106096425 A CN106096425 A CN 106096425A CN 201610394290 A CN201610394290 A CN 201610394290A CN 106096425 A CN106096425 A CN 106096425A
- Authority
- CN
- China
- Prior art keywords
- target application
- permission
- terminal
- authority
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention provides a method, a device and equipment for starting system permission. Wherein, the method comprises the following steps: the terminal outputs a service authority setting page, wherein the service authority setting page is used for indicating the service authority of starting the target application by a user, and the service authority is used for indicating that the system authority of the target application is allowed to be automatically started; and when the service authority setting page receives the operation of starting the service authority of the target application, which is input by a user, the terminal automatically starts the system authority corresponding to the target application. According to the embodiment of the invention, the system permission can be quickly opened.
Description
Technical Field
The invention relates to the technical field of electronics, in particular to a method, a device and equipment for opening system permission.
Background
Along with popularization and function enhancement of intelligent terminals such as smart phones and tablet computers, more and more applications are installed in the smart phones, and operation and use of systems are more and more complicated. Generally, an application needs to acquire some rights of the system (i.e. system rights) to realize some functions when the application is in normal operation, for example, the existing third-party screen locking application can display the notification bar of the instant messaging application such as QQ, WeChat and the like on the screen locking page, so as to notify the user of the arrival of a new message in time, however, if the third-party screen locking application needs to implement the above function, the content of the notification bar must be read only with the authority of "notification right of use" (i.e. the permission of the system is required), some set switches in the existing mobile phones are hidden more secretly, which makes it difficult for the user to find the corresponding opening mode, the common mode of opening "notification right of use" is to guide the user to check through the product page, the permission setting mode is complicated, and once the user cannot find the permission setting mode, the function of the third-party screen locking application is lost, so that the use experience of the user is influenced.
Disclosure of Invention
The embodiment of the invention provides a method, a device and equipment for opening system permission, which can solve the technical problem that the permission for opening the system for application is complex.
The first aspect of the embodiments of the present invention provides a method for opening a system right, including:
the terminal outputs a service authority setting page, wherein the service authority setting page is used for indicating the service authority of starting the target application by a user, and the service authority is used for indicating that the system authority of the target application is allowed to be automatically started;
and when the service authority setting page receives the operation of starting the service authority of the target application, which is input by a user, the terminal automatically starts the system authority corresponding to the target application.
With reference to the implementation manner of the first aspect of the embodiments of the present invention, in a first possible implementation manner of the first aspect, before the terminal automatically starts the system right corresponding to the target application, the method further includes:
the terminal acquires the model information of the terminal;
the terminal judges whether the model information of the terminal is matched with preset model information or not, and if the model information of the terminal is matched with the preset model information, an automatic click rule corresponding to the model information of the terminal is obtained;
the terminal automatically starts the system authority corresponding to the target application, and the method comprises the following steps:
and the terminal automatically clicks the system authority corresponding to the target application according to the automatic clicking rule.
With reference to the first possible implementation manner of the first aspect of the embodiments of the present invention, in a second possible implementation manner of the first aspect, the automatically clicking, by the terminal, the system permission corresponding to the target application according to the automatic click rule includes:
and the terminal starts a system authority setting page corresponding to the target application according to the automatic clicking rule and automatically clicks an opening button of the system authority corresponding to the target application on the system authority setting page.
With reference to the second possible implementation manner of the first aspect of the embodiment of the present invention, in a third possible implementation manner of the first aspect, the automatically clicking an open button of a system permission corresponding to the target application on the system permission setting page includes:
outputting a prompt box for confirming whether the system permission corresponding to the target application is allowed to be opened or not on the system permission setting page;
and the terminal clicks an operation permission button in the prompt box, wherein the operation permission button is used for indicating permission of starting the system authority corresponding to the target application.
With reference to the third possible implementation manner of the first aspect of the embodiment of the present invention, in a fourth possible implementation manner of the first aspect, the clicking a button allowing operation in the prompt box includes:
and judging whether the operation-allowed button exists in the prompt box according to the identifier of the operation-allowed button in the prompt box, if so, clicking the operation-allowed button, wherein the identifier of the operation-allowed button comprises a name corresponding to the operation-allowed button or a resource identifier corresponding to the operation-allowed button.
In a second aspect, an embodiment of the present invention provides an apparatus for opening system permissions, including:
the system comprises a first output unit, a second output unit and a third output unit, wherein the first output unit is used for outputting a service permission setting page, the service permission setting page is used for indicating a service permission of a user for starting a target application, and the service permission is used for indicating that the system permission of the target application is allowed to be automatically started;
and the starting unit is used for automatically starting the system authority corresponding to the target application after receiving the operation of starting the service authority of the target application, which is input by a user, on the service authority setting page.
With reference to the implementation manner of the second aspect of the embodiment of the present invention, in a first possible implementation manner of the second aspect, the method further includes:
the first acquisition unit is used for acquiring the model information of the terminal;
the judging unit is used for judging whether the model information of the terminal is matched with preset model information;
the second obtaining unit is used for obtaining an automatic click rule corresponding to the model information of the terminal if the judging unit judges that the model information of the terminal is matched with preset model information;
the opening unit is specifically configured to:
and automatically clicking the system authority corresponding to the target application according to the automatic clicking rule.
With reference to the first possible implementation manner of the second aspect of the embodiment of the present invention, in a second possible implementation manner of the second aspect, the opening unit is specifically configured to:
and starting a system authority setting page corresponding to the target application according to the automatic clicking rule, and automatically clicking an opening button of the system authority corresponding to the target application on the system authority setting page.
With reference to the second possible implementation manner of the second aspect of the embodiment of the present invention, in a third possible implementation manner of the second aspect, the opening unit includes:
the second output unit is used for starting a system permission setting page corresponding to the target application according to the automatic click rule and outputting a prompt box for confirming whether the system permission corresponding to the target application is allowed to be started or not on the system permission setting page;
and the clicking unit is used for clicking an operation permission button in the prompt box, and the operation permission button is used for indicating permission of opening the system authority corresponding to the target application.
With reference to the third possible implementation manner of the second aspect of the embodiment of the present invention, in a fourth possible implementation manner of the second aspect, the click unit is specifically configured to:
and judging whether the operation-allowed button exists in the prompt box according to the identifier of the operation-allowed button in the prompt box, if so, clicking the operation-allowed button, wherein the identifier of the operation-allowed button comprises a name corresponding to the operation-allowed button or a resource identifier corresponding to the operation-allowed button.
A third aspect of the embodiments of the present invention provides an apparatus for opening a system right, including: a processor, a memory, a communication interface, and a bus;
the processor, the memory and the communication interface are connected through the bus and complete mutual communication; the memory stores executable program code; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to execute a system authority opening method; wherein the method comprises the following steps:
outputting a service permission setting page, wherein the service permission setting page is used for indicating the service permission of a user for starting a target application, and the service permission is used for indicating that the system permission of the target application is allowed to be automatically started;
and when receiving the operation of starting the service authority of the target application input by the user on the service authority setting page, automatically starting the system authority corresponding to the target application.
A fourth aspect of the embodiments of the present invention provides a storage medium, where the storage medium is used to store an application program, and the application program is used to execute the method for opening system permissions according to the embodiments of the present invention when running.
A fifth aspect of the embodiment of the present invention provides an application program, where the application program is configured to execute the method for opening a system privilege according to the embodiment of the present invention when running.
The embodiment of the invention has the following beneficial effects:
the user only needs to perform input operation once on the terminal interface, and after receiving the operation of starting the service permission corresponding to the target application, which is input by the user, the terminal automatically starts the system permission corresponding to the target application without needing the user to perform manual input operation for many times, so that the system permission of the target application can be quickly started.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for opening system permissions according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a page of a killing detection result according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a service right setting page provided by an embodiment of the present invention;
fig. 4 is a schematic diagram of a page for prompting a user how to open a service authority of a CM Locker according to an embodiment of the present invention;
fig. 5 is a schematic diagram of another page for prompting a user how to open a service authority of CM Locker according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a service permission start setting page of the CM Locker provided in the embodiment of the present invention;
fig. 7 is a schematic page diagram of a system permission for prompting a user that a CM Locker is being started according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a display page after the system authority of CM Locker is turned on according to the embodiment of the present invention;
FIG. 9 is a diagram of a prompt box provided by an embodiment of the invention;
fig. 10 is a schematic structural diagram of an apparatus for opening system permissions according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an opening device for system permissions according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of the invention and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
The devices described in the following embodiments of the present invention include smart phones (such as Android phones, iOS phones, Windows Phone phones, and the like), tablet computers, simulators, and the like.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a method for opening system permissions according to an embodiment of the present invention. As shown in fig. 1, the method for opening the system right may include, but is not limited to, the following steps.
S101, a terminal outputs a service permission setting page, wherein the service permission setting page is used for indicating a user to start service permission of a target application, and the service permission is used for indicating that automatic starting operation is allowed to be carried out on system permission of the target application.
In the embodiment of the invention, the service permission setting page comprises an opening button of the service permission corresponding to the target application, prompt information for guiding a user to open the service permission corresponding to the target application can be displayed on the service permission setting page, the user is guided to open the service permission corresponding to the target application, and the user can click the opening button on the service permission setting page to open the service permission corresponding to the target application. Wherein the target application includes, but is not limited to, a third party screen lock application, such as a cheetah screen lock master (CM Locker) application.
Optionally, when the terminal receives a preset trigger instruction, the terminal outputs a service permission setting page, where the preset trigger instruction may be: when the terminal carries out system checking and killing, the fact that the user does not open the system authority of the target application (such as CMLocker) is detected, a checking and killing detection result page is output, the user can click a one-key protection button or a one-key checking and killing button on the page, and after the terminal detects that the user clicks the one-key protection button or the one-key checking and killing button, the service authority setting page is output, so that the user is prompted to open the service authority of the CM Locker, and then the terminal automatically opens the system authority corresponding to the CM Locker, and the CM Locker can normally run some functions (for example, the function of displaying a notification column on a lock screen page). The page of the killing detection result can be seen in fig. 2. The preset trigger instruction may also be: the terminal detects that the user downloads the installation package corresponding to the CM Locker and successfully installs the CM Locker, and the terminal outputs a service authority setting page at the moment, so that the user is prompted to start the service authority of the CM Locker, and then the terminal automatically starts the system authority corresponding to the CM Locker, and the CM Locker can normally run some functions (for example, the function of displaying a notification bar on a lock screen page).
For example, please refer to fig. 3, which is a schematic diagram of a service authority setting page, in fig. 3, a "barrier-free" page is a service authority setting page, in the "barrier-free" page 10, a service authority opening item 11 corresponding to CM Locker is included, optionally, the terminal may further display a prompt message "please open the service authority of CM Locker" in the "barrier-free" page 10, so as to prompt the user to open the service authority of CM Locker on the "barrier-free" page 10. Optionally, the terminal may also pop up a page for prompting the user how to open the service right of the CM Locker on the "no-obstacle" page 10, and notify the user how to open the service right of the CM Locker through the popped-up page, which may be shown in fig. 4 and 5, where two pages are sequentially displayed by the terminal to prompt the user how to open the service right of the CM Locker. The user clicks the service permission opening item 11 corresponding to the CM Locker on the "no-obstacle" page 10, the terminal enters the service permission opening setting page 20 of the CM Locker, see fig. 6, in fig. 6, the service permission opening setting page 20 of the CM Locker includes an opening button 21, the user clicks the opening button 21 to open the service permission of the CM Locker, the terminal can output a prompt message to tell the user what operation will be performed after the service permission is opened, for example, the content displayed on the service permission opening setting page 20 of the CM Locker "is noticed: on, you will receive a routine privacy risk prompt. Please use it for reassurance, CM Locker will not collect any private data about you ".
S102, after receiving the operation of starting the service authority of the target application, which is input by a user, on the service authority setting page, the terminal automatically starts the system authority corresponding to the target application.
In the embodiment of the invention, after the terminal receives the operation of opening the service permission of the target application, which is input by the user, on the service permission setting page, the terminal automatically opens the system permission corresponding to the target application, instead of manually finding the opening setting page of the system permission of the target application by the user and then manually clicking.
As an optional implementation manner, after receiving an operation of opening the service right of the target application, which is input by a user, on the service right setting page, the terminal directly sets a system right corresponding to opening the target application in system setting, without realizing opening the system right corresponding to the target application through a series of simulated click operations.
As another optional implementation manner, after receiving an operation of opening the service right of the target application, which is input by a user, on the service right setting page, the terminal performs a series of simulated click operations to open the system right corresponding to the target application. Specifically, the terminal starts a system permission setting page corresponding to the target application, and clicks an open button of the system permission corresponding to the target application on the system permission setting page.
Taking CM Locker as an example for explanation, the system authority that CM Locker needs to be opened mainly includes: "notification usage rights" and "data access rights". The system permission setting page includes: a "notification usage right" setting page and a "data access right" setting page. After a user clicks an open button 21 on a service authority opening setting page 20 of the CM Locker, the terminal automatically jumps to a setting page of a notification use right corresponding to the CM Locker and automatically performs click operation to open the notification use right of the CM Locker, the terminal automatically jumps to a setting page of a data access right corresponding to the CM Locker and automatically performs click operation to open the data access right of the CM Locker, after the two system authorities are opened, the CM Locker can access data of other applications, such as instant messaging application, and messages of the instant messaging application can be displayed on a screen locking page of the CM Locker, so that the user is timely notified that new messages arrive, and the use of the user is facilitated.
Optionally, the terminal jumps to a setting page of "notification usage right" corresponding to the CM Locker and automatically performs a click operation to open the "notification usage right" of the CM Locker, the terminal automatically jumps to the setting page of "data access right" corresponding to the CM Locker and automatically performs a series of operations of the click operation, which may not be displayed to the user but performed in the background, the operation processes are hidden and invisible to the user, and the terminal may display a processed page to prompt the user that the user is starting the system authority of the CM Locker, for example, see fig. 7. The terminal may output a final result to the user after performing the above-described series of operations, informing the user that the "notification use right" and the "data access right" of the CM Locker have been turned on. For example, see FIG. 8, which is a display page after the system permissions of the target application are opened.
Optionally, the automatically clicking an open button of the system permission corresponding to the target application on the system permission setting page includes:
outputting a prompt box for confirming whether the system permission corresponding to the target application is allowed to be opened or not on the system permission setting page; the terminal clicks an operation permission button in the prompt box, wherein the operation permission button is used for indicating that the system permission corresponding to the target application is allowed to be started:
according to the manual click operation process in the prior art, after the user clicks the button for opening the "notification usage right" on the setting interface of the "notification usage right", the terminal outputs a prompt box to prompt the user to confirm whether to allow opening the "notification usage right", as shown in fig. 9. According to the existing manual clicking operation process, after the terminal outputs a prompt box for confirming whether to allow the 'notice right of use' of the CMLocker to be opened or not, the terminal can automatically perform clicking operation in the prompt box, click an operation button for confirming whether to allow the 'notice right of use' of the CM Locker to be opened or not, and in the process of automatically opening the 'data access right' of the CM Locker, the terminal also outputs the prompt box for confirming whether to allow the 'data access right' of the CM Locker to be opened or not, and then automatically perform clicking operation in the prompt box, click an operation button for allowing the 'data access right' of the CM Locker to be opened or not.
Specifically, clicking the operation-allowed button in the prompt box includes:
and judging whether the operation-allowed button exists in the prompt box according to the identifier of the operation-allowed button in the prompt box, if so, clicking the operation-allowed button, wherein the identifier of the operation-allowed button comprises a name corresponding to the operation-allowed button or a resource identifier corresponding to the operation-allowed button.
Referring to fig. 9, after the terminal outputs a prompt box for confirming whether to allow the CM Locker to be opened, the terminal searches whether there is an "allow" button in the prompt box, and if it is determined that there is an "allow" button in the prompt box, the terminal clicks the "allow" button. The terminal searches Node content (English: Node Detail) corresponding to the prompt box, whether content text is 'allowed' is searched in the Node Detail, or whether resource identification (English: resource-id) is 'android: id/button 1' is searched in the Node Detail, if the text is 'allowed', or if the resource-id is 'android: id/button 1', it indicates that an 'allowed' button exists in the current prompt box, so that the terminal can click the 'allowed' button in the prompt box to determine 'notification use right' for opening the CM Locker. The problem that the displayed contents of the permission buttons are inconsistent due to the multi-language problem can be solved by searching for the resource-id, for example, for a Chinese mobile phone, the text corresponding to the "permission" button is "permission", while for other countries, the text may not be "permission", but for different countries, the displayed contents of the resource-id are basically consistent, so that whether the "permission" button exists in the prompt box can be judged by searching for the resource-id.
Optionally, before the terminal automatically opens the system permission corresponding to the target application, the terminal acquires model information of the terminal, and determines whether the model information of the terminal matches preset model information, where the preset model information is model information that can implement automatic click on the system permission corresponding to the target application, for example, the preset model information is a model information whose system version is above Android 5.0 and whose Application Programming Interface (API) of the system is >20, and if the system version of the terminal is above Android 5.0 and API is >20, the terminal matches the preset model information. And if the model information of the terminal is judged to be matched with the preset model information, acquiring an automatic click rule corresponding to the model information of the terminal, and then carrying out a processing process of automatically clicking the system authority corresponding to the target application according to the automatic click rule. It should be noted that, when terminals of different models leave a factory, the text and the value set for the "allow" button may differ, for example, the text corresponding to the "allow" button set by some terminals is "allow", the text corresponding to the "allow" button set by some other terminals may be "determine", and for the resource-ID, the resource ID corresponding to the "allow" button set by some terminals may be "android: ID/button 1", the resource ID corresponding to the "allow" button set by some other terminals may be "android: ID/button 3", so that, before performing an auto-click process, an auto-click rule corresponding to the current terminal needs to be obtained, the auto-click rule records the text value corresponding to the "allow" button and the value of the resource ID corresponding to the "allow" button, and the terminal may automatically click to open the corresponding target application according to the auto-click rule corresponding to the model information of the terminal The system authority of (1).
It can be seen that, in the method described in fig. 1, a user only needs to perform an input operation on a terminal interface once, and after receiving an operation of starting a service right corresponding to a target application, which is input by the user, the terminal automatically starts a system right corresponding to the target application, and does not need the user to perform multiple manual input operations, so that the system right of the target application can be quickly started.
While the method of the embodiments of the present invention has been described in detail, in order to better implement the above-described aspects of the embodiments of the present invention, the following also provides related apparatus for implementing the aspects.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an opening device for system permissions according to an embodiment of the present invention. As shown in fig. 10, the apparatus 100 for opening a system right includes: a first output unit 1001 and an opening unit 1002, wherein,
a first output unit 1001 configured to output a service authority setting page, where the service authority setting page is used to indicate a service authority for a user to open a target application, and the service authority is used to indicate that an automatic opening operation is allowed for a system authority of the target application;
the starting unit 1002 is configured to automatically start the system permission corresponding to the target application after receiving an operation of starting the service permission of the target application, which is input by a user, on the service permission setting page.
Optionally, the device 100 for opening system authority further includes:
the first acquisition unit is used for acquiring the model information of the terminal;
the judging unit is used for judging whether the model information of the terminal is matched with preset model information;
the second obtaining unit is used for obtaining an automatic click rule corresponding to the model information of the terminal if the judging unit judges that the model information of the terminal is matched with preset model information;
the opening unit 1002 is specifically configured to:
and automatically clicking the system authority corresponding to the target application according to the automatic clicking rule.
Optionally, the starting unit 1002 is specifically configured to:
and starting a system authority setting page corresponding to the target application according to the automatic clicking rule, and automatically clicking an opening button of the system authority corresponding to the target application on the system authority setting page.
Optionally, the opening unit 1002 includes:
the second output unit is used for starting a system permission setting page corresponding to the target application according to the automatic click rule and outputting a prompt box for confirming whether the system permission corresponding to the target application is allowed to be started or not on the system permission setting page;
and the clicking unit is used for clicking an operation permission button in the prompt box, and the operation permission button is used for indicating permission of opening the system authority corresponding to the target application.
Optionally, the click unit is specifically configured to:
and judging whether the operation-allowed button exists in the prompt box according to the identifier of the operation-allowed button in the prompt box, if so, clicking the operation-allowed button, wherein the identifier of the operation-allowed button comprises a name corresponding to the operation-allowed button or a resource identifier corresponding to the operation-allowed button.
It is understood that the functions of the functional units of the system privilege opener 100 of the present embodiment can be specifically implemented according to the method of the embodiment of the method of fig. 1, and are not described herein again.
Fig. 11 is a schematic structural diagram of an opening device for system permissions according to the present invention. The system right opening device 1100 described in this embodiment includes: at least one processor 1101, a communication interface 1102, a user interface 1103 and a memory 1104, where the processor 1101, the communication interface 1102, the user interface 1103 and the memory 1104 may be connected by a bus or other means, and the embodiment of the present invention is exemplified by being connected by the bus 1105. Wherein,
processor 1101 may be a general purpose processor such as a Central Processing Unit (CPU).
The communication interface 1102 may be a wired interface (e.g., an ethernet interface) or a wireless interface (e.g., a cellular network interface or using a wireless local area network interface) for communicating with other devices or servers.
The user interface 1103 may be specifically a touch panel, including a touch screen and a touch screen, for detecting an operation instruction on the touch panel, and the user interface 1103 may also be a physical button or a mouse. The user interface 1103 may also be a display screen for outputting and displaying images or data.
The Memory 1104 may include a Volatile Memory (RAM), such as a Random Access Memory (RAM); the Memory may also include a Non-Volatile Memory (ROM), a Flash Memory, a Hard Disk (HDD), or a Solid State Drive (SSD); the memory 1104 may also comprise a combination of memories of the kind described above. The memory 1104 is used for storing the preset threshold, the preset white list, the preset black list and the preset time point described in the above embodiments. The memory 1104 is used for storing a program code for detecting CPU occupation, and the processor 1101 is used for calling the program code stored in the memory 1104 and executing the following operations:
the processor 1101 outputs a service permission setting page, where the service permission setting page is used to instruct a user to start a service permission of a target application, and the service permission is used to instruct that an automatic start operation is allowed for a system permission of the target application;
after receiving the operation of starting the service right of the target application, which is input by the user, on the service right setting page, the processor 1101 automatically starts the system right corresponding to the target application.
Optionally, before the processor 1101 automatically starts the system authority corresponding to the target application, the processor 1101 is further configured to:
acquiring the model information of the terminal;
judging whether the model information of the terminal is matched with preset model information or not, and if so, acquiring an automatic click rule corresponding to the model information of the terminal;
the processor 1101 automatically opens the system permission corresponding to the target application, including:
the processor 1101 automatically clicks the system permission corresponding to the target application according to the automatic click rule.
Optionally, the automatically clicking the system permission corresponding to the target application by the processor 1101 according to the automatic click rule includes:
the processor 1101 starts a system permission setting page corresponding to the target application according to the automatic click rule, and automatically clicks an open button of the system permission corresponding to the target application on the system permission setting page.
Optionally, the automatically clicking, by the processor 1101, an open button of the system permission corresponding to the target application on the system permission setting page includes:
the processor 1101 outputs a prompt box for confirming whether to allow the system permission corresponding to the target application to be opened or not on the system permission setting page;
the processor 1101 clicks an operation permission button in the prompt box, where the operation permission button is used to indicate permission to open a system right corresponding to the target application.
Optionally, the processor 1101 clicks an operation-allowed button in the prompt box, including:
the processor 1101 judges whether the operation-allowed button exists in the prompt box according to the identifier of the operation-allowed button in the prompt box, and if so, clicks the operation-allowed button, wherein the identifier of the operation-allowed button includes a name corresponding to the operation-allowed button or a resource identifier corresponding to the operation-allowed button.
It is to be understood that the steps executed by the processor 1101 are specifically described with reference to the embodiment in fig. 1, and will not be described herein again.
In summary, by implementing the embodiment of the present invention, the user only needs to perform an input operation on the terminal interface once, and after receiving the operation of starting the service right corresponding to the target application, which is input by the user, the terminal automatically starts the system right corresponding to the target application, and does not need the user to perform multiple manual input operations, so that the system right of the target application can be quickly started.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a ROM, a RAM, or the like.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the system permission starting device provided by the embodiment of the invention can be merged, divided and deleted according to actual needs.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A method for opening system authority is characterized by comprising the following steps:
the terminal outputs a service authority setting page, wherein the service authority setting page is used for indicating the service authority of starting the target application by a user, and the service authority is used for indicating that the system authority of the target application is allowed to be automatically started;
and when the service authority setting page receives the operation of starting the service authority of the target application, which is input by a user, the terminal automatically starts the system authority corresponding to the target application.
2. The method according to claim 1, wherein before the terminal automatically opens the system right corresponding to the target application, the method further comprises:
the terminal acquires the model information of the terminal;
the terminal judges whether the model information of the terminal is matched with preset model information or not, and if the model information of the terminal is matched with the preset model information, an automatic click rule corresponding to the model information of the terminal is obtained;
the terminal automatically starts the system authority corresponding to the target application, and the method comprises the following steps:
and the terminal automatically clicks the system authority corresponding to the target application according to the automatic clicking rule.
3. The method according to claim 2, wherein the terminal automatically clicks the system permission corresponding to the target application according to the automatic click rule, and the method comprises the following steps:
and the terminal starts a system authority setting page corresponding to the target application according to the automatic clicking rule and automatically clicks an opening button of the system authority corresponding to the target application on the system authority setting page.
4. The method according to claim 3, wherein automatically clicking an open button of the system permission corresponding to the target application on the system permission setting page comprises:
outputting a prompt box for confirming whether the system permission corresponding to the target application is allowed to be opened or not on the system permission setting page;
and the terminal clicks an operation permission button in the prompt box, wherein the operation permission button is used for indicating permission of starting the system authority corresponding to the target application.
5. The method of claim 4, wherein clicking an operation-allowed button in the prompt box comprises:
and judging whether the operation-allowed button exists in the prompt box according to the identifier of the operation-allowed button in the prompt box, if so, clicking the operation-allowed button, wherein the identifier of the operation-allowed button comprises a name corresponding to the operation-allowed button or a resource identifier corresponding to the operation-allowed button.
6. An apparatus for opening system permissions, comprising:
the system comprises a first output unit, a second output unit and a third output unit, wherein the first output unit is used for outputting a service permission setting page, the service permission setting page is used for indicating a service permission of a user for starting a target application, and the service permission is used for indicating that the system permission of the target application is allowed to be automatically started;
and the starting unit is used for automatically starting the system authority corresponding to the target application after receiving the operation of starting the service authority of the target application, which is input by a user, on the service authority setting page.
7. The apparatus of claim 6, further comprising:
the first acquisition unit is used for acquiring the model information of the terminal;
the judging unit is used for judging whether the model information of the terminal is matched with preset model information;
the second obtaining unit is used for obtaining an automatic click rule corresponding to the model information of the terminal if the judging unit judges that the model information of the terminal is matched with preset model information;
the opening unit is specifically configured to:
and automatically clicking the system authority corresponding to the target application according to the automatic clicking rule.
8. The device according to claim 7, characterized in that the activation unit is in particular configured to:
and starting a system authority setting page corresponding to the target application according to the automatic clicking rule, and automatically clicking an opening button of the system authority corresponding to the target application on the system authority setting page.
9. The apparatus of claim 8, wherein the opening unit comprises:
the second output unit is used for starting a system permission setting page corresponding to the target application according to the automatic click rule and outputting a prompt box for confirming whether the system permission corresponding to the target application is allowed to be started or not on the system permission setting page;
and the clicking unit is used for clicking an operation permission button in the prompt box, and the operation permission button is used for indicating permission of opening the system authority corresponding to the target application.
10. An apparatus for opening a system right, comprising: a processor, a memory, a communication interface, and a bus;
the processor, the memory and the communication interface are connected through the bus and complete mutual communication; the memory stores executable program code; the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to execute a system authority opening method; wherein the method comprises the following steps:
outputting a service permission setting page, wherein the service permission setting page is used for indicating the service permission of a user for starting a target application, and the service permission is used for indicating that the system permission of the target application is allowed to be automatically started;
and when receiving the operation of starting the service authority of the target application input by the user on the service authority setting page, automatically starting the system authority corresponding to the target application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610394290.1A CN106096425A (en) | 2016-06-06 | 2016-06-06 | System permission starting method, device and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610394290.1A CN106096425A (en) | 2016-06-06 | 2016-06-06 | System permission starting method, device and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106096425A true CN106096425A (en) | 2016-11-09 |
Family
ID=57447919
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610394290.1A Pending CN106096425A (en) | 2016-06-06 | 2016-06-06 | System permission starting method, device and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096425A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599680A (en) * | 2016-12-22 | 2017-04-26 | 北京猎豹移动科技有限公司 | Application program permission setting method and apparatus, and electronic equipment |
CN106648779A (en) * | 2016-12-26 | 2017-05-10 | 竞技世界(北京)网络技术有限公司 | Intelligent terminal floating window permission setting method |
CN106886692A (en) * | 2017-03-23 | 2017-06-23 | 北京金山安全软件有限公司 | Application program using method and device and electronic equipment |
CN107016281A (en) * | 2017-03-23 | 2017-08-04 | 北京金山安全软件有限公司 | Permission setting method and device of application program and electronic equipment |
CN107329659A (en) * | 2017-06-30 | 2017-11-07 | 北京金山安全软件有限公司 | Permission setting method and device, electronic equipment and storage medium |
CN107342992A (en) * | 2017-06-27 | 2017-11-10 | 努比亚技术有限公司 | A kind of System right management method, apparatus and computer-readable recording medium |
CN108093057A (en) * | 2017-12-25 | 2018-05-29 | 北京金山安全软件有限公司 | Method and device for guiding permission to be opened |
CN108334261A (en) * | 2018-01-12 | 2018-07-27 | 口碑(上海)信息技术有限公司 | The open method and device of miscellaneous function |
CN108460035A (en) * | 2017-02-17 | 2018-08-28 | 阿里巴巴集团控股有限公司 | A kind of method and device of acquisition and the page processing of accessible functional status |
CN108647070A (en) * | 2018-04-18 | 2018-10-12 | Oppo广东移动通信有限公司 | Information prompting method, device, mobile terminal and computer-readable medium |
CN108959939A (en) * | 2018-04-18 | 2018-12-07 | 腾讯科技(深圳)有限公司 | A kind of system permission open method, device, system and storage medium |
CN109255214A (en) * | 2018-09-13 | 2019-01-22 | 广东电网有限责任公司 | A kind of authority configuring method and device |
CN109521924A (en) * | 2018-11-27 | 2019-03-26 | 麒麟合盛网络技术股份有限公司 | A kind of method and apparatus of auxiliary user's selection target application |
CN109669730A (en) * | 2018-12-26 | 2019-04-23 | 北京达佳互联信息技术有限公司 | A kind of process keepalive method, device, electronic equipment and medium |
CN109840421A (en) * | 2017-11-24 | 2019-06-04 | 深圳市优必选科技有限公司 | An operating system rights management method, device and terminal |
CN109858200A (en) * | 2018-12-25 | 2019-06-07 | 北京奇安信科技有限公司 | A kind of processing method and terminal of optimization software activation |
CN111125768A (en) * | 2019-12-26 | 2020-05-08 | 联想(北京)有限公司 | Information processing method, information processing apparatus, electronic device, and medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004102457A2 (en) * | 2003-05-06 | 2004-11-25 | Siemens Medical Solutions Health Services Corporation | A personnel and process management system suitable for healthcare and other fields |
CN101415041A (en) * | 2007-10-17 | 2009-04-22 | Tcl天一移动通信(深圳)有限公司 | Method for automatically refusing incoming call |
CN101702744A (en) * | 2009-11-05 | 2010-05-05 | 中兴通讯股份有限公司 | Method of application function automatic activation and corresponding cellphone terminal |
CN101778487A (en) * | 2009-12-23 | 2010-07-14 | 惠州Tcl移动通信有限公司 | Method for automatically starting appointed function of mobile communication terminal when startup |
CN101866294A (en) * | 2010-05-26 | 2010-10-20 | 深圳桑菲消费通信有限公司 | Method for automatic operation of mobile phone application software |
CN102970433A (en) * | 2012-11-27 | 2013-03-13 | 广东欧珀移动通信有限公司 | A method for processing an incoming call from a mobile phone |
CN103324482A (en) * | 2013-06-27 | 2013-09-25 | 苏州创智宏云信息科技有限公司 | Android one-key root permission software |
CN104133694A (en) * | 2014-07-11 | 2014-11-05 | 上海一端科技有限公司 | Method for automatically starting applications after boosting |
CN104348628A (en) * | 2014-12-01 | 2015-02-11 | 北京奇虎科技有限公司 | Method and device for obtaining local Root authority |
-
2016
- 2016-06-06 CN CN201610394290.1A patent/CN106096425A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2004102457A2 (en) * | 2003-05-06 | 2004-11-25 | Siemens Medical Solutions Health Services Corporation | A personnel and process management system suitable for healthcare and other fields |
CN101415041A (en) * | 2007-10-17 | 2009-04-22 | Tcl天一移动通信(深圳)有限公司 | Method for automatically refusing incoming call |
CN101702744A (en) * | 2009-11-05 | 2010-05-05 | 中兴通讯股份有限公司 | Method of application function automatic activation and corresponding cellphone terminal |
CN101778487A (en) * | 2009-12-23 | 2010-07-14 | 惠州Tcl移动通信有限公司 | Method for automatically starting appointed function of mobile communication terminal when startup |
CN101866294A (en) * | 2010-05-26 | 2010-10-20 | 深圳桑菲消费通信有限公司 | Method for automatic operation of mobile phone application software |
CN102970433A (en) * | 2012-11-27 | 2013-03-13 | 广东欧珀移动通信有限公司 | A method for processing an incoming call from a mobile phone |
CN103324482A (en) * | 2013-06-27 | 2013-09-25 | 苏州创智宏云信息科技有限公司 | Android one-key root permission software |
CN104133694A (en) * | 2014-07-11 | 2014-11-05 | 上海一端科技有限公司 | Method for automatically starting applications after boosting |
CN104348628A (en) * | 2014-12-01 | 2015-02-11 | 北京奇虎科技有限公司 | Method and device for obtaining local Root authority |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599680B (en) * | 2016-12-22 | 2020-01-03 | 北京猎豹移动科技有限公司 | Method and device for setting application program permission and electronic equipment |
CN106599680A (en) * | 2016-12-22 | 2017-04-26 | 北京猎豹移动科技有限公司 | Application program permission setting method and apparatus, and electronic equipment |
CN106648779A (en) * | 2016-12-26 | 2017-05-10 | 竞技世界(北京)网络技术有限公司 | Intelligent terminal floating window permission setting method |
CN106648779B (en) * | 2016-12-26 | 2018-05-11 | 竞技世界(北京)网络技术有限公司 | A kind of intelligent terminal suspended window authority setting method |
CN108460035A (en) * | 2017-02-17 | 2018-08-28 | 阿里巴巴集团控股有限公司 | A kind of method and device of acquisition and the page processing of accessible functional status |
CN108460035B (en) * | 2017-02-17 | 2021-12-24 | 阿里巴巴集团控股有限公司 | Method and device for obtaining barrier-free function state and processing page |
CN106886692A (en) * | 2017-03-23 | 2017-06-23 | 北京金山安全软件有限公司 | Application program using method and device and electronic equipment |
CN107016281A (en) * | 2017-03-23 | 2017-08-04 | 北京金山安全软件有限公司 | Permission setting method and device of application program and electronic equipment |
CN107342992A (en) * | 2017-06-27 | 2017-11-10 | 努比亚技术有限公司 | A kind of System right management method, apparatus and computer-readable recording medium |
CN107329659A (en) * | 2017-06-30 | 2017-11-07 | 北京金山安全软件有限公司 | Permission setting method and device, electronic equipment and storage medium |
CN107329659B (en) * | 2017-06-30 | 2020-11-27 | 北京金山安全软件有限公司 | Permission setting method and device, electronic equipment and storage medium |
CN109840421A (en) * | 2017-11-24 | 2019-06-04 | 深圳市优必选科技有限公司 | An operating system rights management method, device and terminal |
CN108093057A (en) * | 2017-12-25 | 2018-05-29 | 北京金山安全软件有限公司 | Method and device for guiding permission to be opened |
CN108334261A (en) * | 2018-01-12 | 2018-07-27 | 口碑(上海)信息技术有限公司 | The open method and device of miscellaneous function |
CN108647070A (en) * | 2018-04-18 | 2018-10-12 | Oppo广东移动通信有限公司 | Information prompting method, device, mobile terminal and computer-readable medium |
CN108959939A (en) * | 2018-04-18 | 2018-12-07 | 腾讯科技(深圳)有限公司 | A kind of system permission open method, device, system and storage medium |
CN108959939B (en) * | 2018-04-18 | 2020-12-25 | 腾讯科技(深圳)有限公司 | System authority opening method, device, system and storage medium |
CN109255214A (en) * | 2018-09-13 | 2019-01-22 | 广东电网有限责任公司 | A kind of authority configuring method and device |
CN109255214B (en) * | 2018-09-13 | 2021-03-19 | 广东电网有限责任公司 | Authority configuration method and device |
CN109521924A (en) * | 2018-11-27 | 2019-03-26 | 麒麟合盛网络技术股份有限公司 | A kind of method and apparatus of auxiliary user's selection target application |
CN109858200A (en) * | 2018-12-25 | 2019-06-07 | 北京奇安信科技有限公司 | A kind of processing method and terminal of optimization software activation |
CN109669730A (en) * | 2018-12-26 | 2019-04-23 | 北京达佳互联信息技术有限公司 | A kind of process keepalive method, device, electronic equipment and medium |
CN111125768A (en) * | 2019-12-26 | 2020-05-08 | 联想(北京)有限公司 | Information processing method, information processing apparatus, electronic device, and medium |
CN111125768B (en) * | 2019-12-26 | 2023-05-02 | 联想(北京)有限公司 | Information processing method, device, electronic equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106096425A (en) | System permission starting method, device and equipment | |
CN108427731B (en) | Page code processing method and device, terminal equipment and medium | |
US9824212B2 (en) | Method and system for recognizing advertisement plug-ins | |
CN106227585B (en) | Application program starting method, device and equipment | |
US20150262031A1 (en) | Method And Apparatus For Identifying Picture | |
CN105049607B (en) | Short message display method and mobile terminal | |
WO2016197461A1 (en) | Application software permission recommendation method, apparatus and system, and storage medium | |
CN107423369A (en) | Method and device for processing files to be deleted | |
CN107329659B (en) | Permission setting method and device, electronic equipment and storage medium | |
CN105187632B (en) | Method and device for determining mobile phone number | |
CN108108599B (en) | Screen unlocking method based on password, communication terminal and related medium product | |
CN106550089A (en) | The processing method of identifying code, client and user terminal | |
CN106874718B (en) | Privacy processing method and device and terminal | |
CN109271228A (en) | Interface function recognition methods, device and the electronic equipment of application | |
CN106789973B (en) | Page security detection method and terminal equipment | |
CN110837377A (en) | Application program updating method and device, storage medium and electronic equipment | |
CN105975302A (en) | Application installation method and terminal | |
CN105094562A (en) | Information processing method and terminal | |
CN109683951A (en) | A kind of code method for automatically releasing, system, medium and electronic equipment | |
CN113010061A (en) | Desktop display control method and device of terminal, storage medium and terminal | |
CN106599637B (en) | Method and device for inputting verification code on verification interface | |
CN110633196A (en) | Automatic use case execution method and device of application program | |
CN106203121B (en) | Kernel address prevents malicious modification method, apparatus and terminal | |
CN104298548A (en) | Information processing method and electronic device | |
CN112153059A (en) | Mail verification code acquisition method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |
|
RJ01 | Rejection of invention patent application after publication |