CN108664786A - Permission configuration method of application program, mobile terminal, server and storage medium - Google Patents
Permission configuration method of application program, mobile terminal, server and storage medium Download PDFInfo
- Publication number
- CN108664786A CN108664786A CN201810374581.3A CN201810374581A CN108664786A CN 108664786 A CN108664786 A CN 108664786A CN 201810374581 A CN201810374581 A CN 201810374581A CN 108664786 A CN108664786 A CN 108664786A
- Authority
- CN
- China
- Prior art keywords
- configuration information
- permission
- permission configuration
- application program
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 83
- 238000004590 computer program Methods 0.000 claims description 20
- 230000010354 integration Effects 0.000 claims description 7
- 238000012790 confirmation Methods 0.000 claims description 6
- 230000004048 modification Effects 0.000 claims description 6
- 238000012986 modification Methods 0.000 claims description 6
- 230000002452 interceptive effect Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 12
- 238000009434 installation Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000007405 data analysis Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域technical field
本申请涉及系统权限配置技术领域,特别是涉及一种应用程序的权限配置方法、移动终端、服务器及存储介质。The present application relates to the technical field of system authority configuration, in particular to an application authority configuration method, a mobile terminal, a server and a storage medium.
背景技术Background technique
移动终端在人们的日程生活中越来越重要,移动终端中的应用程序也使得人们的生活越来越便利。然而不同应用程序的开发者不同,导致应用程序的质量也有差异,尤其是在权限处理方面,比如:有的应用没有申请权限,却在运行过程中使用某一权限,出现报错,停止运行;有的应用程序申请了很多不会用到的权限;有的应用需要某种权限才能运行,但每次安装都要提示该权限……类似的权限问题,给用户造成了不便,给终端产品的美誉度造成了一定影响。Mobile terminals are becoming more and more important in people's daily life, and the application programs in the mobile terminals also make people's life more and more convenient. However, the developers of different applications are different, resulting in differences in the quality of the applications, especially in the processing of permissions. For example: some applications do not apply for permissions, but use a certain permission during the running process, and report an error and stop running; Some applications apply for many permissions that will not be used; some applications require a certain permission to run, but they will be prompted for this permission every time they are installed... Similar permission problems have caused inconvenience to users and the reputation of terminal products. had a certain impact.
发明内容Contents of the invention
本申请采用的一个技术方案是:提供一种应用程序的权限配置方法,应用于移动终端,该权限配置方法包括:获取待安装应用程序的标识信息;获取与标识信息相关联的第一权限配置信息;其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的;基于第一权限配置信息对待安装应用程序进行权限配置。A technical solution adopted by the present application is to provide an application permission configuration method, which is applied to a mobile terminal. The permission configuration method includes: obtaining the identification information of the application program to be installed; obtaining the first permission configuration associated with the identification information information; wherein, the first permission configuration information is formed based on the permission configuration of related application programs by different mobile terminals; based on the first permission configuration information, the permission configuration of the application program to be installed is performed.
本申请采用的另一个技术方案是:提供一种应用程序的权限配置方法,应用于服务器,该权限配置方法包括:获取不同移动终端发送的应用程序的标识信息和相关联的第一权限配置信息,形成数据库;对数据库中同一目标应用程序关联的多种权限配置信息进行分析整合,得到目标应用程序相关联的标准权限配置信息;将目标应用程序的标识信息和相关联的标准权限配置信息同步给移动终端。Another technical solution adopted by the present application is to provide a permission configuration method for an application, which is applied to a server, and the permission configuration method includes: obtaining identification information of application programs sent by different mobile terminals and associated first permission configuration information , forming a database; analyzing and integrating various authority configuration information associated with the same target application in the database to obtain standard authority configuration information associated with the target application; synchronizing the identification information of the target application with the associated standard authority configuration information to the mobile terminal.
本申请采用的另一个技术方案是:提供一种移动终端,该移动终端包括处理器和存储器,其中,存储器用于存储应用程序的标识信息和权限配置信息的关联关系,以及存储计算机程序,处理器用于执行存储器存储的计算机程序以实现如上述的权限配置方法。Another technical solution adopted by the present application is to provide a mobile terminal, which includes a processor and a memory, wherein the memory is used to store the association relationship between the identification information of the application program and the permission configuration information, and to store the computer program, process The device is used to execute the computer program stored in the memory to realize the rights configuration method as described above.
本申请采用的另一个技术方案是:提供一种移动终端,该移动终端包括:标识信息获取模块,用于获取待安装应用程序的标识信息;权限配置信息获取模块,用于获取与标识信息相关联的第一权限配置信息;其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的;权限配置模块,用于基于第一权限配置信息对待安装应用程序进行权限配置。Another technical solution adopted by this application is to provide a mobile terminal, which includes: an identification information acquisition module, used to acquire the identification information of the application program to be installed; an authority configuration information acquisition module, used to acquire the information related to the identification information Linked first permission configuration information; wherein, the first permission configuration information is formed based on the permission configuration of related applications by different mobile terminals; configuration.
本申请采用的另一个技术方案是:提供一种服务器,该服务器包括处理器和存储器,其中,存储器用于存储数据库,以及存储计算机程序,数据库包括不同移动终端对应的多种应用程序的权限配置信息,处理器用于执行存储器存储的计算机程序以实现如上述的权限配置方法。Another technical solution adopted by the present application is to provide a server, which includes a processor and a memory, wherein the memory is used to store a database and store computer programs, and the database includes permission configurations of various application programs corresponding to different mobile terminals Information, the processor is used to execute the computer program stored in the memory to implement the rights configuration method as described above.
本申请采用的另一个技术方案是:提供一种服务器,该服务器包括:获取模块,用于获取不同移动终端发送的应用程序的标识信息和相关联的第一权限配置信息,形成数据库;整合模块,用于对数据库中同一目标应用程序关联的多种权限配置信息进行分析整合,得到目标应用程序相关联的标准权限配置信息;同步模块,用于将目标应用程序的标识信息和相关联的标准权限配置信息同步给移动终端。Another technical solution adopted by the present application is to provide a server, which includes: an acquisition module, used to acquire the identification information of the application programs sent by different mobile terminals and the associated first authority configuration information to form a database; an integration module , which is used to analyze and integrate various permission configuration information associated with the same target application in the database to obtain standard permission configuration information associated with the target application; the synchronization module is used to combine the identification information of the target application with the associated standard The permission configuration information is synchronized to the mobile terminal.
本申请采用的另一个技术方案是:提供一种计算机存储介质,其该计算机存储介质用于存储计算机程序,计算机程序在被处理器执行时,用于实现如上述的权限配置方法。Another technical solution adopted by the present application is to provide a computer storage medium, which is used to store a computer program, and when the computer program is executed by a processor, it is used to implement the above-mentioned rights configuration method.
本申请实施例提供的应用程序的权限配置方法包括:获取待安装应用程序的标识信息;获取与标识信息相关联的第一权限配置信息;其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的;基于第一权限配置信息对待安装应用程序进行权限配置。通过以上方式,能够基于大量的移动终端中应用程序的权限配置情况形成大数据,为用户自动配置更加符合大众需求的权限配置方案,一方面无需用户手动操作,可以在应用程序安装的时候就进行权限的配置,能够减轻用户的负担,另一方面更加增进用户与移动终端之间的交互感,使用户在应用程序的体验上更好,提升移动终端的品质。The application permission configuration method provided by the embodiment of the present application includes: obtaining the identification information of the application program to be installed; obtaining the first permission configuration information associated with the identification information; wherein, the first permission configuration information is based on different mobile terminal pairs. It is formed by the permission configuration of the application program; based on the first permission configuration information, the permission configuration of the application program to be installed is performed. Through the above methods, big data can be formed based on the permission configuration of a large number of applications in mobile terminals, and a permission configuration scheme that is more in line with the needs of the public can be automatically configured for users. The configuration of permissions can reduce the burden of the user, on the other hand, it can further enhance the interaction between the user and the mobile terminal, so that the user can have a better experience in the application program and improve the quality of the mobile terminal.
附图说明Description of drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。其中:In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present application. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort. in:
图1是本申请提供的应用程序的权限配置方法第一实施例的流程示意图;FIG. 1 is a schematic flow chart of the first embodiment of the application permission configuration method provided by the present application;
图2是本申请提供的应用程序的权限配置方法第二实施例的流程示意图;FIG. 2 is a schematic flowchart of a second embodiment of the method for configuring application rights provided by the present application;
图3是本申请提供的应用程序的权限配置方法第三实施例的流程示意图;FIG. 3 is a schematic flowchart of a third embodiment of the method for configuring application rights provided by the present application;
图4是本申请提供的应用程序的权限配置方法第三实施例中显示界面示意图;FIG. 4 is a schematic diagram of the display interface in the third embodiment of the application permission configuration method provided by the present application;
图5是本申请提供的应用程序的权限配置方法第四实施例的流程示意图;FIG. 5 is a schematic flow chart of a fourth embodiment of the method for configuring application rights provided by the present application;
图6是图5中步骤52一实施例的流程示意图;Fig. 6 is a schematic flow chart of an embodiment of step 52 in Fig. 5;
图7是图5中步骤52另一实施例的流程示意图;Fig. 7 is a schematic flow chart of another embodiment of step 52 in Fig. 5;
图8是本申请提供的应用程序的权限配置方法第五实施例的流程示意图;FIG. 8 is a schematic flow chart of a fifth embodiment of the method for configuring application rights provided by the present application;
图9是本申请提供的移动终端一实施例的结构示意图;FIG. 9 is a schematic structural diagram of an embodiment of a mobile terminal provided by the present application;
图10是本申请提供的移动终端另一实施例的结构示意图;FIG. 10 is a schematic structural diagram of another embodiment of a mobile terminal provided by the present application;
图11是本申请提供的服务器一实施例的结构示意图;FIG. 11 is a schematic structural diagram of an embodiment of a server provided by the present application;
图12是本申请提供的服务器另一实施例的结构示意图;Fig. 12 is a schematic structural diagram of another embodiment of the server provided by the present application;
图13是本申请提供的计算机存储介质一实施例的结构示意图。Fig. 13 is a schematic structural diagram of an embodiment of a computer storage medium provided by the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述。可以理解的是,此处所描述的具体实施例仅用于解释本申请,而非对本申请的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. It should be understood that the specific embodiments described here are only used to explain the present application, but not to limit the present application. In addition, it should be noted that, for the convenience of description, only some structures related to the present application are shown in the drawings but not all structures. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.
本申请中的术语“第一”、“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", etc. in this application are used to distinguish different objects, not to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The occurrences of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is understood explicitly and implicitly by those skilled in the art that the embodiments described herein can be combined with other embodiments.
本申请的实施例可以应用于移动终端和服务器组成的系统中,该移动终端可以是手机、平板电脑、可穿戴设备等等,该服务器可以是云端服务器。The embodiments of the present application can be applied to a system composed of a mobile terminal and a server. The mobile terminal can be a mobile phone, a tablet computer, a wearable device, etc., and the server can be a cloud server.
下面先通过几种实施例对移动终端的权限配置方法进行介绍。In the following, several embodiments are used to introduce the method for configuring the rights of the mobile terminal.
参阅图1,图1是本申请提供的应用程序的权限配置方法第一实施例的流程示意图,该权限配置方法包括:Referring to FIG. 1, FIG. 1 is a schematic flow chart of the first embodiment of the method for configuring the rights of an application provided by the present application. The method for configuring rights includes:
步骤11:获取待安装应用程序的标识信息。Step 11: Obtain the identification information of the application program to be installed.
其中,待安装应用程序是指移动终端上即将安装的应用程序,还未进行安装。应用程序的标识信息可以是该程序的名称或者安装包的名称,例如,标识信息可以是“微信”。另外,为了避免不同应用程序采用相同的名称,标识信息还可以加上相应的开发商名称,例如“微信-腾讯”。Wherein, the application program to be installed refers to the application program to be installed on the mobile terminal, which has not been installed yet. The identification information of the application program may be the name of the program or the name of the installation package, for example, the identification information may be "WeChat". In addition, in order to prevent different application programs from using the same name, the corresponding developer name can also be added to the identification information, such as "WeChat-Tencent".
可选的,标识信息还可以是针对每一应用设置的独有的编码,可以是数字号码,也可以是二维码等等,这里不作限制。Optionally, the identification information may also be a unique code set for each application, which may be a digital number, or a two-dimensional code, etc., which is not limited here.
步骤12:获取与标识信息相关联的第一权限配置信息。Step 12: Obtain first rights configuration information associated with the identification information.
其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的。Wherein, the first authority configuration information is formed based on the authority configuration conditions of different mobile terminals for related application programs.
其中,一个应用程序一般包括多个需要进行配置的权限,例如,读取位置信息、使用摄像头、录音或者通话录音、发送推送消息、使用移动数据或WIFI网络等等,权限配置信息包括上述中的至少一种权限的配置情况。Among them, an application generally includes multiple permissions that need to be configured, for example, reading location information, using cameras, recording or call recording, sending push messages, using mobile data or WIFI networks, etc., permission configuration information includes the above Configuration of at least one permission.
可以理解的,在一些系统中,在移动终端上进行应用程序的安装会预先进行权限的配置,一般是需要用户进行选择进行相关的配置,然后根据用户的配置结果进行应用程序的安装,还有一些系统中,是在应用程序安装完成之后,或者安装完成之后首次打开应用程序时,需要对权限进行配置,一般也是用户进行选择进行相关的配置,较为繁琐。It can be understood that in some systems, the installation of the application program on the mobile terminal will pre-configure the authority. Generally, the user is required to select and perform related configuration, and then the application program is installed according to the configuration result of the user. In some systems, after the application is installed, or when the application is opened for the first time after the installation, permissions need to be configured. Generally, the user chooses to perform related configurations, which is relatively cumbersome.
在本实施例中,这里的权限配置信息可以保存在移动终端本地,也可以从相应的服务器实时获取,也可以是预先从相应的服务器获取后保存在本地。具体地,可以名单的形式存储在存储器中,如下表所示:In this embodiment, the permission configuration information here may be stored locally in the mobile terminal, or may be obtained from a corresponding server in real time, or may be obtained from a corresponding server in advance and stored locally. Specifically, it can be stored in the memory in the form of a list, as shown in the following table:
具体地,该名单具体包括应用程序的标识信息与权限配置信息的一一对应关系,每一个应用程序对应的权限配置信息均是通过采用大量的用户的移动终端中相同应用程序所配置的权限,通过大数据分析后得到的权限配置信息。Specifically, the list specifically includes a one-to-one correspondence between application identification information and permission configuration information, and the permission configuration information corresponding to each application program is configured by using the same application program in a large number of users' mobile terminals. Permission configuration information obtained through big data analysis.
例如,对于应用程序A来说,不同的用户可能采用了不同的权限配置方式,假如,有50%的用户采用了权限配置方式a1,有30%用户采用了权限配置方式a2,有20%的用户采用了权限配置方式a3,那么,由于权限配置方式a1的使用率最高,可以基于权限配置方式a1生成与应用程序A对应的权限配置信息A。For example, for application A, different users may adopt different permission configuration methods. For example, 50% of the users have adopted the permission configuration method a1, 30% of the users have adopted the permission configuration method a2, and 20% of the users have adopted the permission configuration method a2. If the user adopts the permission configuration method a3, then, since the permission configuration method a1 has the highest usage rate, the permission configuration information A corresponding to the application program A can be generated based on the permission configuration method a1.
再比如,对于应用程序B来说,其包括的每一项权限对于不同的用户来说,都可以采用不同的权限配置方式,假如,应用程序B包括三种权限,其一为获取位置信息,其二为使用移动数据,其三为使用摄像头。这里可以为每一项权限单独进行数据采集,由于每一项权限仅包括“允许”和“禁止”两种权限配置方式,所以只要配置为与超过一半的用户相同即可。比如,有超过一半的用户将获取位置信息的权限配置为允许,有超过一半的用户将使用移动数据的权限配置为允许,有超过一半的用户将使用摄像头的权限配置为禁止,那么,可以基于允许获取位置信息、允许使用移动数据、禁止使用摄像头的权限配置方式生成对应的权限配置信息B。For another example, for application B, each permission included in it can adopt different permission configuration methods for different users. If application B includes three kinds of permissions, one is to obtain location information, The second is to use mobile data, and the third is to use the camera. Here, data collection can be performed separately for each permission. Since each permission only includes two permission configuration methods of "allow" and "prohibit", it only needs to be configured to be the same as that of more than half of the users. For example, more than half of the users configure the permission to obtain location information to allow, more than half of the users configure the permission to use mobile data to allow, and more than half of the users configure the permission to use the camera to prohibit, then, based on The corresponding permission configuration information B is generated in the permission configuration method of allowing the acquisition of location information, allowing the use of mobile data, and prohibiting the use of cameras.
步骤13:基于第一权限配置信息对待安装应用程序进行权限配置。Step 13: Perform permission configuration on the application program to be installed based on the first permission configuration information.
其中,该配置过程可以是在应用程序的安装过程前、安装过程中或安装完成之后,这里不作限制。Wherein, the configuration process may be before, during or after the installation of the application program, which is not limited here.
可以理解的,该权限配置过程无需人工的参与,系统直接可以根据预先存储的标识信息与权限配置信息的对应关系完成权限配置。It can be understood that the authority configuration process does not require manual participation, and the system can directly complete the authority configuration according to the correspondence between the pre-stored identification information and the authority configuration information.
具体地,在权限配置完成之后,将该权限配置信息写入系统数据库中,并与该应用程序对应,当用户在移动终端运行该应用程序时,若应用程序需要使用某个权限,就会调用系统接口去判断是否有该权限,这个时候系统就根据数据库情况返回该权限状态,以允许或者禁止该权限的使用。Specifically, after the permission configuration is completed, the permission configuration information is written into the system database and corresponds to the application program. When the user runs the application program on the mobile terminal, if the application program needs to use a certain permission, it will call The system interface is used to determine whether the permission exists. At this time, the system returns the status of the permission according to the database situation to allow or prohibit the use of the permission.
下面通过一个具体的应用场景来进行说明。The following describes a specific application scenario.
用户需要安装一应用程序,该应用程序名为ABC,系统从本地存储的名单中查询ABC,并获取到与ABC对应的权限配置信息,然后,将该配置信息写入数据库中。当应用运行时,需要使用某个权限,就会调用系统接口去判断是否有该权限,这个时候系统就根据数据库情况返回该权限状态。The user needs to install an application program named ABC. The system queries ABC from the locally stored list and obtains the permission configuration information corresponding to ABC, and then writes the configuration information into the database. When the application is running and needs to use a certain permission, it will call the system interface to determine whether the permission is available. At this time, the system returns the status of the permission according to the database situation.
区别于现有技术的情况,本实施例的应用程序的权限配置方法包括:获取待安装应用程序的标识信息;获取与标识信息相关联的第一权限配置信息;其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的;基于第一权限配置信息对待安装应用程序进行权限配置。通过上述方式,能够基于大数据为用户自动配置更加符合大众需求的权限配置方案,一方面无需用户手动操作,能够减轻用户的负担,另一方面更加增进用户与移动终端之间的交互感,提升移动终端的品质。Different from the situation in the prior art, the permission configuration method of the application program in this embodiment includes: obtaining identification information of the application program to be installed; obtaining first permission configuration information associated with the identification information; wherein, the first permission configuration information is It is formed based on the permission configuration of related application programs by different mobile terminals; the permission configuration of the application program to be installed is performed based on the first permission configuration information. Through the above method, based on big data, users can be automatically configured with a permission configuration scheme that is more in line with the needs of the public. On the one hand, it does not require manual operation by the user, which can reduce the burden on the user. On the other hand, it can further enhance the interaction between the user and the mobile terminal. The quality of the mobile terminal.
参阅图2,图2是本申请提供的应用程序的权限配置方法第二实施例的流程示意图,该权限配置方法包括:Referring to FIG. 2, FIG. 2 is a schematic flowchart of a second embodiment of the method for configuring the rights of an application provided by the present application. The method for configuring rights includes:
步骤21:获取服务器发送的权限配置数据包。Step 21: Obtain the permission configuration data packet sent by the server.
其中,该权限配置数据包基于大量的移动终端上传的不同应用程序的权限配置信息整合得到的,下面会单独通过几个实施例进行介绍,这里不再赘述。Wherein, the permission configuration data package is obtained based on the integration of permission configuration information of different application programs uploaded by a large number of mobile terminals, which will be introduced separately through several embodiments below, and will not be repeated here.
步骤22:将权限配置数据包存储在本地。Step 22: Store the permission configuration data package locally.
其中,可以名单的形式存储在存储器中,如下表所示:Among them, it can be stored in the memory in the form of a list, as shown in the following table:
具体地,该名单具体包括应用程序的标识信息与权限配置信息的一一对应关系。Specifically, the list specifically includes a one-to-one correspondence between identification information of application programs and permission configuration information.
步骤23:获取待安装应用程序的标识信息。Step 23: Obtain the identification information of the application program to be installed.
步骤24:从权限配置数据包中获取与标识信息相关联的第一权限配置信息。Step 24: Obtain the first authority configuration information associated with the identification information from the authority configuration data package.
其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的。Wherein, the first authority configuration information is formed based on the authority configuration conditions of different mobile terminals for related application programs.
步骤25:基于第一权限配置信息对待安装应用程序进行权限配置。Step 25: Perform permission configuration on the application program to be installed based on the first permission configuration information.
参阅图3,图3是本申请提供的应用程序的权限配置方法第三实施例的流程示意图,该权限配置方法包括:Referring to FIG. 3 , FIG. 3 is a schematic flow chart of a third embodiment of an application permission configuration method provided by the present application. The permission configuration method includes:
步骤31:获取待安装应用程序的标识信息。Step 31: Obtain the identification information of the application program to be installed.
步骤32:获取与标识信息相关联的第一权限配置信息。Step 32: Obtain first rights configuration information associated with the identification information.
其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的。Wherein, the first authority configuration information is formed based on the authority configuration conditions of different mobile terminals for related application programs.
步骤33:显示待安装应用程序的标识信息和相关联的第一权限配置信息。Step 33: Display the identification information of the application program to be installed and the associated first permission configuration information.
如图4所示,图4是本申请提供的应用程序的权限配置方法第三实施例中显示界面示意图。As shown in FIG. 4 , FIG. 4 is a schematic diagram of a display interface in the third embodiment of the application program permission configuration method provided by the present application.
其中,该显示界面主要包括标识信息显示区41、权限配置信息显示区42以及确认区域43。Wherein, the display interface mainly includes an identification information display area 41 , a rights configuration information display area 42 and a confirmation area 43 .
具体地,标识信息显示区41可以用于显示应用程序的图标、名称、版本信息以及占用内存的大小,权限配置信息显示区42用于显示与该标识信息和相关联的第一权限配置信息,具体可以包括多种权限的配置情况,确认区域43可以包括安装和取消按键。Specifically, the identification information display area 41 can be used to display the icon, name, version information and the size of the occupied memory of the application program, and the authority configuration information display area 42 is used to display the identification information and the associated first authority configuration information, Specifically, it may include the configuration of various permissions, and the confirmation area 43 may include install and cancel buttons.
步骤34:在获取确认指令后,基于第一权限配置信息对待安装应用程序进行权限配置。Step 34: After obtaining the confirmation instruction, perform permission configuration on the application program to be installed based on the first permission configuration information.
其中,确认指令由用户操作移动终端产生。Wherein, the confirmation instruction is generated by the user operating the mobile terminal.
具体地,当获取用户点击安装按键的指令时,按照上述的权限配置情况进行安装,当获取用户点击取消按键的指令时,取消应用程序的安装。Specifically, when the instruction of the user clicking the install button is obtained, the installation is performed according to the above permission configuration, and when the instruction of the user clicking the cancel button is obtained, the installation of the application program is cancelled.
步骤35:在获取修改指令后,对第一权限配置信息进行修改,形成第二权限配置信息。Step 35: After obtaining the modification instruction, modify the first rights configuration information to form second rights configuration information.
其中,修改指令由用户操作移动终端产生。Wherein, the modification instruction is generated by the user operating the mobile terminal.
具体地,用户可以对权限配置信息显示区42中的各种权限的配置情况进行修改,具体是通过显示的触控按键进行的,可以将每一项权限设置为允许或者禁止。Specifically, the user can modify the configuration of various permissions in the permission configuration information display area 42, specifically through the displayed touch buttons, and each permission can be set to allow or prohibit.
步骤36:基于第二权限配置信息对待安装应用程序进行权限配置。Step 36: Perform permission configuration on the application program to be installed based on the second permission configuration information.
在本实施例中,显示界面显示与标识信息和相关联的第一权限配置信息,然后用户可以根据自身的实际需求对第一权限配置信息进行修改,得到第二权限配置信息,然后点击安装后,基于用户修改后的权限配置信息对应用程序进行安装。In this embodiment, the display interface displays the identification information and the associated first authority configuration information, and then users can modify the first authority configuration information according to their actual needs to obtain the second authority configuration information, and then click Install , to install the application program based on the modified permission configuration information of the user.
步骤37:将待安装应用程序的标识信息和相关联的第二权限配置信息上传至服务器。Step 37: Upload the identification information of the application program to be installed and the associated second permission configuration information to the server.
另外,由于用户重新配置了权限,则可以将该用户配置的权限上传至服务器以供服务器进行大数据分析。In addition, since the user has reconfigured the permissions, the permissions configured by the user can be uploaded to the server for big data analysis by the server.
可以理解的,一台移动终端对于一个应用程序,只有一种权限配置信息与之对应。例如,同一台移动终端的同一应用程序,之前采用了第一种权限配置信息进行权限配置,服务器中获取的大量的移动终端的权限配置信息也与之对应,后来,由于用户的需求对权限配置信息进行了修改,会同步上传至服务器,将之前的权限配置信息替换掉。这样可以保证服务器中的数据库不断的更新,同一移动终端的同一应用只关联一种权限配置信息也避免了一些应用恶意刷榜。It can be understood that for one mobile terminal, there is only one kind of permission configuration information corresponding to one application program. For example, the same application program on the same mobile terminal used the first type of permission configuration information for permission configuration before, and a large number of mobile terminal permission configuration information obtained from the server also corresponded to it. If the information is modified, it will be uploaded to the server synchronously, and the previous permission configuration information will be replaced. This can ensure that the database in the server is constantly updated, and the same application on the same mobile terminal is only associated with one permission configuration information, which also prevents some applications from maliciously swiping the list.
下面先通过几种实施例对服务器的权限配置方法进行介绍。In the following, several embodiments are used to introduce the method for configuring the authority of the server.
参阅图5,图5是本申请提供的应用程序的权限配置方法第四实施例的流程示意图,该权限配置方法包括:Referring to FIG. 5 , FIG. 5 is a schematic flowchart of a fourth embodiment of an application permission configuration method provided by the present application. The permission configuration method includes:
步骤51:获取不同移动终端发送的应用程序的标识信息和相关联的第一权限配置信息,形成数据库。Step 51: Obtain identification information of application programs sent by different mobile terminals and associated first permission configuration information to form a database.
其中,该权限配置信息一般是用户根据自身的需求手动设置的。可以理解的,一般的应用程序安装时,会提供一默认的权限配置项目,如图4所示,这些权限配置项可以进行手动修改,在用户修改确认安装后,将该权限配置信息上传至服务器,服务器在获取大量的不同的移动终端发送的标识信息和相关联的权限配置信息后,形成数据库。Wherein, the permission configuration information is generally manually set by the user according to his own needs. It is understandable that when a general application is installed, a default permission configuration item will be provided, as shown in Figure 4, these permission configuration items can be manually modified, and the permission configuration information will be uploaded to the server after the user modifies and confirms the installation , the server forms a database after acquiring a large number of identification information sent by different mobile terminals and associated authority configuration information.
其中,服务器获取的信息是三者关联的对应信息,如下表所示:Among them, the information obtained by the server is the corresponding information associated with the three, as shown in the following table:
步骤52:对数据库中同一目标应用程序关联的多种权限配置信息进行分析整合,得到目标应用程序相关联的标准权限配置信息。Step 52: Analyze and integrate multiple kinds of permission configuration information associated with the same target application program in the database to obtain standard permission configuration information associated with the target application program.
在这里,步骤52可以采用两种方式。Here, step 52 can be implemented in two ways.
在一种实施例中,如图6所示,图6是图5中步骤52一实施例的流程示意图,步骤52可以包括:In one embodiment, as shown in FIG. 6, FIG. 6 is a schematic flowchart of an embodiment of step 52 in FIG. 5, and step 52 may include:
步骤521:获取数据库中与同一目标应用程序相关联的多种权限配置信息。Step 521: Obtain various rights configuration information associated with the same target application program in the database.
步骤522:将多种权限配置信息中对应不同移动终端的数量最多的一种作为目标应用程序的标准权限配置信息。Step 522: Use the type of permission configuration information that corresponds to the largest number of different mobile terminals as the standard permission configuration information of the target application program.
具体地,继续参阅上表,这里以同一应用程序A进行说明,基于同一应用程序A,不同的移动终端可能进行不同的权限配置,例如,有50%的移动终端采用了权限配置信息A1,有30%用户采用了权限配置信息A2,有20%的用户采用了权限配置信息A3,那么,由于权限配置信息A1的使用率最高,可以基于权限配置信息A1作为与应用程序A对应的权限配置信息。Specifically, continue to refer to the above table. Here, the same application A is used for illustration. Based on the same application A, different mobile terminals may perform different permission configurations. For example, 50% of mobile terminals use the permission configuration information A1. 30% of the users have adopted the authority configuration information A2, and 20% of the users have adopted the authority configuration information A3, then, since the authority configuration information A1 has the highest usage rate, the authority configuration information A1 can be used as the authority configuration information corresponding to the application program A .
在另一种实施例中,如图7所示,图7是图5中步骤52另一实施例的流程示意图,步骤52可以包括:In another embodiment, as shown in FIG. 7, FIG. 7 is a schematic flowchart of another embodiment of step 52 in FIG. 5, and step 52 may include:
步骤52a:获取数据库中与同一目标应用程序相关联的多种权限配置信息中对每一项权限的配置方式。Step 52a: Obtain the configuration mode of each permission in the multiple permission configuration information associated with the same target application program in the database.
步骤52b:将每一项权限的使用率最高的配置方式组合形成目标应用程序的标准权限配置信息。Step 52b: Combine the configuration mode with the highest usage rate of each permission to form the standard permission configuration information of the target application program.
具体地,对于应用程序B来说,其包括的每一项权限对于不同的用户来说,都可以采用不同的权限配置方式,假如,应用程序B包括三种权限,其一为获取位置信息,其二为使用移动数据,其三为使用摄像头。这里可以为每一项权限单独进行数据采集,由于每一项权限仅包括“允许”和“禁止”两种权限配置方式,所以只要配置为与超过一半的用户相同即可。比如,有超过一半的用户将获取位置信息的权限配置为允许,有超过一半的用户将使用移动数据的权限配置为允许,有超过一半的用户将使用摄像头的权限配置为禁止,那么,可以基于允许获取位置信息、允许使用移动数据、禁止使用摄像头的权限配置方式生成对应的权限配置信息B。Specifically, for application B, each permission included in it can adopt different permission configuration methods for different users. If application B includes three kinds of permissions, one is to obtain location information, The second is to use mobile data, and the third is to use the camera. Here, data collection can be performed separately for each permission. Since each permission only includes two permission configuration methods of "allow" and "prohibit", it only needs to be configured to be the same as that of more than half of the users. For example, more than half of the users configure the permission to obtain location information to allow, more than half of the users configure the permission to use mobile data to allow, and more than half of the users configure the permission to use the camera to prohibit, then, based on The corresponding permission configuration information B is generated in the permission configuration method of allowing the acquisition of location information, allowing the use of mobile data, and prohibiting the use of cameras.
步骤53:将目标应用程序的标识信息和相关联的标准权限配置信息同步给移动终端。Step 53: Synchronize the identification information of the target application program and the associated standard permission configuration information to the mobile terminal.
区别于现有技术的情况,本实施例的应用程序的权限配置方法包括:获取不同移动终端发送的应用程序的标识信息和相关联的第一权限配置信息,形成数据库;对数据库中同一目标应用程序关联的多种权限配置信息进行分析整合,得到目标应用程序相关联的标准权限配置信息;将目标应用程序的标识信息和相关联的标准权限配置信息同步给移动终端。通过上述方式,能够基于大数据为用户推荐更加符合大众需求的权限配置方案,一方面无需用户手动操作,能够减轻用户的负担,另一方面更加增进用户与移动终端之间的交互感,提升移动终端的品质。Different from the situation in the prior art, the permission configuration method of the application program in this embodiment includes: obtaining the identification information of the application program sent by different mobile terminals and the associated first permission configuration information to form a database; The various permission configuration information associated with the program is analyzed and integrated to obtain the standard permission configuration information associated with the target application program; the identification information of the target application program and the associated standard permission configuration information are synchronized to the mobile terminal. Through the above method, based on big data, it is possible to recommend permission configuration schemes that are more in line with public needs for users. On the one hand, manual operations are not required, which can reduce the burden on users. quality of the terminal.
参阅图8,图8是本申请提供的应用程序的权限配置方法第五实施例的流程示意图,该权限配置方法包括:Referring to FIG. 8 , FIG. 8 is a schematic flow chart of a fifth embodiment of an application permission configuration method provided by the present application. The permission configuration method includes:
步骤81:获取不同移动终端发送的应用程序的标识信息和相关联的第一权限配置信息,形成数据库。Step 81: Obtain identification information of application programs sent by different mobile terminals and associated first authority configuration information to form a database.
步骤82:对数据库中同一目标应用程序关联的多种权限配置信息进行分析整合,得到目标应用程序相关联的标准权限配置信息。Step 82: Analyzing and integrating various rights configuration information associated with the same target application program in the database to obtain standard rights configuration information associated with the target application program.
步骤83:将目标应用程序的标识信息和相关联的标准权限配置信息同步给移动终端。Step 83: Synchronize the identification information of the target application program and the associated standard permission configuration information to the mobile terminal.
步骤84:获取目标移动终端发送的目标应用程序的标识信息和相关联的第二权限配置信息。Step 84: Obtain the identification information of the target application program and the associated second permission configuration information sent by the target mobile terminal.
步骤85:将数据库中与目标移动终端对应的目标应用程序的标识信息和相关联的第一权限配置信息,替换为第二权限配置信息。Step 85: Replace the identification information of the target application corresponding to the target mobile terminal in the database and the associated first authority configuration information with the second authority configuration information.
区别于上述实施例,本实施例中的在建立“移动终端-应用程序-第一权限配置信息”的关联关系之后,还继续获取用户对权限配置信息的修改,将其中的第一权限配置信息替换为第二权限配置信息,然后可以重复执行步骤82和步骤83,得到新的标准权限配置信息。Different from the above-mentioned embodiments, in this embodiment, after the association relationship of "mobile terminal-application program-first authority configuration information" is established, the modification of the authority configuration information by the user is continued, and the first authority configuration information among them is It is replaced with the second authority configuration information, and then step 82 and step 83 may be repeated to obtain new standard authority configuration information.
可以理解的,在修改基数较少的情况下,标准权限配置信息可能不会发生变化,而较大量用户修改时,在大数据分析整合之后,标准权限配置信息则会发生变化。It is understandable that in the case of a small modification base, the standard permission configuration information may not change, but when a large number of users modify it, the standard permission configuration information will change after big data analysis and integration.
可选的,服务器还可以检测目标移动终端基于目标应用程序发送权限配置信息的频率是否大于设定第一阈值;若是,将目标应用程序的权限配置为禁止状态。Optionally, the server may also detect whether the frequency of the target mobile terminal sending permission configuration information based on the target application is greater than a set first threshold; if so, configure the permission of the target application to a prohibited state.
可以理解的,若同一移动终端的同一应用程序频繁的进行权限配置的修改,可以认为该应用程序恶意修改权限,侵犯了用户的权益,可以将该应用程序的所有权限配置为禁止状态,或者禁止其进行修改。It is understandable that if the same application on the same mobile terminal frequently modifies the permission configuration, it can be considered that the application maliciously modifies the permission and violates the user's rights and interests, and all permissions of the application can be configured as prohibited, or prohibited. modify it.
可选的,服务器还可以检测不同移动终端基于目标应用程序发送权限配置信息的频率是否大于设定第二阈值;若是,禁止接收目标应用程序发送权限配置信息。Optionally, the server may also detect whether the frequency of different mobile terminals sending permission configuration information based on the target application program is greater than a set second threshold; if so, forbid receiving the permission configuration information sent by the target application program.
可以理解的,若在一段时间内接收到同一应用的大量的权限配置信息,可以认为是该应用的开发商再进行恶意的刷榜,可以将该应用程序的所有权限配置为禁止状态,或者禁止接收与其相关的权限配置信息。It is understandable that if a large amount of permission configuration information of the same application is received within a period of time, it can be considered that the developer of the application maliciously brushes the list, and all permissions of the application can be configured as prohibited, or prohibited. Receive the permission configuration information related to it.
可选的,在上述识别同一移动终端发送的权限配置信息时,可以识别移动终端的IMEI(International Mobile Equipment Identity)。Optionally, when identifying the rights configuration information sent by the same mobile terminal, the IMEI (International Mobile Equipment Identity) of the mobile terminal may be identified.
参阅图9,图9是本申请提供的移动终端一实施例的结构示意图,该移动终端90包括处理器91和存储器92。Referring to FIG. 9 , FIG. 9 is a schematic structural diagram of an embodiment of a mobile terminal provided in the present application. The mobile terminal 90 includes a processor 91 and a memory 92 .
其中,存储器92用于存储应用程序的标识信息和权限配置信息的关联关系。其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的。Wherein, the memory 92 is used for storing the association relationship between the identification information of the application program and the permission configuration information. Wherein, the first authority configuration information is formed based on the authority configuration conditions of different mobile terminals for related application programs.
另外,存储器92还用于存储计算机程序,处理器91用于执行存储器92存储的计算机程序以实现如下方法步骤:获取待安装应用程序的标识信息;获取与标识信息相关联的第一权限配置信息;基于第一权限配置信息对待安装应用程序进行权限配置。In addition, the memory 92 is also used to store computer programs, and the processor 91 is used to execute the computer programs stored in the memory 92 to implement the following method steps: obtain the identification information of the application program to be installed; obtain the first authority configuration information associated with the identification information ; Perform permission configuration on the application program to be installed based on the first permission configuration information.
参阅图10,图10是本申请提供的移动终端另一实施例的结构示意图,该移动终端100包括标识信息获取模块101、权限配置信息获取模块102以及权限配置模块103。Referring to FIG. 10 , FIG. 10 is a schematic structural diagram of another embodiment of a mobile terminal provided by the present application. The mobile terminal 100 includes an identification information acquisition module 101 , an authority configuration information acquisition module 102 and an authority configuration module 103 .
其中,标识信息获取模块101用于获取待安装应用程序的标识信息;权限配置信息获取模块102用于获取与标识信息相关联的第一权限配置信息;权限配置模块103用于基于第一权限配置信息对待安装应用程序进行权限配置。其中,第一权限配置信息是基于不同移动终端对相关应用程序的权限配置情况而形成的;Wherein, the identification information obtaining module 101 is used to obtain the identification information of the application program to be installed; the authority configuration information obtaining module 102 is used to obtain the first authority configuration information associated with the identification information; the authority configuration module 103 is used to configure Information to configure permissions for applications to be installed. Wherein, the first authority configuration information is formed based on the authority configuration conditions of different mobile terminals for related application programs;
参阅图11,图11是本申请提供的服务器一实施例的结构示意图,该服务器110包括处理器111和存储器112。Referring to FIG. 11 , FIG. 11 is a schematic structural diagram of an embodiment of a server provided by the present application. The server 110 includes a processor 111 and a memory 112 .
其中,存储器112用于存储数据库,以及存储计算机程序,数据库包括不同移动终端对应的多种应用程序的权限配置信息,处理器111用于执行存储器112存储的计算机程序以实现如下方法:获取不同移动终端发送的应用程序的标识信息和相关联的第一权限配置信息,形成数据库;对数据库中同一目标应用程序关联的多种权限配置信息进行分析整合,得到目标应用程序相关联的标准权限配置信息;将目标应用程序的标识信息和相关联的标准权限配置信息同步给移动终端。Wherein, the memory 112 is used to store a database and store computer programs, the database includes permission configuration information of various application programs corresponding to different mobile terminals, and the processor 111 is used to execute the computer programs stored in the memory 112 to implement the following method: The identification information of the application program sent by the terminal and the associated first permission configuration information form a database; the multiple permission configuration information associated with the same target application program in the database is analyzed and integrated to obtain the standard permission configuration information associated with the target application program ; Synchronize the identification information of the target application program and the associated standard permission configuration information to the mobile terminal.
参阅图12,图12是本申请提供的服务器另一实施例的结构示意图,该服务器120包括获取模块121、整合模块122以及同步模块123。Referring to FIG. 12 , FIG. 12 is a schematic structural diagram of another embodiment of the server provided by the present application. The server 120 includes an acquisition module 121 , an integration module 122 and a synchronization module 123 .
其中,获取模块121用于获取不同移动终端发送的应用程序的标识信息和相关联的第一权限配置信息,形成数据库;整合模块122用于对数据库中同一目标应用程序关联的多种权限配置信息进行分析整合,得到目标应用程序相关联的标准权限配置信息;同步模块123用于将目标应用程序的标识信息和相关联的标准权限配置信息同步给移动终端。Among them, the obtaining module 121 is used to obtain the identification information of the application programs sent by different mobile terminals and the associated first permission configuration information to form a database; the integration module 122 is used to collect multiple permission configuration information associated with the same target application program in the database Perform analysis and integration to obtain standard authority configuration information associated with the target application; the synchronization module 123 is used to synchronize the identification information of the target application and the associated standard authority configuration information to the mobile terminal.
另外,本申请还可以提供一种权限配置系统,该系统为上述实施例中提供的移动终端和服务器组成的网络系统。In addition, the present application may also provide a rights configuration system, which is a network system composed of the mobile terminal and the server provided in the above embodiments.
参阅图13,图13是本申请提供的计算机存储介质一实施例的结构示意图,该计算机存储介质130用于存储计算机程序131,计算机程序131在被处理器执行时,用于实现如图1-图8的实施例中提供的权限配置方法,该计算机存储介质130可以是用于上述的移动终端,也可以是用于上述的服务器。Referring to FIG. 13, FIG. 13 is a schematic structural diagram of an embodiment of a computer storage medium provided by the present application. The computer storage medium 130 is used to store a computer program 131. When the computer program 131 is executed by a processor, it is used to realize the In the permission configuration method provided in the embodiment of FIG. 8 , the computer storage medium 130 may be used for the above-mentioned mobile terminal, or may be used for the above-mentioned server.
本实施例的计算机可读存储介质存储的计算机程序与上述电子设备的实施例中存储器存储的计算机程序类似,被处理器执行时所实现的方法步骤类似,这里不再赘述。The computer program stored in the computer-readable storage medium of this embodiment is similar to the computer program stored in the memory in the above-mentioned electronic device embodiment, and the method steps implemented when executed by the processor are similar, and details are not repeated here.
本申请提供的上述实施例,是双面显示屏的电子设备的两面显示屏具有不同的分辨率,可以适用于不同的应用场景中,采用较低分辨率的显示屏时,可以有效的降低电子设备的功耗,提高其续航能力。The above-mentioned embodiment provided by this application is that the two display screens of the electronic device with double-sided display screens have different resolutions, which can be applied to different application scenarios. When using a lower-resolution display screen, it can effectively reduce the electronic Reduce the power consumption of the device and improve its battery life.
本申请的实施例以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施方式所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。When the embodiments of the present application are implemented in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or part of the contribution to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium , including several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) execute all or part of the steps of the methods described in various embodiments of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes. .
以上所述仅为本申请的实施方式,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。The above is only the implementation of the application, and does not limit the patent scope of the application. Any equivalent structure or equivalent process conversion made by using the specification and drawings of the application, or directly or indirectly used in other related technologies fields, are all included in the scope of patent protection of this application in the same way.
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810374581.3A CN108664786A (en) | 2018-04-24 | 2018-04-24 | Permission configuration method of application program, mobile terminal, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810374581.3A CN108664786A (en) | 2018-04-24 | 2018-04-24 | Permission configuration method of application program, mobile terminal, server and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108664786A true CN108664786A (en) | 2018-10-16 |
Family
ID=63780037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810374581.3A Pending CN108664786A (en) | 2018-04-24 | 2018-04-24 | Permission configuration method of application program, mobile terminal, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108664786A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815678A (en) * | 2018-12-17 | 2019-05-28 | 维沃移动通信有限公司 | A kind of authority configuring method and mobile terminal |
CN110532764A (en) * | 2019-08-19 | 2019-12-03 | 维沃移动通信有限公司 | A kind of method, mobile terminal and the readable storage medium storing program for executing of permission processing |
CN111143782A (en) * | 2019-11-08 | 2020-05-12 | 深圳市元征科技股份有限公司 | Authority management method and device of application software, server and storage medium |
CN112181476A (en) * | 2020-08-31 | 2021-01-05 | 北京达佳互联信息技术有限公司 | Application control method, device, server and storage medium |
CN112287330A (en) * | 2020-11-23 | 2021-01-29 | 腾讯科技(北京)有限公司 | Permission configuration method and device of application program, computer equipment and storage medium |
CN113742703A (en) * | 2021-08-20 | 2021-12-03 | 深圳Tcl新技术有限公司 | Application program control method and device, electronic equipment and storage medium |
WO2021253975A1 (en) * | 2020-06-18 | 2021-12-23 | 华为技术有限公司 | Permission management method and apparatus for application, and electronic device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105320882A (en) * | 2014-07-28 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method and device for controlling permission of application programs |
CN106991319A (en) * | 2017-03-17 | 2017-07-28 | 维沃移动通信有限公司 | The right management method and mobile terminal of a kind of application program |
CN107145273A (en) * | 2017-04-28 | 2017-09-08 | 努比亚技术有限公司 | Application program authority configuring method and computer equipment |
-
2018
- 2018-04-24 CN CN201810374581.3A patent/CN108664786A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105320882A (en) * | 2014-07-28 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method and device for controlling permission of application programs |
CN106991319A (en) * | 2017-03-17 | 2017-07-28 | 维沃移动通信有限公司 | The right management method and mobile terminal of a kind of application program |
CN107145273A (en) * | 2017-04-28 | 2017-09-08 | 努比亚技术有限公司 | Application program authority configuring method and computer equipment |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815678A (en) * | 2018-12-17 | 2019-05-28 | 维沃移动通信有限公司 | A kind of authority configuring method and mobile terminal |
CN110532764A (en) * | 2019-08-19 | 2019-12-03 | 维沃移动通信有限公司 | A kind of method, mobile terminal and the readable storage medium storing program for executing of permission processing |
CN111143782A (en) * | 2019-11-08 | 2020-05-12 | 深圳市元征科技股份有限公司 | Authority management method and device of application software, server and storage medium |
WO2021253975A1 (en) * | 2020-06-18 | 2021-12-23 | 华为技术有限公司 | Permission management method and apparatus for application, and electronic device |
EP4152190A4 (en) * | 2020-06-18 | 2023-10-25 | Huawei Technologies Co., Ltd. | Permission management method and apparatus for application, and electronic device |
US20230351048A1 (en) * | 2020-06-18 | 2023-11-02 | Huawei Technologies Co., Ltd. | Application Permission Management Method and Apparatus, and Electronic Device |
CN112181476A (en) * | 2020-08-31 | 2021-01-05 | 北京达佳互联信息技术有限公司 | Application control method, device, server and storage medium |
CN112287330A (en) * | 2020-11-23 | 2021-01-29 | 腾讯科技(北京)有限公司 | Permission configuration method and device of application program, computer equipment and storage medium |
CN112287330B (en) * | 2020-11-23 | 2024-03-01 | 腾讯科技(北京)有限公司 | Authority configuration method and device for application program, computer equipment and storage medium |
CN113742703A (en) * | 2021-08-20 | 2021-12-03 | 深圳Tcl新技术有限公司 | Application program control method and device, electronic equipment and storage medium |
CN113742703B (en) * | 2021-08-20 | 2024-09-17 | 深圳Tcl新技术有限公司 | Application program management and control method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108664786A (en) | Permission configuration method of application program, mobile terminal, server and storage medium | |
US9253318B2 (en) | Method and apparatus for providing state information | |
CN106789596B (en) | Information attention method, related equipment and system | |
CN109408132A (en) | A kind of configuration file processing method and server, user terminal, storage medium | |
CN102804144A (en) | Remotely locating and commanding a mobile device | |
CN108037863A (en) | A kind of method and apparatus for showing image | |
CN110348236A (en) | A kind of operating right setting method, device and the storage medium of file | |
CN109814801A (en) | Using login method, device, terminal and storage medium | |
CN109429102A (en) | For showing the electronic device and its operating method of application | |
CN106569585A (en) | Method and terminal of managing application program process | |
CN111144953B (en) | Resource allocation method, device, equipment and medium | |
CN105656984A (en) | Method, device, server and system for synchronizing membership benefits among multiple devices | |
CN106843990A (en) | Application program control method and device | |
CN109522131A (en) | Resource allocation method, device and equipment | |
CN109801136B (en) | Food ordering method, system, terminal, server and medium for preventing malicious ordering | |
CN107645582A (en) | A kind of information variation, terminal device and computer-readable medium | |
EP3174244B1 (en) | Video communication ending method and apparatus, computer program and recording medium | |
CN111784412A (en) | Information push method, device, electronic device and storage medium | |
US20150052444A1 (en) | Method of displaying a dlna apparatus, and mobile terminal | |
KR101744696B1 (en) | Method, device, program and recording medium for filtering information | |
CN112235463B (en) | Incoming call processing method and electronic equipment | |
WO2017020665A1 (en) | Wallpaper switching method and apparatus | |
CN111459571A (en) | Configuration method, processing method and device | |
CN106376096B (en) | Wireless network connection method and equipment thereof | |
CN106998438B (en) | User video image display methods and device in visualization calling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181016 |