CN105354448B - Authorization management method and device - Google Patents

Authorization management method and device Download PDF

Info

Publication number
CN105354448B
CN105354448B CN201510890360.8A CN201510890360A CN105354448B CN 105354448 B CN105354448 B CN 105354448B CN 201510890360 A CN201510890360 A CN 201510890360A CN 105354448 B CN105354448 B CN 105354448B
Authority
CN
China
Prior art keywords
entrance
empowerment management
command reception
authorization
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510890360.8A
Other languages
Chinese (zh)
Other versions
CN105354448A (en
Inventor
李丁盼
李春雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201510890360.8A priority Critical patent/CN105354448B/en
Publication of CN105354448A publication Critical patent/CN105354448A/en
Application granted granted Critical
Publication of CN105354448B publication Critical patent/CN105354448B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses an authorization management method, which comprises the steps of obtaining the response of authorization management software for authorization management of authorized application, wherein the authorization management software records the approval state of the authority applied by the authorized application, and the response is determined by the authorization management software according to the approval state; if the response indicates that the authorization of the authorized application fails, a shortcut instruction receiving entrance is generated; and after receiving a trigger instruction through the shortcut instruction receiving inlet, displaying an interface of an authorization management tool of the authorization management software. Correspondingly, the embodiment of the invention also discloses an authorization management device. The user can directly modify the authority on the interface of the authorization management tool, and the problem that the authority is modified after the authorization fails is solved, so that the user experience is enhanced.

Description

A kind of method and apparatus of empowerment management
Technical field
The present invention relates to field of computer technology more particularly to a kind of method and apparatus of empowerment management.
Background technique
Empowerment management software manages the tool of Root authority, record has each application software Shen in empowerment management software The sanctions status of permission please.Sanctions status can applying right determines in limited time for the first time in application software.To apply " reading short for the first time For the permission of letter ", terminal shows that reminding window as shown in Figure 1, empowerment management software will record operation of the user to reminding window As sanctions status.If user clicks refusal, empowerment management software will record the sanctions status that application software is directed to the permission For " refusal ", and user be likely to be click it is wrong.When application software again prescribe a time limit by applying right, empowerment management software can be direct It is determined as authorization failure according to the sanctions status recorded before.If user wants to modify the permission of the application software, need first The empowerment management software for managing the permission of the application software is found, then finds the boundary for recording the sanctions status of the application software Face needs user to carry out sequence of operations to modify, and program is comparatively laborious.
Summary of the invention
The present invention provides a kind of method and apparatus of empowerment management, can solve after authorization failure that modification authority is cumbersome to ask Topic.
In order to solve the above-mentioned technical problem, first aspect present invention provides a kind of method of empowerment management, the method Include:
The response that empowerment management software carries out empowerment management to authorization application is obtained, the empowerment management software records are The sanctions status of the permission of authorization application application is stated, the response is that the empowerment management software is determined according to the sanctions status 's;If authorization failure is applied in the response instruction authorization, quick command reception entrance is generated;Pass through the quick instruction After reception entrance receives triggering command, the interface of the empowerment management tool of the empowerment management software is shown.
Further, the method also includes:
If the response instruction inquiry user, generates at least two selection instructions and receives entrance, and described at least two A selection instruction receives entrance middle finger and draws target selection command reception entrance.
Wherein, at least two selection instructions of the generation receive entrance, and at least two selection instruction receive into Mouth middle finger draws target selection command reception entrance
According to the identification information of the empowerment management software, determine the target selection command reception entrance it is described at least Two selection instructions receive the position in entrance, and guide out the target selection command reception to enter in the determining position Mouthful.
Further, the method also includes: if response instruction inquiry user, obtains authorization application acquisition The information of the purpose of permission, and show the information got.
Further, the method also includes:
The authorization application is judged whether not for the application in pre-set blacklist, including at least in the blacklist One application for not allowing to authorize;If so, executing the sound for obtaining empowerment management software and carrying out empowerment management to authorization application The step of answering.
Correspondingly, second aspect of the present invention additionally provides a kind of device of empowerment management, and described device includes:
Module is obtained, carries out the response of empowerment management, the authorization pipe to authorization application for obtaining empowerment management software Reason software records have the sanctions status of the permission of the authorization application application, and the response is the empowerment management software according to institute State what sanctions status determined;
Portal generation module is received, if applying authorization failure for the response instruction authorization, generates and fast refers to It enables and receives entrance;
Command reception module, for receiving triggering command by the quick command reception entrance;
Display module, for showing the empowerment management after described instruction receiving module receives the triggering command The interface of the empowerment management tool of software.
Further, the reception portal generation module is also used to:
If the response instruction inquiry user, generates at least two selection instructions and receives entrance, and described at least two A selection instruction receives entrance middle finger and draws target selection command reception entrance.
Wherein, the reception portal generation module is specifically used for:
According to the identification information of the empowerment management software, determine the target selection command reception entrance it is described at least Two selection instructions receive the position in entrance, and guide out the target selection command reception to enter in the determining position Mouthful.
Further, the reception portal generation module is also used to:
If the response instruction inquiry user, the information that the authorization application obtains the purpose of permission is obtained, and show The information got.
Further, described device further include:
Judgment module is described black for judging that whether the authorization applies not for the application in pre-set blacklist Include the application that at least one does not allow to authorize in list, if the authorization application is not the application in the blacklist, touches It sends out described and obtains the response that module acquisition empowerment management software carries out empowerment management to authorization application.
Correspondingly, third aspect present invention provides a kind of terminal, and the terminal includes authorization pipe described in second aspect Some or all of device of reason.
The implementation of the embodiments of the present invention has the following beneficial effects:
The available empowerment management software of the embodiment of the present invention carries out the response of empowerment management to authorization application, if the response Indicate that the authorization using authorization failure, then generates quick command reception entrance, and passing through the quick command reception entrance After receiving triggering command, the interface of the empowerment management tool of the empowerment management software is shown, user can directly authorize The interface modification permission of management tool, modification authority is cumbersome after solving the problems, such as authorization failure, to enhance user experience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is that the schematic diagram at interface is reminded in the authorization of the prior art;
Fig. 2 is a kind of flow diagram of the method for empowerment management provided in an embodiment of the present invention;
Fig. 3 a is a kind of schematic diagram of instruction revision permission provided in an embodiment of the present invention;
Fig. 3 b is the schematic diagram of another instruction revision permission provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of the method for another empowerment management provided in an embodiment of the present invention;
Fig. 5 a is the schematic diagram that interface is reminded in a kind of authorization provided in an embodiment of the present invention;
Fig. 5 b is the schematic diagram that interface is reminded in another authorization provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of the device of empowerment management provided in an embodiment of the present invention;
Fig. 7 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In this section, the basic concepts all referred to first to each embodiment of the present invention are illustrated.
Root is the movement of the administrator right or acquisition permission in android system, with all in system Permission such as starts or stops a process, deletes or increase user, increase or disable hardware etc..
Empowerment management software: refer to the tool that Root authority is managed in terminal.
Terminal provided by the embodiment of the present invention includes all terminals based on android system, is such as based on Android system Smart phone, pad or electronic reader of system etc., the present invention does not limit.
Referring to Fig. 2, Fig. 2 is a kind of flow diagram of the method for empowerment management provided in an embodiment of the present invention.Such as Fig. 2 It is shown the method may include:
Step S21 obtains the response that empowerment management software carries out empowerment management to authorization application, the empowerment management software Record has the sanctions status of the permission of the authorization application application, and the response is the empowerment management software according to the approval What state determined.
When running an application software, it may be necessary to call other application software, the function of the application software could be completed Can, when such as running shopping software, it may be necessary to which the functions such as " recording ", " GPS navigation ", " shooting photos and videos " then need to adjust The function is completed with the corresponding application software of the function, but before application software will call other application software, needs to obtain Call the permission of other application software;Alternatively, needing to obtain the power for unloading the application software when unloading some application software Limit.Terminal carries out empowerment management to application software by empowerment management software, is known as the application software to authorize application here.
Empowerment management software records have the sanctions status of the permission of authorization application application, and the initial value of the sanctions status can With what is be arranged when installing the licensed software, the sanctions status may include " permission ", " refusal " or " inquiry ".It is soft when authorizing Part executes an order, and when executing the order and needing to call permission, then it requests, awards to empowerment management software sending permission application It weighs management software and response is then determined according to the sanctions status of the permission of the authorization of record application application;
Optionally, the empowerment management software includes at least two kinds of response modes.The first response mode: the authorization pipe It manages software and returns to a return value, the return value includes that authorization application authorizes successful return value or authorization to apply authorization failure Return value;If sanctions status is " permission ", the successful return value of authorization is returned;If sanctions status is " refusal ", return The return value of authorization failure.Second of response mode: the empowerment management software returns to the instruction of inquiry user, if approval shape State is " inquiry ", then returns to the instruction.
It should be noted that the form of expression of return value can be achieved by the prior art, such as realized by binary system, Such as " 00 " expression " refusal ", " 11 " expression " permission ", the present invention is not limited.
Further, whether terminal can first judge the authorization application in the authorized application of receiving end authorization application It is not the application in pre-set blacklist, includes the application that at least one does not allow to authorize in the blacklist, if described Authorization application is not the application in pre-set blacklist, just obtains empowerment management software and carries out empowerment management to authorization application Response.
Step S22 generates quick command reception entrance if authorization failure is applied in the response instruction authorization.Its In, the form of expression of the quick command reception entrance may include but be not limited only to button or link etc., the quick finger Enable reception entrance that can be located at reminding window, notification bar.Below quick command reception entrance by be located at reminding window in button for, As shown in Figure 3a.
" checking " button in Fig. 3 a can be understood as quick command reception entrance, can also mention including text in reminding window Show information, the text prompt information is for instructing the user how modification authority.It should be noted that reminding window shown in Fig. 3 a The only optional embodiment of one of embodiment of the present invention cannot limit the present invention with this, and quick botton is in reminding window The middle position present invention does not limit.
Due to, some empowerment management softwares cannot directly be switched to the interface of its empowerment management tool by quick botton, Therefore, when the response instruction authorization is using authorization failure, terminal can first obtain the mark of the empowerment management software Information is managed according to whether empowerment management software described in the identification information judgment allows directly to be switched to its authorization by quick botton The interface of science and engineering tool;If the empowerment management software does not allow directly to be switched to the boundary of its empowerment management tool by quick botton Face then shows the reminding window such as Fig. 3 b, it is preferred that the reminding window shown at this time includes for instructing the user how modification authority Text indicates information.It should be noted that reminding window shown in Fig. 3 b is that one of embodiment of the present invention is optionally implemented Mode cannot limit the present invention with this.
Further, if terminal can not determine empowerment management software according to the identification information got, terminal can basis The frequency of use of local empowerment management software determines empowerment management software using the time, further according to determining empowerment management software Provide corresponding text instruction information.For example, the empowerment management software b that the last time uses is determined as applying authorization by terminal The empowerment management software of empowerment management is carried out, and is provided and " management software b may be authorized to prohibit, please click and check the power of amendment The text of limit " indicates information.
Step S23 shows the empowerment management software after receiving triggering command by the quick command reception entrance Empowerment management tool interface.
It is assumed that terminal is in the authorization application authorization failure, the reminding window of display is as shown in Figure 3a, " looks into when the user clicks See " button, terminal, which may be considered, receives triggering command by the quick command reception entrance, then shows the authorization pipe The interface of the empowerment management tool of software is managed, in this way, what user can directly apply authorization at the interface of empowerment management tool Sanctions status is revised as " inquiring " from " refusal " or " permission ", and modification authority is cumbersome after solving the problems, such as authorization failure, thus Enhance user experience.
Referring to Fig. 4, Fig. 4 is the flow diagram of the method for another empowerment management provided in an embodiment of the present invention.Such as Shown in Fig. 4 the method may include:
Step S41 obtains the response that empowerment management software carries out empowerment management to authorization application, the empowerment management software Record has the sanctions status of the permission of the authorization application application, and the response is the empowerment management software according to the approval What state determined.
Further, whether terminal can first judge the authorization application in the authorized application of receiving end authorization application It is not the application in pre-set blacklist, includes the application that at least one does not allow to authorize in the blacklist, if described Authorization application is not the application in pre-set blacklist, just obtains empowerment management software and carries out empowerment management to authorization application Response.
Step S42, if response instruction inquiry user, generates at least two selection instructions and receive entrance, and in institute It states at least two selection instructions and receives entrance middle finger extraction target selection command reception entrance, and/or, obtain the authorization application The information of the purpose of permission is obtained, and shows the information got.
It should be noted that if the response instruction inquiry user, terminal can only generate at least two selection instructions and connect Mouth is taken in, and is received at least two selection instruction and refers to extraction target selection command reception entrance in entrance, alternatively, only obtaining It takes the authorization application to obtain the information of the purpose of permission, and shows the information got, alternatively, being performed simultaneously above two A method.
Process flow shown in Fig. 4 is one of process, cannot limit the present invention with this.
In a kind of optional embodiment, terminal only generate at least two selection instructions receive entrance, and it is described extremely Few two selection instructions receive entrance middle finger and draw target selection command reception entrance.Wherein, the selection instruction receives entrance The form of expression may include but be not limited only to button or link etc., the quick command reception entrance can be located at prompt Window, notification bar.Quick command reception entrance is by taking the button being located in reminding window as an example below
As shown in Figure 5 a, " permission " and " refusal " select button can be understood as selection instruction and receive entrance.Due to different Empowerment management software in, the positions of the two select buttons is different, and select button is by taking "Yes" and "No" as an example, some authorization pipes "Yes" is on the left side of "No" in reason software, and "Yes" is on the right of "No" in some empowerment management software.And different users its Habit is also different, and some users are accustomed to "Yes" on the left side of "No", and "Yes" in the reminding window that often empowerment management software is shown On the right of "No", user expects to click "Yes", according to the habit of user, it is easy to the button on the left side is clicked directly on, and it is practical The button on the upper left side is "No", leads to maloperation, and user also needs to re-start Authorized operation, more troublesome, reduces user's body It tests.
In embodiments of the present invention, if response instruction inquiry user, terminal can be according to the empowerment management software Identification information, determine target selection command reception entrance at least two selection instruction receive entrance in position, and The target selection command reception entrance is guided out in the determining position.Target selection command reception entrance is with select button For "Yes", if response instruction inquiry user, terminal can show reminding window as shown in Figure 5 a, guide out the choosing of "Yes" Button is selected, to avoid user because of maloperation caused by being accustomed to.Wherein, target selection command reception entrance can be system default , it is also possible to user's self-setting.
It should be noted that guide mode shown in Fig. 5 a is one of present invention alternative embodiment, it cannot be with this Limit the present invention.
In another optional embodiment, terminal only obtains the information that the authorization application obtains the purpose of permission, And show the information got.In the specific implementation, it is assumed that the licensed software needs to obtain the permission of " recording ", terminal The information of the purpose of the permission of available " recording ", and show the information.
It shows that the method present invention of the information does not limit, by taking the permission of acquisition " recording " as an example, can be shown in reminding window Show the information, such as display " allows this using microphone records audio.This permission can allow the application not answer your confirmation Recording audio at any time ", as shown in Figure 5 b;The information can be shown in notification bar;All can be used for showing the information to remind use The mode at family can be applied to the embodiment of the present invention, cannot limit the present invention with above-mentioned several optional implementations.
In another optional embodiment, terminal may be performed simultaneously both the above method.This embodiment phase It is same as the combination of both the above embodiment, details are not described herein.
In the embodiment shown in fig. 4, if response instruction inquiry user, terminal can be received at least two selection instructions Entrance middle finger draws target selection command reception entrance, to avoid user because habit leads to maloperation, and/or, it obtains authorization and answers It with the information for the purpose for obtaining permission, and shows the information that gets, allows a user to the acquisition of timely learning licensed software Purpose after permission, for selection by the user when referred to.
Referring to Fig. 6, Fig. 6 is a kind of structural schematic diagram of the device of empowerment management provided in an embodiment of the present invention;Such as Fig. 6 Shown in empowerment management device at least may include obtain module 61, receive portal generation module 62, command reception module 63 And display module 64, in which:
Module 61 is obtained, carries out the response of empowerment management, the authorization to authorization application for obtaining empowerment management software Management software record has a sanctions status of the permission of the authorization application application, the response be the empowerment management software according to What the sanctions status determined;Portal generation module 62 is received, if applying authorization failure for the response instruction authorization, Then generate quick command reception entrance;Command reception module 63 refers to for receiving triggering by the quick command reception entrance It enables;Display module 64, for after described instruction receiving module 63 receives the triggering command, showing that the empowerment management is soft The interface of the empowerment management tool of part.
In a kind of optional embodiment, if response instruction inquiry user, the reception portal generation module 62 It then generates at least two selection instructions and receives entrance, and received at least two selection instruction and refer to that drawing target selects in entrance Select command reception entrance.
In the specific implementation, receive portal generation module 62 according to the identification information of the empowerment management software, determine described in Target selection command reception entrance receives the position in entrance at least two selection instruction, and in the determining position Guide out the target selection command reception entrance.
In another optional embodiment, if response instruction inquiry user, the reception portal generation module 62 obtain the information that the authorization application obtains the purpose of permission, and show the information got.
In another optional embodiment, if response instruction inquiry user, the reception portal generation module 62 determination target selection command reception entrances receive the position in entrance at least two selection instruction, and true The fixed position guides out the target selection command reception entrance and obtains the purpose that the authorization application obtains permission Information, and show the information that gets.
Further, as shown in fig. 6, the device 6 of the empowerment management can also include judgment module 65, for judging State whether authorization application is not the application in pre-set blacklist, includes that at least one does not allow to authorize in the blacklist Application trigger the acquisition of acquisitions module 61 empowerment management if the authorization application is not the application in the blacklist Software carries out the response of empowerment management to authorization application.
Referring to Fig. 7, the embodiment of the invention provides a kind of structural schematic diagrams of terminal.The terminal 7 includes shown in fig. 6 The device of empowerment management, and the method that the terminal 7 can be used for implementing the empowerment management provided in Fig. 2 and Fig. 4 embodiment.Specifically For:
The terminal 7 may include network interface 71, include one or more depositing for computer readable storage medium Reservoir 72, input unit 73, display unit 74, power supply 75, the processor 76 for including one or more than one processing core Equal components.It will be understood by those skilled in the art that structure shown in Fig. 7 does not constitute the restriction to the device of empowerment management, It may include perhaps combining certain components or different component layouts than illustrating more or fewer components.Wherein:
Network interface 71 can be used for accessing network, can specifically use Broadband Network Interface, WiFi (wireless Fidelity, Wireless Fidelity) module or RF (Radio Frequency, radio frequency) module realize.
Memory 72 can be used for storing software program and module, and processor 76 is stored in the soft of memory 72 by operation Part program and module, thereby executing various function application and data processing.Memory 76 can mainly include storing program area The storage data area and.In addition, memory 72 may include high-speed random access memory, it can also include nonvolatile memory (non-volatile memory), for example, at least a disk memory, flush memory device or the storage of other volatile solid-states Device.Correspondingly, memory 72 can also include Memory Controller, to provide processor 76 and input unit 73 to memory 72 access.
Input unit 73 can be used for receiving the number or character information of input, and generate and user setting and function control Make related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 73 may include touch screen Or key mouse 731 and other input equipments 732.Touch screen or key mouse 731, including touch screen or key mouse, touch screen also referred to as touch Display screen or Trackpad are touched, collecting the touch operation of user on it or nearby, (for example user is appointed using finger, stylus etc. What operation of suitable object or attachment on the contact surface or near contact surface), and phase is driven according to preset formula The attachment device answered.In addition to touch screen or key mouse 731, input unit 73 can also include other input equipments 732.Key mouse includes Physical keyboard and physics mouse.In addition, other input equipments 732 can include but is not limited to function key, (for example volume control is pressed Key, switch key etc.), trace ball, one of operating stick etc. or a variety of.
Display unit 74 can be used for showing information input by user or the information and empowerment management that are supplied to user The various graphical user interface of device 7, these graphical user interface can be by figure, text, icon, video and any combination thereof To constitute.Display unit 74 may include display panel 741, optionally, can using LCD (Liquid Crystal Display, Liquid crystal display), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display Panel 741.
Terminal 7 further includes the power supply 75 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 76 are logically contiguous, to realize management charging, electric discharge and power managed etc. by power-supply management system Function.Power supply 75 can also include one or more direct current or AC power source, recharging system, power failure monitor electricity The random components such as road, power adapter or inverter, power supply status indicator.
Processor 76 is the control centre for optimizing device, utilizes each portion of various interfaces and connection whole mobile phone Point, by running or execute the software program and/or module that are stored in memory 72, and calls and be stored in memory 72 Data, perform various functions and handle data.Optionally, processor 76 may include one or more processing cores;Preferably, Processor 76 can integrate application processor and modem processor, wherein the main processing operation system of application processor, user Interface and application program etc., modem processor mainly handle communication.It is understood that above-mentioned modem processor It can not be integrated into processor 76.
Further, processor 76 calls the program code stored in memory 72, executes following operation:
The response that empowerment management software carries out empowerment management to authorization application is obtained, the empowerment management software records are The sanctions status of the permission of authorization application application is stated, the response is that the empowerment management software is determined according to the sanctions status 's;
If authorization failure is applied in the response instruction authorization, quick command reception entrance is generated;
After receiving triggering command by the quick command reception entrance, the authorization pipe of the empowerment management software is shown The interface of science and engineering tool.
In a kind of optional embodiment, if response instruction inquiry user, processor 76 may call upon storage The program code stored in device 72 executes following operation:
It generates at least two selection instructions and receives entrance, and received at least two selection instruction and refer to extraction in entrance Target selection command reception entrance.
Optionally, processor 76 calls the program code stored in memory 72, generates at least two selection instructions and receives Entrance, and received at least two selection instruction and refer to that drawing target selection command reception entrance specifically can wrap in entrance It includes:
According to the identification information of the empowerment management software, determine the target selection command reception entrance it is described at least Two selection instructions receive the position in entrance, and guide out the target selection command reception to enter in the determining position Mouthful.
In another optional embodiment, if response instruction inquiry user, processor 76, which may call upon, to be deposited The program code stored in reservoir 72 executes following operation:
The information that the authorization application obtains the purpose of permission is obtained, and shows the information got.
In another optional embodiment, if response instruction inquiry user, processor 76, which may call upon, to be deposited The program code stored in reservoir 72 executes following operation:
It generates at least two selection instructions and receives entrance, and received at least two selection instruction and refer to extraction in entrance Target selection command reception entrance, and, the information that the authorization application obtains the purpose of permission is obtained, and show and get The information.
Further, processor 76 can call the program code stored in memory 72, execute following operation:
The authorization application is judged whether not for the application in pre-set blacklist, including at least in the blacklist One application for not allowing to authorize is returned if so, executing the acquisition empowerment management software and carrying out empowerment management to authorization application The step of response returned.
The available empowerment management software of the embodiment of the present invention carries out the response of empowerment management to authorization application, if response refers to Show that the authorization using authorization failure, then generates quick command reception entrance, and connect by the quick command reception entrance After receiving triggering command, the interface of the empowerment management tool of empowerment management software will be shown, user can be directly in empowerment management The interface modification permission of tool, modification authority is cumbersome after solving the problems, such as authorization failure, to enhance user experience.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.In addition, in each embodiment of the present invention In each functional unit can integrate in a processing module, be also possible to each unit and physically exist alone, can also two A or more than two units are integrated in a module.Above-mentioned integrated module both can take the form of hardware realization, can also It is realized in the form of using software function module.If the integrated module realized in the form of software function module and as Independent product when selling or using, also can store in a computer readable storage medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention Type.
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (8)

1. a kind of method of empowerment management, which is characterized in that the described method includes:
The response that empowerment management software carries out empowerment management to authorization application is obtained, the empowerment management software records have described award The sanctions status of the permission of power application application, the response is that the empowerment management software is determined according to the sanctions status, The sanctions status includes " permission ", " refusal " or " inquiry ";
If authorization failure is applied in the response instruction authorization, quick command reception entrance is generated;
After receiving triggering command by the quick command reception entrance, the empowerment management work of the empowerment management software is shown The interface of tool;
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, and at least two choosing It selects command reception entrance middle finger and draws target selection command reception entrance.
2. the method as described in claim 1, which is characterized in that
At least two selection instructions of the generation receive entrance, and receive at least two selection instruction and refer to extraction in entrance Target selection command reception entrance includes:
According to the identification information of the empowerment management software, determine the target selection command reception entrance described at least two Selection instruction receives the position in entrance, and guides out the target selection command reception entrance in the determining position.
3. the method as described in claim 1, which is characterized in that if response instruction inquiry user, generates at least Two selection instructions receive entrance, and receive at least two selection instruction and refer to extraction target selection command reception in entrance Entrance, comprising:
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, and at least two choosing It selects command reception entrance middle finger and draws target selection command reception entrance;Or,
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, obtains the authorization application and obtain The information of the purpose of weighting limit, and show the information got;Or,
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, and at least two choosing It selects command reception entrance middle finger and draws target selection command reception entrance, obtain the letter that the authorization application obtains the purpose of permission Breath, and show the information got.
4. method as claimed in any one of claims 1-3, which is characterized in that the method also includes:
Judge that the authorization application includes at least one in the blacklist whether not for the application in pre-set blacklist Do not allow the application authorized;
If so, the step of executing the response for obtaining empowerment management software to authorization application progress empowerment management.
5. a kind of device of empowerment management, which is characterized in that described device includes:
Module is obtained, carries out the response of empowerment management to authorization application for obtaining empowerment management software, the empowerment management is soft Part record has the sanctions status of the permission of the authorization application application, and the response is the empowerment management software according to described batch What quasi- state determined, the sanctions status includes " permission ", " refusal " or " inquiry ";
Portal generation module is received, if applying authorization failure for the response instruction authorization, quick instruction is generated and connects Take in mouth;
Command reception module, for receiving triggering command by the quick command reception entrance;
Display module, for after described instruction receiving module receives the triggering command, showing the empowerment management software Empowerment management tool interface;
The reception portal generation module is also used to:
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, and at least two choosing It selects command reception entrance middle finger and draws target selection command reception entrance.
6. device as claimed in claim 5, which is characterized in that
The reception portal generation module is specifically used for:
According to the identification information of the empowerment management software, determine the target selection command reception entrance described at least two Selection instruction receives the position in entrance, and guides out the target selection command reception entrance in the determining position.
7. device as claimed in claim 5, which is characterized in that the reception portal generation module is used for:
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, and at least two choosing It selects command reception entrance middle finger and draws target selection command reception entrance;Or,
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, obtains the authorization application and obtain The information of the purpose of weighting limit, and show the information got;Or,
If the response instruction inquiry user, generates at least two selection instructions and receive entrance, and at least two choosing It selects command reception entrance middle finger and draws target selection command reception entrance, obtain the letter that the authorization application obtains the purpose of permission Breath, and show the information got.
8. the device as described in any one of claim 5-7, which is characterized in that described device further include:
Judgment module, for judging that whether the authorization applies not for the application in pre-set blacklist, the blacklist In include that application that at least one does not allow to authorize triggers institute if the authorization application is not the application in the blacklist It states and obtains the response that module acquisition empowerment management software carries out empowerment management to authorization application.
CN201510890360.8A 2015-12-07 2015-12-07 Authorization management method and device Expired - Fee Related CN105354448B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510890360.8A CN105354448B (en) 2015-12-07 2015-12-07 Authorization management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510890360.8A CN105354448B (en) 2015-12-07 2015-12-07 Authorization management method and device

Publications (2)

Publication Number Publication Date
CN105354448A CN105354448A (en) 2016-02-24
CN105354448B true CN105354448B (en) 2019-03-15

Family

ID=55330419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510890360.8A Expired - Fee Related CN105354448B (en) 2015-12-07 2015-12-07 Authorization management method and device

Country Status (1)

Country Link
CN (1) CN105354448B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127063A (en) * 2016-06-12 2016-11-16 乐视控股(北京)有限公司 A kind of mobile device navigation management method and device
CN109063425B (en) * 2018-08-16 2023-01-10 腾讯科技(深圳)有限公司 Software authority management method and device
CN110457921A (en) * 2019-08-01 2019-11-15 维沃移动通信有限公司 Right management method and terminal device
CN112825030B (en) * 2020-02-28 2023-09-19 腾讯科技(深圳)有限公司 Application program control method, device, equipment and storage medium
CN112667973B (en) * 2020-11-30 2023-12-26 新华三技术有限公司 Method and device for activating management software of network equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473232A (en) * 2012-06-06 2013-12-25 北京三星通信技术研究有限公司 Self-management device and self-management method of application programs
CN104536731A (en) * 2014-12-05 2015-04-22 北京奇虎科技有限公司 Method, device and system for setting application programs

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281569A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Method for using network edition software protecting equipment to control software client terminal quantity
CN103164264B (en) * 2011-12-16 2016-03-30 中兴通讯股份有限公司 Application manager, application management method and access method
CN103886255B (en) * 2014-03-12 2017-11-10 可牛网络技术(北京)有限公司 The privacy authority management method and device of application program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473232A (en) * 2012-06-06 2013-12-25 北京三星通信技术研究有限公司 Self-management device and self-management method of application programs
CN104536731A (en) * 2014-12-05 2015-04-22 北京奇虎科技有限公司 Method, device and system for setting application programs

Also Published As

Publication number Publication date
CN105354448A (en) 2016-02-24

Similar Documents

Publication Publication Date Title
EP3803572B1 (en) Setup procedures for an electronic device
CN105354448B (en) Authorization management method and device
CN102014149B (en) Mobile terminal and method for controlling operation of the same
KR102207443B1 (en) Method for providing graphic user interface and apparatus for the same
CN106406739B (en) A kind of note generation method and mobile terminal
CN107678644A (en) A kind of image processing method and mobile terminal
CN101587421A (en) Unlock method and system of touch panel, and touch panel device
AU2019100574A4 (en) Setup procedures for an electronic device
CN110532764A (en) A kind of method, mobile terminal and the readable storage medium storing program for executing of permission processing
JP2023542666A (en) Operation method and device
CN106056001A (en) Private data protection method and apparatus based on mobile terminal and mobile terminal
CN106445326A (en) Operation control method and mobile terminal
CN105094465B (en) Ambient light measurement method and device
CN105739839B (en) The selection method and device of multimedia menu item
CN106484301A (en) A kind of method of hiden application and terminal
CN108932086A (en) Display methods, device and the storage medium of application interface
CN106507176A (en) A kind of method of video playback and mobile terminal
CN106873898A (en) Application program working mode switching method and device and electronic equipment
CN106502727A (en) A kind of control method of application program and mobile terminal
CN103383622B (en) The method of mobile terminal of touch screen response operation and mobile terminal of touch screen
CN105471888B (en) Service verification method and device based on biological information
CN106484480A (en) A kind of determination method of application of attending to anything else, device and terminal
CN106503062A (en) A kind of social dynamic dissemination method and device, user terminal
CN106534482B (en) Method and device for managing application programs of mobile terminal
CN102947773B (en) Apparatus, method and user interface

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190315