CN106066967A - Permission setting method and device - Google Patents
Permission setting method and device Download PDFInfo
- Publication number
- CN106066967A CN106066967A CN201610364017.4A CN201610364017A CN106066967A CN 106066967 A CN106066967 A CN 106066967A CN 201610364017 A CN201610364017 A CN 201610364017A CN 106066967 A CN106066967 A CN 106066967A
- Authority
- CN
- China
- Prior art keywords
- unit
- file
- client
- destination
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000000052 comparative effect Effects 0.000 claims description 3
- 239000000203 mixture Substances 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000032696 parturition Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
- G06F21/1015—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a permission setting method and a permission setting device, which are used for solving the problem that an application lock can not only protect a file, and the method comprises the following steps: acquiring a target file on an authority setting interface; setting a target client capable of accessing a target file on a permission setting interface; the storage path of the target file is maintained. By implementing the embodiment of the invention, the protection of only the file can be realized.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of authority setting method and device.
Background technology
Application on the subscriber equipment such as mobile phone, panel computer can be encrypted by application lock, answers when user needs to start
Used time, user needs to input correct Crypted password could use application, such that it is able to the privacy of protection application.But, very
In many time, user was not required to protect whole application, it is only necessary to the partial document in protection application, such as: user needs user
Some pictures in equipment carry out secret protection, and without whole picture library carries out secret protection, but application lock cannot be the most right
File is protected.
Summary of the invention
The embodiment of the invention discloses a kind of authority setting method and device, being used for solving application lock cannot only enter file
The problem of row protection.
The open a kind of authority setting method of embodiment of the present invention first aspect, including:
File destination is obtained at permission configuration interface;
The destination client being able to access that described file destination is set at permission configuration interface;
Keep the store path of described file destination.
In one embodiment, described method also includes:
Set up priority assignation entrance;
For described priority assignation entrance, Crypted password is set.
In one embodiment, described method also includes:
When the entry instruction for entering described priority assignation entrance being detected, output is used for pointing out user to input password
Information;
When the password inputted for described information being detected, described password is compared with described Crypted password
Relatively;
When described password is identical with described Crypted password, access entitlements arrange interface.
In one embodiment, described method also includes:
When the access instruction for accessing described file destination being detected, obtain the visitor for generating described access instruction
The mark of family end;
When the client that described mark is identified is described destination client, perform described access instruction;
When the client that described mark is identified not is described destination client, abandon described access instruction.
In one embodiment, at least one during described file destination is picture file, video file and audio file.
The open a kind of priority assignation device of embodiment of the present invention second aspect, including:
First acquiring unit, for obtaining file destination at permission configuration interface;
First arranges unit, for arranging the target being able to access that described first acquiring unit obtains at permission configuration interface
The destination client of file;
Holding unit, for keeping the store path of the file destination of described first acquiring unit acquisition.
In one embodiment, described device also includes:
Set up unit, be used for setting up priority assignation entrance;
Second arranges unit, for arranging Crypted password for the described priority assignation entrance setting up unit foundation.
In one embodiment, described device also includes:
Output unit, for when detecting for entering the described entry instruction setting up the priority assignation entrance that unit is set up
Time, output is for pointing out user the information inputting password;
Comparing unit, for when detecting the password that the information exported for described output unit inputs, by institute
State password to compare with the described second Crypted password arranging unit setting;
Enter unit, for when the comparative result of described comparing unit be described password identical with described Crypted password time,
Access entitlements arrange interface.
In one embodiment, described device also includes:
Second acquisition unit, for when the access instruction for accessing described file destination being detected, obtains and is used for giving birth to
Become the mark of the client of described access instruction;
Performance element, the client that the mark for obtaining when described second acquisition unit is identified is described first setting
During the destination client that unit is arranged, perform described access instruction;
Discarding unit, the client that the mark for obtaining when described second acquisition unit is identified is not described first to set
When putting the destination client that unit is arranged, abandon described access instruction.
In one embodiment, at least one during described file destination is picture file, video file and audio file.
In the embodiment of the present invention, obtain file destination at permission configuration interface, arrange at permission configuration interface and be able to access that
The destination client of file destination, and keep the store path of file destination constant, it is seen then that only file can be carried out authority and set
Put, such that it is able to reduce the complexity of file protection.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below by use required in embodiment
Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area
From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to obtain the attached of other according to these accompanying drawings
Figure.
Fig. 1 is the schematic flow sheet of a kind of authority setting method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of authority setting method disclosed in the embodiment of the present invention;
Fig. 3 is the structural representation of a kind of priority assignation device disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of priority assignation device disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of the embodiment of the present invention another priority assignation device disclosed.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on this
Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under not making creative work premise
Execute example, broadly fall into the scope of protection of the invention.
The embodiment of the invention discloses a kind of authority setting method and device, being used for solving application lock cannot only enter file
The problem of row protection.It is described in detail individually below.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of authority setting method disclosed in the embodiment of the present invention.Wherein, should
Authority setting method is to describe from the angle of the subscriber equipment such as mobile phone, panel computer.As it is shown in figure 1, this authority setting method
May comprise steps of.
101, file destination is obtained at permission configuration interface.
In the present embodiment, when during user needs subscriber equipment, the file destination of storage is protected, user can be led to
Crossing and operate with family equipment access entitlements and arrange interface, subscriber equipment obtains file destination at permission configuration interface afterwards.Wherein,
File destination can be at least one in the files such as picture file, video file, audio file.Wherein, file destination is permissible
It is the file in file manager, it is also possible to be the file in a concrete client (or application), such as: work as file destination
During for picture, file destination can be the file in picture library.
102, the destination client of file destination it is able to access that in permission configuration interface setting.
In the present embodiment, subscriber equipment, will be at permission configuration interface after permission configuration interface gets file destination
File destination is carried out priority assignation, is i.e. able to access that the destination client of file destination in permission configuration interface setting, afterwards
File destination can only be accessed by destination client, and other client all cannot access file destination.
103, the store path of file destination is kept.
In the present embodiment, subscriber equipment permission configuration interface arrange be able to access that file destination destination client it
After, not preserving file destination at permission configuration interface, the store path keeping file destination is constant, such as: when file destination is
Picture, and when file destination is originally stored in picture library, file destination is still stored in picture library, therefore, when client needs
When accessing file destination, can conduct interviews according to original store path.
In the authority setting method described by Fig. 1, obtain file destination at permission configuration interface, at permission configuration interface
Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition
Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of another kind of authority setting method disclosed in the embodiment of the present invention.Wherein,
This authority setting method is to describe from the angle of the subscriber equipment such as mobile phone, panel computer.As in figure 2 it is shown, this priority assignation side
Method may comprise steps of.
201, set up priority assignation entrance, and Crypted password is set for priority assignation entrance.
In the present embodiment, when during user needs subscriber equipment, the file of storage is protected, subscriber equipment will be set up
Priority assignation entrance, priority assignation entrance can be client (or application), it is also possible to for file.When authority inlet porting is
During client (or application), set up priority assignation entrance, i.e. install or load client (or application).Enter for priority assignation afterwards
Mouth arranges Crypted password, to ensure the safety of priority assignation entrance.
202, when detecting for the entry instruction of access entitlements inlet porting, output is used for pointing out user to input password
Information.
In the present embodiment, when during user needs subscriber equipment, the file of storage is protected, can be pre-by clicking on
If the operations such as icon, click predeterminable area, pressing programmable button are to subscriber equipment input entering for access entitlements inlet porting
Entering instruction, after subscriber equipment detects this entry instruction, output is used for the information pointing out user to input password, this carries
Show that information can export with voice mode, it is also possible to export with text mode.
203, when the password inputted for this information being detected, this password is compared with Crypted password, when
When this password is identical with Crypted password, access entitlements arrange interface.
In the present embodiment, when subscriber equipment detects the password inputted for this information, by this password with for power
The Crypted password that limit inlet porting is arranged compares, when this password is identical with the Crypted password arranged for priority assignation entrance
Time, access entitlements are arranged interface, when this password is different from the Crypted password arranged for priority assignation entrance, use can be exported
Information in prompting user cipher mistake.Wherein, this password can input with voice mode, it is also possible to is with text
Mode inputs.
204, file destination is obtained at permission configuration interface.
In the present embodiment, when during user needs subscriber equipment, the file destination of storage is protected, user can be led to
Crossing and operate with family equipment access entitlements and arrange interface, subscriber equipment obtains file destination at permission configuration interface afterwards.Wherein,
File destination can be at least one in the files such as picture file, video file, audio file.Wherein, file destination is permissible
It is the file in file manager, it is also possible to be the file in a concrete client (or application), such as: work as file destination
During for picture, file destination can be the file in picture library.
205, the destination client of file destination it is able to access that in permission configuration interface setting.
In the present embodiment, subscriber equipment, will be at permission configuration interface after permission configuration interface gets file destination
File destination is carried out priority assignation, is i.e. able to access that the destination client of file destination in permission configuration interface setting, afterwards
File destination can only be accessed by destination client, and other client all cannot access file destination.
206, the store path of file destination is kept.
In the present embodiment, subscriber equipment permission configuration interface arrange be able to access that file destination destination client it
After, not preserving file destination at permission configuration interface, the store path keeping file destination is constant, such as: when file destination is
Picture, and when file destination is originally stored in picture library, file destination is still stored in picture library, therefore, when client needs
When accessing file destination, can conduct interviews according to original store path.
207, when the access instruction for accessing file destination being detected, the client for generating this access instruction is obtained
The mark of end.
In the present embodiment, when user needs to access file destination, can be used for visiting to subscriber equipment input by operation
When asking the access instruction of file destination, when subscriber equipment detects this access instruction, first judge whether file destination is arranged
Authority, when being provided with authority for file destination, is used for generating the mark of the client of this access instruction by acquisition;When not having
When authority is set for file destination, directly perform this access instruction.
208, when the client that this mark is identified is destination client, this access instruction is performed, when this mark is marked
When the client known not is destination client, abandon this access instruction.
In the present embodiment, get after the mark of the client generating this access instruction, it is judged that this mark is marked
Whether the client known has permission access file destination, i.e. judges whether the client that this mark is identified is destination client,
When the client that this mark is identified is destination client, by this access instruction of execution, when the client that this mark is identified
When being not destination client, this access instruction will be abandoned.
In the authority setting method described by Fig. 2, obtain file destination at permission configuration interface, at permission configuration interface
Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition
Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Referring to Fig. 3, Fig. 3 is the structural representation of a kind of priority assignation device disclosed in the embodiment of the present invention.Wherein, should
Priority assignation device can be the subscriber equipment such as mobile phone, panel computer.As it is shown on figure 3, this priority assignation device may include that
First acquiring unit 301, for obtaining file destination at permission configuration interface;
First arranges unit 302, for arranging the mesh being able to access that the first acquiring unit 301 obtains at permission configuration interface
The destination client of mark file;
Holding unit 303, for keeping the store path of the file destination of the first acquiring unit 301 acquisition.
Specifically, first unit 302 is set arranges at permission configuration interface and be able to access that the destination client of file destination
Afterwards, trigger holding unit 303 and keep the store path of file destination.
In the priority assignation device described by Fig. 3, obtain file destination at permission configuration interface, at permission configuration interface
Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition
Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Referring to Fig. 4, Fig. 4 is the structural representation of another kind of priority assignation device disclosed in the embodiment of the present invention.Wherein,
This priority assignation device can be the subscriber equipment such as mobile phone, panel computer.Wherein, the priority assignation device shown in Fig. 4 is by Fig. 3
Shown priority assignation installation optimization obtains, wherein:
This priority assignation device can also include:
Set up unit 304, be used for setting up priority assignation entrance;
Second arranges unit 305, arranges Crypted password for the priority assignation entrance set up for setting up unit 304.
As a kind of possible embodiment, this priority assignation device can also include:
Output unit 306, for when detecting that the entrance for entering the priority assignation entrance setting up unit 304 foundation refers to
When making, output is for pointing out user the information inputting password;
Comparing unit 307, is used for when detecting for the password of the information input of output unit 306 output, will
This password and second arranges the Crypted password of unit 305 setting and compares;
Enter unit 308, for when the comparative result of comparing unit 307 be this password identical with Crypted password time, entrance
Permission configuration interface.
Specifically, the first acquiring unit 301 is entering the permission configuration interface acquisition file destination that unit 308 enters, the
One arranges unit 302 arranges the destination client being able to access that file destination at the permission configuration interface entering unit 308 entrance.
As a kind of possible embodiment, this priority assignation device can also include:
Second acquisition unit 309, for when the access instruction for accessing file destination being detected, obtains and is used for generating
The mark of the client of this access instruction;
Performance element 310, the client that identified of mark for obtaining when second acquisition unit 309 is first to arrange list
During the destination client that unit 302 is arranged, perform this access instruction;
Discarding unit 311, the client that the mark for obtaining when second acquisition unit 309 is identified is not the first setting
During the destination client that unit 302 is arranged, abandon this access instruction.
In the priority assignation device described by Fig. 4, obtain file destination at permission configuration interface, at permission configuration interface
Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition
Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Refer to the structural representation that Fig. 5, Fig. 5 are the embodiment of the present invention another priority assignation devices disclosed.Wherein,
This priority assignation device can be the subscriber equipment such as mobile phone, panel computer.As it is shown in figure 5, this priority assignation device can include
Processor 501, memorizer 502, input equipment 503, output device 504 and communication bus 505, memorizer 502 can be at a high speed
RAM memory, it is also possible to be non-labile memorizer (non-volatile memory), for example, at least one disk storage
Device.Alternatively, memorizer 502 can also is that at least one is located remotely from the storage device of aforementioned processor 501.Input equipment
503 can be touch screen, button, microphone etc., and output device 504 can be display screen, microphone etc., wherein:
Communication bus 505, for realizing the connection communication between these assemblies;
In memorizer 502, storage has batch processing code, and processor 501 is for calling the program of storage in memorizer 502
Code operates below performing:
File destination is obtained at permission configuration interface;
The destination client being able to access that file destination is set at permission configuration interface;
Keep the store path of file destination.
As a kind of possible embodiment, processor 501 is additionally operable to call the program code of storage in memorizer 502 and holds
The following operation of row:
Set up priority assignation entrance;
For priority assignation entrance, Crypted password is set.
As a kind of possible embodiment, input equipment 503, for receiving the entrance for access entitlements inlet porting
Instruct and be sent to processor 501;
Output device 504, the prompting letter inputting password for pointing out user for output under the control of processor 501
Breath;
Input equipment 503, is additionally operable to receive the password inputted for this information and be sent to processor 501;
Processor 501 is additionally operable to call below the program code execution of storage in memorizer 502 and operates:
This password is compared with the Crypted password arranged for priority assignation entrance;
When this password is identical with the Crypted password arranged for priority assignation entrance, access entitlements arrange interface.
As a kind of possible embodiment, input equipment 503, it is additionally operable to reception and refers to for accessing the access of file destination
Make and be sent to processor 501;
Processor 501 is additionally operable to call below the program code execution of storage in memorizer 502 and operates:
Obtain the mark being used for generating the client of this access instruction;
When the client that this mark is identified is destination client, perform this access instruction;
When the client that this mark is identified not is destination client, abandon this access instruction.
In the priority assignation device described by Fig. 5, obtain file destination at permission configuration interface, at permission configuration interface
Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition
Part carries out authority, such that it is able to reduce the complexity of file protection.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
Completing instructing relevant hardware by program, this program can be stored in a computer-readable recording medium, storage
Medium may include that flash disk, read only memory (read-only memory, ROM), random access device (random access
Memory, RAM), disk or CD etc..
Above authority setting method disclosed in the embodiment of the present invention and device are described in detail, used herein
Principle and the embodiment of the present invention are set forth by specific case, and the explanation of above example is only intended to help to understand this
The method of invention and core concept thereof;Simultaneously for one of ordinary skill in the art, according to the thought of the present invention, specifically
All will change on embodiment and range of application, in sum, this specification content should not be construed as the present invention's
Limit.
Claims (10)
1. an authority setting method, it is characterised in that including:
File destination is obtained at permission configuration interface;
The destination client being able to access that described file destination is set at permission configuration interface;
Keep the store path of described file destination.
Method the most according to claim 1, it is characterised in that described method also includes:
Set up priority assignation entrance;
For described priority assignation entrance, Crypted password is set.
Method the most according to claim 2, it is characterised in that described method also includes:
When the entry instruction for entering described priority assignation entrance being detected, output is for pointing out user to input carrying of password
Show information;
When the password inputted for described information being detected, described password is compared with described Crypted password;
When described password is identical with described Crypted password, access entitlements arrange interface.
4. according to the method described in any one of claim 1-3, it is characterised in that described method also includes:
When the access instruction for accessing described file destination being detected, obtain the client for generating described access instruction
Mark;
When the client that described mark is identified is described destination client, perform described access instruction;
When the client that described mark is identified not is described destination client, abandon described access instruction.
5. according to the method described in any one of claim 1-3, it is characterised in that described file destination is picture file, video
At least one in file and audio file.
6. a priority assignation device, it is characterised in that including:
First acquiring unit, for obtaining file destination at permission configuration interface;
First arranges unit, for arranging the file destination being able to access that described first acquiring unit obtains at permission configuration interface
Destination client;
Holding unit, for keeping the store path of the file destination of described first acquiring unit acquisition.
Device the most according to claim 6, it is characterised in that described device also includes:
Set up unit, be used for setting up priority assignation entrance;
Second arranges unit, for arranging Crypted password for the described priority assignation entrance setting up unit foundation.
Method the most according to claim 7, it is characterised in that described device also includes:
Output unit, is used for when detecting for entering the described entry instruction setting up the priority assignation entrance that unit is set up,
Output is for pointing out user the information inputting password;
Comparing unit, for when detecting the password that the information exported for described output unit inputs, by described close
Code compares with the described second Crypted password arranging unit setting;
Enter unit, for when the comparative result of described comparing unit be described password identical with described Crypted password time, entrance
Permission configuration interface.
9. according to the method described in any one of claim 6-8, it is characterised in that described device also includes:
Second acquisition unit, for when the access instruction for accessing described file destination being detected, obtains and is used for generating institute
State the mark of the client of access instruction;
Performance element, the client that the mark for obtaining when described second acquisition unit is identified is described first to arrange unit
During the destination client arranged, perform described access instruction;
Discarding unit, the client that the mark for obtaining when described second acquisition unit is identified is not described first to arrange list
During the destination client that unit is arranged, abandon described access instruction.
10. according to the device described in any one of claim 6-8, it is characterised in that described file destination is picture file, video
At least one in file and audio file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610364017.4A CN106066967A (en) | 2016-05-26 | 2016-05-26 | Permission setting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610364017.4A CN106066967A (en) | 2016-05-26 | 2016-05-26 | Permission setting method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106066967A true CN106066967A (en) | 2016-11-02 |
Family
ID=57420184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610364017.4A Pending CN106066967A (en) | 2016-05-26 | 2016-05-26 | Permission setting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106066967A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778173A (en) * | 2016-12-15 | 2017-05-31 | 北京数字天域科技有限责任公司 | The method and device that a kind of application lock based on intelligent operating system is set |
CN108573161A (en) * | 2017-03-13 | 2018-09-25 | 北京贝塔科技股份有限公司 | Encryption method, application lock and electronic equipment |
CN113342269A (en) * | 2021-05-31 | 2021-09-03 | 上海蓝色帛缔智能工程有限公司 | Multi-channel data storage method, device, equipment and medium based on cloud statistics |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130198865A1 (en) * | 2012-01-31 | 2013-08-01 | Canon Kabushiki Kaisha | Transmission apparatus, transmission method, and recording medium |
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN103679045A (en) * | 2012-09-10 | 2014-03-26 | 鸿富锦精密工业(深圳)有限公司 | File security control system and method |
US20140304837A1 (en) * | 2013-04-04 | 2014-10-09 | Canon Kabushiki Kaisha | System and method for controlling same, access management service system and method for controlling same, and non-transitory computer readable medium |
CN104376011A (en) * | 2013-08-14 | 2015-02-25 | 华为终端有限公司 | Privacy protection implementing method and device |
CN105100708A (en) * | 2015-06-26 | 2015-11-25 | 小米科技有限责任公司 | Request processing method and device |
-
2016
- 2016-05-26 CN CN201610364017.4A patent/CN106066967A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130198865A1 (en) * | 2012-01-31 | 2013-08-01 | Canon Kabushiki Kaisha | Transmission apparatus, transmission method, and recording medium |
CN103366105A (en) * | 2012-03-29 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Method and communication terminal for implementing private space |
CN103679045A (en) * | 2012-09-10 | 2014-03-26 | 鸿富锦精密工业(深圳)有限公司 | File security control system and method |
US20140304837A1 (en) * | 2013-04-04 | 2014-10-09 | Canon Kabushiki Kaisha | System and method for controlling same, access management service system and method for controlling same, and non-transitory computer readable medium |
CN104376011A (en) * | 2013-08-14 | 2015-02-25 | 华为终端有限公司 | Privacy protection implementing method and device |
CN105100708A (en) * | 2015-06-26 | 2015-11-25 | 小米科技有限责任公司 | Request processing method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778173A (en) * | 2016-12-15 | 2017-05-31 | 北京数字天域科技有限责任公司 | The method and device that a kind of application lock based on intelligent operating system is set |
CN106778173B (en) * | 2016-12-15 | 2021-02-23 | 北京数字天域科技有限责任公司 | Method and device for setting application lock based on intelligent operating system |
CN108573161A (en) * | 2017-03-13 | 2018-09-25 | 北京贝塔科技股份有限公司 | Encryption method, application lock and electronic equipment |
CN108573161B (en) * | 2017-03-13 | 2022-02-18 | 北京贝塔科技股份有限公司 | Encryption method, application lock and electronic equipment |
CN113342269A (en) * | 2021-05-31 | 2021-09-03 | 上海蓝色帛缔智能工程有限公司 | Multi-channel data storage method, device, equipment and medium based on cloud statistics |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1857954B1 (en) | Portable electronic apparatus and recording medium for changing the access permission of an application or file upon user biometric identification | |
CN106022148A (en) | File encryption method and device | |
WO2016015448A1 (en) | Multi-system entering method, apparatus and terminal | |
KR101489152B1 (en) | Apparatus and method for preventing screen capture | |
JP2017518598A (en) | Authority management method, apparatus, program, and recording medium | |
US20070198933A1 (en) | Permitting Multiple Tasks Requiring Elevated Rights | |
CN102880820A (en) | Method for accessing application program of mobile terminal and mobile terminal | |
CN107979571B (en) | File use processing method, terminal and server | |
CN104866752B (en) | A kind of application guard method and user terminal | |
CN104392166B (en) | The method and terminal of data access | |
CN105323218A (en) | Identity verifying method and device | |
CN107329659B (en) | Permission setting method and device, electronic equipment and storage medium | |
CN104184900A (en) | Data processing method, system and mobile terminal | |
CN104700001A (en) | Information encryption method and device of application program | |
US20160134625A1 (en) | Method and apparatus for controlling communications terminal and corresponding communications terminal | |
CN105138252A (en) | Control method and electronic equipment | |
CN106066967A (en) | Permission setting method and device | |
CN105635794B (en) | A kind of record screen method and system | |
US20180157457A1 (en) | Enforcing display sharing profiles on a client device sharing display activity with a display sharing application | |
EP3333743B1 (en) | System and method of preventing unfair evaluation of applications by users | |
WO2023160640A1 (en) | Application identifier control method and apparatus | |
CN112749030A (en) | Clipboard control method and device and readable storage medium | |
US11503074B2 (en) | Device enrollment in a management service | |
KR102193531B1 (en) | Methods and devices for realizing support functions in applications | |
CN105335673A (en) | Information safety processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161102 |