CN106066967A - Permission setting method and device - Google Patents

Permission setting method and device Download PDF

Info

Publication number
CN106066967A
CN106066967A CN201610364017.4A CN201610364017A CN106066967A CN 106066967 A CN106066967 A CN 106066967A CN 201610364017 A CN201610364017 A CN 201610364017A CN 106066967 A CN106066967 A CN 106066967A
Authority
CN
China
Prior art keywords
unit
file
client
destination
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610364017.4A
Other languages
Chinese (zh)
Inventor
白斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201610364017.4A priority Critical patent/CN106066967A/en
Publication of CN106066967A publication Critical patent/CN106066967A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a permission setting method and a permission setting device, which are used for solving the problem that an application lock can not only protect a file, and the method comprises the following steps: acquiring a target file on an authority setting interface; setting a target client capable of accessing a target file on a permission setting interface; the storage path of the target file is maintained. By implementing the embodiment of the invention, the protection of only the file can be realized.

Description

A kind of authority setting method and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of authority setting method and device.
Background technology
Application on the subscriber equipment such as mobile phone, panel computer can be encrypted by application lock, answers when user needs to start Used time, user needs to input correct Crypted password could use application, such that it is able to the privacy of protection application.But, very In many time, user was not required to protect whole application, it is only necessary to the partial document in protection application, such as: user needs user Some pictures in equipment carry out secret protection, and without whole picture library carries out secret protection, but application lock cannot be the most right File is protected.
Summary of the invention
The embodiment of the invention discloses a kind of authority setting method and device, being used for solving application lock cannot only enter file The problem of row protection.
The open a kind of authority setting method of embodiment of the present invention first aspect, including:
File destination is obtained at permission configuration interface;
The destination client being able to access that described file destination is set at permission configuration interface;
Keep the store path of described file destination.
In one embodiment, described method also includes:
Set up priority assignation entrance;
For described priority assignation entrance, Crypted password is set.
In one embodiment, described method also includes:
When the entry instruction for entering described priority assignation entrance being detected, output is used for pointing out user to input password Information;
When the password inputted for described information being detected, described password is compared with described Crypted password Relatively;
When described password is identical with described Crypted password, access entitlements arrange interface.
In one embodiment, described method also includes:
When the access instruction for accessing described file destination being detected, obtain the visitor for generating described access instruction The mark of family end;
When the client that described mark is identified is described destination client, perform described access instruction;
When the client that described mark is identified not is described destination client, abandon described access instruction.
In one embodiment, at least one during described file destination is picture file, video file and audio file.
The open a kind of priority assignation device of embodiment of the present invention second aspect, including:
First acquiring unit, for obtaining file destination at permission configuration interface;
First arranges unit, for arranging the target being able to access that described first acquiring unit obtains at permission configuration interface The destination client of file;
Holding unit, for keeping the store path of the file destination of described first acquiring unit acquisition.
In one embodiment, described device also includes:
Set up unit, be used for setting up priority assignation entrance;
Second arranges unit, for arranging Crypted password for the described priority assignation entrance setting up unit foundation.
In one embodiment, described device also includes:
Output unit, for when detecting for entering the described entry instruction setting up the priority assignation entrance that unit is set up Time, output is for pointing out user the information inputting password;
Comparing unit, for when detecting the password that the information exported for described output unit inputs, by institute State password to compare with the described second Crypted password arranging unit setting;
Enter unit, for when the comparative result of described comparing unit be described password identical with described Crypted password time, Access entitlements arrange interface.
In one embodiment, described device also includes:
Second acquisition unit, for when the access instruction for accessing described file destination being detected, obtains and is used for giving birth to Become the mark of the client of described access instruction;
Performance element, the client that the mark for obtaining when described second acquisition unit is identified is described first setting During the destination client that unit is arranged, perform described access instruction;
Discarding unit, the client that the mark for obtaining when described second acquisition unit is identified is not described first to set When putting the destination client that unit is arranged, abandon described access instruction.
In one embodiment, at least one during described file destination is picture file, video file and audio file.
In the embodiment of the present invention, obtain file destination at permission configuration interface, arrange at permission configuration interface and be able to access that The destination client of file destination, and keep the store path of file destination constant, it is seen then that only file can be carried out authority and set Put, such that it is able to reduce the complexity of file protection.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below by use required in embodiment Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is only some embodiments of the present invention, for this area From the point of view of those of ordinary skill, on the premise of not paying creative work, it is also possible to obtain the attached of other according to these accompanying drawings Figure.
Fig. 1 is the schematic flow sheet of a kind of authority setting method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of authority setting method disclosed in the embodiment of the present invention;
Fig. 3 is the structural representation of a kind of priority assignation device disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of priority assignation device disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of the embodiment of the present invention another priority assignation device disclosed.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under not making creative work premise Execute example, broadly fall into the scope of protection of the invention.
The embodiment of the invention discloses a kind of authority setting method and device, being used for solving application lock cannot only enter file The problem of row protection.It is described in detail individually below.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of authority setting method disclosed in the embodiment of the present invention.Wherein, should Authority setting method is to describe from the angle of the subscriber equipment such as mobile phone, panel computer.As it is shown in figure 1, this authority setting method May comprise steps of.
101, file destination is obtained at permission configuration interface.
In the present embodiment, when during user needs subscriber equipment, the file destination of storage is protected, user can be led to Crossing and operate with family equipment access entitlements and arrange interface, subscriber equipment obtains file destination at permission configuration interface afterwards.Wherein, File destination can be at least one in the files such as picture file, video file, audio file.Wherein, file destination is permissible It is the file in file manager, it is also possible to be the file in a concrete client (or application), such as: work as file destination During for picture, file destination can be the file in picture library.
102, the destination client of file destination it is able to access that in permission configuration interface setting.
In the present embodiment, subscriber equipment, will be at permission configuration interface after permission configuration interface gets file destination File destination is carried out priority assignation, is i.e. able to access that the destination client of file destination in permission configuration interface setting, afterwards File destination can only be accessed by destination client, and other client all cannot access file destination.
103, the store path of file destination is kept.
In the present embodiment, subscriber equipment permission configuration interface arrange be able to access that file destination destination client it After, not preserving file destination at permission configuration interface, the store path keeping file destination is constant, such as: when file destination is Picture, and when file destination is originally stored in picture library, file destination is still stored in picture library, therefore, when client needs When accessing file destination, can conduct interviews according to original store path.
In the authority setting method described by Fig. 1, obtain file destination at permission configuration interface, at permission configuration interface Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of another kind of authority setting method disclosed in the embodiment of the present invention.Wherein, This authority setting method is to describe from the angle of the subscriber equipment such as mobile phone, panel computer.As in figure 2 it is shown, this priority assignation side Method may comprise steps of.
201, set up priority assignation entrance, and Crypted password is set for priority assignation entrance.
In the present embodiment, when during user needs subscriber equipment, the file of storage is protected, subscriber equipment will be set up Priority assignation entrance, priority assignation entrance can be client (or application), it is also possible to for file.When authority inlet porting is During client (or application), set up priority assignation entrance, i.e. install or load client (or application).Enter for priority assignation afterwards Mouth arranges Crypted password, to ensure the safety of priority assignation entrance.
202, when detecting for the entry instruction of access entitlements inlet porting, output is used for pointing out user to input password Information.
In the present embodiment, when during user needs subscriber equipment, the file of storage is protected, can be pre-by clicking on If the operations such as icon, click predeterminable area, pressing programmable button are to subscriber equipment input entering for access entitlements inlet porting Entering instruction, after subscriber equipment detects this entry instruction, output is used for the information pointing out user to input password, this carries Show that information can export with voice mode, it is also possible to export with text mode.
203, when the password inputted for this information being detected, this password is compared with Crypted password, when When this password is identical with Crypted password, access entitlements arrange interface.
In the present embodiment, when subscriber equipment detects the password inputted for this information, by this password with for power The Crypted password that limit inlet porting is arranged compares, when this password is identical with the Crypted password arranged for priority assignation entrance Time, access entitlements are arranged interface, when this password is different from the Crypted password arranged for priority assignation entrance, use can be exported Information in prompting user cipher mistake.Wherein, this password can input with voice mode, it is also possible to is with text Mode inputs.
204, file destination is obtained at permission configuration interface.
In the present embodiment, when during user needs subscriber equipment, the file destination of storage is protected, user can be led to Crossing and operate with family equipment access entitlements and arrange interface, subscriber equipment obtains file destination at permission configuration interface afterwards.Wherein, File destination can be at least one in the files such as picture file, video file, audio file.Wherein, file destination is permissible It is the file in file manager, it is also possible to be the file in a concrete client (or application), such as: work as file destination During for picture, file destination can be the file in picture library.
205, the destination client of file destination it is able to access that in permission configuration interface setting.
In the present embodiment, subscriber equipment, will be at permission configuration interface after permission configuration interface gets file destination File destination is carried out priority assignation, is i.e. able to access that the destination client of file destination in permission configuration interface setting, afterwards File destination can only be accessed by destination client, and other client all cannot access file destination.
206, the store path of file destination is kept.
In the present embodiment, subscriber equipment permission configuration interface arrange be able to access that file destination destination client it After, not preserving file destination at permission configuration interface, the store path keeping file destination is constant, such as: when file destination is Picture, and when file destination is originally stored in picture library, file destination is still stored in picture library, therefore, when client needs When accessing file destination, can conduct interviews according to original store path.
207, when the access instruction for accessing file destination being detected, the client for generating this access instruction is obtained The mark of end.
In the present embodiment, when user needs to access file destination, can be used for visiting to subscriber equipment input by operation When asking the access instruction of file destination, when subscriber equipment detects this access instruction, first judge whether file destination is arranged Authority, when being provided with authority for file destination, is used for generating the mark of the client of this access instruction by acquisition;When not having When authority is set for file destination, directly perform this access instruction.
208, when the client that this mark is identified is destination client, this access instruction is performed, when this mark is marked When the client known not is destination client, abandon this access instruction.
In the present embodiment, get after the mark of the client generating this access instruction, it is judged that this mark is marked Whether the client known has permission access file destination, i.e. judges whether the client that this mark is identified is destination client, When the client that this mark is identified is destination client, by this access instruction of execution, when the client that this mark is identified When being not destination client, this access instruction will be abandoned.
In the authority setting method described by Fig. 2, obtain file destination at permission configuration interface, at permission configuration interface Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Referring to Fig. 3, Fig. 3 is the structural representation of a kind of priority assignation device disclosed in the embodiment of the present invention.Wherein, should Priority assignation device can be the subscriber equipment such as mobile phone, panel computer.As it is shown on figure 3, this priority assignation device may include that
First acquiring unit 301, for obtaining file destination at permission configuration interface;
First arranges unit 302, for arranging the mesh being able to access that the first acquiring unit 301 obtains at permission configuration interface The destination client of mark file;
Holding unit 303, for keeping the store path of the file destination of the first acquiring unit 301 acquisition.
Specifically, first unit 302 is set arranges at permission configuration interface and be able to access that the destination client of file destination Afterwards, trigger holding unit 303 and keep the store path of file destination.
In the priority assignation device described by Fig. 3, obtain file destination at permission configuration interface, at permission configuration interface Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Referring to Fig. 4, Fig. 4 is the structural representation of another kind of priority assignation device disclosed in the embodiment of the present invention.Wherein, This priority assignation device can be the subscriber equipment such as mobile phone, panel computer.Wherein, the priority assignation device shown in Fig. 4 is by Fig. 3 Shown priority assignation installation optimization obtains, wherein:
This priority assignation device can also include:
Set up unit 304, be used for setting up priority assignation entrance;
Second arranges unit 305, arranges Crypted password for the priority assignation entrance set up for setting up unit 304.
As a kind of possible embodiment, this priority assignation device can also include:
Output unit 306, for when detecting that the entrance for entering the priority assignation entrance setting up unit 304 foundation refers to When making, output is for pointing out user the information inputting password;
Comparing unit 307, is used for when detecting for the password of the information input of output unit 306 output, will This password and second arranges the Crypted password of unit 305 setting and compares;
Enter unit 308, for when the comparative result of comparing unit 307 be this password identical with Crypted password time, entrance Permission configuration interface.
Specifically, the first acquiring unit 301 is entering the permission configuration interface acquisition file destination that unit 308 enters, the One arranges unit 302 arranges the destination client being able to access that file destination at the permission configuration interface entering unit 308 entrance.
As a kind of possible embodiment, this priority assignation device can also include:
Second acquisition unit 309, for when the access instruction for accessing file destination being detected, obtains and is used for generating The mark of the client of this access instruction;
Performance element 310, the client that identified of mark for obtaining when second acquisition unit 309 is first to arrange list During the destination client that unit 302 is arranged, perform this access instruction;
Discarding unit 311, the client that the mark for obtaining when second acquisition unit 309 is identified is not the first setting During the destination client that unit 302 is arranged, abandon this access instruction.
In the priority assignation device described by Fig. 4, obtain file destination at permission configuration interface, at permission configuration interface Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition Part carries out priority assignation, such that it is able to reduce the complexity of file protection.
Refer to the structural representation that Fig. 5, Fig. 5 are the embodiment of the present invention another priority assignation devices disclosed.Wherein, This priority assignation device can be the subscriber equipment such as mobile phone, panel computer.As it is shown in figure 5, this priority assignation device can include Processor 501, memorizer 502, input equipment 503, output device 504 and communication bus 505, memorizer 502 can be at a high speed RAM memory, it is also possible to be non-labile memorizer (non-volatile memory), for example, at least one disk storage Device.Alternatively, memorizer 502 can also is that at least one is located remotely from the storage device of aforementioned processor 501.Input equipment 503 can be touch screen, button, microphone etc., and output device 504 can be display screen, microphone etc., wherein:
Communication bus 505, for realizing the connection communication between these assemblies;
In memorizer 502, storage has batch processing code, and processor 501 is for calling the program of storage in memorizer 502 Code operates below performing:
File destination is obtained at permission configuration interface;
The destination client being able to access that file destination is set at permission configuration interface;
Keep the store path of file destination.
As a kind of possible embodiment, processor 501 is additionally operable to call the program code of storage in memorizer 502 and holds The following operation of row:
Set up priority assignation entrance;
For priority assignation entrance, Crypted password is set.
As a kind of possible embodiment, input equipment 503, for receiving the entrance for access entitlements inlet porting Instruct and be sent to processor 501;
Output device 504, the prompting letter inputting password for pointing out user for output under the control of processor 501 Breath;
Input equipment 503, is additionally operable to receive the password inputted for this information and be sent to processor 501;
Processor 501 is additionally operable to call below the program code execution of storage in memorizer 502 and operates:
This password is compared with the Crypted password arranged for priority assignation entrance;
When this password is identical with the Crypted password arranged for priority assignation entrance, access entitlements arrange interface.
As a kind of possible embodiment, input equipment 503, it is additionally operable to reception and refers to for accessing the access of file destination Make and be sent to processor 501;
Processor 501 is additionally operable to call below the program code execution of storage in memorizer 502 and operates:
Obtain the mark being used for generating the client of this access instruction;
When the client that this mark is identified is destination client, perform this access instruction;
When the client that this mark is identified not is destination client, abandon this access instruction.
In the priority assignation device described by Fig. 5, obtain file destination at permission configuration interface, at permission configuration interface Arrange and be able to access that the destination client of file destination, and keep the store path of file destination constant, it is seen then that can be only to literary composition Part carries out authority, such that it is able to reduce the complexity of file protection.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completing instructing relevant hardware by program, this program can be stored in a computer-readable recording medium, storage Medium may include that flash disk, read only memory (read-only memory, ROM), random access device (random access Memory, RAM), disk or CD etc..
Above authority setting method disclosed in the embodiment of the present invention and device are described in detail, used herein Principle and the embodiment of the present invention are set forth by specific case, and the explanation of above example is only intended to help to understand this The method of invention and core concept thereof;Simultaneously for one of ordinary skill in the art, according to the thought of the present invention, specifically All will change on embodiment and range of application, in sum, this specification content should not be construed as the present invention's Limit.

Claims (10)

1. an authority setting method, it is characterised in that including:
File destination is obtained at permission configuration interface;
The destination client being able to access that described file destination is set at permission configuration interface;
Keep the store path of described file destination.
Method the most according to claim 1, it is characterised in that described method also includes:
Set up priority assignation entrance;
For described priority assignation entrance, Crypted password is set.
Method the most according to claim 2, it is characterised in that described method also includes:
When the entry instruction for entering described priority assignation entrance being detected, output is for pointing out user to input carrying of password Show information;
When the password inputted for described information being detected, described password is compared with described Crypted password;
When described password is identical with described Crypted password, access entitlements arrange interface.
4. according to the method described in any one of claim 1-3, it is characterised in that described method also includes:
When the access instruction for accessing described file destination being detected, obtain the client for generating described access instruction Mark;
When the client that described mark is identified is described destination client, perform described access instruction;
When the client that described mark is identified not is described destination client, abandon described access instruction.
5. according to the method described in any one of claim 1-3, it is characterised in that described file destination is picture file, video At least one in file and audio file.
6. a priority assignation device, it is characterised in that including:
First acquiring unit, for obtaining file destination at permission configuration interface;
First arranges unit, for arranging the file destination being able to access that described first acquiring unit obtains at permission configuration interface Destination client;
Holding unit, for keeping the store path of the file destination of described first acquiring unit acquisition.
Device the most according to claim 6, it is characterised in that described device also includes:
Set up unit, be used for setting up priority assignation entrance;
Second arranges unit, for arranging Crypted password for the described priority assignation entrance setting up unit foundation.
Method the most according to claim 7, it is characterised in that described device also includes:
Output unit, is used for when detecting for entering the described entry instruction setting up the priority assignation entrance that unit is set up, Output is for pointing out user the information inputting password;
Comparing unit, for when detecting the password that the information exported for described output unit inputs, by described close Code compares with the described second Crypted password arranging unit setting;
Enter unit, for when the comparative result of described comparing unit be described password identical with described Crypted password time, entrance Permission configuration interface.
9. according to the method described in any one of claim 6-8, it is characterised in that described device also includes:
Second acquisition unit, for when the access instruction for accessing described file destination being detected, obtains and is used for generating institute State the mark of the client of access instruction;
Performance element, the client that the mark for obtaining when described second acquisition unit is identified is described first to arrange unit During the destination client arranged, perform described access instruction;
Discarding unit, the client that the mark for obtaining when described second acquisition unit is identified is not described first to arrange list During the destination client that unit is arranged, abandon described access instruction.
10. according to the device described in any one of claim 6-8, it is characterised in that described file destination is picture file, video At least one in file and audio file.
CN201610364017.4A 2016-05-26 2016-05-26 Permission setting method and device Pending CN106066967A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610364017.4A CN106066967A (en) 2016-05-26 2016-05-26 Permission setting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610364017.4A CN106066967A (en) 2016-05-26 2016-05-26 Permission setting method and device

Publications (1)

Publication Number Publication Date
CN106066967A true CN106066967A (en) 2016-11-02

Family

ID=57420184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610364017.4A Pending CN106066967A (en) 2016-05-26 2016-05-26 Permission setting method and device

Country Status (1)

Country Link
CN (1) CN106066967A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778173A (en) * 2016-12-15 2017-05-31 北京数字天域科技有限责任公司 The method and device that a kind of application lock based on intelligent operating system is set
CN108573161A (en) * 2017-03-13 2018-09-25 北京贝塔科技股份有限公司 Encryption method, application lock and electronic equipment
CN113342269A (en) * 2021-05-31 2021-09-03 上海蓝色帛缔智能工程有限公司 Multi-channel data storage method, device, equipment and medium based on cloud statistics

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198865A1 (en) * 2012-01-31 2013-08-01 Canon Kabushiki Kaisha Transmission apparatus, transmission method, and recording medium
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103679045A (en) * 2012-09-10 2014-03-26 鸿富锦精密工业(深圳)有限公司 File security control system and method
US20140304837A1 (en) * 2013-04-04 2014-10-09 Canon Kabushiki Kaisha System and method for controlling same, access management service system and method for controlling same, and non-transitory computer readable medium
CN104376011A (en) * 2013-08-14 2015-02-25 华为终端有限公司 Privacy protection implementing method and device
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130198865A1 (en) * 2012-01-31 2013-08-01 Canon Kabushiki Kaisha Transmission apparatus, transmission method, and recording medium
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
CN103679045A (en) * 2012-09-10 2014-03-26 鸿富锦精密工业(深圳)有限公司 File security control system and method
US20140304837A1 (en) * 2013-04-04 2014-10-09 Canon Kabushiki Kaisha System and method for controlling same, access management service system and method for controlling same, and non-transitory computer readable medium
CN104376011A (en) * 2013-08-14 2015-02-25 华为终端有限公司 Privacy protection implementing method and device
CN105100708A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Request processing method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778173A (en) * 2016-12-15 2017-05-31 北京数字天域科技有限责任公司 The method and device that a kind of application lock based on intelligent operating system is set
CN106778173B (en) * 2016-12-15 2021-02-23 北京数字天域科技有限责任公司 Method and device for setting application lock based on intelligent operating system
CN108573161A (en) * 2017-03-13 2018-09-25 北京贝塔科技股份有限公司 Encryption method, application lock and electronic equipment
CN108573161B (en) * 2017-03-13 2022-02-18 北京贝塔科技股份有限公司 Encryption method, application lock and electronic equipment
CN113342269A (en) * 2021-05-31 2021-09-03 上海蓝色帛缔智能工程有限公司 Multi-channel data storage method, device, equipment and medium based on cloud statistics

Similar Documents

Publication Publication Date Title
EP1857954B1 (en) Portable electronic apparatus and recording medium for changing the access permission of an application or file upon user biometric identification
CN106022148A (en) File encryption method and device
WO2016015448A1 (en) Multi-system entering method, apparatus and terminal
KR101489152B1 (en) Apparatus and method for preventing screen capture
JP2017518598A (en) Authority management method, apparatus, program, and recording medium
US20070198933A1 (en) Permitting Multiple Tasks Requiring Elevated Rights
CN102880820A (en) Method for accessing application program of mobile terminal and mobile terminal
CN107979571B (en) File use processing method, terminal and server
CN104866752B (en) A kind of application guard method and user terminal
CN104392166B (en) The method and terminal of data access
CN105323218A (en) Identity verifying method and device
CN107329659B (en) Permission setting method and device, electronic equipment and storage medium
CN104184900A (en) Data processing method, system and mobile terminal
CN104700001A (en) Information encryption method and device of application program
US20160134625A1 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
CN105138252A (en) Control method and electronic equipment
CN106066967A (en) Permission setting method and device
CN105635794B (en) A kind of record screen method and system
US20180157457A1 (en) Enforcing display sharing profiles on a client device sharing display activity with a display sharing application
EP3333743B1 (en) System and method of preventing unfair evaluation of applications by users
WO2023160640A1 (en) Application identifier control method and apparatus
CN112749030A (en) Clipboard control method and device and readable storage medium
US11503074B2 (en) Device enrollment in a management service
KR102193531B1 (en) Methods and devices for realizing support functions in applications
CN105335673A (en) Information safety processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161102