CN109963023A - Book management method and device - Google Patents

Book management method and device Download PDF

Info

Publication number
CN109963023A
CN109963023A CN201910234290.9A CN201910234290A CN109963023A CN 109963023 A CN109963023 A CN 109963023A CN 201910234290 A CN201910234290 A CN 201910234290A CN 109963023 A CN109963023 A CN 109963023A
Authority
CN
China
Prior art keywords
target
communication group
configuration
direct
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910234290.9A
Other languages
Chinese (zh)
Inventor
王芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201910234290.9A priority Critical patent/CN109963023A/en
Publication of CN109963023A publication Critical patent/CN109963023A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/27453Directories allowing storage of additional subscriber data, e.g. metadata
    • H04M1/27457Management thereof, e.g. manual editing of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Library & Information Science (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure is directed to book management method and devices.This method comprises: obtaining the access request that target application is directed to address list, the address list includes at least two communication groups;In response to the access request, the target access permission of the target application is obtained, the target access permission is used to limit the communication group for allowing the target application to access;Contact information in the communication group that the target access permission limits is provided for the target application.The technical solution can provide the contact information in the communication group of its target access permission restriction only for the target application; the contact information by other communication groups is avoided to be leaked to the target application; it protects the privacy information of user not revealed all, improves the safety of user information.

Description

Book management method and device
Technical field
This disclosure relates to field of communication technology more particularly to book management method and device.
Background technique
Current most of mobile phones apply the address list information for needing to obtain user in installation process or use process, such as Game, friend-making software etc., thus the telephone number in available address list carries out further social functions.
Summary of the invention
The embodiment of the present disclosure provides book management method and device.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of book management method is provided, comprising:
The access request that target application is directed to address list is obtained, the address list includes at least two communication groups;
In response to the access request, the target access permission of the target application is obtained, the target access permission is used In the communication group for limiting the permission target application access;
Contact information in the communication group that the target access permission limits is provided for the target application.
In one embodiment, the method also includes:
The first configuration-direct for being directed to the target application is received, first configuration-direct is used to indicate the target The access authority of application is configured to target access permission;
In response to first configuration-direct, the target access is set by the access authority of the target application and is weighed Limit.
In one embodiment, at least two communications group includes disclosing the communication group of the communication group and privacy class of class, It is described in response to described first when the target access permission, which includes, allows the communication group of the target application access privacy class The access authority of the target application is set the target access permission by configuration-direct, comprising:
In response to first configuration-direct, the first authorization message is obtained;
After first authorization message is verified, target access power is set by the access authority of the target application Limit.
In one embodiment, the method also includes:
The second configuration-direct for being directed to object contact person information is received, second configuration-direct is used to indicate the mesh Mark contact information is distributed to target communication group;
In response to second configuration-direct, the object contact person information is recorded in the target communication group.
In one embodiment, at least two communications group includes disclosing the communication group of the communication group and privacy class of class, Second configuration-direct is to indicate the object contact person information being transferred to open class from the communication group of the privacy class It is described in response to second configuration-direct when target communication group, the object contact person information is recorded in the target and is led to In news group, comprising:
In response to second configuration-direct, the second authorization message is obtained;
After verifying second authorization message and passing through, by the object contact person information from the communication group of the privacy class It is transferred to the target communication group of the open class.
According to the first aspect of the embodiments of the present disclosure, a kind of address book management device is provided, comprising:
First obtains module, and the access request for being directed to address list for obtaining target application, the address list includes at least Two communication groups;
Second obtains module, for obtaining the target access permission of the target application, institute in response to the access request Target access permission is stated for limiting the communication group for allowing the target application to access;
Module is provided, for providing the contact person in the communication group that the target access permission limits for the target application Information.
In one embodiment, described device further include:
First receiving module, for receiving the first configuration-direct for being directed to the target application, first configuration-direct It is used to indicate and configures target access permission for the access authority of the target application;
Setup module, for setting institute for the access authority of the target application in response to first configuration-direct State target access permission.
In one embodiment, at least two communications group includes disclosing the communication group of the communication group and privacy class of class, When the target access permission, which includes, allows the communication group of the target application access privacy class, the setup module includes:
First acquisition submodule, for obtaining the first authorization message in response to first configuration-direct;
Submodule is set, for after first authorization message is verified, by the access authority of the target application It is set as target access permission.
In one embodiment, described device further include:
Second receiving module, for receiving the second configuration-direct for being directed to object contact person information, second configuration refers to Order, which is used to indicate, distributes the object contact person information to target communication group;
Logging modle, in response to second configuration-direct, the object contact person information to be recorded in the mesh It marks in communication group.
In one embodiment, at least two communications group includes disclosing the communication group of the communication group and privacy class of class, Second configuration-direct is to indicate the object contact person information being transferred to open class from the communication group of the privacy class When target communication group, the logging modle includes:
Second acquisition submodule, for obtaining the second authorization message in response to second configuration-direct;
Submodule is shifted, for after verifying second authorization message and passing through, by the object contact person information from institute The communication group for stating privacy class is transferred to the target communication group of the open class.
According to the third aspect of an embodiment of the present disclosure, a kind of address book management device is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to executing the step in the above method.
According to a fourth aspect of embodiments of the present disclosure, a kind of computer readable storage medium is provided, computer is stored with and refers to It enables, the step in the above method is realized when the computer instruction is executed by processor.
The technical scheme provided by this disclosed embodiment can include the following benefits: the present embodiment can be by address list At least two communication groups are divided into, and are the corresponding access authority of each application configuration, such terminal is directed in acquisition target application When the access request of address list, the target access permission of the target application, the mesh can be obtained in response to the access request Mark access authority is used to limit the communication group for allowing the target application to access;In this way, terminal can be answered only for the target With the contact information provided in the communication group that the target access permission limits, avoid for other contact informations being leaked to The target application protects the privacy information of user not revealed all, improves the safety of user information.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of flow chart of book management method shown according to an exemplary embodiment.
Fig. 2 is a kind of setting schematic diagram of the access authority of application shown according to an exemplary embodiment.
Fig. 3 is a kind of schematic diagram of application permission set interface shown according to an exemplary embodiment.
Fig. 4 is a kind of grouping schematic diagram of adding information of contact person shown according to an exemplary embodiment.
Fig. 5 is a kind of grouping schematic diagram of contact information shown according to an exemplary embodiment.
Fig. 6 is a kind of flow chart of book management method shown according to an exemplary embodiment.
Fig. 7 is a kind of flow chart of book management method shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of address book management device shown according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of address book management device shown according to an exemplary embodiment.
Figure 10 is a kind of block diagram of address book management device shown according to an exemplary embodiment.
Figure 11 is a kind of block diagram of address book management device shown according to an exemplary embodiment.
Figure 12 is a kind of block diagram of address book management device shown according to an exemplary embodiment.
Figure 13 is a kind of block diagram of address book management device shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Currently, some users are not intended to certain applications to obtain oneself all address list information, also it is not intended in address list Certain good friends know oneself use the application, therefore can only be closed in priority assignation the application acquisition address list power Limit;But sometimes user needs temporarily to obtain address list permission again to increase particular buddies, opens the meeting of address list permission at this time Cause privacy of user to be revealed, do not open the purpose that permission is unable to reach oneself again, this results in the condition that user faces a difficult selection.
To solve the above-mentioned problems, the present embodiment provides a kind of book management method, address list can be divided into Few two communication groups, and be the corresponding access authority of each application configuration, such terminal is obtaining target application for address list When access request, the target access permission of the target application, the target access power can be obtained in response to the access request It limits the use of in the communication group for limiting the permission target application access;In this way, terminal only can provide institute for the target application The contact information in communication group is stated, avoids other contact informations being leaked to the target application, protects that user's is hidden Personal letter breath is not revealed all, and the safety of user information is improved.
Fig. 1 is a kind of flow chart of book management method shown according to an exemplary embodiment, as shown in Figure 1, should Book management method is for including the following steps 101-103 in terminal:
In a step 101, the access request that target application is directed to address list is obtained, the address list includes at least two logical News group.
In a step 102, in response to the access request, the target access permission of the target application, the mesh are obtained Mark access authority is used to limit the communication group for allowing the target application to access.
In step 103, the contact person in the communication group that the target access permission limits is provided for the target application Information.
Here, address list belongs to the more important privacy information of user, and malicious application would generally obtain in user communication record Contact information, with the relationship between association user and user.Most normal use softwares are also required to obtain the communication of user Record, such as social software, Games Software etc..Sometimes user is not intended to parent, teacher, client, leader, subordinate etc. to know oneself Whether these applications are being used, it is therefore desirable to these users are shielded, but wish that another part people in address list is accessible, Therefore address list can be divided at least two communication groups, each communication group according to the instruction of user by the managing device of address list There is unique communication group to identify, may include multiple contact informations.Then, which can also be each application configuration For the access authority of address list, the access authority is each using accessible communication group for limiting, these is so allowed to apply A part of communication group that restriction can only be accessed forbids it to access other communication groups, the privacy information of user is protected not let out Dew.
Here, managing device can be to allow accessing address list with the access authority that default configuration talk application, short message are applied Interior All Contacts' information;Others application can configure different access authority according to the instruction of user, so that these are answered With can be according to the contact information for needing to access in specific communication group of user.Exemplary, Fig. 2 is according to an exemplary reality Apply a kind of setting schematic diagram of the access authority of the application exemplified.As shown in Fig. 2, work as terminal downloads installation targets in application, Managing device can control terminal and pop up an Option Box 20 on the screen, and information is shown in the Option Box 20 " allows target Each communication group identifies corresponding each option in the communication group of application access " and address list, and user, which can choose, allows the mesh The communication group for marking application access identifies corresponding option such as communication group A option 201 and communication group B option 202;And click " determination " Key 203, in this way, terminal, which is just designated as target application according to user, is configured with corresponding target access permission, the target access Permission is used to limit the communication group for allowing the target application to access.
In this way, the target application, after installing, user enters the interface of target application, clicking the keys such as addition good friend is needed When wanting accessing address list, which can automatically generate the access request for address list, can be in the access request The target access permission for carrying target application, when managing device gets the access request, can obtain in response to the access request The target access permission of the target application carried in the access request is taken, determines the communication group for allowing the target application to access For communication group A and communication group B.Alternatively, managing device according to user instruction set the target access permission of target application after, It can recorde the target access permission of target application, in this way, managing device when getting the access request, can be inquired and be prestored Respectively apply corresponding access authority, obtain the corresponding target access permission of the target application, determining allows the target application to visit The communication group asked is communication group A and communication group B.
Here, managing device is after getting the target access permission of target application, so that it may only provide for target application Contact information in communication group A and communication group B, without providing the contact information in other communication groups, in this way, only allowing mesh The contact information in communication group A and communication group B that mark application access user specifies, avoids the contact person in other communication groups The leakage of information improves the safety of user information.
The address list of user can be divided by the present embodiment in the case where not needing to install additional software, plug-in unit Different access authority can be set for different applications at least two communication groups, and phase can only be accessed by limiting application accordingly The communication group answered protects the privacy information of user not revealed all, improves user without accessing other communication groups The safety of information.
In a kind of possible embodiment, can be implemented as in above-mentioned book management method in step 101 is following Step A1 to A2.
In step A1, the first configuration-direct for being directed to the target application is received, first configuration-direct is for referring to Show that the access authority by the target application is configured to target access permission;
In step A2, in response to first configuration-direct, target is set by the access authority of the target application Access authority.
Here, the first configuration-direct for the target application that managing device can be inputted according to user, for mesh Application configuration target access permission is marked, which can be configures target for the access authority of target application for the first time Access authority is also possible to the access authority of target application being changed to target access permission.
Here, managing device can be when installation targets be applied or in target application maiden visit address list, at end The authority configuration interface of automatic displaying target application on screen is held, user can input the first configuration at the authority configuration interface and refer to It enables, configures target access permission for target application.It is exemplary, it can be as shown in Fig. 2, managing device can be installed in terminal downloads When target application or when target application maiden visit address list, Option Box 20 is shown, user can select in the Option Box 20 The corresponding option of the communication group-communication group A option 201 and communication group B option 202 for allowing the target application to access are selected, it is so defeated Enter to be directed to the first configuration-direct of the target application, the access authority of the target application is configured accessible communication by instruction The target access permission of group A and communication group B.Managing device can be in response to first configuration-direct, by the target application Access authority be set as target access permission.Meanwhile managing device can recorde the access authority of target application as target visit It asks permission, is inquired in case subsequent.
Here, for each application downloaded, terminal can increase each application permission setting in address list application Interface, user can click to enter each application permission set interface and refer in each first configuration of application permission configuration interface input It enables, configures target access permission for target application.Exemplary, Fig. 3 is a kind of application power shown according to an exemplary embodiment Limit the schematic diagram of set interface.As shown in figure 3, user can click to enter the application permission set interface 30, and in the application Target application icon 300 to be configured, after managing device detects the clicking operation, Ke Yixian are clicked in permission configuration interface 30 The corresponding communication group Option Box 301 of the target application is shown, user can select to allow the target application in the Option Box 301 The corresponding option of communication group of access, in this way, user can select accessible communication group one by one for each application, in this way, Managing device can receive the first configuration-direct for the target application, indicate the access authority of the target application It is configured to the target access permission of one or more communication groups of accessible user's selection.Managing device can be in response to described The access authority of the target application is set target access permission by first configuration-direct.
What needs to be explained here is that the target application for the authority configuration that do not access for user, managing device can write from memory Recognizing the target access authority configuration of the target application is to allow to access a certain specific communication group.
The present embodiment can receive the first configuration-direct for the target application, and first configuration-direct is for referring to Show that the access authority by the target application is configured to target access permission;In response to first configuration-direct, by the mesh The access authority of mark application is set as target access permission;So according to user input configuration-direct come for each application configuration not Same access authority, it is ensured that each application can only access the communication group that user allows to access, and guarantee that privacy of user is not leaked.
In a kind of possible embodiment, at least two communications group includes the communication group and privacy class of open class Communication group, when the target access permission, which includes, allows the communication group of the target application access privacy class, above-mentioned step A2 can be implemented as following steps A21 and step A22.
In step A21, in response to first configuration-direct, the first authorization message is obtained.
In step A22, after first authorization message is verified, the access authority of the target application is arranged For target access permission.
Here, multiple communication groups in address list may include the communication group of open class and the communication group of privacy class, this is hidden Contact information in the communication group of private class is all the information of important relation people, the information of these important relations people cannot be random Access, needs user legally to license to the application, which could access the communication group of privacy class.
Therefore it is configured as accessing some privacy class communication group, Huo Zhe in the first configuration access permission of target application The access authority of target application is revised as access privacy class communication group from open class communication group is accessed, or in target application When increasing by one privacy class communication group of access in access authority, managing device can receive the first configuration-direct, indicate target The target access authority configuration of application is the communication group for allowing the target application to access some privacy class, at this point, management dress The first authorization message can be obtained in response to first configuration-direct by setting, which can be the information such as password, fingerprint. Exemplary, which can show a prompting frame, display reminding information " please input licencing key " and award in the prompting frame Weigh the input frame of password, the licencing key that user sets before can inputting in the input frame, in this way, managing device Get the first authorization message;Alternatively, exemplary, which can also show a prompting frame, and display mentions in the prompting frame Show information " fingerprint please be input ", the letter for the fingerprint that user is arranged before can inputting user at the fingerprint collecting region of terminal Breath, in this way, managing device can get the first authorization message.
Here, managing device is after getting the first authorization message, so that it may whether for it to verify first authorization message The authorization message of preceding setting, if it is not, then first authorization message verifying does not pass through, at this point, managing device cannot be by mesh The access authority of mark application is set as target access permission.If it is, first authorization message is verified, at this point, management Device can set target access permission for the access authority of target application, allow the logical of target application access privacy class News group.
The present embodiment has to pass through user's legal authorization when configuring application access privacy class communication group, only logical in authorization It is out-of-date, it could allow application access privacy class communication group, guarantee the safety of contact information in privacy class address list, prevent privacy from letting out Dew.
In a kind of possible embodiment, above-mentioned book management method is also implemented as following steps B1 and B2.
In step bl is determined, the second configuration-direct for being directed to object contact person information is received, second configuration-direct is used for Instruction distributes the object contact person information to target communication group, and the object contact person information includes newly being added to described lead to The contact information of record is interrogated, is not located at the target in ungrouped contact information or the address list in the address list The contact information of communication group;
In step B2, in response to second configuration-direct, the object contact person information is recorded in the target In communication group.
Here, the second configuration-direct for the object contact person information that managing device can be inputted according to user, To distribute target communication group for object contact person information, the object contact person information, which can be, is newly added to the address list Contact information is also possible to ungrouped contact information in the address list, and second configuration-direct is used to indicate at this time Object contact person information is subjected to just sub-distribution, distribution to target communication group.Certain object contact person information is also possible to It is located at the contact information of other communication groups in the address list, second configuration-direct is used to indicate object contact person at this time Affiliated communication group is changed to target communication group before.
Here, managing device can show the packet configuration interface of contact person, Yong Huke on the edit page of contact person To input the second configuration-direct at the packet configuration interface, communication group is configured for the contact information.Exemplary, Fig. 4 is basis A kind of grouping schematic diagram of adding information of contact person shown in one exemplary embodiment.As shown in figure 4, user is new in address list When increasing a contact information and entering contact person's edit page 40, packet options can be shown on contact person's edit page 40 Frame 401, the option that user can be selected as the communication group of adding information of contact person distribution in the packet options frame 401 are such as logical The second configuration-direct that news group C option 4011, so input are directed to the object contact person information, indicates the object contact person The distribution of information is to communication group C.Managing device can be in response to second configuration-direct, by the object contact person information point It is assigned to target communication group i.e. communication group C.Certainly, for original contact person in address list, user can also click to enter the connection It is the edit page of people, and selects corresponding grouping in the packet options frame of the edit page for the contact information.
Here, the contact person that managing device can also increase each communication group in address list application distributes interface, uses Family can input the second configuration-direct at the packet configuration interface, distribute different contact informations for each communication group.It is exemplary, Fig. 5 is a kind of grouping schematic diagram of contact information shown according to an exemplary embodiment.As shown in figure 5, user can be into Enter contact person's packet interface 50 of communication group A, and shows whole connections in address list in contact person's packet interface 50 People option 501, user can select the connection people option of input communication group A, such as Fig. 5 in this all connection people option 501 Shown, user has selected contact person of the contact person 1,2,3,5,7,8 etc. as communication group A.In this way, user can be every one by one A communication group selection can contact person in group, in this way, managing device can receive second for object contact person information Configuration-direct, instruction distribute the object contact person information to target communication group.Managing device can be in response to described second The object contact person information is recorded in the target communication group by configuration-direct.
What needs to be explained here is that user can be in above-mentioned contact person's edit page 40 or contact person's packet interface 50 On, the communication group of some contact information is modified, amendment step is with reference to shown in Fig. 4 or Fig. 5.
What needs to be explained here is that for the contact information that user is not grouped, managing device can be defaulted this To a certain specific communication group, specifically communication group can be terminal setting for this, be also possible to use for the distribution of contact information Family setting, this is not restricted.Contact information in different communication groups can be entirely different, can also have part identical, The i.e. same contact information can be in communication group A or in communication group B, and this is not restricted.
The present embodiment can receive the second configuration-direct for object contact person information, and second configuration-direct is used for Instruction distributes the object contact person information to target communication group;In response to second configuration-direct, the target is joined It is that people's information is recorded in the target communication group;Different communication groups so is distributed for user, can allow each application that can only visit It asks user's certain communication groups for allowing to access, guarantees that privacy of user is not leaked.
In a kind of possible embodiment, at least two communications group includes the communication group of open class and leading to for privacy class News group, second configuration-direct are that the object contact person information is transferred to openly by instruction from the communication group of the privacy class When the target communication group of class, the step B2 in above-mentioned book management method is also implemented as following steps B21 and B22.
In step B21, in response to second configuration-direct, the second authorization message is obtained.
In step B22, after verifying second authorization message and passing through, by the object contact person information from described hidden The communication group of private class is transferred to the target communication group of the open class.
Here, multiple communication groups in address list can disclose the communication group of class and the communication group of privacy class, the privacy class Communication group in contact information be all important relation people information, the information of these important relations people cannot be visited arbitrarily It asks, user is needed legally to license to the application, which could access the communication group of privacy class.Therefore when user joins target When being the target communication group that people's information is transferred to open class from the communication group of the privacy class, show the object contact person information not Belong to important relation people's information again, it can be by each application arbitrarily access, at this point, being to be disliked to guarantee object contact person information not Meaning or user are ignorant, the communication group of privacy class is moved out of when not paying attention to, managing device can refer to receiving second configuration When enabling, in response to second configuration-direct, the second authorization message is obtained, which can be password, fingerprint etc. Information.Exemplary, which can show a prompting frame, display reminding information " please input licencing key " in the prompting frame The licencing key set before being inputted in the input frame with the input frame of licencing key, user, in this way, managing device is just It is available to the second authorization message;Alternatively, exemplary, which can also show a prompting frame, show in the prompting frame Show prompt information " fingerprint please be input ", the fingerprint that user is arranged before can inputting user at the fingerprint collecting region of terminal Information, in this way, managing device can get the second authorization message.
Here, managing device is after getting the second authorization message, so that it may whether for it to verify second authorization message The authorization message of preceding setting, if it is not, then second authorization message verifying does not pass through, at this point, managing device cannot be by mesh Mark contact information is transferred to the target communication group of the open class from the communication group of the privacy class.If it is, this first Authorization message is verified, at this point, managing device can shift object contact person information from the communication group of the privacy class To the target communication group of the open class.
What needs to be explained here is that second configuration-direct can also indicate that the object contact person information from the public affairs The communication group for opening class is transferred to the target communication group of privacy class, does not need user at this time and authorizes, managing device can be direct The object contact person information is transferred to the target communication group of privacy class from the communication group of the open class.
The object contact person information is being transferred to the open class from the communication group of the privacy class by the present embodiment User's legal authorization is had to pass through when target communication group, only when authorization passes through, could by the object contact person information from The communication group of the privacy class is transferred to the target communication group of the open class, guarantees the safety of the object contact person information, prevents Only privacy leakage.
Realization process is discussed in detail below by several embodiments.
Fig. 6 is a kind of flow chart of book management method shown according to an exemplary embodiment, as shown in fig. 6, should Book management method can be realized by equipment such as terminals, including step 601-607.
In step 601, the first configuration-direct for being directed to the target application is received, first configuration-direct is for referring to Show that the access authority by the target application is configured to target access permission.
In step 602, in response to first configuration-direct, set described for the access authority of the target application Target access permission.
In step 603, the second configuration-direct for being directed to object contact person information is received, second configuration-direct is used for Instruction distributes the object contact person information to target communication group.
In step 604, in response to second configuration-direct, the object contact person information is recorded in the target In communication group.
In step 605, the access request that target application is directed to address list is obtained, the address list includes at least two logical News group.
In step 606, in response to the access request, the target access permission of the target application, the mesh are obtained Mark access authority is used to limit the communication group for allowing the target application to access.
In step 607, the contact person in the communication group that the target access permission limits is provided for the target application Information.
Fig. 7 is a kind of flow chart of book management method shown according to an exemplary embodiment, as shown in fig. 7, should Book management method can be realized that the address list includes at least two communication groups by equipment such as terminals;Described at least two Communication group includes the communication group of open class and the communication group of privacy class, and the method includes the steps 701-709.
In step 701, the first configuration-direct for being directed to the target application is received, first configuration-direct is for referring to Show that the access authority by the target application is configured to target access permission;The target access permission includes allowing the target The communication group of application access privacy class.
In a step 702, in response to first configuration-direct, the first authorization message is obtained.
In step 703, after first authorization message is verified, the access authority of the target application is arranged For target access permission.
In step 704, the second configuration-direct for being directed to object contact person information is received, second configuration-direct is used for Instruction distributes the object contact person information to target communication group;Second configuration-direct is that instruction contacts the target People's information is transferred to the target communication group of open class from the communication group of the privacy class.
In step 705, in response to second configuration-direct, the second authorization message is obtained.
In step 706, after verifying second authorization message and passing through, by the object contact person information from described hidden The communication group of private class is transferred to the target communication group of the open class.
In step 707, the access request that target application is directed to address list is obtained, the address list includes at least two logical News group.
In step 708, in response to the access request, the target access permission of the target application, the mesh are obtained Mark access authority is used to limit the communication group for allowing the target application to access.
In step 709, the contact person in the communication group that the target access permission limits is provided for the target application Information.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.
Fig. 8 is a kind of block diagram of address book management device shown according to an exemplary embodiment, which can pass through Software, hardware or both are implemented in combination with as some or all of of electronic equipment.As shown in figure 8, the address list management Device includes:
First obtains module 801, and the access request for being directed to address list for obtaining target application, the address list includes extremely Few two communication groups;
Second obtains module 802, for obtaining the target access power of the target application in response to the access request Limit, the target access permission are used to limit the communication group for allowing the target application to access;
Module 803 is provided, for providing the connection in the communication group that the target access permission limits for the target application It is people's information.
As a kind of possible embodiment, Fig. 9 is a kind of address book management device shown according to an exemplary embodiment Block diagram, as shown in figure 9, address book management device disclosed above can be configured to include 804 He of the first receiving module Setup module 805, in which:
First receiving module 804, for receiving the first configuration-direct for being directed to the target application, first configuration refers to Order, which is used to indicate, configures target access permission for the access authority of the target application;
Setup module 805, for setting the access authority of the target application in response to first configuration-direct The target access permission.
As a kind of possible embodiment, Figure 10 is a kind of address book management device shown according to an exemplary embodiment Block diagram, as shown in Figure 10, at least two communications group includes the communication group of open class and the communication group of privacy class, described Target access permission includes address book management device disclosed above when allowing the communication group of the target application access privacy class Setup module 805 can also be configured to include the first acquisition submodule 8051 and setting submodule 8052, in which:
First acquisition submodule 8051, for obtaining the first authorization message in response to first configuration-direct;
Submodule 8052 is set, for after first authorization message is verified, by the access of the target application Priority assignation is target access permission.
As a kind of possible embodiment, Figure 11 is a kind of address book management device shown according to an exemplary embodiment Block diagram, as shown in figure 11, address book management device disclosed above can be configured to include 806 He of the second receiving module Logging modle 807, in which:
Second receiving module 806, for receiving the second configuration-direct for being directed to object contact person information, second configuration Instruction, which is used to indicate, distributes the object contact person information to target communication group;
Logging modle 807, for the object contact person information being recorded in described in response to second configuration-direct In target communication group.
As a kind of possible embodiment, Figure 12 is a kind of address book management device shown according to an exemplary embodiment Block diagram, as shown in figure 12, at least two communications group includes the communication group of open class and the communication group of privacy class, described the Two configuration-directs are that instruction leads to the object contact person information from the target that the communication group of the privacy class is transferred to open class When news group, address book management device disclosed above can also be configured to logging modle 807 to include the second acquisition submodule 8071 and transfer submodule 8072, in which:
Second acquisition submodule 8071, for obtaining the second authorization message in response to second configuration-direct;
Submodule 8072 is shifted, for after verifying second authorization message and passing through, by the object contact person information The target communication group of the open class is transferred to from the communication group of the privacy class.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Figure 13 is a kind of block diagram of address book management device shown according to an exemplary embodiment, which is suitable for eventually End equipment.For example, device 1300 can be mobile phone, game console, computer, tablet device, personal digital assistant etc..
Device 1300 may include following one or more components: processing component 1301, memory 1302, power supply module 1303, multimedia component 1304, audio component 1305, input/output (I/O) interface 1306, sensor module 1307, Yi Jitong Believe component 1308.
The integrated operation of the usual control device 1300 of processing component 1301, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing component 1301 may include one or more processors 1320 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1301 may include one or more moulds Block, convenient for the interaction between processing component 1301 and other assemblies.For example, processing component 1301 may include multi-media module, To facilitate the interaction between multimedia component 1304 and processing component 1301.
Memory 1302 is configured as storing various types of data to support the operation in device 1300.These data Example includes the instruction of any application or method for operating on device 1300, contact data, telephone book data, Message, picture, video etc..Memory 1302 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1303 provides electric power for the various assemblies of device 1300.Power supply module 1303 may include power management System, one or more power supplys and other with for device 1300 generate, manage, and distribute the associated component of electric power.
Multimedia component 1304 includes the screen of one output interface of offer between described device 1300 and user.? In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more Media component 1304 includes a front camera and/or rear camera.When device 1300 is in operation mode, as shot mould When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 1305 is configured as output and/or input audio signal.For example, audio component 1305 includes a wheat Gram wind (MIC), when device 1300 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 1302 or via communication Component 1308 is sent.In some embodiments, audio component 1305 further includes a loudspeaker, is used for output audio signal.
The interface 1306 of I/O provides interface, above-mentioned peripheral interface mould between processing component 1301 and peripheral interface module Block can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button And locking press button.
Sensor module 1307 includes one or more sensors, and the state for providing various aspects for device 1300 is commented Estimate.For example, sensor module 1307 can detecte the state that opens/closes of device 1300, the relative positioning of component, such as institute The display and keypad that component is device 1300 are stated, sensor module 1307 can be with detection device 1300 or device 1,300 1 The position change of a component, the existence or non-existence that user contacts with device 1300,1300 orientation of device or acceleration/deceleration and dress Set 1300 temperature change.Sensor module 1307 may include proximity sensor, be configured in not any physics It is detected the presence of nearby objects when contact.Sensor module 1307 can also include optical sensor, as CMOS or ccd image are sensed Device, for being used in imaging applications.In some embodiments, which can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1308 is configured to facilitate the communication of wired or wireless way between device 1300 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 1300,2G or 3G or their combination.It is exemplary at one In embodiment, communication component 1308 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1308 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1300 can be by one or more application specific integrated circuit (ASIC), number Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1302 of instruction, above-metioned instruction can be executed by the processor 1320 of device 1300 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of device 1300 When device executes, so that device 1300 is able to carry out above-mentioned book management method, which comprises
The access request that target application is directed to address list is obtained, the address list includes at least two communication groups;
In response to the access request, the target access permission of the target application is obtained, the target access permission is used In the communication group for limiting the permission target application access;
Contact information in the communication group that the target access permission limits is provided for the target application.
In one embodiment, the method also includes:
The first configuration-direct for being directed to the target application is received, first configuration-direct is used to indicate the target The access authority of application is configured to target access permission;
In response to first configuration-direct, the target access is set by the access authority of the target application and is weighed Limit.
In one embodiment, at least two communications group includes disclosing the communication group of the communication group and privacy class of class, It is described in response to described first when the target access permission, which includes, allows the communication group of the target application access privacy class The access authority of the target application is set the target access permission by configuration-direct, comprising:
In response to first configuration-direct, the first authorization message is obtained;
After first authorization message is verified, target access power is set by the access authority of the target application Limit.
In one embodiment, the method also includes:
The second configuration-direct for being directed to object contact person information is received, second configuration-direct is used to indicate the mesh Mark contact information is distributed to target communication group;
In response to second configuration-direct, the object contact person information is recorded in the target communication group.
In one embodiment, at least two communications group includes disclosing the communication group of the communication group and privacy class of class, Second configuration-direct is to indicate the object contact person information being transferred to open class from the communication group of the privacy class It is described in response to second configuration-direct when target communication group, the object contact person information is recorded in the target and is led to In news group, comprising:
In response to second configuration-direct, the second authorization message is obtained;
After verifying second authorization message and passing through, by the object contact person information from the communication group of the privacy class It is transferred to the target communication group of the open class.
The present embodiment additionally provides a kind of address book management device, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The access request that target application is directed to address list is obtained, the address list includes at least two communication groups;
In response to the access request, the target access permission of the target application is obtained, the target access permission is used In the communication group for limiting the permission target application access;
Contact information in the communication group that the target access permission limits is provided for the target application.
In one embodiment, above-mentioned processor can be additionally configured to:
The first configuration-direct for being directed to the target application is received, first configuration-direct is used to indicate the target The access authority of application is configured to target access permission;
In response to first configuration-direct, the target access is set by the access authority of the target application and is weighed Limit.
In one embodiment, above-mentioned processor can be additionally configured to:
At least two communications group includes the communication group of open class and the communication group of privacy class, is weighed in the target access It is described in response to first configuration-direct when limit includes that the permission target application accesses the communication group of privacy class, it will be described The access authority of target application is set as the target access permission, comprising:
In response to first configuration-direct, the first authorization message is obtained;
After first authorization message is verified, target access power is set by the access authority of the target application Limit.
In one embodiment, above-mentioned processor can be additionally configured to:
The method also includes:
The second configuration-direct for being directed to object contact person information is received, second configuration-direct is used to indicate the mesh Mark contact information is distributed to target communication group;
In response to second configuration-direct, the object contact person information is recorded in the target communication group.
In one embodiment, above-mentioned processor can be additionally configured to:
At least two communications group includes the communication group of open class and the communication group of privacy class, second configuration-direct It is described when to indicate for the object contact person information to be transferred to the target communication group of open class from the communication group of the privacy class In response to second configuration-direct, the object contact person information is recorded in the target communication group, comprising:
In response to second configuration-direct, the second authorization message is obtained;
After verifying second authorization message and passing through, by the object contact person information from the communication group of the privacy class It is transferred to the target communication group of the open class.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (12)

1. a kind of book management method characterized by comprising
The access request that target application is directed to address list is obtained, the address list includes at least two communication groups;
In response to the access request, the target access permission of the target application is obtained, the target access permission is for limiting Surely allow the communication group of the target application access;
Contact information in the communication group that the target access permission limits is provided for the target application.
2. the method according to claim 1, wherein the method also includes:
The first configuration-direct for being directed to the target application is received, first configuration-direct is used to indicate the target application Access authority be configured to target access permission;
In response to first configuration-direct, the target access permission is set by the access authority of the target application.
3. according to the method described in claim 2, it is characterized in that, at least two communications group includes the communication group of open class With the communication group of privacy class, when the target access permission, which includes, allows the communication group of target application access privacy class, It is described to set the target access permission for the access authority of the target application in response to first configuration-direct, packet It includes:
In response to first configuration-direct, the first authorization message is obtained;
After first authorization message is verified, target access permission is set by the access authority of the target application.
4. the method according to claim 1, wherein the method also includes:
The second configuration-direct for being directed to object contact person information is received, second configuration-direct, which is used to indicate, joins the target It is that people's information is distributed to target communication group;
In response to second configuration-direct, the object contact person information is recorded in the target communication group.
5. according to the method described in claim 4, it is characterized in that, at least two communications group includes the communication group of open class With the communication group of privacy class, second configuration-direct is communication of the instruction by the object contact person information from the privacy class It is described in response to second configuration-direct when group is transferred to the target communication group of open class, by the object contact person information It is recorded in the target communication group, comprising:
In response to second configuration-direct, the second authorization message is obtained;
After verifying second authorization message and passing through, the object contact person information is shifted from the communication group of the privacy class To the target communication group of the open class.
6. a kind of address book management device characterized by comprising
First obtains module, and the access request for being directed to address list for obtaining target application, the address list includes at least two Communication group;
Second obtains module, for obtaining the target access permission of the target application, the mesh in response to the access request Mark access authority is used to limit the communication group for allowing the target application to access;
Module is provided, for providing contact person's letter in the communication group that the target access permission limits for the target application Breath.
7. device according to claim 6, which is characterized in that described device further include:
First receiving module, for receiving the first configuration-direct for being directed to the target application, first configuration-direct is used for The access authority of the target application is configured target access permission by instruction;
Setup module, for setting the mesh for the access authority of the target application in response to first configuration-direct Mark access authority.
8. device according to claim 7, which is characterized in that at least two communications group includes the communication group of open class With the communication group of privacy class, when the target access permission, which includes, allows the communication group of target application access privacy class, The setup module includes:
First acquisition submodule, for obtaining the first authorization message in response to first configuration-direct;
Submodule is set, for after first authorization message is verified, the access authority of the target application to be arranged For target access permission.
9. device according to claim 6, which is characterized in that described device further include:
Second receiving module, for receiving the second configuration-direct for being directed to object contact person information, second configuration-direct is used The object contact person information is distributed to target communication group in instruction;
Logging modle, for the object contact person information being recorded in the target and is led in response to second configuration-direct In news group.
10. device according to claim 9, which is characterized in that at least two communications group includes the communication of open class The communication group of group and privacy class, second configuration-direct are to indicate the leading to from the privacy class by the object contact person information When news group is transferred to the target communication group of open class, the logging modle includes:
Second acquisition submodule, for obtaining the second authorization message in response to second configuration-direct;
Submodule is shifted, for after verifying second authorization message and passing through, by the object contact person information from described hidden The communication group of private class is transferred to the target communication group of the open class.
11. a kind of address book management device characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to perform claim requires the step in any one of 1 to 5 the method.
12. a kind of computer readable storage medium, is stored with computer instruction, which is characterized in that the computer instruction is located Manage the step realized in any one of claim 1 to 5 the method when device executes.
CN201910234290.9A 2019-03-26 2019-03-26 Book management method and device Pending CN109963023A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910234290.9A CN109963023A (en) 2019-03-26 2019-03-26 Book management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910234290.9A CN109963023A (en) 2019-03-26 2019-03-26 Book management method and device

Publications (1)

Publication Number Publication Date
CN109963023A true CN109963023A (en) 2019-07-02

Family

ID=67024897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910234290.9A Pending CN109963023A (en) 2019-03-26 2019-03-26 Book management method and device

Country Status (1)

Country Link
CN (1) CN109963023A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316197A (en) * 2011-09-07 2012-01-11 宇龙计算机通信科技(深圳)有限公司 Method for acquiring contact information and device
US20140115693A1 (en) * 2012-10-24 2014-04-24 Qnx Software Systems Limited Managing permission settings applied to applications
CN105207900A (en) * 2015-10-28 2015-12-30 上海季诺金融信息服务有限公司 Secret information transmission method based on instant messaging platform
US20160285885A1 (en) * 2013-12-23 2016-09-29 Intel Corporation Contextual contacts for html5
CN106506511A (en) * 2016-11-17 2017-03-15 京东方科技集团股份有限公司 A kind of address list information processing method, device
CN109361807A (en) * 2018-10-25 2019-02-19 努比亚技术有限公司 Information access control method, mobile terminal and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316197A (en) * 2011-09-07 2012-01-11 宇龙计算机通信科技(深圳)有限公司 Method for acquiring contact information and device
US20140115693A1 (en) * 2012-10-24 2014-04-24 Qnx Software Systems Limited Managing permission settings applied to applications
US20160285885A1 (en) * 2013-12-23 2016-09-29 Intel Corporation Contextual contacts for html5
CN105207900A (en) * 2015-10-28 2015-12-30 上海季诺金融信息服务有限公司 Secret information transmission method based on instant messaging platform
CN106506511A (en) * 2016-11-17 2017-03-15 京东方科技集团股份有限公司 A kind of address list information processing method, device
CN109361807A (en) * 2018-10-25 2019-02-19 努比亚技术有限公司 Information access control method, mobile terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN104992091B (en) Access the method, apparatus and storage medium of terminal
CN104765552B (en) Right management method and device
US20160226674A1 (en) Method and apparatus for controlling smart device
CN105357734B (en) The method and device of control access WIFI hot spot
CN105807873A (en) Temperature control method and device
CN105117101B (en) The display methods and device of application program
US20170300260A1 (en) Method, device and computer-readable storage medium for data migration
CN104933351A (en) Information security processing method and information security processing device
CN106020943A (en) Application program dual-opening method and device
CN104376273A (en) Data access control method and device
CN106095220B (en) Notification message reminding method and device
CN106203167A (en) Application rights management method and device
CN105354489A (en) Right granting method and apparatus
CN106446653A (en) Application authority management method and device and electronic equipment
CN107959757A (en) User information processing method, device, APP servers and terminal device
WO2018049609A1 (en) Permission control method and device
CN105681365B (en) Method and apparatus for file transmission
CN105426745B (en) Information display method and device
CN106372943A (en) Message processing method and device
CN104298903B (en) Access the method and device of mobile terminal
CN105912922A (en) Information management method and device, and terminal
CN105677352A (en) Setting method and device for application icon color
CN105955635B (en) Interface display method and device
WO2018049611A1 (en) Permission control method and device
CN105630447A (en) Method and device for adjusting word display

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702