Server, terminal and authority management and permission method

A technology of rights management and server, applied in the fields of license, server, terminal and rights management, to achieve the effect of improving use efficiency, improving user experience and improving accuracy

Inactive Publication Date: 2014-01-15
XIAN COOLPAD SOFTWARE TECH CO LTD
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a server, a terminal and a permission management and permission method, which solves the technical problem in the prior art that the user must judge and adjust the permission of the application program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server, terminal and authority management and permission method
  • Server, terminal and authority management and permission method
  • Server, terminal and authority management and permission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052]The general idea of ​​the present invention is: by extracting the identification information of the application programs that need to be limited in authority, and uploading the identification information to the server, the server will query according to the information stored in itself or in other servers, and obtain the corresponding information. The reasonable permission policy of the application program, so as to limit the permission of the corresponding application program according to the reasonable permission policy. However, in this application, the reasonable permission policy obtained from the server can be in various ways, and the better ones can be the following two. One is the permission policy after removing the unnecessary permissions of the corresponding application program, that is, the permission in the permission policy It is the permission that the application program can operate; a prohibition permission policy that prohibits the corresponding applicat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a server, a terminal and an authority management and permission method. Identification information of an application program to be inquired from the terminal is obtained; an optimal and reasonable permission policy corresponding to the application program to be inquired is inquired and obtained according to the identification information, and the permission policy is sent to the terminal. The tedious process of judging the application software program manually by a user is avoided, and a server sends the optimal permission policy to the terminal directly through inquiring. In addition, the terminal conducts permission limitation on the corresponding application program through the obtained reasonable permission policy, manual permission selection of a user is avoided, the terminal obtains the reasonable permission policy automatically to limit the application program, and user experience is further improved. Meanwhile, the reasonable permission policy is used, inaccurate permission judgment of the user is avoided, and information safety of the user is protected.

Description

technical field [0001] The invention relates to a server, a terminal, a rights management and a licensing method, in particular to a server, a terminal, a rights management and a licensing method for adjusting the access rights of application programs. Background technique [0002] With the popularity of smart phones, various applications have sprung up like mushrooms after rain. The good and bad applications also pose a huge threat to the privacy and security of mobile phone users. Some illegal manufacturers spy on users' privacy through applications, causing users to have various problems such as the leakage of address books and the theft of bank accounts. [0003] For this kind of problem, the industry has also appeared some solutions specifically to solve this problem. It is mainly to provide an interception program for mobile terminals. When some applications try to access private data, a prompt is given to the user, and then the user can choose whether to allow acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/50G06F21/44H04L12/24
CPCG06F21/44G06F21/51
Inventor 王章健
Owner XIAN COOLPAD SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products