Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal rights management method and terminal device

A technology of rights management and terminal equipment, which is applied in the fields of electronic digital data processing, instruments, calculations, etc., can solve difficult, unpopular, and different problems, achieve high stability, improve user experience, and protect mobile phone security.

Inactive Publication Date: 2014-03-05
SHANGHAI DROI TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, the current management application software on the market needs to be rooted to use the application’s rights management function normally, but this rooting will have a greater impact on the phone’s system security, stability of use, and after-sales warranty.
In addition, different mobile phones have different rooting methods, and at the same time, it is too difficult for ordinary users to do it. Therefore, such permission management functions of third-party applications in the market are not popular.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal rights management method and terminal device
  • Terminal rights management method and terminal device
  • Terminal rights management method and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0025] The first embodiment of the present invention relates to a terminal authority management method, the specific process is as follows figure 1 shown.

[0026] In step 101, a flag bit for identifying whether permission is allowed is set in the system file in advance. Specifically, in the system file used to save the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to terminal equipment and discloses a terminal rights management method and a terminal device. According to the method, flag bits for whether rights included in rights information of applications are available or not are set in a system file, and values of the flag bits are modifiable to users; when the applications run, whether or not the corresponding flag bits of rights under applying in the system file indicate usage available is detected; if usage is allowed, the applications are run normally; if usage is not allowed, the applications are stopped running. A frame layer is modified directly, usage is allowed with no need for cellphone rooting, the influences on cellphone system security, usage stability, aftersales warranty and the like are avoided, the cellphones are open, and cellphone security is also protected.

Description

technical field [0001] The present invention relates to terminal equipment, in particular to a rights management method in the terminal equipment. Background technique [0002] There are various applications that can be loaded on a terminal device (such as a mobile phone), and many applications need to request certain permissions from the system during operation. For example, when an application program needs to view the address book and call records, it needs to request permission from the system to access the address book and call records. [0003] At present, the permission management of the terminal device to the application program is mainly realized through the following methods: [0004] Taking the Android system as an example, the permission information of the application is mainly specified through some tags in the configuration file of the application (such as AndroidManifest.xml), and these tags will be read into the system file during installation (such as data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52
CPCG06F21/51G06F2221/2141
Inventor 王松李响刘洋洪文彬
Owner SHANGHAI DROI TECH CO LTD