Permission controlling method and device for application programs

An application and permission control technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as inability to access application programs safely, and achieve a system that does not affect user experience, improves security, and has simple locking operations. Effect

Inactive Publication Date: 2016-03-09
GREE ELECTRIC APPLIANCES INC
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and device for controlling application rights, to at least solve the problem that in the prior art, applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission controlling method and device for application programs
  • Permission controlling method and device for application programs
  • Permission controlling method and device for application programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] According to an embodiment of the present invention, an embodiment of an application permission control method is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0016] figure 1 is a flowchart of an application permission control method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0017] Step S102, selecting one or more application programs to be locked among the application programs installed on the terminal, and setting a lock password.

[0018] Specifically, the above-mentioned terminal may be a terminal device such as a smart phone (such as an Android phone, an iOS phone, etc...

Embodiment 2

[0083] According to an embodiment of the present invention, an embodiment of an application permission control device is provided, such as image 3 As shown, the device includes: a selection module 31 and a locking module 33 .

[0084] Wherein, the selection module 31 is used for selecting one or more application programs to be locked among the application programs installed on the terminal, and setting a lock password.

[0085] Specifically, the above-mentioned terminal may be a terminal device such as a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, or a handheld computer, or a computer terminal.

[0086] In an optional solution, the user can specify the application programs that others do not want to access and use on the Android system device, that is, select one or more applications that do not want others to access and use, and set the application programs that do not want others to access and use. Application lock password, the user can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a permission controlling method and device for application programs. The permission controlling method comprises the following steps of: selecting one or more application programs to be locked from application programs installed on a terminal, and setting a locking password; and after a locking instruction is detected, locking the application programs to be locked by using the locking password. The permission controlling method and device solve the technical problem in the prior art that the application programs installed on the terminal can be freely used by a user, and security access can not be pointedly carried out on the application programs according to the demands of the user.

Description

technical field [0001] The present invention relates to the field of application program control, in particular, to an application program permission control method and device. Background technique [0002] With the popularization and use of mobile terminals, more and more users are accustomed to using mobile phones to handle daily affairs. Even if they forget to bring their mobile phones or their own mobile phones are inconvenient to use, they can also borrow other people's mobile phones to operate. However, the specific application program on each user's mobile terminal has its own privacy (for example, the chat history of mobile QQ, WeChat and other chat application software, the photos taken in the mobile phone gallery, etc.), and the user lends the mobile terminal to others. After that, don't want others to be able to use the above specific application. [0003] Aiming at the technical problem in the prior art that the application program installed on the terminal can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/121G06F21/629G06F2221/2141G06F2221/2147
Inventor 唐钰林
Owner GREE ELECTRIC APPLIANCES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products