Unlock instant, AI-driven research and patent intelligence for your innovation.

A permission configuration method and device

A permission configuration and permission technology, applied in the electronic field, can solve problems such as leakage of personal privacy, leakage of personal privacy, and lack of security of smart terminals, so as to avoid leakage of personal privacy and improve security.

Active Publication Date: 2019-01-29
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the existing power-on unlocking method can make the smart terminal have a certain degree of security under normal circumstances, it will still inadvertently leak personal privacy when the smart terminal is in the process of borrowing. For example, when a friend borrows a mobile phone to make a call or watch When opening a web page, if a certain application program pops up a private message, it will lead to the leakage of personal privacy, which will cause the smart terminal not to have sufficient security in this case.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A permission configuration method and device
  • A permission configuration method and device
  • A permission configuration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0022] See figure 1 , is a schematic flowchart of a rights configuration method provided by an embodiment of the present invention, and the method may include:

[0023] S101. Obtain a target unlock password, and identify the target unlock password according to a preset password permission mapping table; the password permission mapping table includes multiple unlock passwords and multiple permission configuration modes;

[0024] Specifically, the mobile terminal ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose an authority configuration method and apparatus. The method comprises: acquiring a target unlock password, and identifying the target unlock password according to a preset password authority mapping table, wherein the password authority mapping table comprises multiple unlock passwords and multiple authority configuration modes; when identifying that the target unlock password is a legal unlock password, searching the authority configuration mode with a mapping relationship with the target unlock password in the password authority mapping table; and performing authority configuration on an application in a terminal according to the searched authority configuration mode. By using the authority configuration method and apparatus provided by the present invention, security of the intelligent terminal can be improved, so that leakage of personal privacy in the lending process is avoided.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a permission configuration method and device. Background technique [0002] In the current smart terminal, in order to use the smart terminal more safely, the unlock password is usually entered when the screen is turned on, and the user can only use the smart terminal when the unlock password is legal. The current unlock password is usually a fingerprint password, graphic Passwords, numeric codes, and more. Although the existing power-on unlocking method can make the smart terminal have a certain degree of security under normal circumstances, it will still inadvertently leak personal privacy when the smart terminal is in the process of borrowing. For example, when a friend borrows a mobile phone to make a call or watch When opening a web page, if a certain application program pops up a private message, it will lead to the leakage of personal privacy, which will cause...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/31G06F21/32
Inventor 宫鲁津
Owner TENCENT TECH (SHENZHEN) CO LTD