Terminal permission control method and system

A technology of authority control and control method, which is applied in the field of terminal authority control method and system, can solve problems such as inability to adjust adaptively, and achieve the effect of improving security and usability

Inactive Publication Date: 2017-05-24
ZTE CORP
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example: the system permissions and/or application permissions of the smart terminal used by the user are not necessarily applicable to all environments or occasions. Usually, when the user is in a different environment, the sys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal permission control method and system
  • Terminal permission control method and system
  • Terminal permission control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Embodiment 1 of the present invention provides a method for controlling terminal authority, such as figure 1 As shown, wherein, the first attribute for the first permission is stored in the terminal, the first permission includes at least the system permission and / or application permission of the terminal, and the first attribute is used to describe the first permission Opening and closing conditions of a permission; the method mainly includes:

[0047] Step 101, obtain first information of the terminal, where the first information is information used to describe the environment where the terminal is located.

[0048]In the embodiment of the present invention, the system authority refers to the operation and use authority of various functions of the operating system (such as Android system, Apple's IOS operating system, windows operating system, etc.) of the intelligent terminal, such as the wireless local area network (wifi) of the intelligent terminal. authority, mob...

Embodiment 2

[0074] Corresponding to the terminal authority control method in the embodiment of the present invention, Embodiment 2 of the present invention also provides a terminal authority control system, such as Figure 5 As shown, the system includes: an initialization unit 10, a first information obtaining unit 20, a policy control unit 30 and an authority control unit 40; wherein,

[0075] The initialization unit 10 is configured to store a first attribute for a first permission, the first permission includes at least the system permission and / or application permission of the terminal, and the first attribute is used to describe the first permission opening and closing conditions;

[0076] The first information obtaining unit 20 is configured to obtain first information of the terminal, where the first information is information describing the environment in which the terminal is located;

[0077] The policy control unit 30 is configured to obtain a permission control policy based ...

Embodiment 3

[0098] Considering that in practical applications, end users have different requirements for opening and / or closing system permissions and / or application permissions in the terminal in different geographical locations, such as workplaces, home places or unfamiliar locations; and , end users have certain rules to follow for the opening and / or closing habits of terminal system permissions and / or application permissions, that is, end users usually have the same habit of opening and / or closing permissions in the same location area; then according to the Regularly and adaptively adjust the operation and use rights of applications and systems, which can save users a lot of manual operations, save users time, and improve the operation experience.

[0099] According to the third embodiment of the present invention, the method for controlling the terminal authority based on the change of geographic location, such as image 3 As shown, the method mainly includes:

[0100] Step 301, ini...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal permission control method. A terminal stores a first attribute for first permission; the first permission at least includes system permission and/or application permission of the terminal; and the first attribute is used for describing enable and disable conditions of the first permission. The method comprises the steps of obtaining first information of the terminal, wherein the first information is information used for describing an environment in which the terminal is located; based on the obtained first information and the first attribute, stored in the terminal, for the first permission, obtaining a permission control policy; and executing enable or disable operation for the first permission when it is determined that the first permission needs to be subjected to state adjustment according to the permission control policy.

Description

technical field [0001] The invention belongs to the field of intelligent terminals, and in particular relates to a method and system for controlling terminal authority. Background technique [0002] With the rapid development of the mobile Internet, smart terminals have become popular, and there are more and more applications based on smart terminals. These applications include: office software, wealth management software, social software, game software and so on. While various applications have greatly changed people's work, life, and communication methods, they are also deeply troubling users, such as the inability to separate work and life, frequent security incidents, and so on. For example: the system permissions and / or application permissions of the smart terminal used by the user are not necessarily applicable to all environments or occasions. Usually, when the user is in a different environment, the system permissions and / or application permissions of the smart termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 黄勤波
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products