Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for setting application permissions

A technology of application programs and permissions, applied in the Internet field, can solve problems such as the inability to monitor and control students' mobile phones, and achieve the effect of timely and effective monitoring and control

Inactive Publication Date: 2017-07-18
GUANGDONG XIAOTIANCAI TECH CO LTD
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method for setting application program permissions to solve the problem in the prior art that parents cannot monitor and control students' mobile phones in a timely and effective manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for setting application permissions
  • Method and device for setting application permissions
  • Method and device for setting application permissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] figure 1 The implementation flow of a method for setting application program permissions provided by the first embodiment of the present invention is shown, and the details are as follows:

[0052] In step S101, the second terminal generates permission data of the application program, and sends the permission data of the application program to the first terminal.

[0053] Specifically, the first terminal in the embodiment of the present invention may be a controlled terminal, for example, it may be a mobile phone used by a student user or other users whose use of some application programs is restricted. In the first terminal, the application corresponding to the method is preset with data communication permission and execution permission. During the running or starting process of other application programs, other application programs can be started or downloaded through the application corresponding to this method. Moreover, in order to ensure the effectiveness of mon...

Embodiment approach

[0057] In addition, as a preferred embodiment of the present invention, the step of generating the permission data of the application program at the second terminal is specifically as follows:

[0058] Receive the parent's permission setting voice, and extract the voice keywords and voice features in the permission setting voice;

[0059] judging whether the voice feature matches the preset voice feature;

[0060] If the voice feature matches the preset voice feature, an instruction corresponding to the voice keyword is executed.

[0061] After receiving the authority setting voice, the second terminal may extract frequency features and the like in the authority setting voice. The text information in the voice is recognized by a voice recognition algorithm, and keywords in the text information in the voice are extracted, such as "allow", "prohibit", "not allowed", "authorize" and so on.

[0062] After extracting the feature of the authority setting voice, compare the feature...

Embodiment 3

[0072] figure 2 The implementation process provided by the second embodiment of the present invention is shown, and the details are as follows:

[0073] In step S201, the second terminal acquires an application program sequence generated by the number of application programs downloaded by student terminals in the application market.

[0074] Specifically, the application sequence generated by counting the number of application programs downloaded by student terminals in each mainstream application market can be counted. Wherein, the student terminal can be determined according to whether it is the first terminal described in this method, that is, whether it is bound to the second terminal, and can receive the permission data of the application program set by the second terminal, and according to the received permission data Controls the download or launch of an application.

[0075] After counting the number of times the application program is downloaded by the student term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for setting application permissions. The method comprises the following steps: generating permission data of an application by a second terminal, and transmitting the permission data of the application to a first terminal; when the first terminal downloads an application or starts an application, acquiring the permission corresponding to the downloaded application or the started application from the permission data of the application; and determining whether the first terminal can download the application or start the application according to the permission. According to the method for setting the application permissions provided by the invention, the permission data pre-generated by the second terminal controls the download or start of the application of the first terminal, so that the application of the first terminal used by students can be timely and effectively monitored and controlled.

Description

technical field [0001] The invention belongs to the field of the Internet, and in particular relates to a method and a device for setting application program permissions. Background technique [0002] With the popularization of smart phones, more and more primary and middle school students also have their own smart phones. Learning videos can be played and learning applications can be installed on smartphones, which brings convenience to student users. At the same time, because non-learning applications such as games and chats are more attractive to student user groups, if they are not properly controlled, it will seriously affect the learning efficiency of students. [0003] In order to effectively reduce the impact of non-study applications on students' learning, it is usually through the binding of parents' mobile phones with students' mobile phones to view the applications running on students' mobile phones to control the use of some The running permission of the appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/45
CPCG06F21/45G06F2221/2113G06F2221/2149
Inventor 解文静
Owner GUANGDONG XIAOTIANCAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products