A rights management method, a rights management device and an intelligent terminal

A technology of authority management and authority, which is applied in the field of information security, can solve problems such as personal data leakage, automatic exit of applications, unusable applications, etc., and achieve the effect of ensuring the security of personal information

Active Publication Date: 2020-08-14
THUNDER SOFTWARE TECH SHENZHEN
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user grants these applications the permissions they require, it may cause the personal data stored on the smart terminal to be leaked; if the user does not grant these applications the permissions they require, the applications will be unusable, It can even cause the application to automatically exit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A rights management method, a rights management device and an intelligent terminal
  • A rights management method, a rights management device and an intelligent terminal
  • A rights management method, a rights management device and an intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 The implementation process of the rights management method provided by Embodiment 1 of the present invention is shown, and the details are as follows:

[0025] In step S101, the permission request instruction sent by the application program is received;

[0026] In the embodiment of the present invention, during the running process of the application program, the permission request instruction sent by the application program is received. Specifically, it may be to receive the permission request instruction sent by the application program when the application program is installed; or, in step S101, it may also be to receive the permission request instruction sent by the application program when the application program is used. limited.

[0027] In step S102, based on the real access permission requested by the permission request instruction, the virtual access permission corresponding to the real access permission is determined;

[0028] In the embodiment of ...

Embodiment 2

[0045] On the basis of embodiment one, figure 2 The implementation flow of another rights management method provided by Embodiment 2 of the present invention is shown, and the details are as follows:

[0046] In step S301, a permission request instruction sent by an application program is received;

[0047] In step S302, based on the real access permission requested by the permission request instruction, determine the virtual access permission corresponding to the real access permission;

[0048] In step S303, granting the aforementioned virtual access authority to the aforementioned application program;

[0049] In the embodiment of the present invention, the implementation manners of the above step S301 to the above step S303 are the same as or similar to those of the above step S101 and the above step S103 respectively, which will not be repeated here.

[0050] In step S304, receiving an input authority change instruction;

[0051] In the embodiment of the present inven...

Embodiment 3

[0059] Figure 4 A structural block diagram of the rights management device provided by the embodiment of the present invention is shown, and for convenience of description, only parts related to the embodiment of the present invention are shown. The rights management device 4 includes: a request receiving unit 41 , a rights determining unit 42 , and a rights granting unit 43 .

[0060] Wherein, the request receiving unit 41 is configured to receive the permission request instruction sent by the application program;

[0061] The authority determination unit 42 is configured to determine the virtual access authority corresponding to the above-mentioned real access authority based on the real access authority requested by the authority request instruction received by the above-mentioned request receiving unit 41, wherein the above-mentioned real access authority is the same as that of the terminal in the real system data association, the above-mentioned virtual access rights ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority management method, an authority management device and an intelligent terminal. The authority management method includes the steps that an authority request instruction sent by an application program is received; based on real access authority requested by the authority request instruction, virtual access authority corresponding to the real access authority is determined, wherein the real access authority is associated with terminal data in a real system, the virtual access authority is associated with terminal data in a virtual system, and the terminal data in the virtual system is different from the terminal data in the real system; the virtual access authority is awarded to the application program. According to the scheme, not only can access authority needed by the application program be opened, but also personal information security of a user can be guaranteed.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a rights management method, a rights management device, an intelligent terminal and a computer-readable storage medium. Background technique [0002] Many applications often apply to the smart terminal for a large number of unnecessary or even irrelevant permissions when installed. For example, some applications will apply to the smart terminal to read the secure digital card (SD card), system log information, address book information, call information, SMS information, smart terminal geographic location and other information permissions. If the user grants these applications the permissions they require, it may cause the personal data stored on the smart terminal to be leaked; if the user does not grant these applications the permissions they require, the applications will be unusable, It may even cause the application to automatically exit. Contents of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/629
Inventor 肖立锋龙德武
Owner THUNDER SOFTWARE TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products