Authority management method, authority management device, mobile terminal and storage medium

A technology of authority management and mobile terminal, which is applied in the direction of telephone communication, electrical components, branch office equipment, etc., can solve the problems of unfavorable operation experience, mobile terminal security, etc., and achieve the effect of avoiding the direct use of equipment management authority and improving system performance and stability

Inactive Publication Date: 2018-10-09
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, users often install various third-party applications, and these third-party applications often guide users to open the device manager function of the mobile terminal in various ways, which is not conducive to the user's operating experience and the security of the mobile terminal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority management method, authority management device, mobile terminal and storage medium
  • Authority management method, authority management device, mobile terminal and storage medium
  • Authority management method, authority management device, mobile terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0024] see figure 1 , figure 1 A schematic flowchart of the rights management method provided in the first embodiment of the present application is shown. The rights management method is used to prevent malicious programs from directly using device management rights by adding prompt information, and improve system performance and stability. In a specific embodiment, the rights management method is applied as Figure 7 The rights management device 200 shown and the mobile terminal configured with the rights management device 200 ( Figure 9 ). The following will take the mobile terminal as an example to illustrate the specific process of this embodiment. Of course, it can be understood that the mobile terminal used in this embodiment can be a smart phone, a tablet computer, a wearable electronic device, etc., and no specific details will be given here. limited. The following will target figure 1 The flow shown is described in detail, and the rights management method may s...

no. 2 example

[0036] see image 3 , image 3 A schematic flowchart of the rights management method provided by the second embodiment of the present application is shown. The following will target image 3 The flow shown is described in detail, and the method may specifically include the following steps:

[0037] Step S210: After the device management permission of the application is activated, monitor the acquisition request of the device management permission;

[0038] Step S220: When an acquisition request for the target authority is detected, display an operation corresponding to the target authority and a prompt message indicating whether to execute the operation corresponding to the target authority.

[0039] see Figure 4 , in this embodiment, when listening to the acquisition request for the target authority, the mobile terminal displays the operation corresponding to the target authority in addition to displaying whether the operation corresponding to the target authority is all...

no. 3 example

[0049] see Figure 5 , Figure 5 A schematic flowchart of the rights management method provided by the third embodiment of the present application is shown. The following will target Figure 5 The shown process is described, and the shown method may specifically include the following steps:

[0050] Step S310: After the device management permission of the application is activated, monitor the acquisition request of the device management permission.

[0051] Step S320: When an acquisition request for the target authority is detected, display a prompt message indicating whether the operation corresponding to the target authority is allowed to be performed, and display selection information for reminding each time or not reminding again.

[0052] see Figure 6 , in this embodiment, when listening to the acquisition request of the target authority, in addition to displaying the prompt information of whether to allow the operation corresponding to the target authority, the mobi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authority management method, an authority management device, a mobile terminal and a storage medium, which relate to the technical field of the mobile terminals. The method comprises the following steps: when an equipment management authority of an application is activated, monitoring an acquisition request of the equipment management authority, when the acquisition request of a target authority is monitored, displaying prompt information of whether to allow execution of an operation corresponding to the target authority, wherein the target authority is the authority in the equipment management authority, and when an instruction of allowing execution of the target authority is received, running the operation corresponding to the target authority. According to the authority management method, the authority management device, the mobile terminal and the storage medium provided by the embodiment of the invention, by adding the prompt information, directly using the equipment management authority by a malicious program is avoided, and system performance and stability are promoted.

Description

technical field [0001] The present application relates to the technical field of mobile terminals, and more specifically, to a rights management method, device, mobile terminal and storage medium. Background technique [0002] Mobile terminals, such as mobile phones, have become one of the most commonly used consumer electronic products in people's daily life. Moreover, users often install various third-party applications, and these third-party applications often guide users to open the device manager function of the mobile terminal in various ways, which is not conducive to the user's operating experience and the security of the mobile terminal. Contents of the invention [0003] In view of the above problems, this application proposes a permission management method, device, mobile terminal, and storage medium to prevent malicious programs from directly using device management permissions by adding prompt information, and improve system performance and stability. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725
CPCH04M1/72403H04M1/72463
Inventor 林志泳
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products