Rights management method, device, mobile terminal and storage medium

A permission management and permission technology, applied in electrical digital data processing, instruments, digital data authentication, etc., can solve problems such as unfavorable operation experience, mobile terminal security, etc., and achieve the effect of improving system security and stability and preventing unreasonable use.

Active Publication Date: 2021-08-17
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the user starts using the mobile phone, various third-party applications are often installed, and these third-party applications often activate the device manager function or auxiliary functions of the mobile terminal in various ways to obtain device management rights, which is not conducive to the user's operation Experience and Mobile Terminal Security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rights management method, device, mobile terminal and storage medium
  • Rights management method, device, mobile terminal and storage medium
  • Rights management method, device, mobile terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0023] see figure 1 , figure 1 A schematic flowchart of the rights management method provided in the first embodiment of the present application is shown. The authority management method is used to verify user information when the user sets the management authority, and only display the setting page of the management authority when the verification is passed, thereby improving the system security and stability of the mobile terminal. In a specific embodiment, the rights management method is applied as Figure 5 The rights management device 200 shown and the mobile terminal configured with the rights management device 200 ( Figure 6 ). The following will take the mobile terminal as an example to illustrate the specific process of this embodiment. Of course, it can be understood that the mobile terminal used in this embodiment can be a smart phone, a tablet computer, a wearable electronic device, etc., and no specific details will be given here. limited. The following will...

no. 2 example

[0058] see Figure 4 , Figure 4 A schematic flowchart of the rights management method provided by the second embodiment of the present application is shown. The following will target Figure 4 The flow shown is described in detail, and the method may specifically include the following steps:

[0059] Step S210: Obtain the corresponding relationship between all permissions and permission levels in the management permissions to be activated when obtaining the activation operation of the management permissions of the application program by the user.

[0060] In the embodiment of the present invention, after obtaining the user's activation operation of the management authority of the application program, the management authority to be activated of the application program can be obtained first, that is, the management authority that needs to be activated, and then the management authority to be activated can be obtained. The corresponding relationship between all permissions an...

no. 3 example

[0083] see Figure 5 , Figure 5 A block diagram of modules of the rights management apparatus 200 provided by the third embodiment of the present application is shown. The following will target Figure 5 The block diagram shown is for illustration, the authority management device 200 includes: an authority level acquisition module 210 , an authority level judgment module 220 , a user verification module 230 , a verification information receiving module 240 , a verification information judging module 250 and an execution module 260 . Wherein, the authority level acquisition module is used to obtain the authority levels of all the authority levels in the management authority to be activated when the user's activation operation of the application program management authority is obtained after the function of management authority is activated; the authority level The judging module is used to judge whether there is a permission level higher than the preset level among all the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a permission management method, device, mobile terminal and storage medium. The method includes: obtaining the permission levels of all permissions in the management permissions to be activated when obtaining the activation operation of the management permissions of the application program by the user ; Judging whether there is an authority whose authority level is greater than the preset level among all the authorities; if there is an authority greater than the preset level, verify the user information; receive the user verification information input by the user; determine the user verification information and the preset verification information Whether it matches, if it matches the preset verification information, activate the to-be-activated management authority, and if it does not match the preset verification information, reject the activation operation. This method can prevent the user from activating the management authority of the application program by mistake, and can improve the stability of the system of the mobile terminal.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, and more specifically, to a rights management method, device, mobile terminal and storage medium. Background technique [0002] Mobile terminals, such as mobile phones, have become one of the most commonly used consumer electronic products in people's daily life. When users use mobile phones, they often install various third-party applications, and these third-party applications often activate the device manager function or auxiliary functions of mobile terminals in various ways to obtain device management rights, which is not conducive to user operations Experience security with mobile terminals. Contents of the invention [0003] In view of the above problems, the present invention proposes a rights management method, device, mobile terminal and storage medium, so as to prevent users from activating the management rights of application programs by mistake and improve the sta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/72463H04M1/72448G06F21/31
CPCG06F21/31G06F2221/2149H04M1/72448H04M1/72463
Inventor 林志泳
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products