Rights management method, device, mobile terminal and storage medium
A permission management and permission technology, applied in electrical digital data processing, instruments, digital data authentication, etc., can solve problems such as unfavorable operation experience, mobile terminal security, etc., and achieve the effect of improving system security and stability and preventing unreasonable use.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0023] see figure 1 , figure 1 A schematic flowchart of the rights management method provided in the first embodiment of the present application is shown. The authority management method is used to verify user information when the user sets the management authority, and only display the setting page of the management authority when the verification is passed, thereby improving the system security and stability of the mobile terminal. In a specific embodiment, the rights management method is applied as Figure 5 The rights management device 200 shown and the mobile terminal configured with the rights management device 200 ( Figure 6 ). The following will take the mobile terminal as an example to illustrate the specific process of this embodiment. Of course, it can be understood that the mobile terminal used in this embodiment can be a smart phone, a tablet computer, a wearable electronic device, etc., and no specific details will be given here. limited. The following will...
no. 2 example
[0058] see Figure 4 , Figure 4 A schematic flowchart of the rights management method provided by the second embodiment of the present application is shown. The following will target Figure 4 The flow shown is described in detail, and the method may specifically include the following steps:
[0059] Step S210: Obtain the corresponding relationship between all permissions and permission levels in the management permissions to be activated when obtaining the activation operation of the management permissions of the application program by the user.
[0060] In the embodiment of the present invention, after obtaining the user's activation operation of the management authority of the application program, the management authority to be activated of the application program can be obtained first, that is, the management authority that needs to be activated, and then the management authority to be activated can be obtained. The corresponding relationship between all permissions an...
no. 3 example
[0083] see Figure 5 , Figure 5 A block diagram of modules of the rights management apparatus 200 provided by the third embodiment of the present application is shown. The following will target Figure 5 The block diagram shown is for illustration, the authority management device 200 includes: an authority level acquisition module 210 , an authority level judgment module 220 , a user verification module 230 , a verification information receiving module 240 , a verification information judging module 250 and an execution module 260 . Wherein, the authority level acquisition module is used to obtain the authority levels of all the authority levels in the management authority to be activated when the user's activation operation of the application program management authority is obtained after the function of management authority is activated; the authority level The judging module is used to judge whether there is a permission level higher than the preset level among all the p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com