Application program permission processing method and device, storage medium and electronic equipment

A technology of application programs and processing methods, applied in the direction of electrical digital data processing, computer security devices, instruments, etc., can solve problems such as poor user experience and abnormal functions

Active Publication Date: 2020-05-29
NEUSOFT CORP
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at this time, if the authority is not judged, and the top page of the application stac

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program permission processing method and device, storage medium and electronic equipment
  • Application program permission processing method and device, storage medium and electronic equipment
  • Application program permission processing method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0053] figure 1 It is a flowchart of a method for processing application permissions according to an exemplary embodiment. The method can be applied to terminals capable of installing and running applications, such as mobile phones, tablet computers, electronic watches, PCs, notebook computers, Smart bracelets and more. Such as figure 1 As shown, the method may include the following steps.

[0054]In S101, before the page of the application program is recycled, the current permission information of the application program is stored, and the current permission information is used as the first permission information.

[0055] In the present disclosure, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an application program permission processing method and device, a storage medium and electronic equipment. The method comprises the steps that before a page of the applicationprogram is recycled, current permission information of the application program is stored, and the current permission information serves as first permission information; after the page of the application program is recycled, if the application program is opened, current permission information of the application program is obtained, and the current permission information serves as second permissioninformation; and the application program is restarted if it is determined that the target permission changed from the authorization state to the rejection state exists according to the first permission information and the second permission information and the target permission is the necessary permission of the application program. According to the method, the application program is restarted toapply for authorization of the target permission to the user, and the operation of recovering the stack top page is not directly carried out, so that the abnormal function of the application program is avoided, and the user experience is improved.

Description

technical field [0001] The present disclosure relates to the technical field of terminal applications, and in particular, to a method, device, storage medium, and electronic device for processing permissions of application programs. Background technique [0002] The Android system divides permissions into two levels, one is common permissions, which will not hide problems that endanger user privacy and security, such as access to network permissions, access to WIFI, etc. One category is dangerous permissions, which will threaten the user's security and privacy issues, such as access to photo albums, text messages, geographic location and other permissions. [0003] For security reasons, the Android system restricts system functions. Specifically, starting from Android 6.0, the Android system has introduced a permission application mechanism, that is, applications need to dynamically apply for relevant dangerous permissions before using certain functions. In general, if an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51
CPCG06F21/51
Inventor 王萌李健王伟光
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products