Check patentability & draft patents in minutes with Patsnap Eureka AI!

Application permission determination method, device and system

A technology for applying permissions and determining methods, which is applied in the Internet field and can solve problems such as increasing the risk of user information leakage

Pending Publication Date: 2020-08-18
BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present disclosure provides a method, device, and system for determining application permissions, so as to at least solve the increased risk of user information leakage caused by obtaining all permissions of third-party applications when the user obtains the authorization of the third-party application through the current application in the related art The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application permission determination method, device and system
  • Application permission determination method, device and system
  • Application permission determination method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] In order to make those skilled in the art better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.

[0080] It should be noted that the terms "first", "second" and the like in the description and claims of the present disclosure and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used may be interchanged under appropriate circumstances such that the embodiments of the disclosure described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this disclosure. Rather, they are merely examples of apparatus and methods ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an application permission determination method, device and system, and the method comprises steps of when it is detected that a target user account triggers the first application to call a target application service of a second application, determining a current application scene of the first application; and determining a target application permission corresponding to thetarget application service according to the current application scene of the first application, so that the first application calls the target application service based on the target application permission.

Description

technical field [0001] The present disclosure relates to the field of Internet technologies, and in particular, to a method, device and system for determining application rights. Background technique [0002] In the related art, after logging in an application on a terminal, a user can obtain authorization from a third-party application through the application, and obtain application services provided by the third-party application according to the authorization. For example, after logging in to application A, the user can obtain authorization from application B associated with application A through application A, such as login authorization, etc., and then the user can directly obtain application services provided by application B through application A according to the authorization, Such as login service. [0003] However, in the related art, when a user obtains permissions of a third-party application through an application, he usually obtains all permissions of the thir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/629G06F2221/2141G06F21/31G06F21/44
Inventor 谭兵郭达王宏志李新
Owner BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More