Permission control method, device and equipment and storage medium

A technology of authority control and authority, which is applied in the computer field, can solve problems such as poor security, violation of user privacy, and large limitation of authority control, and achieve the effects of high security, enhanced protection, and effective authority control norms

Pending Publication Date: 2020-12-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on this permission control method, it is easy to perform operations that violate user privacy as soon as the application is started. The limitation of permission control is relatively large, the standardization and effectiveness of permission control are poor, and the security is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission control method, device and equipment and storage medium
  • Permission control method, device and equipment and storage medium
  • Permission control method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0055] It should be noted that the terms "first" and "second" in the specification and claims of the present application are used to distinguish similar objects, but not necessarily used to describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a permission control method, device and equipment and a storage medium. The method comprises the steps of determining a processing state of protocol information corresponding to an application based on a starting instruction of the application; in response to the fact that the processing state of the protocol information is that the protocol information is not confirmed, displaying the protocol information; displaying permission description information corresponding to the application program based on a confirmation instruction of the protocol information; based on a confirmation instruction of the permission description information, obtaining an authorization result of at least one necessary permission in a polling mode; and in response to the fact that the authorization result of the at least one necessary permission is authorization, skipping to a starting main page corresponding to the application program. Based on the mode, permission control is carried outbefore the application program is successfully started, the phenomenon that operation invading user privacy is executed once the application program is started can be avoided, permission control is more standard and effective, the protection degree of the user privacy can be improved, and safety is high.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular, to a permission control method, device, device, and storage medium. Background technique [0002] With the development of computer technology, there are more and more types of application programs. Usually, when some permissions of the application program are not authorized by the user, the terminal cannot perform operations that need to rely on the resources corresponding to these permissions, so as to achieve the effect of protecting user privacy based on permission control. [0003] In related technologies, after the application program is successfully started, it is determined whether the operation to be executed corresponding to the application program needs to rely on resources corresponding to a certain authority, and when it is determined that the operation to be performed corresponding to the application program needs to rely on resources ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44
CPCG06F21/44
Inventor 郑晓旭李飞宏
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products