Authority management method and device, electronic equipment and storage medium

An authority management and authority technology, which is applied in the fields of electronic equipment and storage media, devices, and authority management methods, can solve the problems of single terminal authority monitoring standard and low user privacy security, and achieves a simple and direct way of monitoring codes and improves security. Performance, easy-to-achieve effects

Pending Publication Date: 2021-10-15
MEIZU TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to solve the technical problem that the existing terminal authority monitoring standard is single, resulting in low user privacy and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority management method and device, electronic equipment and storage medium
  • Authority management method and device, electronic equipment and storage medium
  • Authority management method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] An embodiment of the present invention provides a permission management method. When the method detects that a third-party application is scheduled on the terminal, it judges whether the scheduling behavior of the third-party application is a sensitive behavior, and if so, generates a permission scheduling notification according to the sensitive behavior. And prompt on the screen status bar, based on this method to detect whether the scheduling of some permissions of the terminal by the application on the terminal during the running process is illegal scheduling, compared with the existing technology, the compatibility and versatility of this method Relatively high, there is no need to set monitoring rules for permissions, and it can be applied to the monitoring of permission calls for various applications, avoiding the security risks of single-rule monitoring.

[0073] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authority management method and device, electronic equipment and a storage medium, and the method comprises the steps of judging whether an application calling operation is scheduling of a third-party application, if yes, detecting whether the third-party application has a sensitive behavior in a running process on a terminal, and if yes, generating an authority scheduling notification according to the sensitive behavior, prompting the user that the operation of the third-party application has the scheduling occurrence of the sensitive permission on the screen status bar. In this way, the user only needs to be notified that the sensitive behavior occurs, the permission operation does not need to be carried out through a pop-up window, and compared with the prior art, the method is easier to implement and can be suitable for permission calling monitoring of various applications, and potential safety hazards existing in monitoring of a single rule are avoided.

Description

technical field [0001] The present invention relates to the technical field of terminal control, in particular to a rights management method, device, electronic equipment and storage medium. Background technique [0002] With the development of science and technology, mobile terminals have become a must-have for users, and users will install various applications in the mobile terminal. These applications need to obtain some permissions of the terminal to run in the terminal. Realize the normal use of applications, such as address book, camera, microphone, etc., but the opening of these permissions may cause leakage of user privacy. If the user opens without understanding the danger of the permission, it may bring security to the user Hidden danger. [0003] In order to solve the above problems, the current terminal system has set up a certain monitoring mechanism for the control of permissions. For example, when the application is started for the first time, the user will b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F21/45
CPCG06F21/45G06F21/52
Inventor 黄健峰谢认众黄超华彭邦博曾渤章黎子豪徐继雄邱逢生陈馨然
Owner MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products