Access permission management method and terminal equipment

An access authority management and authority technology, which is applied in the generation of response errors, electrical digital data processing, instruments, etc., and can solve the problem that the user version system cannot locate the abnormal cause.

Pending Publication Date: 2021-12-17
QINGDAO HISENSE MOBILE COMM TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This application discloses a management method of access rights and terminal equipment, which are used to solve the problem that the cause of abnormality cannot be located in the user version system in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access permission management method and terminal equipment
  • Access permission management method and terminal equipment
  • Access permission management method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0043] Among them, in the description of the embodiments of this application, unless otherwise specified, " / " means or means, for example, A / B can mean A or B; "and / or" in the text is only a description of associated objects The association relationship indicates that there may be three kinds of relationships, for example, A and / or B, which may indicate: A exists alone, A and B exist at the same time, and B exists alone. In addition, in the description of the embodiment of the present application , "plurality" means two or more than two.

[0044] Hereinafter, the terms "first" and "second" are used for descriptive purposes only, and cannot be understood as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access permission management method and terminal equipment, and solves the problem that a user version system cannot locate an abnormal reason in the prior art. According to the method, the policy file required by the process privilege extraction is preset into the terminal in advance, after the process is abnormal, the equipment and the terminal are controlled to perform authentication operation by utilizing the cooperation of the public key and the private key, and whether the permission elevation process is triggered or not is judged according to the authentication result. According to the method for temporarily elevating the process permission, the operation of taking in a special mirror image or restarting the terminal is avoided, the user data cannot be erased or the user privacy cannot be leaked in the permission elevating process, the state before the permission elevating operation can be recovered after the user restarts the terminal, a developer can also debug the terminal of the user version on site and quickly position the progress problem, and the problem does not need to be reproduced and analyzed again.

Description

technical field [0001] The present application relates to the technical field of terminals, in particular to a method for managing access rights and a terminal device. Background technique [0002] The user version system is running in the terminal. Due to the limitation of the system permissions, when the terminal process is abnormal, it cannot be debugged and / or analyzed and located. Many process abnormalities have a low probability of recurrence and take a long time, which will increase the company’s testing costs . Taking the mobile phone as an example, the existing technology needs to modify the mobile phone image when using the privilege escalation method to deal with the abnormal process of the terminal. However, modifying the mobile phone image will force the user data to be erased and the mobile phone will be restarted, which will easily lead to the destruction of the problem site and the loss of user information. Contents of the invention [0003] The present ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/31G06F11/07
CPCG06F21/445G06F21/31G06F11/079
Inventor 王旭光王晓林黄虎
Owner QINGDAO HISENSE MOBILE COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products