Authority management method and device, mobile terminal and storage medium
A technology of authority management and authority, applied in computer security devices, electrical digital data processing, telephone communication, etc., can solve problems such as unfavorable operation experience and mobile terminal security, and achieve the effect of improving system performance and stability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0022] see figure 1 , figure 1 A schematic flowchart of the rights management method provided in the first embodiment of the present application is shown. The authority management method is used to add prompt information according to the authority level, prevent malicious programs from directly using device management authority, and improve system performance and stability. In a specific embodiment, the rights management method is applied as Figure 5 The rights management device 200 shown and the mobile terminal configured with the rights management device 200 ( Figure 7 ). The following will take the mobile terminal as an example to illustrate the specific process of this embodiment. Of course, it can be understood that the mobile terminal used in this embodiment can be a smart phone, a tablet computer, a wearable electronic device, etc., and no specific details will be given here. limited. The following will target figure 1 The flow shown is described in detail, and ...
no. 2 example
[0038] see image 3 , image 3 A schematic flowchart of the rights management method provided by the second embodiment of the present application is shown. The following will target image 3 The flow shown is described in detail, and the method may specifically include the following steps:
[0039] Step S210: After the device management permission of the application is activated, monitor the acquisition request of the device management permission.
[0040] Step S220: When the acquisition request for the target authority is detected, look up a mapping relationship table including the target authority and the authority level.
[0041] In this embodiment, the mobile terminal presets and stores a mapping relationship table, wherein the mapping relationship table is a correspondence table between permissions and permission levels in device management permissions. It can be understood that the mapping relationship The table includes the target authority and the authority level c...
no. 3 example
[0056] see Figure 5 , Figure 5 A block diagram of modules of the rights management apparatus 200 provided by the third embodiment of the present application is shown. The following will target Figure 5 The block diagram shown is for illustration, the authority management device 200 includes: a monitoring and starting module 210, an authority level judgment module 220, a prompt information display module 230 and an authority operation running module 240, wherein:
[0057] The monitoring and starting module 210 is configured to monitor the acquisition request of the device management right after the device management right of the application is activated.
[0058] The authority level judging module 220 is configured to obtain the authority level of the target authority when monitoring the acquisition request for the target authority, and determine whether the authority level is higher than a preset level, wherein the target authority is the device Permissions in Administra...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com