Permission setting method and terminal equipment
A technology of terminal equipment and permissions, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as leakage of user privacy data, and achieve the effect of improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0021] refer to figure 1 , shows a flow chart of the steps of a permission setting method according to Embodiment 1 of the present invention.
[0022] The permission setting method provided by the embodiment of the present invention includes the following steps:
[0023] Step 101: When starting the target application program for the first time, display at least one permission information of the target application program.
[0024] After the target application program is installed, when the target application program is opened for the first time, various permissions need to be authorized to the target application program, and at least one permission information of the target application program is displayed when the target application program is opened.
[0025] For example: the permission information of the target application includes: access to address book, access to camera, access to geographic location, etc.
[0026] Step 102: For each permission information, display pro...
Embodiment 2
[0035] refer to figure 2 , shows a flow chart of the steps of a permission setting method according to Embodiment 2 of the present invention.
[0036] The permission setting method provided by the embodiment of the present invention includes the following steps:
[0037] Step 201: When starting the target application program for the first time, display at least one permission information of the target application program.
[0038] After the target application program is installed, when the target application program is opened for the first time, various permission information needs to be authorized to the target application program, and at least one permission information of the target application program is displayed when the target application program is opened.
[0039] For example: the permission information of the target application includes: access to address book, access to camera, access to geographic location, etc.
[0040] Permission information may include first ...
Embodiment 3
[0065] refer to Figure 6 , shows a structural block diagram of a terminal device according to Embodiment 3 of the present invention.
[0066] The terminal device provided by the embodiment of the present invention includes: a first display module 301, configured to display at least one permission information of the target application when the target application is started for the first time; a second display module 302, configured to A permission information, displaying prompt information corresponding to the permission information; a setting module 303, configured to set the permission information of the target application program when receiving the first input of the prompt information.
[0067] In the embodiment of the present invention, when the target application is started for the first time, at least one permission information of the target application is displayed; for each permission information, the prompt information corresponding to the permission information is d...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com