Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permission setting method and terminal equipment

A technology of terminal equipment and permissions, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as leakage of user privacy data, and achieve the effect of improving user experience

Inactive Publication Date: 2020-05-08
VIVO MOBILE COMM CO LTD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a permission setting method and a terminal device to solve the problem in the prior art that authorization of application program permission information causes leakage of user privacy data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permission setting method and terminal equipment
  • Permission setting method and terminal equipment
  • Permission setting method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] refer to figure 1 , shows a flow chart of the steps of a permission setting method according to Embodiment 1 of the present invention.

[0022] The permission setting method provided by the embodiment of the present invention includes the following steps:

[0023] Step 101: When starting the target application program for the first time, display at least one permission information of the target application program.

[0024] After the target application program is installed, when the target application program is opened for the first time, various permissions need to be authorized to the target application program, and at least one permission information of the target application program is displayed when the target application program is opened.

[0025] For example: the permission information of the target application includes: access to address book, access to camera, access to geographic location, etc.

[0026] Step 102: For each permission information, display pro...

Embodiment 2

[0035] refer to figure 2 , shows a flow chart of the steps of a permission setting method according to Embodiment 2 of the present invention.

[0036] The permission setting method provided by the embodiment of the present invention includes the following steps:

[0037] Step 201: When starting the target application program for the first time, display at least one permission information of the target application program.

[0038] After the target application program is installed, when the target application program is opened for the first time, various permission information needs to be authorized to the target application program, and at least one permission information of the target application program is displayed when the target application program is opened.

[0039] For example: the permission information of the target application includes: access to address book, access to camera, access to geographic location, etc.

[0040] Permission information may include first ...

Embodiment 3

[0065] refer to Figure 6 , shows a structural block diagram of a terminal device according to Embodiment 3 of the present invention.

[0066] The terminal device provided by the embodiment of the present invention includes: a first display module 301, configured to display at least one permission information of the target application when the target application is started for the first time; a second display module 302, configured to A permission information, displaying prompt information corresponding to the permission information; a setting module 303, configured to set the permission information of the target application program when receiving the first input of the prompt information.

[0067] In the embodiment of the present invention, when the target application is started for the first time, at least one permission information of the target application is displayed; for each permission information, the prompt information corresponding to the permission information is d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a permission setting method and terminal equipment, and the method comprises the steps: displaying at least one piece of permission information of a target application program when the target application program is started for the first time; for each piece of permission information, displaying prompt information corresponding to the permission information;when a first input of prompt information is received, setting permission information of the target application program. The permission information of the target application program can be set by a user through the prompt information of different permission information, and meanwhile, due to the fact that the prompt information of different permission information is different, unnecessary permission information is prevented from being authorized, so that private data of the user is protected from being leaked, and the use experience of the user is improved.

Description

technical field [0001] The present invention relates to the technical field of terminal equipment, in particular to a permission setting method and terminal equipment. Background technique [0002] At present, with the development of science and technology, terminal equipment has become an indispensable tool in people's daily life. Various applications are also installed in the terminal equipment, and each application requires the user to manually authorize some permission information in the process of using it. run. [0003] However, some permission information to be authorized by some applications has nothing to do with the core functions of the application. When permission information irrelevant to application functions is authorized, it will cause leakage of user privacy data. Contents of the invention [0004] Embodiments of the present invention provide a permission setting method and a terminal device to solve the problem in the prior art that user privacy data is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/62
CPCG06F21/45G06F21/6245
Inventor 肖日新
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products