Application program access limiting method and device, equipment and medium

An access restriction and application technology, applied in the information field, can solve information security problems, user troubles and other problems, and achieve the effect of improving pertinence, solving information security problems, and reducing security risks and potential threats.

Pending Publication Date: 2021-02-19
PING AN TRUST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an application program access restriction method, device, device, and medium to solve the information security problems caused by external application programs to enterprises and the troubles to users during working hours

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program access limiting method and device, equipment and medium
  • Application program access limiting method and device, equipment and medium
  • Application program access limiting method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] The method for restricting access to applications provided in this embodiment is applied to mobile terminals, and the mobile terminals include but are not limited to smart phones, tablet computers, smart watches, and the like. The access restriction method of the application program provided by this embodiment will be described in detail below, such as figure 1 As shown, the access restriction methods of the application include:

[0048] In ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application program access limiting method, and the method comprises the following steps: acquiring position information of a mobile terminal according to a preset time interval in a preset on-duty time period, and outputting a sign-in interface if the position information is in a preset address range; obtaining an on-duty check-in message through the check-in interface,and outputting an application program management authority request according to the on-duty check-in message; if an authorization instruction for the application program management permission requestis obtained, setting successful attendance check-in, starting a permission management page, and performing permission management on an external application program on a preset list; and if a refusalinstruction for the application program management authority request is obtained, setting that attendance check-in fails. According to the invention, the information security problem of an external application program to an enterprise and the puzzle problem to a user in an on-duty time period are solved.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to an application program access restriction method, device, equipment and medium. Background technique [0002] The current new era of industry 4.0 is the era of using information technology to promote industrial transformation, that is, the era of intelligence. The financial industry is undergoing digital business transformation. chain, etc.) to transform and upgrade the original business model. With the in-depth utilization of the new generation of information technology, the accompanying information security risks will become more prominent. [0003] Existing mobile terminals integrate multiple functions such as communication, games, learning, and entertainment. Everyone's life is basically inseparable from mobile phones. For enterprises, the application programs provided on mobile phones also provide great convenience for office work. However, external applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06Q10/10
CPCG06F21/51G06Q10/1091
Inventor 龙健李江波叶兵
Owner PING AN TRUST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products