Nothing Special   »   [go: up one dir, main page]

CN109343900B - Permission configuration method and terminal - Google Patents

Permission configuration method and terminal Download PDF

Info

Publication number
CN109343900B
CN109343900B CN201811002976.7A CN201811002976A CN109343900B CN 109343900 B CN109343900 B CN 109343900B CN 201811002976 A CN201811002976 A CN 201811002976A CN 109343900 B CN109343900 B CN 109343900B
Authority
CN
China
Prior art keywords
application
terminal
authority
configuration information
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811002976.7A
Other languages
Chinese (zh)
Other versions
CN109343900A (en
Inventor
许胜华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811002976.7A priority Critical patent/CN109343900B/en
Publication of CN109343900A publication Critical patent/CN109343900A/en
Application granted granted Critical
Publication of CN109343900B publication Critical patent/CN109343900B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a permission configuration method and a terminal, relates to the technical field of communication, and aims to solve the problem that the convenience of a user for using the terminal is poor due to the fact that the user needs to repeatedly set permissions of applications in different forms of the same product in the existing terminal. The permission configuration method comprises the following steps: acquiring authority configuration information of a first application in a terminal; and configuring the authority of a second application according to the authority configuration information of the first application, wherein the first application and the second application are application programs with different forms, and the function of the first application and the function of the second application have relevance. The method can be applied to the scene of configuring the authority for the application in the terminal.

Description

Permission configuration method and terminal
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a permission configuration method and a terminal.
Background
For an application program (hereinafter, referred to as an application) of the same product, there may be two forms, namely a native application and a fast application. The native application can be downloaded and installed on the terminal and then used by a user; and the fast application can be used in a point-to-point mode without downloading and installation.
Currently, when an application relates to private information of a user, a terminal prompts the user to set the authority of the application. For example, functions such as positioning, storage, and a microphone in an electronic map may relate to privacy information of a user, and when a terminal completes a native application of the electronic map or runs a fast application of the electronic map for the first time, the terminal prompts the user to set the authority of the functions, so that the user can set the authority of the functions to be allowed or prohibited.
However, after the terminal completes the native application of a product, the terminal prompts the user to set the permission of the native application, and when the terminal runs the fast application of the product for the first time, the terminal also prompts the user to set the permission, so that the user needs to repeatedly set the permissions of the applications of different forms of the same product, and the convenience of the user in using the terminal is poor.
Disclosure of Invention
The embodiment of the invention provides a permission configuration method and a terminal, and aims to solve the problem that the convenience of a user for using the terminal is poor due to the fact that the user needs to repeatedly set permissions of applications in different forms of the same product in the existing terminal.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an authority configuration method, which is applied to a terminal, and the method includes: acquiring authority configuration information of a first application in a terminal; and configuring the authority of a second application according to the authority configuration information of the first application, wherein the first application and the second application are application programs with different forms, and the function of the first application and the function of the second application have relevance.
In a second aspect, an embodiment of the present invention provides a terminal, where the terminal includes an obtaining module and a configuring module. The acquisition module is used for acquiring authority configuration information of a first application in the terminal; the configuration module is used for configuring the authority of the second application according to the authority configuration information of the first application acquired by the acquisition module, the first application and the second application are application programs with different forms, and the function of the first application and the function of the second application have relevance.
In a third aspect, an embodiment of the present invention provides a terminal, where the terminal includes a processor, a memory, and a computer program stored in the memory and being executable on the processor, and when the computer program is executed by the processor, the steps of the permission configuration method in the first aspect are implemented.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the steps of the permission configuration method in the first aspect.
In the embodiment of the present invention, the permission configuration information of a first application in a terminal may be acquired, and the permission of a second application may be configured according to the permission configuration information of the first application, where the second application and the first application are application programs of different forms, and a function of the second application has a correlation with a function of the first application. According to the scheme, for the first application and the second application with the same function and different forms, the user can directly configure the permission of the second application according to the configured permission configuration information of the first application, so that the user is not required to repeatedly set the permissions of the applications with the same function and different forms (namely the applications with different forms of the same product), and the convenience of the user in using the terminal is improved.
Drawings
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a rights configuration method according to an embodiment of the present invention;
fig. 3 is a second schematic diagram of a privilege configuration method according to an embodiment of the present invention;
fig. 4 is a third schematic diagram of a permission configuration method according to an embodiment of the present invention;
fig. 5 is one of schematic interfaces of an application of the permission configuration method according to the embodiment of the present invention;
fig. 6 is a second schematic interface diagram of an application of the permission configuration method according to the embodiment of the present invention;
fig. 7 is a third schematic interface diagram of an application of the permission configuration method according to the embodiment of the present invention;
FIG. 8 is a fourth schematic diagram illustrating a privilege configuration method according to an embodiment of the present invention;
FIG. 9 is a fourth schematic interface diagram of an application of the privilege configuration method according to the embodiment of the present invention;
fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 11 is a second schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 12 is a hardware schematic diagram of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The term "and/or" herein is an association relationship describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The symbol "/" herein denotes a relationship in which the associated object is or, for example, a/B denotes a or B.
The terms "first" and "second," and the like, in the description and in the claims of the present invention are used for distinguishing between different objects and not for describing a particular order of the objects. For example, the first application and the second application, etc. are used to distinguish different applications, rather than to describe a particular order of applications.
In the embodiments of the present invention, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the description of the embodiments of the present invention, unless otherwise specified, "a plurality" means two or more, for example, a plurality of display screens means two or more display screens, and the like.
The following first explains some of the nouns or terms referred to in the claims and the specification of the present invention.
Native application: also referred to as legacy applications, may run on the terminal's operating system after being downloaded and installed on the terminal. After the native application is installed on the terminal, the terminal can prompt the user to set the authority of the native application, and after the user triggers the setting of the authority of the native application, the terminal can store the authority configuration information of the native application.
Quick application: is an application in another form (e.g., the native application may be. apk file, and the fast application may be. rpk file) having the same function as the native application, and is ready-to-use without installation. When the fast application runs on the terminal for the first time, the terminal can prompt a user to set the authority of the fast application, and after the user triggers the setting of the authority of the fast application, the terminal can store the authority configuration information of the fast application.
Because after the native application of a product (for example, an electronic map) is installed at the terminal, the terminal can prompt the user to set the authority of the native application, and when the terminal runs the fast application of the product for the first time, the terminal can prompt the user to set the authority, so that the user needs to repeatedly set the authorities of the applications of different forms of the same product, and the convenience of the user for using the terminal is poor.
In view of this, an embodiment of the present invention provides a permission configuration method and a terminal, which may acquire permission configuration information of a first application in the terminal, and configure permission of a second application according to the permission configuration information of the first application, where the second application and the first application are application programs of different forms, and functions of the second application and functions of the first application have relevance. According to the scheme, for the first application and the second application with the same function and different forms, the user can directly configure the permission of the second application according to the configured permission configuration information of the first application, so that the user is not required to repeatedly set the permissions of the applications with the same function and different forms (namely the applications with different forms of the same product), and the convenience of the user in using the terminal is improved.
The terminal in the embodiment of the present invention may be a terminal having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
The following describes a software environment to which the permission configuration method provided by the embodiment of the present invention is applied, by taking an android operating system as an example.
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are respectively: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the permission configuration method provided in the embodiment of the present invention based on the system architecture of the android operating system shown in fig. 1, so that the permission configuration method may operate based on the android operating system shown in fig. 1. Namely, the processor or the terminal can implement the permission configuration method provided by the embodiment of the invention by running the software program in the android operating system.
The terminal in the embodiment of the invention can be a mobile terminal or a non-mobile terminal. For example, the mobile terminal may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted terminal, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile terminal may be a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiment of the present invention is not particularly limited.
The execution main body of the authority configuration method provided by the embodiment of the present invention may be the terminal, or may also be a functional module and/or a functional entity capable of implementing the authority configuration method in the terminal, which may be specifically determined according to actual use requirements, and the embodiment of the present invention is not limited. The following takes a terminal as an example to exemplarily explain the authority configuration method provided by the embodiment of the present invention.
As shown in fig. 2, an embodiment of the present invention provides a rights configuration method, which may include S200 and S201 described below.
S200, the terminal acquires authority configuration information of the first application in the terminal.
S201, the terminal configures the authority of the second application according to the authority configuration information of the first application.
The first application and the second application are application programs with different forms, and the functions of the first application and the functions of the second application have relevance.
In the embodiment of the present invention, if a user needs to configure the authority of a second application in a terminal, the terminal may be triggered to acquire authority configuration information of a first application (for example, the first application is an application installed or already running in the terminal) associated with the second application in the terminal, and then the terminal may configure the authority of the second application according to the authority configuration information of the first application.
Optionally, in this embodiment of the present invention, the authority configuration information may include at least one authority item, and each authority item may include authority content and configuration information corresponding to the authority content.
For example, in the embodiment of the present invention, the authority content of the first application may include the authority of the first application, such as self-starting, making a call, accessing an address list, sending a short message, and positioning a mobile phone, and may be specifically determined according to an actual use requirement, which is not limited in the embodiment of the present invention.
Illustratively, in the embodiment of the present invention, the configuration information corresponding to the rights content may be authorized (i.e. the rights content is allowed), prohibited (i.e. the rights content is rejected), or unknown (i.e. the rights content is not allowed or rejected).
Optionally, in the embodiment of the present invention, the rights content and the configuration information corresponding to the rights content may be stored in the terminal in a form of a rights list.
According to the permission configuration method provided by the embodiment of the invention, aiming at the first application and the second application with the same function and different forms, as the user can directly configure the permission of the second application according to the configured permission configuration information of the first application, the user is not required to repeatedly set the permission of the application with the same function and different forms (namely the application with different forms of the same product), and the convenience of the user for using the terminal is improved.
Optionally, with reference to fig. 2, as shown in fig. 3, before the above S200, the method for configuring a right according to the embodiment of the present invention may further include the following S202 and S203. Accordingly, the above S200 may be specifically realized by S200a and S200b described below.
S202, the terminal determines that the second application meets the first condition.
S203, under the condition that the second application meets the first condition, the terminal acquires the first identifier from the configuration file of the second application.
The first identifier may be used to indicate a first application.
S200a, the terminal judges whether the first application indicated by the first identification meets the second condition.
Optionally, in the embodiment of the present invention, the first identifier may be a package name of the first application, and may also be another identifier of the first application, which may be specifically determined according to an actual use requirement, and the embodiment of the present invention is not limited. For convenience of explanation and understanding, the following embodiments are all exemplified by the package name of the first application as the first identifier.
Optionally, in the embodiment of the present invention, the first application may be a native application, and the second application may be a fast application. Alternatively, the first application may be a fast application and the second application may be a native application.
For example, in an embodiment of the present invention, the configuration file of the native application may include some application description of the native application. For example, the configuration file of the native application may include basic application information such as a package name, an application name, a version number, and an application icon of the native application. The extensible field of the configuration file of the native application (represented by, for example, a quick package) may include the package name of the fast application corresponding to the native application. The package name of the fast application is different from the package name of the native application corresponding to the fast application. And, in case that the terminal completes the native application installation, the terminal saves the basic application information of the native application. For example, the terminal may save basic application information of the native application in a native package list.
For example, in the embodiment of the present invention, the configuration file of the fast application may include some application descriptions of the fast application. For example, the configuration file of the fast application may include basic application information such as a package name, an application name, a version number, and an application icon of the fast application. The extensible field of the configuration file of the fast application (for example, the field is represented by a native package) may include a package name of a native application corresponding to the fast application. The package name of the fast application is different from the package name of the native application corresponding to the fast application. And when the fast application runs on the terminal for the first time, the terminal stores the basic application information of the fast application. For example, the terminal may store basic application information of the fast application in the quick package list.
Optionally, in this embodiment of the present invention, when the first application is a native application and the second application is a fast application, the first condition may be that the terminal runs the second application for the first time, and the second condition may be that the terminal has installed the first application before running the second application for the first time. When the first application is a fast application and the second application is a native application, the first condition may be that the terminal completes installation of the second application, and the second condition may be that the terminal has run the first application before completing installation of the second application.
The following describes, as an example, two embodiments (i.e., a first embodiment and a second embodiment described below) of a specific implementation manner of S202 to S200a described above when the second application is a fast application and the first application is a native application, or when the second application is a native application and the first application is a fast application.
First embodiment
In the first embodiment, when the first application is a native application and the second application is a fast application, the above-mentioned S202 to S200a can be specifically implemented in the following manner. That is, in a case where the terminal determines that the fast application is first run on the terminal (i.e., the second application satisfies the first condition), the terminal may obtain the first identifier (which is used to indicate the native application corresponding to the fast application) from the configuration file of the fast application, and determine whether the native application indicated by the first identifier is installed in the terminal before the terminal first runs the fast application (i.e., whether the first application satisfies the second condition).
When the terminal detects that the fast application is triggered to run on the terminal, the terminal firstly judges whether the fast application is run for the first time. For example, for a fast application that has already run on the terminal, the terminal stores basic application information of the fast application in a quick package list. When the terminal detects that the fast application is triggered to run on the terminal, the terminal firstly analyzes the configuration file of the fast application to obtain the package name of the fast application, and then whether the terminal runs the fast application is judged by determining whether the package name of the fast application is included in the package list in the terminal. If the quick package list includes the package name of the quick application, the terminal can judge that the terminal has already run the quick application, that is, the terminal can determine that the quick application does not run on the terminal for the first time; if the quick package list does not include the packet name of the quick application, the terminal may determine that the terminal has not run the quick application, that is, the terminal may determine that the quick application runs on the terminal for the first time.
Specifically, when the terminal determines that the fast application is running on the terminal for the first time (that is, the second application satisfies the first condition), the terminal may parse the configuration file of the fast application, obtain a package name of the native application corresponding to the fast application in the native package extension field of the configuration file, and then determine whether the native application is installed before the fast application is running for the first time by determining whether the package name of the native application corresponding to the fast application is included in the native package list in the terminal. If the terminal determines that the native package list in the terminal includes the package name of the native application corresponding to the fast application (that is, the first application meets the second condition), the terminal may determine that the native application is installed before the terminal runs the fast application for the first time; if the terminal determines that the package name of the native application corresponding to the fast application is not included in the native package list in the terminal, the terminal can judge that the native application is not installed before the fast application is run for the first time by the terminal.
Second embodiment
In the second embodiment, when the first application is a fast application and the second application is a native application, the above-mentioned S202 to S200a can be specifically implemented in the following manner. That is, in a case where the terminal determines that the native application is installed on the terminal completely (i.e., the second application satisfies the first condition), the terminal may obtain a first identifier (which indicates a fast application corresponding to the native application) from a configuration file of the native application, and determine whether the fast application has been run before the terminal completes the installation of the native application (i.e., whether the first application satisfies the second condition).
Specifically, when the terminal determines that the native application is installed on the terminal (that is, the second application satisfies the first condition), the terminal may parse the configuration file of the native application, acquire a package name of the fast application corresponding to the native application stored in a package extension field of the configuration file, and then determine whether the fast application has been run by the terminal before the native application is installed by determining whether the package name of the fast application corresponding to the native application is included in a package list in the terminal. If the terminal determines that the package name of the fast application corresponding to the native application is included in the quick package list in the terminal (i.e., the first application meets the second condition), the terminal may determine that the terminal has run the fast application before the native application is installed; if the terminal determines that the terminal does not have the package name of the fast application corresponding to the native application, the terminal may determine that the terminal does not run the fast application before the native application is installed.
In this embodiment of the present invention, in a case where the terminal determines that the first application indicated by the first identifier satisfies the second condition, the terminal may continue to execute S200b described below. And under the condition that the terminal judges that the first application indicated by the first identifier does not meet the second condition, the terminal can prompt the user to set the authority of the second application according to the conventional authority configuration steps. For the description of the conventional permission configuration step, reference may be made to related steps for configuring the permission of the application in the prior art, which are not described herein in detail.
S200b, the terminal acquires the authority configuration information of the first application.
In the embodiment of the present invention, when the first application is a native application and the second application is a fast application, the terminal may obtain the permission configuration information of the native application from the permission list of the native application stored in the terminal when the terminal determines that the native application is installed before the terminal runs the fast application for the first time (that is, the first application satisfies the second condition). And then the terminal can configure the authority of the quick application according to the acquired authority configuration information of the native application.
In the embodiment of the present invention, when the first application is a fast application and the second application is a native application, the terminal may obtain the permission configuration information of the fast application from the permission list of the fast application stored in the terminal when the terminal determines that the terminal has run the fast application before the native application is installed (that is, the first application satisfies the second condition). And then the terminal can configure the authority of the native application according to the acquired authority configuration information of the fast application.
The permission configuration method provided by the embodiment of the invention can acquire permission configuration information of the first application and configure the permission of the second application according to the permission configuration information of the first application under the condition that the second application meets the first condition and the first application meets the second condition aiming at the first application and the second application with the same function and different forms. Therefore, the user can directly configure the authority of the second application according to the configured authority configuration information of the first application, so that the user is not required to repeatedly set the authorities of the applications with the same function and different forms (namely the applications with different forms of the same product), and the convenience of the user for using the terminal is improved.
Optionally, with reference to fig. 3, as shown in fig. 4, after the above S200b and before the above S201, the method for configuring rights provided in the embodiment of the present invention may further include the following S204 and S205. Accordingly, S201 may be specifically implemented by S201a or S201b described below.
And S204, the terminal displays the authority configuration information and the first control of the first application.
The permission configuration information of the first application may include N first permission items, where N may be a positive integer.
For example, the second application is a fast application of an electronic map, and the first application is a native application of the electronic map. As shown in fig. 5, the terminal may display rights configuration information of a native application (i.e., a first application) including 7 first rights items. Wherein each first rights item includes a rights content and configuration information (e.g., authorization, prohibition, or unknown) corresponding to the rights content. As shown in fig. 5, the authority content of the native application includes self-starting, floating window, dialing, accessing an address list, sending a short message, accessing a contact and positioning a mobile phone, and the configuration information corresponding to the authority content is authorization (as shown in fig. 5) respectively
Figure BDA0001783399350000061
Shown), disabled (as in fig. 5)
Figure BDA0001783399350000062
Shown), authorized, prohibited, authorized, and authorized.
Optionally, in this embodiment of the present invention, as shown in fig. 5, the terminal may further display a "one-key configuration to fast application" (that is, a first control) for triggering automatic configuration of the permission configuration information of the first application to the second application.
S205, the terminal receives a first input of a user.
The first input may be an input of a first control by a user. Or the first input may be the input of at least one of the N first right items by the user.
For example, in the embodiment of the present invention, the first input may be a drag input, or may be a click input (for example, a single-click input or a double-click input), which may be determined specifically according to an actual use requirement, and the embodiment of the present invention is not limited.
Specifically, when the first input is an input of the first control by the user, S201 may be specifically implemented by S201a described below. In a case where the first input is an input of at least one first authority item of the N first authority items by the user, the above S201 may be specifically implemented by S201b described below.
S201a, the terminal responding to the first input, configuring the N first right items to the second application (hereinafter referred to as auto-configuration).
In the embodiment of the present invention, as shown in fig. 5, the first control is "one-key configuration to fast application", and the terminal may, in response to a first input (for example, click input) of the user to "one-key configuration to fast application", configure all the permission configuration information (i.e., the 7 first permission items shown in fig. 5) of the native application to the fast application, so that the user does not need to set permissions one by one, and thus, fast automatic configuration may be implemented.
S201b, the terminal responding to the first input, configuring at least one first right item to the second application (hereinafter referred to as user-defined configuration).
In the embodiment of the present invention, as shown in fig. 5, the terminal may configure at least one first permission item of the native application (i.e., a part of or all of the 7 first permission items shown in fig. 5) to the fast application in response to a first input (e.g., a click input) by the user and an input by the user to the "application" control (shown in fig. 5). Therefore, the user can trigger and set the authority according to personal requirements, and user-defined configuration can be realized.
Optionally, the terminal in the embodiment of the present invention may be a terminal including a plurality of display screens. For convenience of explanation, the following description will exemplarily be given by taking an example in which the terminal includes two display screens (e.g., a first display screen and a second display screen).
Optionally, in this embodiment of the present invention, the permission configuration information and the first control of the first application may be displayed on a first display screen of the terminal. And, the terminal may further display the authority configuration information of the second application on the second display screen.
Illustratively, S204 may be specifically implemented by S204a described below. After S204a, the method for configuring rights according to the embodiment of the present invention may further include S206 described below.
S204a, the terminal displays the authority configuration information and the first control of the first application on the first display screen.
S206, the terminal displays the authority configuration information of the second application on the second display screen.
The permission configuration information of the second application may include N permission items to be configured.
Optionally, in this embodiment of the present invention, the first display screen may be a main display screen of the terminal, and the second display screen may be a sub-display screen of the terminal. Alternatively, the first display screen may be a secondary display screen of the terminal, and the second display screen may be a primary display screen of the terminal.
In the embodiment of the invention, the permission configuration information of the second application, the first application configuration information and the first control can be respectively displayed on the two display screens, so that a user can conveniently check and set the permission, and the convenience of man-machine interaction is improved.
Optionally, in the embodiment of the present invention, in combination with S204a and S206, the foregoing S201a may be specifically implemented by the following S201a1, and the foregoing S201b may be specifically implemented by the following S201b 1.
S201a1, the terminal correspondingly configures the N first permission items to the N permission items to be configured.
The following description will exemplarily take a native application in which the first application is an electronic map and a fast application in which the second application is an electronic map as an example. Fig. 6 (a) shows two display screens of the terminal, the display screen on the right side being a first display screen of the terminal, and the display screen on the left side being a second display screen of the terminal.
As shown in (a) of fig. 6, the terminal may display authority configuration information of a native application (i.e., a first application) of the electronic map on the first display screen, the authority configuration information of the native application may include self-start-up-authorization, floating window-prohibition, call-making-authorization, address book-prohibition, short message sending-authorization, contact person accessing-authorization, and mobile phone locating-authorization, and may display a first control, i.e., "one-key configuration to fast application", on the first display screen.
Meanwhile, as shown in (a) of fig. 6, the terminal may be at the second placeThe authority configuration information of the fast application (i.e. the second application) of the electronic map is displayed on the two display screens, and the authority configuration information of the fast application can comprise self-starting unknown (as in (a) in fig. 6)
Figure BDA0001783399350000071
Shown, for prompting the user that the permissions can be set), floating window-unknown, dialing-unknown, accessing address list-unknown, sending short message-unknown, accessing contacts-unknown and locating handset-unknown. Optionally, the terminal may display a second control on the second display screen, such as an "apply" control and/or a "reset" control; wherein the "application" control can be used to trigger the terminal to configure the authority configuration information of the native application to the fast application, and the "reset" control can be used to restore the authority configuration information of the configured fast application to an initial state (e.g., an unknown state).
As shown in fig. 6 (a), the terminal may correspondingly configure 7 first permission items of the native application to 7 permission items to be configured to the fast application in response to a first input of the user to configure the "one-key configuration to the fast application" (i.e., the first control) displayed on the first display screen. For example, the first permission item "self-starting-authorization" of the native application corresponds to the permission item "self-starting-unknown" to be configured to the fast application, so that the permission item "self-starting-unknown" to be configured to the fast application is configured to be "self-starting-authorization", and so on, as shown in (b) in fig. 6, the permission items to be configured to the fast application are all configured to be the configuration permission items completely consistent with the native application.
S201b1, the terminal correspondingly configures at least one first authority item to at least one to-be-configured authority item in the N to-be-configured authority items.
Still, the following takes the first application as a native application of the electronic map, and the second application as a fast application of the electronic map as an example for illustrative explanation. Fig. 7 (a) shows two display screens of the terminal, in which the display screen on the right side is a first display screen of the terminal and the display screen on the left side is a second display screen of the terminal.
As shown in fig. 7 (a), if the user wants to configure the to-be-configured authority item "call-unknown" and the to-be-configured authority item "send short message-unknown" of the fast application, the user may perform a drag input (i.e., the above-mentioned first input) on the first authority item "call-authorization" and the first authority item "send short message-authorization" of the native application, for example, the user may drag the first authority item "call-authorization" and the first authority item "send short message-authorization" of the native application from the first display screen of the terminal to the second display screen of the terminal, respectively. The terminal can respond to the first input, and correspondingly configure the two first permission items of the native application to the two permission items to be configured of the fast application, so that the permission item to be configured of the fast application, namely 'dialing-unknown' is configured to be 'dialing-authorized', and the permission item to be configured of the fast application, namely 'sending short message-unknown' is configured to be 'sending short message-authorized'. As shown in (b) in fig. 7, the two to-be-configured permission items of the fast application are configured to be consistent with the configured permission item corresponding to the native application, and the other to-be-configured permission items of the fast application still keep an unknown state.
Optionally, in the embodiment of the present invention, when an "application" control is displayed on the second display screen of the terminal, the terminal may configure the two first permission items of the native application to the two to-be-configured permission items of the fast application in response to a first input of the "application" control and a first permission item of the native application by the user.
In the embodiment of the invention, the first permission items of the first application can be automatically configured to the permission items to be configured of the second application, and the permission items to be configured of the second application can also be configured in a user-defined manner according to the requirements of users, so that the flexibility of human-computer interaction is improved.
Optionally, with reference to fig. 4, as shown in fig. 8, after the step 200a and before the step S200b, the method for configuring rights according to the embodiment of the present invention may further include the following steps S207 and S208. Accordingly, S200b can be specifically realized by S200b1 described below.
And S207, displaying prompt information by the terminal.
The prompt message can be used for prompting the user to configure the authority configuration information of the first application to the second application.
And S208, the terminal receives a second input of the prompt message from the user.
S200b1, the terminal responds to the second input, and acquires the authority configuration information of the first application.
For example, as shown in fig. 9, the terminal may display a prompt message, where the prompt message may include a prompt content, a "cancel" control, and a "continue" control, and the prompt content is used to prompt the user that the permission configuration information of the native application (i.e., the first application) may be configured to the fast application. The terminal may obtain the permission configuration information of the native application in response to the received second input of the user to the "continue" control in the prompt message. The terminal can also respond to the received second input of the user to the cancel control in the prompt message, and prompt the user to set the authority of the second application according to the conventional authority configuration step.
In the embodiment of the invention, before configuring the authority of the second application according to the conventional authority configuration step, the user is prompted to configure the authority configuration information of the first application to the second application, so that the user can select a mode of configuring the authority of the second application according to personal requirements, and the convenience of using the terminal by the user is improved.
As shown in fig. 10, an embodiment of the present invention provides a terminal 300, where the terminal 300 may include an obtaining module 301 and a configuring module 302. An obtaining module 301, configured to obtain permission configuration information of a first application in the terminal 300; a configuring module 302, configured to configure an authority of a second application according to the authority configuration information of the first application acquired by the acquiring module 301, where the first application and the second application are application programs with different forms, and a function of the first application and a function of the second application have a correlation.
Optionally, in this embodiment of the present invention, the obtaining module 301 is further configured to, before obtaining the permission configuration information of the first application in the terminal 300, obtain a first identifier from a configuration file of a second application when the second application meets a first condition, where the first identifier is used to indicate the first application; the obtaining module 301 is specifically configured to obtain the permission configuration information of the first application when the first application indicated by the first identifier meets the second condition.
Optionally, in this embodiment of the present invention, the first application may be a native application, the second application may be a fast application, the first condition may be that the terminal runs the second application for the first time, and the second condition may be that the terminal has installed the first application before running the second application for the first time.
Optionally, in this embodiment of the present invention, the first application may be a fast application, the second application may be a native application, the first condition may be that the terminal completes the installation of the second application, and the second condition may be that the terminal has run the first application before completing the installation of the second application.
Optionally, with reference to fig. 10, as shown in fig. 11, the terminal 300 according to the embodiment of the present invention may further include a display module 303 and a receiving module 304.
A display module 303, configured to display the permission configuration information of the first application and the first control after the obtaining module 301 obtains the permission configuration information of the first application in the terminal 300, and before the configuration module 302 configures the permission of the second application according to the permission configuration information of the first application, where the permission configuration information of the first application may include N first permission items, and N may be a positive integer.
A receiving module 304, configured to receive a first input of a user, where the first input is an input of the user to a first control displayed by the display module 303, or an input of the user to at least one first authority item of the N first authority items displayed by the display module 303.
The configuring module 302 is specifically configured to, in a case that the first input received by the receiving module 304 is an input of a first control by a user, configure the N first permission items to the second application in response to the first input. Or, the configuring module 302 is specifically configured to, in a case that the first input is input by a user to at least one first authority item of the N first authority items, configure the at least one first authority item to the second application in response to the first input.
Optionally, in this embodiment of the present invention, the terminal may include a first display screen and a second display screen.
The display module 303 is specifically configured to display the permission configuration information and the first control of the first application on the first display screen. The display module 303 is further configured to display, on the second display screen, authority configuration information of the second application, where the authority configuration information of the second application may include N authority items to be configured.
Optionally, in this embodiment of the present invention, the configuration module 302 is specifically configured to correspondingly configure the N first permission items to the N permission items to be configured; or correspondingly configuring at least one first authority item to at least one to-be-configured authority item in the N to-be-configured authority items.
The terminal provided by the embodiment of the present invention can implement each process implemented by the terminal in the above method embodiments, and is not described herein again to avoid repetition.
The terminal provided by the embodiment of the invention can acquire the authority configuration information of the first application in the terminal, and configure the authority of the second application according to the authority configuration information of the first application, wherein the second application and the first application are application programs with different forms, and the function of the second application has relevance with the function of the first application. According to the scheme, for the first application and the second application with the same function and different forms, the user can directly configure the permission of the second application according to the configured permission configuration information of the first application, so that the user is not required to repeatedly set the permissions of the applications with the same function and different forms (namely the applications with different forms of the same product), and the convenience of the user in using the terminal is improved.
Fig. 12 is a schematic diagram of a hardware structure of a terminal for implementing various embodiments of the present invention. As shown in fig. 12, the terminal 800 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and a power supply 811. Those skilled in the art will appreciate that the terminal configuration shown in fig. 12 is not intended to be limiting, and that the terminal may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the terminal includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 810 is configured to, when a second application satisfies a first condition, obtain a first identifier from a configuration file of the second application, where the first identifier is used to indicate that the first application is a different form of application having the same function, and the second application and the first application are different forms of application having the same function; acquiring authority configuration information of the first application under the condition that the first application indicated by the first identifier meets a second condition; and configuring the authority of the second application according to the authority configuration information of the first application.
The embodiment of the invention provides a terminal, which can acquire permission configuration information of a first application in the terminal and configure permission of a second application according to the permission configuration information of the first application, wherein the second application and the first application are application programs with different forms, and functions of the second application and the functions of the first application have relevance. According to the scheme, for the first application and the second application with the same function and different forms, the user can directly configure the permission of the second application according to the configured permission configuration information of the first application, so that the user is not required to repeatedly set the permissions of the applications with the same function and different forms (namely the applications with different forms of the same product), and the convenience of the user in using the terminal is improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 801 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 810; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 801 can also communicate with a network and other devices through a wireless communication system.
The terminal provides wireless broadband internet access to the user through the network module 802, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 803 may convert audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into an audio signal and output as sound. Also, the audio output unit 803 may also provide audio output related to a specific function performed by the terminal 800 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
The input unit 804 is used for receiving an audio or video signal. The input unit 804 may include a Graphics Processing Unit (GPU) 8041 and a microphone 8042, and the graphics processor 8041 processes image data of a still picture or video obtained by an image capturing apparatus (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 806. The image frames processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or transmitted via the radio frequency unit 801 or the network module 802. The microphone 8042 can receive sound, and can process such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 801 in case of a phone call mode.
The terminal 800 also includes at least one sensor 805, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 8061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 8061 and/or the backlight when the terminal 800 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 805 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 806 is used to display information input by the user or information provided to the user. The display unit 806 may include a display panel 8061, and the display panel 8061 may be configured in the form of a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), or the like.
The user input unit 807 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal. Specifically, the user input unit 807 includes a touch panel 8071 and other input devices 8072. The touch panel 8071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 8071 (e.g., operations by a user on or near the touch panel 8071 using a finger, a stylus, or any other suitable object or accessory). The touch panel 8071 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 810, receives a command from the processor 810, and executes the command. In addition, the touch panel 8071 can be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 8071, the user input unit 807 can include other input devices 8072. In particular, other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 8071 can be overlaid on the display panel 8061, and when the touch panel 8071 detects a touch operation on or near the touch panel 8071, the touch operation is transmitted to the processor 810 to determine the type of the touch event, and then the processor 810 provides a corresponding visual output on the display panel 8061 according to the type of the touch event. Although in fig. 12, the touch panel 8071 and the display panel 8061 are two independent components to implement the input and output functions of the terminal, in some embodiments, the touch panel 8071 and the display panel 8061 may be integrated to implement the input and output functions of the terminal, and this is not limited herein.
The interface unit 808 is an interface for connecting an external device to the terminal 800. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 808 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the terminal 800 or may be used to transmit data between the terminal 800 and external devices.
The memory 809 may be used to store software programs as well as various data. The memory 809 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 809 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 810 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 809 and calling data stored in the memory 809, thereby integrally monitoring the terminal. Processor 810 may include one or more processing units; optionally, the processor 810 may integrate an application processor and a modem processor, wherein the application processor mainly handles operating systems, user interfaces, application programs, and the like, and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 810.
Terminal 800 can also include a power supply 811 (e.g., a battery) for powering the various components, and optionally, power supply 811 can be logically coupled to processor 810 via a power management system to manage charging, discharging, and power consumption management via the power management system.
In addition, the terminal 800 includes some functional modules that are not shown, and are not described in detail herein.
Optionally, an embodiment of the present invention further provides a terminal, including the processor 810 shown in fig. 12, a memory 809, and a computer program stored in the memory 809 and capable of running on the processor 810, where the computer program, when executed by the processor 810, implements each process of the above-mentioned permission configuration method embodiment, and can achieve the same technical effect, and details are not described here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned embodiment of the permission configuration method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may include a read-only memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (7)

1. A permission configuration method is applied to a terminal, and is characterized by comprising the following steps:
acquiring authority configuration information of a first application in the terminal;
configuring the authority of a second application according to the authority configuration information of the first application, wherein the first application and the second application are the same application program with different forms, and the function of the first application and the function of the second application have relevance;
the first application is a native application and the second application is a fast application; or,
the first application is a fast application and the second application is a native application;
before the obtaining of the permission configuration information of the first application in the terminal, the method further includes:
under the condition that the second application meets a first condition, acquiring a first identifier from a configuration file of the second application, wherein the first identifier is used for indicating the first application;
the acquiring the permission configuration information of the first application in the terminal comprises the following steps:
acquiring authority configuration information of the first application under the condition that the first application indicated by the first identifier meets a second condition;
when the first application is a native application and the second application is a fast application, the first condition is that the terminal first runs the second application, and the second condition is that the terminal has installed the first application before the second application is first run;
or,
when the first application is a fast application and the second application is a native application, the first condition is that the terminal completes installation of the second application, and the second condition is that the terminal has run the first application before completing installation of the second application.
2. The method according to claim 1, wherein after the obtaining of the permission configuration information of the first application in the terminal and before the configuring of the permission of the second application according to the permission configuration information of the first application, the method further comprises:
displaying authority configuration information and a first control of the first application, wherein the authority configuration information of the first application comprises N first authority items, and N is a positive integer;
receiving a first input of a user, wherein the first input is an input of the user to the first control or an input of the user to at least one first authority item in the N first authority items;
the configuring the authority of the second application according to the authority configuration information of the first application comprises the following steps:
in the case that the first input is input of the first control by a user, responding to the first input, and configuring the N first permission items to the second application;
and in the case that the first input is input of a user to at least one first authority item in the N first authority items, responding to the first input, and configuring the at least one first authority item to the second application.
3. The method of claim 2, wherein the terminal comprises a first display screen and a second display screen;
the displaying the permission configuration information and the first control of the first application comprises:
displaying the permission configuration information of the first application and the first control on the first display screen;
the method further comprises the following steps:
and displaying the authority configuration information of the second application on the second display screen, wherein the authority configuration information of the second application comprises N authority items to be configured.
4. The method according to claim 3, wherein the configuring the N first right items to the second application comprises:
correspondingly configuring the N first permission items to the N permission items to be configured;
the configuring the at least one first permission item to the second application includes:
and correspondingly configuring the at least one first authority item to at least one to-be-configured authority item in the N to-be-configured authority items.
5. A terminal is characterized by comprising an acquisition module and a configuration module;
the acquisition module is used for acquiring authority configuration information of a first application in the terminal;
the configuration module is configured to configure the permission of a second application according to the permission configuration information of the first application acquired by the acquisition module, where the first application and the second application are the same application program in different forms, and the function of the first application and the function of the second application have relevance; the first application is a native application and the second application is a fast application; or,
the first application is a fast application and the second application is a native application;
the obtaining module is further configured to obtain a first identifier from a configuration file of a second application when the second application meets a first condition before obtaining permission configuration information of the first application in the terminal, where the first identifier is used to indicate the first application;
the obtaining module is specifically configured to obtain permission configuration information of the first application when the first application indicated by the first identifier meets a second condition;
when the first application is a native application and the second application is a fast application, the first condition is that the terminal first runs the second application, and the second condition is that the terminal has installed the first application before the second application is first run;
or,
when the first application is a fast application and the second application is a native application, the first condition is that the terminal completes installation of the second application, and the second condition is that the terminal has run the first application before completing installation of the second application.
6. A terminal, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the rights configuration method according to any one of claims 1 to 4.
7. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the rights configuration method according to any one of claims 1 to 4.
CN201811002976.7A 2018-08-30 2018-08-30 Permission configuration method and terminal Active CN109343900B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811002976.7A CN109343900B (en) 2018-08-30 2018-08-30 Permission configuration method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811002976.7A CN109343900B (en) 2018-08-30 2018-08-30 Permission configuration method and terminal

Publications (2)

Publication Number Publication Date
CN109343900A CN109343900A (en) 2019-02-15
CN109343900B true CN109343900B (en) 2022-04-08

Family

ID=65292295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811002976.7A Active CN109343900B (en) 2018-08-30 2018-08-30 Permission configuration method and terminal

Country Status (1)

Country Link
CN (1) CN109343900B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084004B (en) 2019-03-28 2021-06-04 南京维沃软件技术有限公司 Permission configuration method and terminal equipment
CN110443030B (en) * 2019-06-24 2021-04-27 维沃移动通信有限公司 Permission processing method and terminal device
CN113032738A (en) * 2021-03-23 2021-06-25 维沃移动通信有限公司 Application authority management method and device and electronic equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650324A (en) * 2016-10-10 2017-05-10 广东欧珀移动通信有限公司 Application program authority management method and device and mobile terminal

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8601468B1 (en) * 2010-05-18 2013-12-03 Google Inc. Web-based applications using web extents
US9336358B2 (en) * 2014-03-25 2016-05-10 Google Inc. Granting permission in association with an application
CN105955782B (en) * 2016-05-09 2020-02-07 北京奇虎科技有限公司 Application program operation control method and device
CN106203167B (en) * 2016-07-08 2019-05-07 北京小米移动软件有限公司 Application rights management method and device
CN107193667B (en) * 2017-04-25 2021-03-09 北京小米移动软件有限公司 Method and device for updating webpage permission
CN107943531A (en) * 2017-11-03 2018-04-20 珠海市君天电子科技有限公司 A kind of authority control method, user terminal, electronic equipment and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650324A (en) * 2016-10-10 2017-05-10 广东欧珀移动通信有限公司 Application program authority management method and device and mobile terminal

Also Published As

Publication number Publication date
CN109343900A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN110995923B (en) Screen projection control method and electronic equipment
CN109542282B (en) Interface display method and terminal equipment
CN110062105B (en) Interface display method and terminal equipment
CN110221737B (en) Icon display method and terminal equipment
CN111027030B (en) Permission setting method and terminal device
CN109828705B (en) Icon display method and terminal equipment
CN110058836B (en) Audio signal output method and terminal equipment
CN110908557B (en) Information display method and terminal equipment
CN110457935B (en) Permission configuration method and terminal equipment
CN109358931B (en) Interface display method and terminal
CN111163260B (en) Camera starting method and electronic equipment
CN108762606B (en) Screen unlocking method and terminal equipment
CN110012151B (en) Information display method and terminal equipment
CN109343900B (en) Permission configuration method and terminal
CN110753155A (en) Proximity detection method and terminal equipment
CN111338524A (en) Application program control method and electronic equipment
CN109857305B (en) Input response method and mobile terminal
CN109933267B (en) Method for controlling terminal equipment and terminal equipment
CN111125680A (en) Permission setting method and terminal equipment
CN111381753B (en) Multimedia file playing method and electronic equipment
CN109815678B (en) Permission configuration method and mobile terminal
CN108988413B (en) Mobile terminal charging method and mobile terminal
CN110084004B (en) Permission configuration method and terminal equipment
CN111475067B (en) Message indication method and electronic equipment
CN111010455B (en) Hotspot name modification method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant