Nothing Special   »   [go: up one dir, main page]

CN110443030B - Permission processing method and terminal device - Google Patents

Permission processing method and terminal device Download PDF

Info

Publication number
CN110443030B
CN110443030B CN201910551473.3A CN201910551473A CN110443030B CN 110443030 B CN110443030 B CN 110443030B CN 201910551473 A CN201910551473 A CN 201910551473A CN 110443030 B CN110443030 B CN 110443030B
Authority
CN
China
Prior art keywords
application program
terminal device
application
user
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910551473.3A
Other languages
Chinese (zh)
Other versions
CN110443030A (en
Inventor
康新龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910551473.3A priority Critical patent/CN110443030B/en
Publication of CN110443030A publication Critical patent/CN110443030A/en
Priority to PCT/CN2020/082082 priority patent/WO2020258961A1/en
Application granted granted Critical
Publication of CN110443030B publication Critical patent/CN110443030B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a permission processing method and terminal equipment, relates to the technical field of communication, and can solve the problem that privacy information of a user is leaked after a homologous application program obtains different permissions of the terminal equipment. The scheme comprises the following steps: under the condition that a target condition is met, determining a second application program which belongs to a homologous application program with the first application program in N application programs installed on the terminal equipment, wherein the target condition is at least one of the following: the terminal equipment downloads the first application program and runs the first application program; processing a first right according to a first mode, wherein the first right is a right configured for a second application program by the terminal equipment, and the first mode comprises at least one of the following items: a way of closing the right, a way of encrypting information corresponding to the right, N being a positive integer. The scheme is applied to the scene of authority processing configured for the homologous application program by the terminal device.

Description

Permission processing method and terminal device
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a permission processing method and terminal equipment.
Background
With the continuous development of communication technology, more and more applications can be installed in the terminal device.
Generally, an application installed in a terminal device can acquire various rights in the terminal device. For example, taking an application a, an application B, an application C, and an application D installed in the terminal device as examples, the application a may obtain a short message right in the terminal device, the application B may obtain a contact right in the terminal device, the application C may obtain a recording right in the terminal device, and the application D may obtain a camera right in the terminal device.
However, when the application a, the application B, the application C, and the application D belong to a same source application (i.e., an application developed by a same developer or operated by a same operator), since the same source application may acquire different rights in the terminal device, the developer or the operator providing the same source application may obtain data corresponding to the different rights, so that the developer or the operator may superimpose, process, and the like the data to obtain detailed information of the user, which may further cause leakage of private information of the user.
Disclosure of Invention
The embodiment of the invention provides an authority processing method, which aims to solve the problem that after a homologous application program obtains different authorities of terminal equipment, privacy information of a user is leaked.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present invention provides an authority processing method, where the method is applied to a terminal device, and the method includes: and under the condition that the target condition is met, determining a second application program which belongs to the homologous application program with the first application program in the N application programs installed on the terminal equipment, and processing the first authority according to a first mode. The first permission is a permission configured for the second application program by the terminal device, and the first mode includes at least one of the following: the method for closing the authority and the method for encrypting the information corresponding to the authority have at least one of the following target conditions: the terminal equipment downloads the first application program and runs the first application program, and N is a positive integer.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes a determining module and a processing module. The determining module is configured to determine, in the N applications installed in the terminal device, a second application that belongs to a homologous application with the first application under a condition that a target condition is satisfied, where the target condition is at least one of: the terminal equipment downloads the first application program and runs the first application program; a processing module, configured to process a first right according to a first mode, where the first right is a right configured by the terminal device for the second application program determined by the determining module, and the first mode includes at least one of the following: a way of closing the right, a way of encrypting information corresponding to the right, N being a positive integer.
In a third aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes a processor, a memory, and a computer program stored on the memory and executable on the processor, and the computer program, when executed by the processor, implements the steps of the permission processing method in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the permission processing method in the first aspect.
In the embodiment of the invention, under the condition that a target condition (at least one of the following conditions is met, namely, the terminal equipment downloads a first application program and runs the first application program), a second application program which belongs to a homologous application program with the first application program is determined in N (N is a positive integer) application programs installed on the terminal equipment; and processing the first right (the first right is the right configured by the terminal device for the second application program) according to a first mode (the first mode comprises at least one of the following modes: a mode of closing the right and a mode of encrypting information corresponding to the right). By the scheme, when the terminal device downloads an application program and/or runs an application program, the terminal device can close the authority configured for other application programs (the other application programs and the application program belong to the same-source application program) by the terminal device or encrypt information corresponding to the authority configured for the other application programs by the terminal device, so that the same-source application programs can be prevented from simultaneously acquiring different authorities in the terminal device, developers or operators of the same-source application programs can be prevented from acquiring detailed information of users after data acquired by the same-source application programs according to different authorities are superposed, processed and the like, further privacy information of the users can be prevented from being leaked, and the safety of the privacy information of the users is ensured.
Drawings
Fig. 1 is a schematic structural diagram of an android operating system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a privilege processing method according to an embodiment of the present invention;
fig. 3 is a second schematic diagram of a privilege processing method according to an embodiment of the present invention;
fig. 4 is a third schematic diagram of a privilege processing method according to an embodiment of the present invention;
fig. 5 is one of schematic diagrams of an interface applied by a permission processing method according to an embodiment of the present invention;
FIG. 6 is a fourth schematic diagram illustrating a privilege processing method according to an embodiment of the present invention;
fig. 7 is a second schematic diagram of an interface applied by a permission processing method according to an embodiment of the present invention;
FIG. 8 is a fifth diagram illustrating a privilege processing method according to an embodiment of the present invention;
fig. 9 is a third schematic diagram of an interface applied by a permission processing method according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 11 is a second schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 12 is a hardware schematic diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The term "and/or" herein is an association relationship describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The symbol "/" herein denotes a relationship in which the associated object is or, for example, a/B denotes a or B.
The terms "first" and "second," etc. herein are used to distinguish between different objects and are not used to describe a particular order of objects. For example, the first application and the second application, etc. are for distinguishing between different applications, rather than for describing a particular order of the applications.
In the embodiments of the present invention, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the description of the embodiments of the present invention, unless otherwise specified, "a plurality" means two or more, for example, a plurality of elements means two or more elements, and the like.
The following first explains the nouns and/or terms referred to herein.
The homologous application program: applications developed by the same developer or applications operated by the same operator.
The embodiment of the invention provides a permission processing method and terminal equipment, which can determine a second application program which belongs to a homologous application program with a first application program in N (N is a positive integer) application programs installed in the terminal equipment under the condition of meeting target conditions (at least one of the following conditions is that the terminal equipment downloads the first application program and the terminal equipment runs the first application program); and processing the first right (the first right is the right configured by the terminal device for the second application program) according to a first mode (the first mode comprises at least one of the following modes: a mode of closing the right and a mode of encrypting information corresponding to the right). By the scheme, when the terminal device downloads an application program and/or runs an application program, the terminal device can close the authority configured for other application programs (the other application programs and the application program belong to the same-source application program) by the terminal device or encrypt information corresponding to the authority configured for the other application programs by the terminal device, so that the same-source application programs can be prevented from simultaneously acquiring different authorities in the terminal device, developers or operators of the same-source application programs can be prevented from acquiring detailed information of users after data acquired by the same-source application programs according to different authorities are superposed, processed and the like, further privacy information of the users can be prevented from being leaked, and the safety of the privacy information of the users is ensured.
The terminal device in the embodiment of the present invention may be a terminal device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present invention are not limited in particular.
The following describes a software environment to which the permission processing method provided by the embodiment of the present invention is applied, by taking an android operating system as an example.
Fig. 1 is a schematic diagram of an architecture of a possible android operating system according to an embodiment of the present invention. In fig. 1, the architecture of the android operating system includes 4 layers, which are respectively: an application layer, an application framework layer, a system runtime layer, and a kernel layer (specifically, a Linux kernel layer).
The application program layer comprises various application programs (including system application programs and third-party application programs) in an android operating system.
The application framework layer is a framework of the application, and a developer can develop some applications based on the application framework layer under the condition of complying with the development principle of the framework of the application.
The system runtime layer includes libraries (also called system libraries) and android operating system runtime environments. The library mainly provides various resources required by the android operating system. The android operating system running environment is used for providing a software environment for the android operating system.
The kernel layer is an operating system layer of an android operating system and belongs to the bottommost layer of an android operating system software layer. The kernel layer provides kernel system services and hardware-related drivers for the android operating system based on the Linux kernel.
Taking an android operating system as an example, in the embodiment of the present invention, a developer may develop a software program for implementing the permission processing method provided in the embodiment of the present invention based on the system architecture of the android operating system shown in fig. 1, so that the permission processing method may operate based on the android operating system shown in fig. 1. Namely, the processor or the terminal device can implement the permission processing method provided by the embodiment of the invention by running the software program in the android operating system.
The terminal equipment in the embodiment of the invention can be a mobile terminal or a non-mobile terminal. For example, the mobile terminal may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted terminal, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile terminal may be a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiment of the present invention is not particularly limited.
The execution main body of the authority processing method provided by the embodiment of the present invention may be the terminal device, or may also be a functional module and/or a functional entity capable of implementing the authority processing method in the terminal device, which may be specifically determined according to actual use requirements, and the embodiment of the present invention is not limited. The following takes a terminal device as an example to exemplarily describe the authority processing method provided by the embodiment of the present invention.
In the embodiment of the invention, when a certain application program is installed or operated, the terminal equipment can configure the authority for the application program according to the use requirement of a user. For example, when installing a communication application, the terminal device may configure a contact authority, a camera authority, a short message authority, and the like for the communication application according to the use requirement of the user. In this way, after the terminal device installs the plurality of applications belonging to the same source application, each of the plurality of applications may acquire a certain right or rights in the terminal device, and thus the plurality of applications may acquire various rights in the terminal device. For example, assuming that the applications belonging to the same source application are application a and application B, and application a may obtain the contact authority and the short message authority in the terminal device, and application B may obtain the recording authority and the camera authority in the terminal device, then application a and application B may obtain the contact authority, the short message authority, the recording authority and the camera authority in the terminal device. Therefore, developers or operators of the application a and the application B may obtain data corresponding to different permissions, and the developers or the operators may superimpose and process the data to obtain detailed information of the user, which may further cause leakage of privacy information of the user.
In order to solve the foregoing problem, an embodiment of the present invention provides a permission processing method, where when a terminal device downloads or runs an application program, the terminal device may close a permission configured for another application program by the terminal device (the other application program and the application program belong to a same-source application program), or encrypt information corresponding to the permission configured for the other application program by the terminal device, so that the different permissions in the terminal device may be prevented from being simultaneously obtained by the same-source application programs, and thus developers or operators of the same-source application programs may be prevented from obtaining detailed information of a user after data obtained by the same-source application programs according to the different permissions are superimposed and processed, and further privacy information of the user may be prevented from being leaked, and security of the privacy information of the user is ensured.
The following describes an exemplary privilege processing method provided in an embodiment of the present invention with reference to various drawings.
As shown in fig. 2, an embodiment of the present invention provides a method for processing a right, which may include the following S201-S202.
S201, under the condition that the target condition is met, the terminal device determines a second application program which belongs to the homologous application program with the first application program in the N application programs installed in the terminal device.
Wherein the target condition may be at least one of: the terminal equipment downloads the first application program and runs the first application program, and N is a positive integer. That is, the terminal device may execute the above S201 in a case of downloading the first application program, may also execute the above S201 in a case of running the first application program, and may also execute S201 in a case of both downloading the first application program and running the first application program, which may be determined specifically according to actual usage requirements, and the embodiment of the present invention is not limited.
In the embodiment of the present invention, when the terminal device downloads or runs the first application program, the terminal device may search, in the application program installed in the terminal device, an application program that belongs to a same source application program as the first application program, and if the terminal device searches a second application program that belongs to the same source application program as the first application program, the terminal device may first process the permission configured for the second application program by the terminal device (for example, close or encrypt information corresponding to the permission), and then download or run the first application program, so as to prevent the same source application programs from simultaneously acquiring multiple different permissions in the terminal device; if the terminal device does not find the application program belonging to the same source application program as the first application program, the terminal device can normally download or run the first application program according to the traditional flow.
It can be understood that, in the embodiment of the present invention, when the target condition is that the terminal device downloads the first application program, the first application program may be an application program that the terminal device needs to download. When the target condition is that the terminal device runs the first application program, the first application program may be an application program installed in the terminal device.
Optionally, in the embodiment of the present invention, the N application programs installed on the terminal device may be non-system application programs installed on the terminal device. For example, the N applications may include any possible applications such as a taxi taking application, a shopping application, a communication application, and a video application, which may be determined according to actual usage requirements, and the embodiment of the present invention is not limited.
It is to be understood that the second application may be an application of the N applications. Illustratively, the second application may be a taxi-taking application, a shopping application, a communication application, a video application, or the like.
It should be noted that, in the embodiment of the present invention, the first application program and the second application program may be application programs of the same application type, or application programs of different application types, which may be determined specifically according to actual usage requirements, and the embodiment of the present invention is not limited.
S202, the terminal equipment processes the first authority according to the first mode.
The first right may be a right configured for the second application program by the terminal device. The first mode may include at least one of: a way to close the rights, a way to encrypt information corresponding to the rights.
It should be noted that, the first right, that is, the right configured by the terminal device for the second application program, may be: and the terminal equipment configures the authority for the second application program to use the functions provided by other application programs. After the terminal device configures the second application with the right to use the functions provided by the other applications, the second application can use the functions. For example, assuming that the second application is a shopping application and the terminal device can configure a contact authority and a short message authority for the shopping application, the contact authority and the short message authority configured for the shopping application by the terminal device may be: and the terminal equipment configures the authority for the shopping application program to use the contact function in the telephone application program and the short message function in the short message application program. After the terminal device configures the authority for using the contact function in the telephone application program and the short message function in the short message application program for the shopping application program, the shopping application program can use the contact function in the telephone application program and the short message function in the short message application program; namely, the shopping application program can read the contact information in the telephone application program and the short message content in the short message application program.
In the embodiment of the present invention, it can be understood that the first permission and the permission configured by the terminal device for the second application program may be referred to as a non-fixed permission of the second application program.
Of course, the second application may also have fixed rights. The fixed permissions of the second application are the permissions that the second application must have to fulfill its basic functions.
In the embodiment of the present invention, under the condition that the first mode includes a mode of closing the right, the terminal device may close the first right; after the terminal device closes the first right, the second application program does not have the first right, that is, in this case, the second application program cannot access information corresponding to the first right. In the case where the first mode includes a mode of encrypting information corresponding to the authority, the terminal device may encrypt the information corresponding to the first authority; after the terminal device encrypts the information corresponding to the first authority, the second application program can only access the information encrypted with the information corresponding to the first authority, that is, in this case, although the second application program still has the first authority, the information acquired by the second application program according to the first authority is the encrypted information. When the first mode includes a mode of closing the right and a mode of encrypting information corresponding to the right, reference may be made to the above description about the two modes for the processing mode of the terminal device, and details are not described here again.
In the embodiment of the present invention, because the terminal device may close the authority configured for other application programs (the other application programs and the application program belong to the same-source application program) by the terminal device, or encrypt the information corresponding to the authority configured for the other application programs by the terminal device, the different authorities in the terminal device may be prevented from being acquired by the same-source application programs at the same time, so that developers or operators of the same-source application programs may be prevented from acquiring detailed information of the user after data acquired by the same-source application programs according to the different authorities are superimposed, processed, and the like, thereby preventing privacy information of the user from being leaked, and ensuring the security of the privacy information of the user.
Optionally, in this embodiment of the present invention, after the terminal device closes the first right or encrypts the information corresponding to the first right, if the terminal device runs the second application program, the terminal device may open the first right or decrypt the information corresponding to the first right.
For example, in conjunction with fig. 2, as shown in fig. 3, after S202, the method for processing rights according to the embodiment of the present invention may further include S203.
And S203, under the condition that the terminal device runs the second application program, the terminal device processes the first permission according to a second mode corresponding to the first mode.
Wherein the second mode may include at least one of: the manner in which the rights are opened (which may also be referred to as opening the rights), and the manner in which the information corresponding to the rights is decrypted.
It is to be understood that the first aspect corresponds to the second aspect in that: when the first mode is a mode of closing authority, the second mode is a mode of opening authority; alternatively, in the case where the first scheme is a scheme of encrypting information corresponding to a right, the second scheme is a scheme of decrypting information corresponding to a right.
In the embodiment of the present invention, in a case that the second manner includes a manner of opening a right, the terminal device may open the first right; after the terminal device opens the first right, the second application program has the first right, that is, in this case, the second application program can access information corresponding to the first right. In the case where the second mode includes a mode of decrypting information corresponding to the authority, the terminal device may decrypt information corresponding to the first authority; after the terminal device decrypts the information corresponding to the first authority, the second application program can access the information corresponding to the first authority. When the second manner includes a manner of opening the right and a manner of decrypting the information corresponding to the right, the processing manner of the terminal device may refer to the above description about the two manners, and is not described herein again.
It should be noted that, in the embodiment of the present invention, when the terminal device runs the second application, the terminal device may further process the authority (hereinafter, referred to as a second authority) configured by the terminal device for the first application according to the first manner. Specifically, under the condition that the terminal device runs the second application program, the terminal device may further close the second authority or encrypt information corresponding to the second authority. Under the condition that the terminal device runs the second application program, the terminal device can close the second authority firstly and then open the first authority; alternatively, the terminal device may encrypt the information corresponding to the second right first, and then decrypt the information corresponding to the first right.
In the embodiment of the invention, after the terminal device closes the authority configured for a certain application program by the terminal device or encrypts the information corresponding to the authority, the terminal device can open the authority or decrypt the information corresponding to the authority when the terminal device runs the application program, so that the application program can have the function required by a user when running, the user experience can be improved, and the man-machine interaction performance can be improved.
Optionally, in the embodiment of the present invention, the terminal device may automatically record the number of rights acquired by the homologous application program in the terminal device, and remind the user of a risk of information leakage when the number of rights is greater than a certain value.
Exemplarily, in combination with the above fig. 2, as shown in fig. 4, the authority processing method according to the embodiment of the present invention further includes the following S204.
And S204, under the condition that the target number is larger than or equal to the preset threshold value, the terminal equipment displays first prompt information.
The first prompt message may be used to prompt the user that the number of rights acquired by the homologous application (specifically, the total number of rights acquired by the homologous application program) has exceeded a preset threshold. The target number is the sum of the number of the first authorities and the number of the second authorities (namely the authorities configured by the terminal device for the first application program).
In the embodiment of the invention, the terminal device can automatically record the total number of the authorities acquired by the homologous application programs in the terminal device, and when the total number of the authorities is larger than or equal to a certain numerical value, the terminal device can prompt a user that the total number of the authorities acquired by the homologous application programs exceeds a preset threshold value, so that the risk of information leakage exists.
It should be noted that, the second permission, that is, the permission configured by the terminal device for the first application program, may be: and the terminal equipment configures the authority for the first application program to use the functions provided by other application programs. After the terminal device configures the first application with the right to use the functions provided by the other applications, the first application may use these functions. For example, assuming that the first application is a shopping application and the terminal device can configure a contact authority and a short message authority for the shopping application, the contact authority and the short message authority configured for the shopping application by the terminal device may be: and the terminal equipment configures the authority for the shopping application program to use the contact function in the telephone application program and the short message function in the short message application program. After the terminal device configures the authority for using the contact function in the telephone application program and the short message function in the short message application program for the shopping application program, the shopping application program can use the contact function in the telephone application program and the short message function in the short message application program; namely, the shopping application program can read the contact information in the telephone application program and the short message content in the short message application program.
In the embodiment of the present invention, it can be understood that the second permission, that is, the permission configured by the terminal device for the first application program, may be referred to as a non-fixed permission of the first application program.
Of course, the first application may also have fixed permissions. The fixed permissions of the first application are the permissions that the first application must have to fulfill its basic functions.
Optionally, in this embodiment of the present invention, the target number may be a sum of numbers of different authorities in the first authority and the second authority. For example, assuming that the first right is a recording right and a contact right, and the second right is a short message right, a contact right and a camera right, different rights in the first right and the second right are: the recording authority, the contact authority, the short message authority and the camera authority, namely the number of the targets is 4.
In the embodiment of the present invention, the preset threshold may be a critical value for determining whether the private information of the user is leaked, and may be calculated by a manufacturer of the terminal device according to big data.
It should be noted that the embodiment of the present invention may not limit the execution timing of the above S204, that is, the terminal device may execute the above S204 at any time. Fig. 4 illustrates the execution of S204 after S202, which does not limit the execution timing of S204. The method can be determined according to actual use requirements, and the embodiment of the invention is not limited.
The method shown in S204 above is further exemplarily described below with reference to fig. 5.
For example, it is assumed that the homologous application includes the first application and the second application, the first application is a communication application, the second application is a taxi-taking application, and the terminal device configures permissions for the first application, that is, the second permissions are a short message permission, a contact permission and a camera permission, and the terminal device configures permissions for the second application, that is, the first permissions are a recording permission, a contact permission, a motion permission, a position permission and a camera permission. Then, in a possible implementation manner, as shown in fig. 5 (a), when the terminal device detects that the total number of the permissions acquired by the communication application and the taxi taking application is greater than or equal to a preset threshold, the terminal device may display a prompt message (i.e., the first prompt message) that the number of the permissions acquired by the communication application is 3, the number of the permissions acquired by the taxi taking application is 5, and there is a risk of information leakage, so as to prompt the user that the number of the permissions acquired by the homologous application exceeds the preset threshold, and there is a risk of information leakage. In another possible implementation manner, as shown in fig. 5 (b), when the terminal device detects that the total number of the permissions acquired by the communication application and the taxi taking application is greater than or equal to the preset threshold, the terminal device may display a prompt message (i.e., the first prompt message) "the total number of the permissions acquired by the communication application and the taxi taking application is too large, and there is a risk of information leakage", so as to prompt the user that the number of the permissions acquired by the homologous application exceeds the preset threshold, and there is a risk of information leakage.
Optionally, in the embodiment of the present invention, the foregoing S204 may also be executed alone, that is, S204 may not be executed in combination with the method shown in fig. 2. Specifically, reference may be made to the description related to the method shown in fig. 4 in the foregoing embodiment, and details are not described here again.
In the embodiment of the invention, under the condition that the total number of the authorities acquired by the homologous application program is greater than or equal to the preset threshold, the terminal device can prompt a user that information leakage risks possibly exist due to the fact that the total number of the authorities acquired by the homologous application program is too large through displaying the first prompt message, so that the user can timely know the security of the privacy information of the user, the user experience is further improved, and the man-machine interaction performance is improved.
Optionally, in the embodiment of the present invention, if the target condition is that the terminal device downloads the first application program, that is, the terminal device executes the permission processing method provided in the embodiment of the present invention under the condition that the first application program is downloaded, after the terminal device determines the second application program that belongs to the same-source application program as the first application program, before the terminal device processes the first permission according to the first manner, the terminal device may further prompt the user whether to install the first application program.
For example, with reference to fig. 2, as shown in fig. 6, after S201 and before S202, the method for processing permissions according to the embodiment of the present invention may further include S205-S206 described below. S202 may be specifically implemented by S202a described below.
And S205, the terminal equipment displays the second prompt message.
The second prompt message may be used to prompt the user whether to install the first application program.
In this embodiment of the present invention, after the terminal device determines a second application program that belongs to a homologous application program with the first application program, the terminal device may display the second display information to prompt a user whether to install the first application program.
It is to be understood that, when there is an application program belonging to a same source application program as the first application program, the terminal device may prompt the user whether to install the first application program in order to prevent the privacy information of the user from being revealed.
Optionally, in this embodiment of the present invention, the second prompting information may include first prompting content and a first prompting option. The first prompt content is used for prompting the user whether to install the first application program, the first prompt option can comprise a first option and a second option, the first option can be used for determining that the first application program is installed, and the second option can be used for determining that the first application program is not installed.
For example, as shown in fig. 7, the first prompt content may be "whether to install the first application? "(as shown at 70 in fig. 7), the first option may be a" yes "option (as shown at 71 in fig. 7), and the second option may be a" no "option (as shown at 72 in fig. 7).
In the embodiment of the invention, after the terminal device displays the second prompt message, the user can trigger the terminal device to execute different actions through different inputs of the second prompt message. Specifically, the user may trigger the terminal device to process the first right according to the first mode through a first input of a second prompt message, and install a first application program; that is, the user may trigger the terminal device to perform S202a described below by the first input of the second prompt information. Or the user can trigger the terminal device not to install the first application program and download and install a third application program which has the same application type as the first application program and does not belong to the same source application program as the second application program through second input of the second prompt message; that is, the user may trigger the terminal device to execute S206 described below by the second input of the second prompt information.
S202a, when receiving a first input of the second prompt information from the user, the terminal device processes the first right according to the first mode, and installs the first application.
Wherein the first input may be used to determine to install the first application. Illustratively, the first input may be a user input to the "yes" option shown at 71 in fig. 7.
It should be noted that, the embodiment of the present invention may not limit the input form of the first input, and may specifically be determined according to the actual use requirement, and the embodiment of the present invention is not limited.
And S206, under the condition that the second input of the user to the second prompt information is received, the terminal equipment downloads and installs the third application program.
Wherein the second input is used to determine not to install the first application. Illustratively, the second input may be a user input to the "no" option shown at 72 in fig. 7.
It should be noted that, the embodiment of the present invention may not limit the input form of the second input, and may specifically be determined according to actual use requirements, and the embodiment of the present invention is not limited.
The third application program is an application program of the same application type as the first application program, and the third application program and the second application program do not belong to a same source application program. For example, assuming that the first application is a shopping application 1 and the second application is a taxi-taking application, the third application may be a shopping application that is not a same source application as the taxi-taking application 1, for example, the third application may be a shopping application 2.
Optionally, in this embodiment of the present invention, the terminal device may download and install the third application program according to the history information. The history information may be history download information of an application program which is downloaded by most of the terminal devices and has the same application type as the first application program and is not a source application program as the second application program, and which is collected by the server.
In the embodiment of the invention, after the terminal device displays the second prompt message, if the user determines to install the first application program, the user can perform the first input on the second prompt message to trigger the terminal device to process the first permission according to the first mode and install the first application program. If the user determines not to install the first application program, the user can perform second input on the second prompt message to trigger the terminal device not to install the first application program, and download and install a third application program which is the same as the first application program in application type and does not belong to the same source application program as the second application program. Therefore, on the basis of ensuring that the application program of a certain application type is normally installed, a plurality of homologous application programs are prevented from simultaneously acquiring a plurality of authorities in the terminal equipment, and therefore privacy information of a user is prevented from being leaked.
Optionally, in this embodiment of the present invention, before the terminal device downloads and installs the third application program, the terminal device may display third prompt information to prompt the user whether to install the third application program.
For example, with reference to fig. 6 and fig. 8, in the authority processing method provided in the embodiment of the present invention, the above S206 may be specifically implemented by the following S206a and S206 b. After S206a, the method for processing authority provided by the embodiment of the present invention may further include S206c described below.
S206a, the terminal device displays the third prompting message when receiving the second input of the second prompting message from the user.
And the third prompt message is used for prompting the user whether to install the third application program.
In the embodiment of the present invention, in a case that a second input of the second prompt information by the user is received, the terminal device may display the third display information to prompt the user whether to install the third application program.
Optionally, in this embodiment of the present invention, the third prompting information may include second prompting content and second prompting options. The second prompting content is used for prompting the user whether to install the third application program, the second prompting option can comprise a third option and a fourth option, the third option can be used for determining to install the third application program, and the fourth option can be used for determining not to install the third application program.
For example, as shown in fig. 9, the second prompt content may be "whether to install the third application? "(as indicated at 90 in fig. 9), the third option may be a" yes "option (as indicated at 91 in fig. 9), and the fourth option may be a" no "option (as indicated at 92 in fig. 9).
S206b, upon receiving a third input of the third prompt information from the user, the terminal device downloads and installs the third application.
Wherein the third input is used to determine to install the third application. Illustratively, the third input may be a user input to the "yes" option shown at 91 in fig. 9.
It should be noted that, the embodiment of the present invention may not limit the input form of the third input, and may specifically be determined according to the actual use requirement, and the embodiment of the present invention is not limited.
And S206c, under the condition that the fourth input of the third prompt information by the user is received, the terminal equipment quits the downloading interface.
Wherein the fourth input is used to determine that the third application is not installed. Illustratively, the fourth input may be a user input to the "no" option shown at 92 in fig. 9.
It should be noted that, the embodiment of the present invention may not limit the input form of the fourth input, and may specifically be determined according to the actual use requirement, and the embodiment of the present invention is not limited.
It should be noted that, in the case that the target condition is that the terminal device downloads the first application program, before the terminal device executes the foregoing S201, the terminal device may display a download interface, where the download interface may be used for the terminal device to download the application program. In this way, after the terminal device receives the fourth input of the third prompt message from the user, the terminal device may exit the download interface.
In the embodiment of the present invention, after the terminal device displays the third prompt information, if the user determines to install the third application program, the user may trigger the terminal device to install the third application program by performing a third input on the third prompt information; and if the user determines that the third application program is not installed, the user can trigger the terminal device not to install the third application program by performing fourth input on the third prompt information, and quit the currently displayed downloading interface. Therefore, the terminal equipment can be provided with or without the third application program according to the requirements of the user, so that the user experience can be improved, and the man-machine interaction performance can be improved.
In the embodiment of the present invention, the authority processing methods shown in the above method drawings are all exemplarily described by referring to one drawing in the embodiment of the present invention. In specific implementation, the authority processing method shown in each method drawing can also be implemented by combining any other drawing which can be combined and is illustrated in the above embodiments, and details are not described here.
As shown in fig. 10, an embodiment of the present invention provides a terminal device 400, where the terminal device 400 may include a determining module 401 and a processing module 402. The determining module 401 is configured to determine, in the N applications installed in the terminal device, a second application that belongs to a homologous application with the first application when a target condition is met, where the target condition is at least one of: the terminal equipment downloads the first application program and runs the first application program; a processing module 402, configured to process a first right according to a first manner, where the first right is a right configured by the terminal device for the second application determined by the determining module 401, and the first manner includes at least one of the following: a way of closing the right, a way of encrypting information corresponding to the right, N being a positive integer.
Optionally, the processing module 402 is further configured to, when the terminal device runs the second application, process the first right according to a second manner corresponding to the first manner, where the second manner includes at least one of the following: the way of opening the rights, the way of decrypting the information corresponding to the rights.
Optionally, with reference to fig. 10, as shown in fig. 11, the terminal device provided in the embodiment of the present invention may further include a display module 403. The display module 403 is configured to display first prompt information when the target number is greater than or equal to a preset threshold, where the first prompt information is used to prompt that the number of permissions acquired by the user from the source application exceeds the preset threshold, the target number is a sum of the number of the first permissions and the number of second permissions, and the second permission is a permission configured by the terminal device for the first application.
Optionally, the target condition may be that the terminal device downloads a first application program. With reference to fig. 10, as shown in fig. 11, the terminal device provided in the embodiment of the present invention may further include a display module 403. The display module 403 is configured to, after the determining module 401 determines that the second application belongs to the same source application as the first application, display a second prompt message before the processing module 402 processes the first permission according to the first manner, where the second prompt message is used to prompt the user whether to install the first application; the processing module 402 is specifically configured to, in a case that a first input of the second prompt information by the user is received, process the first right according to a first manner, and install the first application program, where the first input is used to determine to install the first application program.
Optionally, the processing module 402 is further configured to, after the display module 403 displays the second prompt message, download and install a third application program in a case that a second input of the second prompt message is received, where the third application program is an application program of the same application type as the first application program, and the third application program and the first application program do not belong to a same source application program, and the second input is used to determine that the first application program is not installed.
Optionally, the display module 403 is further configured to provide third prompt information, where the third prompt information is used to prompt a user whether to install a third application program; the processing module 402 is further configured to download and install the third application program when receiving a third input of the third prompt message from the user, where the third input is used to determine to install the third application program.
Optionally, the processing module 402 is further configured to quit the downloading interface after the display module 403 displays the third prompt information and receiving a fourth input of the third prompt information from the user, where the downloading interface is used to download the application program.
In an embodiment of the present invention, the first input, the second input, the third input, and the fourth input may be received by a receiving module in the terminal device.
The terminal device provided by the embodiment of the present invention can implement each process implemented by the terminal device in the above method embodiments, and is not described here again to avoid repetition.
The embodiment of the invention provides terminal equipment, which can determine a second application program which belongs to a homologous application program with a first application program in N (N is a positive integer) application programs installed in the terminal equipment under the condition of meeting target conditions (at least one of the following conditions is that the terminal equipment downloads the first application program and the terminal equipment runs the first application program); and processing the first right (the first right is the right configured by the terminal device for the second application program) according to a first mode (the first mode comprises at least one of the following modes: a mode of closing the right and a mode of encrypting information corresponding to the right). By the scheme, when the terminal device downloads an application program and/or runs an application program, the terminal device can close the authority configured for other application programs (the other application programs and the application program belong to the same-source application program) by the terminal device or encrypt information corresponding to the authority configured for the other application programs by the terminal device, so that the same-source application programs can be prevented from simultaneously acquiring different authorities in the terminal device, developers or operators of the same-source application programs can be prevented from acquiring detailed information of users after data acquired by the same-source application programs according to different authorities are superposed, processed and the like, further privacy information of the users can be prevented from being leaked, and the safety of the privacy information of the users is ensured.
Fig. 12 is a schematic diagram of a hardware structure of a terminal device for implementing various embodiments of the present invention. As shown in fig. 12, the terminal device 100 includes, but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the terminal device configuration shown in fig. 12 does not constitute a limitation of the terminal device, and that the terminal device may include more or fewer components than shown, or combine certain components, or a different arrangement of components. In the embodiment of the present invention, the terminal device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 110 is configured to determine, in the case that the target condition is satisfied, a second application program that belongs to a homologous application program with the first application program among N application programs installed in the terminal device; and processes the first right in a first manner. Wherein the target condition may be at least one of: the terminal equipment downloads the first application program and runs the first application program; the first mode may include at least one of: the method comprises the steps of closing the authority and encrypting information corresponding to the authority, wherein the first authority is the authority configured for the second application program by the terminal equipment.
In an embodiment of the present invention, the first input, the second input, the third input, and the fourth input may be received by the user input unit 107.
It can be understood that, in the embodiment of the present invention, the determining module 401 and the processing module 402 in the structural schematic diagrams of the terminal device (for example, fig. 10 and fig. 11) may be implemented by the processor 110. The display module 403 in the schematic structural diagram of the terminal device (for example, fig. 11) may be implemented by the display unit 106.
The embodiment of the invention provides terminal equipment, which can determine a second application program which belongs to a homologous application program with a first application program in N (N is a positive integer) application programs installed in the terminal equipment under the condition of meeting target conditions (at least one of the following conditions is that the terminal equipment downloads the first application program and the terminal equipment runs the first application program); and processing the first right (the first right is the right configured by the terminal device for the second application program) according to a first mode (the first mode comprises at least one of the following modes: a mode of closing the right and a mode of encrypting information corresponding to the right). By the scheme, when the terminal device downloads an application program and/or runs an application program, the terminal device can close the authority configured for other application programs (the other application programs and the application program belong to the same-source application program) by the terminal device or encrypt information corresponding to the authority configured for the other application programs by the terminal device, so that the same-source application programs can be prevented from simultaneously acquiring different authorities in the terminal device, developers or operators of the same-source application programs can be prevented from acquiring detailed information of users after data acquired by the same-source application programs according to different authorities are superposed, processed and the like, further privacy information of the users can be prevented from being leaked, and the safety of the privacy information of the users is ensured.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 101 may be used for receiving and sending signals during a message transmission or call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through a wireless communication system.
The terminal device provides wireless broadband internet access to the user through the network module 102, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the network module 102 or stored in the memory 109 into an audio signal and output as sound. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the terminal device 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 includes a speaker, a buzzer, a receiver, and the like.
The input unit 104 is used to receive an audio or video signal. The input unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the graphics processing unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the network module 102. The microphone 1042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode.
The terminal device 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or the backlight when the terminal device 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal device posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 105 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal device. Specifically, the user input unit 107 includes a touch panel 1071 and other input devices 1072. Touch panel 1071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 1071 (e.g., operations by a user on or near touch panel 1071 using a finger, stylus, or any suitable object or attachment). The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and receives and executes commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Specifically, other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 1071 may be overlaid on the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although in fig. 12, the touch panel 1071 and the display panel 1061 are two independent components to implement the input and output functions of the terminal device, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the terminal device, and is not limited herein.
The interface unit 108 is an interface for connecting an external device to the terminal apparatus 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the terminal apparatus 100 or may be used to transmit data between the terminal apparatus 100 and the external device.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the terminal device, connects various parts of the entire terminal device by using various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the terminal device. Processor 110 may include one or more processing units; alternatively, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The terminal device 100 may further include a power supply 111 (such as a battery) for supplying power to each component, and optionally, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
In addition, the terminal device 100 includes some functional modules that are not shown, and are not described in detail here.
Optionally, an embodiment of the present invention further provides a terminal device, where the terminal device may include the processor 110 shown in fig. 12, the memory 109, and a computer program stored in the memory 109 and capable of running on the processor 110, and when the computer program is executed by the processor 110, the computer program implements each process of the foregoing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not described here again.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the processes of the method embodiments, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may include a read-only memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, and the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (11)

1. A permission processing method is applied to a terminal device, and comprises the following steps:
under the condition that a target condition is met, determining a second application program which belongs to a homologous application program with a first application program in N application programs installed in the terminal equipment, wherein N is a positive integer, and the target condition is at least one of the following conditions: the terminal equipment downloads the first application program and runs the first application program; the homologous application programs are application programs developed by the same developer or application programs operated by the same operator;
processing a first right according to a first mode, wherein the first right is a right configured for the second application program by the terminal equipment, and the first mode comprises at least one of the following modes: a way to close the rights, a way to encrypt information corresponding to the rights.
2. The method of claim 1, wherein after processing the first right in the first manner, the method further comprises:
processing the first permission according to a second mode corresponding to the first mode under the condition that the terminal device runs the second application program, wherein the second mode comprises at least one of the following modes: the way of opening the rights, the way of decrypting the information corresponding to the rights.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
and displaying first prompt information when the target number is greater than or equal to a preset threshold, wherein the first prompt information is used for prompting that the number of the authorities acquired by the user from the same source application exceeds the preset threshold, the target number is the sum of the number of the first authorities and the number of second authorities, and the second authorities are the authorities configured for the first application program by the terminal equipment.
4. The method according to claim 1, wherein the target condition is that the terminal device downloads the first application;
after determining a second application program that belongs to a homologous application program with the first application program and before processing the first right in the first manner, the method further comprises:
displaying second prompt information, wherein the second prompt information is used for prompting a user whether to install the first application program;
the processing the first right in the first manner includes:
and under the condition that first input of the second prompt message by the user is received, processing the first authority according to the first mode, and installing the first application program, wherein the first input is used for determining the installation of the first application program.
5. The method of claim 4, wherein after displaying the second prompting message, the method further comprises:
and downloading and installing a third application program under the condition that second input of the user for the second prompt message is received, wherein the third application program is an application program with the same application type as the first application program, the third application program and the second application program do not belong to the same source application program, and the second input is used for determining that the first application program is not installed.
6. The terminal equipment is characterized by comprising a determining module and a processing module;
the determining module is configured to determine, in N applications installed in the terminal device, a second application that belongs to a homologous application with the first application under a condition that a target condition is satisfied, where N is a positive integer, and the target condition is at least one of: the terminal equipment downloads the first application program and runs the first application program; the homologous application programs are application programs developed by the same developer or application programs operated by the same operator;
the processing module is configured to process a first right according to a first manner, where the first right is a right configured by the terminal device for the second application program determined by the determining module, and the first manner includes at least one of the following: a way to close the rights, a way to encrypt information corresponding to the rights.
7. The terminal device of claim 6,
the processing module is further configured to, when the terminal device runs the second application, process the first right according to a second manner corresponding to the first manner, where the second manner includes at least one of the following: the way of opening the rights, the way of decrypting the information corresponding to the rights.
8. The terminal device according to claim 6 or 7, wherein the terminal device further comprises a display module;
the display module is configured to display first prompt information when the target number is greater than or equal to a preset threshold, where the first prompt information is used to prompt that the number of permissions acquired by a user from a source application exceeds the preset threshold, the target number is the sum of the number of the first permissions and the number of second permissions, and the second permission is the permission configured by the terminal device for the first application program.
9. The terminal device according to claim 6, wherein the target condition is that the terminal device downloads the first application program, and the terminal device further comprises a display module;
the display module is configured to display second prompt information after the determination module determines that the second application program belongs to a same source application program as the first application program and before the processing module processes the first permission according to the first mode, where the second prompt information is used to prompt a user whether to install the first application program;
the processing module is specifically configured to, in a case where a first input of the second prompt information displayed by the display module by a user is received, process the first permission in the first manner, and install the first application program, where the first input is used to determine to install the first application program.
10. The terminal device of claim 9,
the processing module is further configured to, after the display module displays the second prompt message, download and install a third application program under the condition that a second input of the second prompt message by the user is received, where the third application program is an application program of the same application type as the first application program, and the third application program and the second application program do not belong to a same source application program, and the second input is used to determine that the first application program is not installed.
11. A terminal device, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, implements the steps of the rights processing method according to any one of claims 1 to 5.
CN201910551473.3A 2019-06-24 2019-06-24 Permission processing method and terminal device Active CN110443030B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910551473.3A CN110443030B (en) 2019-06-24 2019-06-24 Permission processing method and terminal device
PCT/CN2020/082082 WO2020258961A1 (en) 2019-06-24 2020-03-30 Permission processing method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910551473.3A CN110443030B (en) 2019-06-24 2019-06-24 Permission processing method and terminal device

Publications (2)

Publication Number Publication Date
CN110443030A CN110443030A (en) 2019-11-12
CN110443030B true CN110443030B (en) 2021-04-27

Family

ID=68428257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910551473.3A Active CN110443030B (en) 2019-06-24 2019-06-24 Permission processing method and terminal device

Country Status (2)

Country Link
CN (1) CN110443030B (en)
WO (1) WO2020258961A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443030B (en) * 2019-06-24 2021-04-27 维沃移动通信有限公司 Permission processing method and terminal device
CN111125680A (en) * 2019-11-29 2020-05-08 维沃移动通信有限公司 Permission setting method and terminal equipment

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999026123A1 (en) * 1997-11-18 1999-05-27 Christopher Benjamin Wakely Improvements relating to software protection systems
US7076804B2 (en) * 2001-05-11 2006-07-11 International Business Machines Corporation Automated program resource identification and association
KR101285394B1 (en) * 2011-08-24 2013-08-23 주식회사 팬택 Apparatus and Method for Controlling Permission in Mobile Terminal
CN103310149B (en) * 2013-05-27 2018-06-26 华为终端(东莞)有限公司 The method, apparatus and terminal of system function call
KR20160098912A (en) * 2015-02-11 2016-08-19 한국전자통신연구원 Method for Re-adjusting Application Permission and User terminal for performing the same Method
CN106372491B (en) * 2015-12-15 2021-03-02 北京智谷睿拓技术服务有限公司 Sensor access right management method and device
CN106569832A (en) * 2016-11-10 2017-04-19 北京金山安全软件有限公司 Application program management method and device and terminal
CN108681427B (en) * 2018-05-28 2020-06-30 维沃移动通信有限公司 Access right control method and terminal equipment
CN109343900B (en) * 2018-08-30 2022-04-08 维沃移动通信有限公司 Permission configuration method and terminal
CN110443030B (en) * 2019-06-24 2021-04-27 维沃移动通信有限公司 Permission processing method and terminal device

Also Published As

Publication number Publication date
CN110443030A (en) 2019-11-12
WO2020258961A1 (en) 2020-12-30

Similar Documents

Publication Publication Date Title
CN109542282B (en) Interface display method and terminal equipment
CN110062105B (en) Interface display method and terminal equipment
CN111027030B (en) Permission setting method and terminal device
CN110908557B (en) Information display method and terminal equipment
CN110058836B (en) Audio signal output method and terminal equipment
CN108595946B (en) Privacy protection method and terminal
CN110457935B (en) Permission configuration method and terminal equipment
CN108681664B (en) Encryption method and device
CN110007822B (en) Interface display method and terminal equipment
CN111163260B (en) Camera starting method and electronic equipment
CN109857495A (en) A kind of display control method and terminal device
CN108681427B (en) Access right control method and terminal equipment
CN108804151B (en) Method and terminal for restarting application program
CN110457879A (en) Object displaying method and terminal device
CN110443030B (en) Permission processing method and terminal device
CN109992941B (en) Authority management method and terminal equipment
CN109522741B (en) Application program permission prompting method and terminal equipment thereof
CN110167006B (en) Method for controlling application program to use SIM card and terminal equipment
CN109343900B (en) Permission configuration method and terminal
CN109857305B (en) Input response method and mobile terminal
CN111125680A (en) Permission setting method and terminal equipment
CN110232275B (en) Control method and terminal equipment
CN111381753B (en) Multimedia file playing method and electronic equipment
CN109815678B (en) Permission configuration method and mobile terminal
CN111310250A (en) Application sharing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant