CN111062025B - Application data processing method and related device - Google Patents

Application data processing method and related device Download PDF

Info

Publication number
CN111062025B
CN111062025B CN201911252496.0A CN201911252496A CN111062025B CN 111062025 B CN111062025 B CN 111062025B CN 201911252496 A CN201911252496 A CN 201911252496A CN 111062025 B CN111062025 B CN 111062025B
Authority
CN
China
Prior art keywords
application
module
party application
media
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911252496.0A
Other languages
Chinese (zh)
Other versions
CN111062025A (en
Inventor
王文东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201911252496.0A priority Critical patent/CN111062025B/en
Publication of CN111062025A publication Critical patent/CN111062025A/en
Application granted granted Critical
Publication of CN111062025B publication Critical patent/CN111062025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application discloses an application data processing method and a related device, wherein the method comprises the following steps: the third-party application sends a media platform version acquisition request carrying an authentication code to the media service module; the media service module receives the media platform version acquisition request, verifies the authentication code and passes the verification, and sends the media platform version information to the third-party application; the third party application receives the media platform version information, selects an enhanced function supported by the operating system according to the media platform version information, enables an algorithm module of the enhanced function through the media service module, and processes application data through the algorithm module to realize the enhanced function. The embodiment of the application is beneficial to safely opening the bottom layer function.

Description

Application data processing method and related device
Technical Field
The present application relates to the field of electronic device technologies, and in particular, to an application data processing method and a related apparatus.
Background
At present, various third-party applications are increasingly widely applied to electronic equipment, and the third-party applications can access the underlying data through a standard application interface.
Disclosure of Invention
The embodiment of the application provides an application data processing method and a related device, so as to safely open a bottom layer function.
In a first aspect, an embodiment of the present application provides an application data processing method, which is applied to an electronic device, where the electronic device includes a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the method comprises the following steps:
the third-party application sends a media platform version acquisition request carrying an authentication code to the media service module;
the media service module receives the media platform version acquisition request, verifies the authentication code and passes the verification, and sends the media platform version information to the third-party application;
the third party application receives the media platform version information, selects an enhanced function supported by the operating system according to the media platform version information, enables an algorithm module of the enhanced function through the media service module, and processes application data through the algorithm module to realize the enhanced function.
In a second aspect, an application data processing apparatus is provided in an embodiment of the present application, and is applied to an electronic device, where the electronic device includes a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the apparatus comprises a processing unit and a communication unit, wherein,
the processing unit is used for controlling the third-party application to send a media platform version acquisition request carrying an authentication code to the media service module; the media service module is used for controlling the media platform version acquisition request to be received, the authentication code is verified and passes the verification, and the media platform version information is sent to the third-party application; and the algorithm module is used for controlling the third-party application to receive the media platform version information, selecting the enhanced function supported by the operating system according to the media platform version information, enabling the enhanced function through the media service module, and processing application data through the algorithm module to realize the enhanced function.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method of the first aspect of the embodiment of the present application.
In a fourth aspect, an embodiment of the present application provides a chip, including: and the processor is used for calling and running the computer program from the memory so that the device provided with the chip executes part or all of the steps described in any method of the first aspect of the embodiment of the application.
In a fifth aspect, this application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program enables a computer to perform some or all of the steps described in any one of the methods of the first aspect of this application.
In a sixth aspect, the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the present application, the electronic device includes a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the third party application firstly sends a media platform version acquisition request carrying an authentication code to a media service module; secondly, the media service module receives the media platform version acquisition request, verifies the authentication code and passes the verification, and sends the media platform version information to the third-party application; and finally, the third-party application receives the version information of the media platform, selects the enhanced function supported by the operating system according to the version information of the media platform, enables the algorithm module of the enhanced function through the media service module, and processes the application data through the algorithm module to realize the enhanced function. Therefore, in the embodiment of the application, the third-party application of the electronic device can perform security verification through the authentication code, and the algorithm module of the native enhanced function of the operating system is triggered to process the application data of the application after the verification is passed, so that the bottom-layer core capability is opened to the third-party application after the authentication is realized, the bottom-layer capability is not directly used, the security can be effectively controlled, and the safe opening of the bottom-layer function is facilitated.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic diagram of a software system architecture of an electronic device according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an application data processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another application data processing method provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 5 is a block diagram illustrating functional units of an application data processing apparatus according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device according to the embodiments of the present application may be an electronic device with communication capability, and the electronic device may include various handheld devices with wireless communication function, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and so on.
Currently, in an Android platform, a three-party camera Application can access underlying Application data through a standard Android Application Programming Interface (API), but if a user wants to use more underlying enhanced functions or an image processed through an algorithm, there is no corresponding standard Interface to map underlying capabilities to three parties for access. However, it is very important to ensure security after opening the functions of the underlying core, and the current scheme authorizes the security by means of white list or the like.
For the platform developed now, the authorization method of both parties is still simple and insecure after releasing Software Development Kit (SDK) or after close cooperation. The system is easy to be attacked by tampering, simulation and the like, so that the system is greatly influenced.
In view of the foregoing problems, embodiments of the present application provide an application data processing method and a related apparatus, and the following describes embodiments of the present application in detail with reference to the accompanying drawings.
As shown in fig. 1, an electronic device 100 according to an embodiment of the present application includes a media service module and an operating system (e.g., an android operating system, which is not limited herein exclusively), an application layer of the operating system is provided with a third party application and a media management module (also referred to as a media interface module), a hardware abstraction layer of the operating system is provided with a hardware abstraction module (e.g., an android native module, such as a native camera hardware abstraction module CameraHAL), a media policy module and an algorithm management module, and further, an operating system native architecture includes a framework layer and a driver layer, the framework layer includes application interfaces (e.g., a native camera application program interface) of various native applications, application services (e.g., a native camera service), a framework layer interface (e.g., Google HAL3interface), the hardware abstraction layer includes a hardware abstraction layer interface (e.g., HAL3.0), and hardware abstraction modules (e.g., a camera hardware abstraction module), the driver layer includes various drivers (e.g., screen Display driver, Audio driver, etc.) for enabling various hardware of the electronic device, such as the image signal processor ISP + front-end image sensors, etc.
The media service module is independent of the operating system, third-party applications can communicate with the media service module through the media management module, the media service module can communicate with the media policy module through an android native information link formed by an application interface, an application service, a frame layer interface, a hardware abstraction layer interface and the hardware abstraction module, the media policy module communicates with the algorithm management module, the algorithm management module maintains an android native algorithm library, the algorithm library comprises enhancement functions supported by various native applications, and for example, for a native camera application, the enhancement functions such as binocular shooting, beauty, sharpening, night vision and the like are supported. In addition, the media service module can also directly communicate with the media policy module or the algorithm management module.
Based on the above framework, the media service module may enable the algorithm module in the algorithm library through the android native information link, the media policy module, and the algorithm management module, or enable the algorithm module in the algorithm library directly through the media policy module and the algorithm management module, or enable the algorithm module in the algorithm library directly through the algorithm management module, thereby implementing an enhanced function of opening native application association for third-party applications.
Based on the above framework, the media service module may invoke the driver of the application to enable some hardware through an android native information link, or through a first information link composed of the media policy module and the hardware abstraction module, or through a second information link composed of the media policy module, the algorithm management module, and the hardware abstraction module, thereby implementing opening native application-related hardware for a third party application.
Referring to fig. 2, fig. 2 is a flowchart illustrating an application data processing method according to an embodiment of the present application, where the application data processing method can be applied to the electronic device shown in fig. 1. As shown in the figure, the application data processing method includes the following operations.
S201, a third party application sends a media platform version acquisition request carrying an authentication code to a media service module;
the third-party application may be various applications that need to use the underlying application data of the electronic device, such as a camera application and a map application.
S202, the media service module receives the media platform version acquisition request, verifies the authentication code and passes the verification, and sends the media platform version information to the third-party application;
for example, the media service oma edia service module receives a media platform oma edia version acquisition request carrying an authentication code from a third-party application, verifies the authentication code, and returns the oma edia version information to the third-party application if the verification is successful, for example, a character string such as "1.1: 1.2" may be returned.
S203, the third party application receives the media platform version information, selects the enhancement function supported by the operating system according to the media platform version information, enables the algorithm module of the enhancement function through the media service module, and processes application data through the algorithm module to realize the enhancement function.
It can be seen that, in the embodiment of the present application, the electronic device includes a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the third party application firstly sends a media platform version acquisition request carrying an authentication code to a media service module; secondly, the media service module receives the media platform version acquisition request, verifies the authentication code and passes the verification, and sends the media platform version information to the third-party application; and finally, the third-party application receives the version information of the media platform, selects the enhanced function supported by the operating system according to the version information of the media platform, enables the algorithm module of the enhanced function through the media service module, and processes the application data through the algorithm module to realize the enhanced function. Therefore, in the embodiment of the application, the third-party application of the electronic device can perform security verification through the authentication code, and the algorithm module of the native enhanced function of the operating system is triggered to process the application data of the application after the verification is passed, so that the bottom-layer core capability is opened to the third-party application after the authentication is realized, the bottom-layer capability is not directly used, the security can be effectively controlled, and the safe opening of the bottom-layer function is facilitated.
In one possible example, the media service module verifying the authentication code and verifying pass includes: the media service module acquires an asymmetric private key of the preconfigured third-party application; the media service module decrypts the authentication code by using the asymmetric private key to obtain an APP signature key, a system date and an appointed field of the third-party application; and the media service module determines that the verification is passed according to the APP signature key, the system date and the appointed field.
The asymmetric private key is one of key pairs in asymmetric encryption, and an asymmetric encryption algorithm needs two keys: public keys (public keys for short) and private keys (private keys for short). The public key and the private key are a pair, and if data is encrypted by the public key, the data can be decrypted only by the corresponding private key. This algorithm is called asymmetric encryption algorithm because two different keys are used for encryption and decryption. The basic process of realizing confidential information exchange by the asymmetric encryption algorithm is as follows: the first party generates a pair of secret keys and discloses the public keys, and needs to send other roles of information to the first party, namely, the second party uses the public keys to encrypt confidential information and then sends the encrypted information to the first party, and the first party uses the private keys to decrypt the encrypted information.
In the specific implementation, the APP signature key can be understood as permission for installing third-party application, after the third-party application is downloaded to the electronic device, the third-party application is sent to an internal server, the internal server uses an asymmetric public key to encrypt according to the APP signature key, system date, appointed fields and other information of the third-party application to obtain an authentication code, the encrypted information can also be information such as authorization duration, an OMediaService module can obtain a preconfigured asymmetric private key of the third-party application corresponding to the public key after receiving the authentication code from the third-party application, then uses the asymmetric private key to decrypt authentication to obtain the APP signature key, system date, appointed fields and other information of the third-party application, then the system judges the information, and if the information passes correct verification.
It can be seen that, in this example, the OMediaService module first obtains the preconfigured asymmetric private key, then decrypts the authentication code using the private key, obtains the APP signature key, the system date, and the agreed field of the third-party application, and then determines that the verification is passed according to the APP signature key, the system date, and the agreed field, and performs encryption authorization and decryption by using the asymmetric secret key, so that the security can be effectively controlled, and the security of enhancing the function openness is favorably ensured.
In one possible example, the authentication code is an RSA encrypted ciphertext.
The RSA algorithm is one of asymmetric encryption algorithms, and the RSA algorithm is long in key and high in safety.
In this example, the authentication code is an RSA encrypted ciphertext, which is beneficial to improving security.
In one possible example, the method further comprises: and the media service module checks the authentication code and returns a null character string to the third-party application if the check fails.
The authentication code may be sent by the third party application to the oma service module through the media management oma manager module.
As can be seen, in this example, after the OMediaService module verifies the authentication code from the third-party application, if the verification fails, the OMediaManager module returns a null character string to the third-party application, so that the verification result is made clear, and the accurate transmission of the verification result is facilitated.
In one possible example, the third party application selects the enhanced functions supported by the operating system according to the media platform version information, including: the third party application sends a capability acquisition request carrying the version information of the media platform to the media service module; the media service module receives the capability acquisition request, inquires an application capability list of the media platform version information, and sends the application capability list to the third-party application; the third-party application receives the application capability list, and inquires the application capability list to acquire the enhanced functions supported by the current media platform for the third-party application; and determining the enhanced functions selected to be open among the enhanced functions.
In the application capability list of the media platform version information, all the enhanced functions supported by the currently used ome for the third party application, that is, the enhanced functions accessible to the third party application, may be listed.
In a specific implementation, the enhanced function selected to be opened may be actively selected by a user (for example, the third-party application displays all enhanced functions supported by the current media platform for the third-party application on a screen, and determines the enhanced functions according to the selection of the user), or may be intelligently selected by the third-party application in combination with user portrait information (for example, in the third-party camera application, if the user portrait information is female, and the professional is a news media worker, the enhanced function such as high definition may be intelligently selected), or may be automatically selected by the third-party application in combination with current scene information (for example, if the enhanced function of the third-party camera application includes a night scene function, if the current scene is a night scene, the enhanced function may be automatically selected).
As can be seen, in this example, the third-party application can obtain the enhanced capability supported by the current media platform for the third-party application according to the application capability list of the query platform version information, and then determine the enhanced function selected to be opened in the enhanced functions according to the capability list, thereby implementing safe opening of the enhanced function to the third-party application.
In one possible example, a hardware abstraction layer of the operating system is provided with a hardware abstraction module, a media policy module and an algorithm management module; the algorithm module for enabling the enhanced function by the third party application through the media service module comprises: the third-party application sends the selected open enhanced function to the media service module; the media service module receives the enhanced function selected to be opened and sends the enhanced function selected to be opened to the algorithm management module through the media strategy module; the algorithm management module enables the algorithm module of the enhanced function selected to be opened.
In a specific implementation, after receiving the enhancement function selected to be opened, the OMediaService module converts first configuration information of the enhancement function selected to be opened into second configuration information that can be identified by the AlgoManager module, and then sends the second configuration information to the algorithm management module through the media policy Omedia Strategy module. And the algomager can enable the algorithm module with the enhanced function selected to be opened according to the second configuration information, an information conversion process is arranged in the middle, and the bottom-layer capability is not directly used.
It can be seen that, in this example, after the oma data service receives the selected open enhanced function sent by the third-party application, the oma data service sends the selected open enhanced function to the AlgoManager module through the oma data module, and the AlgoManager module enables the algorithm module of the selected open enhanced function, and does not directly use the bottom-layer capability, so as to prevent the third-party from directly coupling and viewing the bottom-layer capability, which is beneficial to ensuring the security of the bottom-layer capability.
In one possible example, the third party application processes application data through the algorithm module to implement the enhanced functionality, including: the third party application sends a data acquisition request to the hardware abstraction module; the hardware abstraction module receives the data acquisition request, acquires the current application data to be processed of the third-party application, and sends an algorithm calling notification to the algorithm management module through the media policy module; the algorithm management module receives the algorithm calling notification, calls the algorithm module to process the application data to obtain processed application data, and sends the processed application data to the third-party application; and the third party application receives the processed application data and realizes the enhancement function according to the processed application data.
In the concrete implementation, after receiving a data acquisition request of a third-party application, a hardware abstraction module acquires current application data to be processed of the third-party application, and then an algorithm calling notification is sent to an algorithm management module through a media policy module, so that the algorithm management module calls an algorithm module with an enhanced function selected to be opened to process the application data after receiving the notification, or after acquiring the application data to be processed, the hardware abstraction module calls a corresponding algorithm module to process the application data, or after sending the algorithm calling notification to the media policy module, the hardware abstraction module calls the corresponding algorithm module to process, and then returns the processed application data to the third-party application.
It can be seen that, in this example, after the third-party application sends the data acquisition request to the hardware abstraction module, the hardware abstraction module may acquire current application data to be processed of the third-party application, and send an algorithm call notification to the algorithm management module through the media policy module, and finally call the algorithm module with the enhanced function selected to be open to process the application data, and return the processed application data to the third-party application, so that after the third-party application acquires the processed application data, the enhanced function is implemented according to the processed application data, which is beneficial for the third-party application to use the underlying enhanced function or the image processed through the underlying algorithm.
Referring to fig. 3, fig. 3 is a flowchart illustrating another application data processing method according to an embodiment of the present application, where the application data processing method can be applied to the electronic device shown in fig. 1.
As shown in the figure, the application data processing method includes the following operations:
s301, the third party application sends a media platform version acquisition request carrying an authentication code to a media service module;
s302, the media service module receives the media platform version obtaining request and obtains the preset asymmetric private key of the third-party application;
s303, the media service module uses the asymmetric private key to decrypt the authentication code to obtain an APP signature key, a system date and an appointed field of the third-party application;
s304, the media service module determines that the verification is passed according to the APP signature key, the system date and the appointed field, and sends the media platform version information to the third-party application;
s305, the third party application receives the media platform version information, selects the enhancement function supported by the operating system according to the media platform version information, enables the algorithm module of the enhancement function through the media service module, and processes application data through the algorithm module to realize the enhancement function.
It can be seen that, in the embodiment of the present application, the electronic device includes a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the third party application firstly sends a media platform version acquisition request carrying an authentication code to a media service module; secondly, the media service module receives the media platform version acquisition request, verifies the authentication code and passes the verification, and sends the media platform version information to the third-party application; and finally, the third-party application receives the version information of the media platform, selects an enhanced function supported by an operating system according to the version information of the media platform, enables an algorithm module of the enhanced function through the media service module, and processes application data through the algorithm module to realize the enhanced function. Therefore, in the embodiment of the application, the third-party application of the electronic device can perform security verification through the authentication code, and the bottom-layer algorithm module is triggered to process the bottom-layer application data required to be called by the third-party application after the verification is passed, so that the bottom-layer capability is opened to the third-party application after authentication is realized, the bottom-layer capability is not directly used, the security can be effectively controlled, and the safe opening of the bottom-layer function is facilitated.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device 400 according to an embodiment of the present disclosure, and as shown in the figure, the electronic device 400 includes an application processor 410, a memory 420, a communication interface 430, and one or more programs 421, where the one or more programs 421 are stored in the memory 420 and configured to be executed by the application processor 410, and the one or more programs 421 include instructions for executing any step in the foregoing method embodiment.
In one possible example, the program 421 includes instructions for performing the following steps: controlling the third-party application to send a media platform version acquisition request carrying an authentication code to the media service module; the media service module is controlled to receive the media platform version acquisition request, check the authentication code and pass the check, and send the media platform version information to the third-party application; and controlling the third-party application to receive the media platform version information, selecting an enhanced function supported by the operating system according to the media platform version information, enabling an algorithm module of the enhanced function through the media service module, and processing application data through the algorithm module to realize the enhanced function.
In one possible example, in controlling the media service module to verify the authentication code and verify that it is passed, the instructions in the program 421 are specifically for performing the following operations: controlling the media service module to obtain a preconfigured asymmetric private key of the third-party application; controlling the media service module to decrypt the authentication code by using the asymmetric private key to obtain an APP signature key, a system date and an appointed field of the third-party application; and controlling the media service module to determine that the verification passes according to the APP signature key, the system date and the appointed field.
In one possible example, the authentication code is an RSA encrypted ciphertext.
In one possible example, the program 421 also includes instructions for: and controlling the media service module to check the authentication code and if the check fails, returning a null character string to the third-party application.
In one possible example, in controlling the third-party application to select the enhanced functionality supported by the operating system according to the media platform version information, the instructions in the program 421 are specifically configured to: controlling the third-party application to send a capability acquisition request carrying the version information of the media platform to the media service module; controlling the media service module to receive the capability acquisition request, inquiring an application capability list of the media platform version information, and sending the application capability list to the third-party application; the third-party application is controlled to receive the application capability list, and the application capability list is inquired to obtain the enhanced functions supported by the current media platform aiming at the third-party application; and determining the enhanced functions selected to be open among the enhanced functions.
In one possible example, a hardware abstraction layer of the operating system is provided with a hardware abstraction module, a media policy module and an algorithm management module; in terms of the algorithm module controlling the third party application to enable the enhanced functionality through the media service module, the instructions in the program 421 are specifically configured to perform the following operations: controlling the third-party application to send the selected open enhanced function to the media service module; controlling the media service module to receive the enhanced function selected to be opened, and sending the enhanced function selected to be opened to the algorithm management module through the media policy module; and an algorithm module for controlling the algorithm management module to enable the enhanced function selected to be opened.
In one possible example, the instructions in the program 421 are specifically for performing the following operations in terms of an algorithm module that controls the third party application to enable the enhanced functionality through the media service module: controlling the third party application to send a data acquisition request to the hardware abstraction module; the hardware abstraction module is controlled to receive the data acquisition request, acquire the current application data to be processed of the third-party application, and send an algorithm calling notification to the algorithm management module through the media policy module; controlling the algorithm management module to receive the algorithm calling notification, calling the algorithm module to process the application data to obtain processed application data, and sending the processed application data to the third-party application; and controlling the third-party application to receive the processed application data, and realizing the enhancement function according to the processed application data.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 5 is a block diagram of functional units of the application data processing apparatus 500 according to the embodiment of the present application. The application data processing device 500 is applied to an electronic device, the electronic device includes a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the application data processing device comprises a processing unit 501 and a communication unit 502, wherein the processing unit 501 is configured to execute any step in the above method embodiments, and when data transmission such as sending is performed, the communication unit 502 is optionally called to complete corresponding operations. The details will be described below.
The processing unit 501 is configured to control the third-party application to send a media platform version acquisition request carrying an authentication code to the media service module; the media service module is used for controlling the media platform version acquisition request to be received, the authentication code is verified and passes the verification, and the media platform version information is sent to the third-party application; and the algorithm module is used for controlling the third-party application to receive the media platform version information, selecting the enhanced function supported by the operating system according to the media platform version information, enabling the enhanced function through the media service module, and processing application data through the algorithm module to realize the enhanced function.
In one possible example, in terms of controlling the media service module to check the authentication code and check that the authentication code is passed, the processing unit 501 is specifically configured to control the media service module to obtain an asymmetric private key of the preconfigured third-party application; controlling the media service module to decrypt the authentication code by using the asymmetric private key to obtain an APP signature key, a system date and an appointed field of the third-party application; and controlling the media service module to determine that the verification passes according to the APP signature key, the system date and the appointed field.
In one possible example, the authentication code is an RSA encrypted ciphertext.
In a possible example, the processing unit 501 is further configured to control the media service module to check the authentication code and if the check fails, return a null string to the third-party application.
In a possible example, in controlling the third-party application to select the enhanced function supported by the operating system according to the media platform version information, the processing unit 501 is specifically configured to control the third-party application to send a capability obtaining request carrying the media platform version information to the media service module; controlling the media service module to receive the capability acquisition request, inquiring an application capability list of the media platform version information, and sending the application capability list to the third-party application; the third-party application is controlled to receive the application capability list, and the application capability list is inquired to obtain the enhanced functions supported by the current media platform aiming at the third-party application; and determining the enhanced functions selected to be open among the enhanced functions.
In one possible example, a hardware abstraction layer of the operating system is provided with a hardware abstraction module, a media policy module and an algorithm management module; in terms of controlling the third-party application to enable the algorithm module of the enhanced function through the media service module, the processing unit 501 is specifically configured to control the third-party application to send the selected open enhanced function to the media service module; controlling the media service module to receive the enhanced function selected to be opened, and sending the enhanced function selected to be opened to the algorithm management module through the media policy module; and an algorithm module for controlling the algorithm management module to enable the enhanced function selected to be opened.
In one possible example, in terms of an algorithm module controlling the third-party application to enable the enhanced functionality through the media service module, the processing unit 501 is specifically configured to control the third-party application to send a data acquisition request to the hardware abstraction module; the hardware abstraction module is controlled to receive the data acquisition request, acquire the current application data to be processed of the third-party application, and send an algorithm calling notification to the algorithm management module through the media policy module; controlling the algorithm management module to receive the algorithm calling notification, calling the algorithm module to process the application data to obtain processed application data, and sending the processed application data to the third-party application; and controlling the third-party application to receive the processed application data, and realizing the enhancement function according to the processed application data.
The application data processing apparatus 500 may further include a storage unit 503 for storing program codes and data of the electronic device. The processing unit 501 may be a processor, the communication unit 502 may be a touch display screen or a transceiver, and the storage unit 503 may be a memory.
It can be understood that, since the method embodiment and the apparatus embodiment are different presentation forms of the same technical concept, the content of the method embodiment portion in the present application should be synchronously adapted to the apparatus embodiment portion, and is not described herein again.
Embodiments of the present application further provide a chip, where the chip includes a processor, configured to call and run a computer program from a memory, so that a device in which the chip is installed performs some or all of the steps described in the electronic device in the above method embodiments.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. The application data processing method is applied to electronic equipment, wherein the electronic equipment comprises a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the method comprises the following steps:
the third-party application sends a media platform version acquisition request carrying an authentication code to the media service module;
the media service module receives the media platform version acquisition request and acquires an asymmetric private key of the preconfigured third-party application; decrypting the authentication code by using the asymmetric private key to obtain an APP signature key, a system date and an appointed field of the third-party application; the media service module determines that the verification is passed according to the APP signature key, the system date and the appointed field, and sends media platform version information to the third-party application;
the third party application receives the media platform version information, selects an enhanced function supported by the operating system according to the media platform version information, enables an algorithm module of the enhanced function through the media service module, and processes application data through the algorithm module to realize the enhanced function.
2. The method of claim 1, wherein the authentication code is an RSA encrypted ciphertext.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
and the media service module checks the authentication code and returns a null character string to the third-party application if the check fails.
4. The method of claim 1 or 2, wherein the third party application selects the enhanced functions supported by the operating system according to the media platform version information, and comprises:
the third party application sends a capability acquisition request carrying the version information of the media platform to the media service module;
the media service module receives the capability acquisition request, inquires an application capability list of the media platform version information, and sends the application capability list to the third-party application;
the third-party application receives the application capability list, and inquires the application capability list to acquire the enhanced functions supported by the current media platform for the third-party application; and determining the enhanced functions selected to be open among the enhanced functions.
5. The method according to claim 4, wherein a hardware abstraction layer of the operating system is provided with a hardware abstraction module, a media policy module and an algorithm management module; the algorithm module for enabling the enhanced function by the third party application through the media service module comprises:
the third-party application sends the selected open enhanced function to the media service module;
the media service module receives the enhanced function selected to be opened and sends the enhanced function selected to be opened to the algorithm management module through the media strategy module;
the algorithm management module enables the algorithm module of the enhanced function selected to be opened.
6. The method of claim 5, wherein the third party application processes application data through the algorithm module to implement the enhanced functionality, comprising:
the third party application sends a data acquisition request to the hardware abstraction module;
the hardware abstraction module receives the data acquisition request, acquires the current application data to be processed of the third-party application, and sends an algorithm calling notification to the algorithm management module through the media policy module;
the algorithm management module receives the algorithm calling notification, calls the algorithm module to process the application data to obtain processed application data, and sends the processed application data to the third-party application;
and the third party application receives the processed application data and realizes the enhancement function according to the processed application data.
7. The application data processing device is applied to electronic equipment, wherein the electronic equipment comprises a media service module and an operating system, and an application layer of the operating system is provided with a third-party application; the apparatus comprises a processing unit and a communication unit, wherein,
the processing unit is used for controlling the third-party application to send a media platform version acquisition request carrying an authentication code to the media service module; the media service module is used for controlling the media platform version acquisition request to be received and acquiring the preset asymmetric private key of the third-party application; decrypting the authentication code by using the asymmetric private key to obtain an APP signature key, a system date and an appointed field of the third-party application; the media service module determines that the verification is passed according to the APP signature key, the system date and the appointed field, and sends media platform version information to the third-party application; and the algorithm module is used for controlling the third-party application to receive the media platform version information, selecting the enhanced function supported by the operating system according to the media platform version information, enabling the enhanced function through the media service module, and processing application data through the algorithm module to realize the enhanced function.
8. A chip, comprising: a processor for calling and running a computer program from a memory so that a device on which the chip is installed performs the method of any one of claims 1-6.
9. An electronic device comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any of claims 1-6.
10. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-6.
CN201911252496.0A 2019-12-09 2019-12-09 Application data processing method and related device Active CN111062025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911252496.0A CN111062025B (en) 2019-12-09 2019-12-09 Application data processing method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911252496.0A CN111062025B (en) 2019-12-09 2019-12-09 Application data processing method and related device

Publications (2)

Publication Number Publication Date
CN111062025A CN111062025A (en) 2020-04-24
CN111062025B true CN111062025B (en) 2022-03-01

Family

ID=70300450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911252496.0A Active CN111062025B (en) 2019-12-09 2019-12-09 Application data processing method and related device

Country Status (1)

Country Link
CN (1) CN111062025B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109768977A (en) * 2019-01-15 2019-05-17 杭州云英网络科技有限公司 Streaming medium data processing method, device and relevant device and medium
CN109782989A (en) * 2017-11-14 2019-05-21 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6018724A (en) * 1997-06-30 2000-01-25 Sun Micorsystems, Inc. Method and apparatus for authenticating on-line transaction data
AU2002332710A1 (en) * 2001-08-29 2003-03-18 Globespanvirata Incorporated Secure access to software functionalities
EP1836636A1 (en) * 2004-11-17 2007-09-26 David Fauthoux Portable personal mass storage medium and computer system with secure access to a user space via a network
CN101398771B (en) * 2008-11-18 2010-08-18 中国科学院软件研究所 Distributed system access control method based on component and access control system
CN101630351B (en) * 2009-06-04 2012-10-03 中国人民解放军理工大学指挥自动化学院 Method for enhancing safety of Oracle database server by utilizing progress infusion and TNS protocol analysis
US9094821B2 (en) * 2012-02-02 2015-07-28 Acorn Technologies, Inc. Method and system for activation of performance enhancements for mobile devices
CN103685195A (en) * 2012-09-21 2014-03-26 华为技术有限公司 User verification processing method, user device and server
US9390327B2 (en) * 2013-09-16 2016-07-12 Eyeverify, Llc Feature extraction and matching for biometric authentication
US10203855B2 (en) * 2016-12-09 2019-02-12 Snap Inc. Customized user-controlled media overlays
CN106603563A (en) * 2016-12-30 2017-04-26 厦门市美亚柏科信息股份有限公司 Information safety realization method and system based on biometric features identification
CN109274634B (en) * 2017-07-18 2021-06-11 腾讯科技(深圳)有限公司 Multimedia communication method and device, and storage medium
CN114666435B (en) * 2019-04-19 2023-03-28 华为技术有限公司 Method for using enhanced function of electronic device, chip and storage medium
CN110177218B (en) * 2019-06-28 2021-06-04 广州鲁邦通物联网科技有限公司 Photographing image processing method of android device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109782989A (en) * 2017-11-14 2019-05-21 腾讯科技(深圳)有限公司 Safe verification method and relevant apparatus
CN109768977A (en) * 2019-01-15 2019-05-17 杭州云英网络科技有限公司 Streaming medium data processing method, device and relevant device and medium

Also Published As

Publication number Publication date
CN111062025A (en) 2020-04-24

Similar Documents

Publication Publication Date Title
EP3772700B1 (en) Method and device for encrypting model of neural network, and storage medium
CN105446713B (en) Method for secure storing and equipment
US9647984B2 (en) System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device
CN109146470B (en) Method and device for generating payment code
CN111061524A (en) Application data processing method and related device
CN105634737B (en) Data transmission method, terminal and system
CN107766701B (en) Electronic equipment, dynamic library file protection method and device
CN106936774A (en) Authentication method and system in credible performing environment
CN106572427B (en) Method and device for establishing near field communication
JP6163610B2 (en) Forgery prevention verification method, apparatus, program, and recording medium
CN105745660A (en) Technologies for supporting multiple digital rights management protocols on a client device
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
CN109618313B (en) Vehicle-mounted Bluetooth device and connection method and system thereof
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
KR20150084218A (en) A system and method for protecting from hacking of mobile terminal
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN113468606A (en) Application program access method and electronic equipment
CN111062025B (en) Application data processing method and related device
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
CN110826097A (en) Data processing method and electronic equipment
CN110996088B (en) Video processing method and related device
CN110225034B (en) Method, device and equipment for protecting identity card information, identity card, server and storage medium
CN108924136B (en) Authorization authentication method, device and storage medium
CN113268775B (en) Photo processing method, device and system and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant