CN103885763A - Operating system resource access method and system - Google Patents
Operating system resource access method and system Download PDFInfo
- Publication number
- CN103885763A CN103885763A CN201210562962.7A CN201210562962A CN103885763A CN 103885763 A CN103885763 A CN 103885763A CN 201210562962 A CN201210562962 A CN 201210562962A CN 103885763 A CN103885763 A CN 103885763A
- Authority
- CN
- China
- Prior art keywords
- access
- request
- operating
- service routine
- party application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
Disclosed is an operating system resource access method and system. The method includes the steps of establishing a service program, which is an independently running background executable application, corresponding to a third party application; transmitting an access request of the third party application to the service program; allowing the service program to access operating system resources according to the access request. The operating system resource access method and system has the advantages that the third party application can access the operating system resources by means of 'service', modifying an installation mode of the third party application and user permission is not required, an operating system is accessed through the background executable application corresponding to the third party application, the influence of safety risks and misoperation caused by user group permission modification can be avoided, and the third party application can access the operating system resources safely and stably.
Description
Technical field
The present invention relates to data access technology, particularly relate to a kind of operating-system resources access method and system.
Background technology
In the operating system (as IOS, android etc.) of some intelligent terminals, General System is given tacit consent to built-in background program and is had keeper (root) authority, can accessing operation system resource.And the third party application that user installs voluntarily, only has general user (mobile) authority, can only access limited public resource, and direct access system resources, third party application is generally to exist with " sandbox " form, non-code file is all kept in this " sandbox ", for example image, icon, sound, reflection, attribute list, text etc., third party application can only be in the file system creating for it file reading, there is no authority directly to the operating system request of conducting interviews, obtain data or Update Table etc.
In the middle of prior art, in the time that third party application need to obtain with retouching operation system resource, normally revise installation form and the installation directory of third party application, adopt third party's installation kit form (as deb, pxl form) application program of packing, then utilize the characteristic of third party's installation kit form, third party application is directly installed in system-level application catalog, and to revise application program authority be administrator right, can directly access and operating-system resources thereby make third party application there is authority.
But adopt above-mentioned alter mode, when part third party application is installed, revise user and organize authority, installation directory, application program authority are set to the highest simultaneously, thereby make other application programs under installation directory also obtain highest weight limit simultaneously, make other application programs can unrestricted access and the limited resources of the system of modification, have larger security risk.
In addition, after third party application successful installation, application program has obtained the highest weight limit of system, if improper use, easily cause the application program with original access rights can not normally access this system resource, even can cause occurring the situations such as stuck, program crashing, have a strong impact on the stability of operating system.
Summary of the invention
Based on this, be necessary to provide a kind of safe, operating-system resources access method and system that stability is high.
A kind of operating-system resources access method, comprises the steps:
Set up the service routine corresponding with third party application, the backstage executable application programs that this service routine is independent operating;
The request of access of described third party application is sent to described service routine;
By described service routine according to described request of access accessing operation system resource.
A kind of operating-system resources access system, is characterized in that, comprising:
Module is set up in service, for setting up the service routine corresponding with third party application, and the backstage executable application programs that this service routine is independent operating;
Request sending module, for being sent to described service routine by the request of access of described third party application;
Request access module, for by described service routine according to described request of access accessing operation system resource.
Aforesaid operations system resource access method and system, adopt the mode of " service " to realize the access of third party application to operating-system resources, without mounting means and the user right of revising third party application, visit operating system by the backstage executable application programs corresponding with it, avoid revising user and organized security risk and the maloperation impact that authority is brought, improved the safety and stability of third party application accessing operation system resource.
Accompanying drawing explanation
Fig. 1 is the operating-system resources access method process flow diagram of an embodiment;
Fig. 2 is the operating-system resources access system structural representation of an embodiment.
Embodiment
Below in conjunction with accompanying drawing, the embodiment of operating-system resources access method of the present invention is described in detail.
Fig. 1 shows the operating-system resources access method process flow diagram of an embodiment, mainly comprises the steps:
Step S10: set up the service routine corresponding with third party application, the backstage executable application programs that this service routine is independent operating, for accessing operation system resource.
In this step, be mainly aimed at third party application and set up the separate backstage executable application programs that carries out data interaction with it.
In one embodiment, according to the operating-system resources of the required request of access of third party application, set up the independently executable service routine in backstage of " service content ", comprise information services, collection contact person service routine, telephone bell service routine and/or message registration service routine etc., each service routine is corresponding to a function independently, carries out data read, delete or modification etc. for the information to operating system, collection contact person, telephone bell and/or message registration etc.
Due to each service routine be essentially one can independent operating backstage executable application programs, identical with the background program method of operation of operating system, so service routine and system carry background program and can be arranged under same directory, thereby acquisition administrator right, organize authority without revising corresponding user, it is with os starting and at running background, the services request of real-time response third party application.
Step S20: the request of access of described third party application is sent to described service routine.
In this step, in the time that third party application will conduct interviews to operating system, the directly access service routine at running background corresponding with it.
In one embodiment, third party application adopts TCP/IP or Http mode to send described request of access to described service routine.
For request of access, can be arranged to data packet form, this packet mainly comprises: No. ID of third party application, access time stamp, request content and request response mode etc., the service routine on backstage stabs to carry out safety verification by No. ID with the access time, avoids the illegal request of other application program; Request content is used for the concrete operations of mark request, as obtains, revises or delete the address list of user A; Request response mode is used for the service routine on mark backstage for the response mode of request of access, as sync response or asynchronous response.
Step S30: by described service routine according to described request of access accessing operation system resource.
In this step, carry out data interaction by service routine and operating system, by the request of access of operating system respond services program.
In one embodiment, request of access comprises the request of operating-system resources (as reading out data) and the request to operating-system resources executable operations (as deletion data, Update Table etc.) of obtaining.
If described request of access is the request of obtaining operating-system resources, resolve this request of access by service routine, according to the database of the correlation parameter opening operation system in request of access, inquire about corresponding operating-system resources, and after encapsulating, be sent to corresponding third party application;
If described request of access is the request to operating-system resources executable operations, resolve this request of access by service routine, according to the application programming interfaces of the correlation parameter call operation system in described request of access, operating-system resources is carried out to corresponding operation, and operating result (as operated successfully or failure) is sent to corresponding third party application.
For more clear technical scheme of the present invention, set forth the application example realizing based on operating-system resources access method of the present invention below.
Example one: the message registration of third party application acquisition request operating system;
Set up the message registration service routine corresponding with third party application, with os starting and at running background, for the message registration of operating system is conducted interviews, after third party application starts, need to show the historical message registration of user time, third party application sends request of access by TCP/IP or Http mode to the message registration service routine at running background, and request content comprises: No. ID and the access time stamp of (1) current third party application; (2) access content: the message registration that obtains user A; (3) request response mode: sync response and asynchronous response mode.The message registration service routine on backstage is being received request of access and is being passed through after safety verification, the message registration database of opening operation system, inquire the message registration of user A by sql statement, this message registration comprise No. ID of unique sign, dial in/Outgoing Number, air time etc.Message registration service routine is changed the message registration obtaining (removing unwanted field) and encapsulation, then synchronous or be asynchronously sent to corresponding third party application by TCP/IP or Http mode, so far completes access process.
Example two: third party application request deletion action system message registration;
Set up the message registration service routine corresponding with third party application, with os starting and at running background, for the message registration of operating system is conducted interviews, after third party application starts, need to show the historical message registration of user time, third party application sends request of access by TCP/IP or Http mode to the message registration service routine at running background, and request content comprises: No. ID and the access time stamp of (1) current third party application; (2) access content: the message registration of deleting user A; (3) request response mode: sync response and asynchronous response mode.The message registration service routine on backstage is being received request of access and is being passed through after safety verification, the message registration database of opening operation system, inquire the message registration of user A by sql statement, this message registration comprise No. ID of unique sign, dial in/Outgoing Number, air time etc.API (application program) interface of call operation system-kill call is deleted the message registration of user A, then synchronous or asynchronously by TCP/IP or Http mode, operating result (success or not) is sent to corresponding third party application, so far complete access process.
Because part system resource data are to be kept in internal memory, the directly data-base content of deletion action system, after operating system is restarted, generally can return data in EMS memory again and write in database, thereby delete unsuccessfully.Preferably, when the message registration service routine on backstage is received after the request of deletion message registration of third party application, adopt the api interface of call operation system, utilize existing operating system to carry interface and remove to delete the corresponding data in internal memory and database, rather than directly remove the message registration in database, the stability of operating system and the integrality of system resource data are guaranteed, avoid the data of direct delete database and cause producing system mistake, guaranteed the safe operation of operating system.
Operating-system resources access method of the present invention, " service " pattern of employing realizes third party application and operating system is stablized intercommunication, make still to leave in the accessing operation system resource that third party application in " sandbox " can be quick, stable, avoided third party application directly access cause the impact on operating system stability.
Simultaneously, because each service routine is separate, service routine only carries out data interaction with third party application, can carry out " increment " to third party application very easily upgrades, in the time increasing a service routine, as long as issue an increment installation kit, upgrade third party application and newly-increased background service program, reduce the data volume of installation kit, save flow.
Further, service routine can cover installation with the third party application of issuing, perfect compatible, simplify third party the loaded down with trivial details installation of form bag has been installed, unloading operation, as in IOS system, user is installing after third party application, by designing upgrade button at third party application, in the time that user clicks this upgrade button, third party application jumps to the cydia program of IOS system, the deb bag that utilizes cydia to download corresponding background service program is installed, third party application can utilize this service routine to obtain and operating operation system resource.
Below in conjunction with accompanying drawing, the embodiment of operating-system resources access system of the present invention is described in detail.
Fig. 2 shows the operating-system resources access system structural representation of an embodiment, mainly comprises: module 10, request sending module 20 and request access module 30 are set up in service.
In one embodiment, described service routine comprises: information services, collection contact person service routine, telephone bell service routine and/or message registration service routine.
Described request sending module 20, for being sent to described service routine by the request of access of described third party application.
In one embodiment, request sending module 20 adopts TCP/IP or Http mode to send described request of access.
In one embodiment, described request of access comprises: No. ID of third party application, access time stamp, request content and request response mode.
Described request access modules 30, for by described service routine according to described request of access accessing operation system resource.
In one embodiment, described request access modules 30 is further used for:
If described request of access is the request of obtaining operating-system resources, resolve described request of access by described service routine, according to the database of described request of access opening operation system, inquire about corresponding operating-system resources, and after encapsulating, be sent to corresponding third party application;
If described request of access is the request to operating-system resources executable operations, resolve described request of access by described service routine, according to the application programming interfaces of described request of access call operation system, operating-system resources is carried out to corresponding operation, and operating result is sent to corresponding third party application.
Operating-system resources access system of the present invention is corresponding one by one with operating-system resources access method of the present invention, and technical characterictic and the beneficial effect thereof of setting forth at the embodiment of aforesaid operations system resource access method are all applicable in the embodiment of operating-system resources access system.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-mentioned embodiment, and corresponding system, can carry out the hardware that instruction is relevant by computer program to complete, described program can be stored in a computer read/write memory medium, this program, in the time carrying out, can comprise the flow process as the respective embodiments described above.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
The above embodiment has only expressed several embodiment of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.
Claims (10)
1. an operating-system resources access method, is characterized in that, comprises the steps:
Set up the service routine corresponding with third party application, the backstage executable application programs that this service routine is independent operating;
The request of access of described third party application is sent to described service routine;
By described service routine according to described request of access accessing operation system resource.
2. operating-system resources access method according to claim 1, is characterized in that, described service routine comprises: information services, collection contact person service routine, telephone bell service routine and/or message registration service routine.
3. operating-system resources access method according to claim 1, is characterized in that, adopts TCP/IP or Hp mode to send described request of access.
4. operating-system resources access method according to claim 1, is characterized in that, described request of access comprises: No. ID of third party application, access time stamp, request content and request response mode.
5. operating-system resources access method according to claim 1, is characterized in that, comprises according to the step of described request of access accessing operation system resource by described service routine:
If described request of access is the request of obtaining operating-system resources, resolve described request of access by described service routine, according to the database of described request of access opening operation system, inquire about corresponding operating-system resources, and after encapsulating, be sent to corresponding third party application;
If described request of access is the request to operating-system resources executable operations, resolve described request of access by described service routine, according to the application programming interfaces of described request of access call operation system, operating-system resources is carried out to corresponding operation, and operating result is sent to corresponding third party application.
6. an operating-system resources access system, is characterized in that, comprising:
Module is set up in service, for setting up the service routine corresponding with third party application, and the backstage executable application programs that this service routine is independent operating;
Request sending module, for being sent to described service routine by the request of access of described third party application;
Request access module, for by described service routine according to described request of access accessing operation system resource.
7. operating-system resources access system according to claim 6, is characterized in that, described service routine comprises: information services, collection contact person service routine, telephone bell service routine and/or message registration service routine.
8. operating-system resources access system according to claim 6, is characterized in that, adopts TCP/IP or Http mode to send described request of access.
9. operating-system resources access system according to claim 6, is characterized in that, described request of access comprises: No. ID of third party application, access time stamp, request content and request response mode.
10. operating-system resources access system according to claim 6, is characterized in that, described request access modules is further used for:
If described request of access is the request of obtaining operating-system resources, resolve described request of access by described service routine, according to the database of described request of access opening operation system, inquire about corresponding operating-system resources, and after encapsulating, be sent to corresponding third party application;
If described request of access is the request to operating-system resources executable operations, resolve described request of access by described service routine, according to the application programming interfaces of described request of access call operation system, operating-system resources is carried out to corresponding operation, and operating result is sent to corresponding third party application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210562962.7A CN103885763A (en) | 2012-12-21 | 2012-12-21 | Operating system resource access method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210562962.7A CN103885763A (en) | 2012-12-21 | 2012-12-21 | Operating system resource access method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103885763A true CN103885763A (en) | 2014-06-25 |
Family
ID=50954676
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210562962.7A Pending CN103885763A (en) | 2012-12-21 | 2012-12-21 | Operating system resource access method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103885763A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488366A (en) * | 2014-10-13 | 2016-04-13 | 阿里巴巴集团控股有限公司 | Data permission control method and system |
CN105975333A (en) * | 2015-12-24 | 2016-09-28 | 北京奇虎科技有限公司 | Method and device for running control of application programs |
WO2017185952A1 (en) * | 2016-04-28 | 2017-11-02 | 广州广电运通金融电子股份有限公司 | Hardware device access management method and system |
CN107688475A (en) * | 2016-08-04 | 2018-02-13 | 创盛视联数码科技(北京)有限公司 | The method that Swift language class libraries is quoted based on IOS systemic software developments bag |
CN107797645A (en) * | 2017-10-12 | 2018-03-13 | 北京小米移动软件有限公司 | Resource control method and device |
CN108241693A (en) * | 2016-12-26 | 2018-07-03 | 北京国双科技有限公司 | The method and apparatus of synchrodata |
CN111913722A (en) * | 2020-06-15 | 2020-11-10 | 北京爱接力科技发展有限公司 | Third-party application program management method and device applied to robot |
WO2024041338A1 (en) * | 2022-08-23 | 2024-02-29 | 华为技术有限公司 | Data access method and electronic device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101431713A (en) * | 2007-11-09 | 2009-05-13 | 中国移动通信集团公司 | Resource access method and equipment |
-
2012
- 2012-12-21 CN CN201210562962.7A patent/CN103885763A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101431713A (en) * | 2007-11-09 | 2009-05-13 | 中国移动通信集团公司 | Resource access method and equipment |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488366A (en) * | 2014-10-13 | 2016-04-13 | 阿里巴巴集团控股有限公司 | Data permission control method and system |
CN105975333A (en) * | 2015-12-24 | 2016-09-28 | 北京奇虎科技有限公司 | Method and device for running control of application programs |
CN105975333B (en) * | 2015-12-24 | 2019-05-31 | 北京奇虎科技有限公司 | The method and device of application program operation control |
WO2017185952A1 (en) * | 2016-04-28 | 2017-11-02 | 广州广电运通金融电子股份有限公司 | Hardware device access management method and system |
CN107688475A (en) * | 2016-08-04 | 2018-02-13 | 创盛视联数码科技(北京)有限公司 | The method that Swift language class libraries is quoted based on IOS systemic software developments bag |
CN108241693A (en) * | 2016-12-26 | 2018-07-03 | 北京国双科技有限公司 | The method and apparatus of synchrodata |
CN108241693B (en) * | 2016-12-26 | 2020-10-27 | 北京国双科技有限公司 | Method and device for synchronizing data |
CN107797645A (en) * | 2017-10-12 | 2018-03-13 | 北京小米移动软件有限公司 | Resource control method and device |
CN111913722A (en) * | 2020-06-15 | 2020-11-10 | 北京爱接力科技发展有限公司 | Third-party application program management method and device applied to robot |
WO2024041338A1 (en) * | 2022-08-23 | 2024-02-29 | 华为技术有限公司 | Data access method and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103885763A (en) | Operating system resource access method and system | |
CN102932777B (en) | The update method of a kind of terminal applies and user terminal | |
CN102236764B (en) | Method and monitoring system for Android system to defend against desktop information attack | |
CN103747104A (en) | Method and system for migrating user information among internet of things equipment | |
CN103473502A (en) | Method and system for acquiring Root rights of android-based mobile terminal | |
WO2013178048A1 (en) | Method and device for generating firmware over-the-air upgrade package | |
CN109922106A (en) | The cloud cell phone system realized based on Docker container | |
CN103716346A (en) | Management method and device of application on android handset client | |
WO2015058574A1 (en) | Method and apparatus for implementing push notification of extensive application program | |
CN106406944A (en) | Control method and system for forbidding self-starting of application | |
CN103455520A (en) | Method and device for accessing Android database | |
EP2549782B1 (en) | Data card and method and system for customizing its application service | |
CN104035842A (en) | Method for deleting and recovering built-in application program | |
CN105765533A (en) | Method and apparatus for firmware virtualization | |
CN102624762A (en) | Method for improving robot software function based on cloud computing and cloud computing server | |
CN102541595A (en) | Method and device for upgrading intelligent device and intelligent device | |
CN109951563A (en) | A kind of smart card update method and its more new system working method | |
CN108182129A (en) | A kind of digital evidence obtaining system and method based on mobile terminal mirror image restoring data information | |
CN103443757A (en) | Erasing method, erasing device and erasing system | |
KR102037556B1 (en) | Method and device for upgrading telephone number in wireless terminal self-adaptive network upgrade | |
CN102333153B (en) | Wireless communication device and application program reminding method thereof | |
CN105786575A (en) | Mobile terminal and data elimination avoiding method thereof during system rewriting | |
CN105760777A (en) | Safety information management method and system based on intelligent platform | |
CN102004654A (en) | Software installation method and device | |
CN107016086B (en) | Method for extracting behavior and position data in GooglePlay of android system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140625 |
|
RJ01 | Rejection of invention patent application after publication |