CN106155808B - Method and device for managing computer system resources - Google Patents

Method and device for managing computer system resources Download PDF

Info

Publication number
CN106155808B
CN106155808B CN201510179506.8A CN201510179506A CN106155808B CN 106155808 B CN106155808 B CN 106155808B CN 201510179506 A CN201510179506 A CN 201510179506A CN 106155808 B CN106155808 B CN 106155808B
Authority
CN
China
Prior art keywords
jail
dynamic library
library file
name
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510179506.8A
Other languages
Chinese (zh)
Other versions
CN106155808A (en
Inventor
马识佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510179506.8A priority Critical patent/CN106155808B/en
Publication of CN106155808A publication Critical patent/CN106155808A/en
Application granted granted Critical
Publication of CN106155808B publication Critical patent/CN106155808B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application discloses a management method of computer system resources, which is applied to electronic equipment, wherein the electronic equipment is provided with one or more jail-breaking software aiming at an operating system of the electronic equipment, and the method comprises the following steps: determining a public directory in which one or more operating resources of the jail crossing software in the electronic equipment are located; and changing the running state of at least one of the jail crossing software by changing the attribute of the running resource under the public directory. The application also discloses a corresponding device. By utilizing the technical scheme, the resource occupation of the electronic equipment can be saved.

Description

Method and device for managing computer system resources
Technical Field
The present invention relates to the field of Information Technology (IT), and in particular, to a method and an apparatus for managing computer system resources.
Background
Generally, operating systems can be divided into closed operating systems and open operating systems. In a closed operating system, such as the operating system of an apple cell phone (IOS, iPhone OS), users are not allowed to change system settings or develop software at will, limiting certain interfaces and permissions from being open to third party software manufacturers. In view of this, users use jail-crossing software to gain control of the closed operating system and access to it, thereby enabling custom installation and running of applications, plug-ins, etc. that are not official or from third parties. For example, in the IOS, a user can use the jail-breaking software to install some free games, application programs, change system themes, and the like, so as to meet the personalized use requirements of the user. However, the use of these jail crossing software can consume significant computer system resources.
For example, after the jail crossing software is installed in the IOS system, the jail crossing software may run in the background all the time. Although the user cannot see the operation condition of the jail-crossing software on the interface of the terminal device such as a mobile phone, a tablet computer and the like, the operation of the jail-crossing software always occupies the system resources of the terminal device, which affects the operation speed and increases the power consumption of the terminal device. If the user does not uninstall such jail crossing software, the user cannot stop the operation of the jail crossing software in the background. Likewise, it is not possible for software development and testing personnel to disable the operation of jail-breaking software in the background without uninstalling it.
Disclosure of Invention
In view of this, the present invention provides a method and an apparatus for managing computer system resources, which can save resource occupation of electronic devices.
The technical scheme of the invention is realized as follows:
the invention provides a management method of computer system resources, which is applied to electronic equipment, wherein the electronic equipment is provided with one or more jail-breaking software aiming at an operating system of the electronic equipment, and the method comprises the following steps: determining a public directory in which one or more operating resources of the jail crossing software in the electronic equipment are located; and changing the running state of at least one of the jail crossing software by changing the attribute of the running resource under the public directory.
The invention also provides a management device of computer system resources, which is applied to electronic equipment, wherein the electronic equipment is provided with one or more jail-breaking software aiming at an operating system of the electronic equipment, and the device comprises: the system comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a public directory in which one or more operating resources of the jail-breaking software in the electronic equipment are located; and the management module is used for changing the running state of at least one piece of jail crossing software by changing the attribute of the running resource under the public directory determined by the determination module.
Compared with the prior art, the method and the device have the advantages that the user can control the running state of the jail crossing software at the background under the condition that the jail crossing software is not unloaded, the resource occupation of electronic equipment is saved, the power consumption is reduced, and the running speed is increased.
Drawings
FIG. 1 is a flowchart illustrating a method for managing computer system resources according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an attribute list of a run resource under a common directory according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for managing computer system resources according to another embodiment of the present invention;
FIG. 4 is a schematic diagram of a user interface for selecting jail crossing software according to an embodiment of the invention;
FIG. 5 is a diagram illustrating a mapping table according to an embodiment of the invention;
FIG. 6 is a schematic diagram of a user interface for rebooting or logging off an electronic device according to an embodiment of the invention;
FIG. 7 is a block diagram of an apparatus for managing computer system resources according to an embodiment of the present invention;
FIG. 8 is a block diagram of an apparatus for managing computer system resources according to another embodiment of the present invention;
fig. 9 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
FIG. 1 is a flowchart illustrating a method for managing computer system resources according to an embodiment of the present invention. The method is applied to an electronic device that is installed with one or more jail-breaking software for its operating system. Referring to fig. 1, the method includes:
step 101, determining a public directory in which one or more operating resources of the jail-breaking software in the electronic equipment are located.
When a user installs one or more pieces of jail-breaking software on the electronic equipment, an operating system of the electronic equipment generates a public directory corresponding to the one or more pieces of jail-breaking software in a memory, and operating resources of the jail-breaking software are stored in the public directory.
In one embodiment, the operating resources under the common directory include dynamic library files corresponding to jail crossing software. Each dynamic library file may be composed of one or more hook (hook) functions. Wherein the hook function is used for capturing a specific message sent out in the operating system before the specific message reaches a destination window, so as to obtain the control right of the specific message. Therefore, the dynamic library file formed by the hook function can be used as an entrance when corresponding jail crossing software is operated in the public directory, and the hook function in the dynamic library file is executed by calling the dynamic library file, so that the jail crossing software is operated.
For example, in the Iphone Operating System (IOS) used on a apple cell phone, when a user installs one or more jail-breaking software, the public directory may be an absolute path, such as/Library/mobile subsystem/dynamic libraries. Dynamic library files corresponding to each jail-breaking software are stored under the public directory. Each jail crossing software can correspond to one dynamic library file.
In a specific implementation, other non-dynamic library files besides the dynamic library file described above may also be included under the public directory.
In the invention, the electronic devices for operating the jail crossing software include but are not limited to smart phones, palm computers, tablet computers and the like.
And 102, changing the running state of at least one piece of jail-crossing software by changing the attribute of the running resource in the public directory.
Here, the attribute of the running resource under the public directory is an attribute of the dynamic library file, including a name, a size, a type, a date, and the like of the dynamic library file. Fig. 2 is a schematic diagram of an attribute list of a run resource in a common directory according to an embodiment of the present invention. Wherein the name of each dynamic library file comprises a primary name and an extension name. For example, a dynamic library file named "TEMain. dylib" includes a main name "TEMain" and an extension "dylib".
When the electronic equipment is started, dynamic library files with preset main names and preset extension names in the public directory are loaded into the internal memory, and therefore corresponding jail crossing software is operated. For example, in an IOS system, all dynamic library files with the extension "dylib" can be called by the operating system to run corresponding jail-breaking software. Here, "dylib" is a preset extension. The dynamic library file with the suffix name "disabled" shown in fig. 2 cannot be called, and corresponding jail crossing software cannot be run in the background. In addition, the name of the jail crossing software can be used as a preset main name.
In one embodiment, changing the attributes of the running resources under the common directory may be accomplished by changing the name of the dynamic library file. Specifically, the primary name and/or extension name of the dynamic library file is changed.
For example, a dynamic library file named "TEMain. dylib" is modified to "TEMain-x.dylib" (i.e., modify the primary name), "TEMain. disabled" (i.e., modify the extension), or "TEMain-x.disabled" (i.e., modify the primary and extension). When the operating system accesses the public directory and reads the dynamic library file under the public directory, the 'TEMain.dylib' file cannot be read, namely the preset main name is 'TEMain' and the preset extension name is 'dylib', so that the operation of the corresponding jail crossing software 'TEMain' in the background is forbidden.
In another embodiment, changing the attributes of the running resources under the common directory may also be accomplished by changing the name and date of the dynamic library file.
For example, when there are a large number of dynamic library files as well as non-dynamic library files in a public directory, the name of a dynamic library file is changed while the date of the dynamic library file is also modified. For example, for the dynamic library file named "temain.dylib" in fig. 2, in addition to the modification of the file main name and/or the extension name, the date may be modified from "2014-02-02" to the abnormal date "2014-02-29", and the attribute of the dynamic library file is further modified to be an abnormal attribute, so that the corresponding jail crossing software "TEMain" is prohibited from running in the background.
After the attribute of the operating resource under the public directory is changed, the memory resource occupied by the jail crossing software is updated, and then the operating state of the jail crossing software can be updated, and the method specifically comprises the following steps: and releasing the memory, and loading the dynamic library file with the preset main name and the preset extension name in the public directory into the memory.
It should be noted that the running state of the jail crossing software refers to whether the jail crossing software runs in the background of the operating system, that is, whether system memory resources are occupied, and then the jail crossing software is judged to be in a starting state or a forbidden state. Specifically, the starting state means that the jail crossing software runs on the background, occupies memory resources, and reads in a dynamic library file corresponding to the jail crossing software; the forbidden state means that the jail crossing software does not run in the background and does not occupy any memory resource or releases the resource occupied by the dynamic library file corresponding to the jail crossing software.
In the embodiment of the invention, the public directory where the running resources of one or more jail-crossing software in the electronic equipment are located is determined, the running state of at least one jail-crossing software is changed by changing the attribute of the running resources under the public directory, so that a user can control the running state of the jail-crossing software at the background under the condition of not unloading the jail-crossing software, the jail-crossing software is started or forbidden according to the input of the user, the resource and electric quantity consumption of the electronic equipment is saved, the running speed of the electronic equipment is improved, development and testing personnel can be helped to work under the environment without the running of the jail-crossing software, the influence of the jail-crossing software on the development process is reduced, and more accurate test data are obtained.
FIG. 3 is a flowchart illustrating a method for managing computer system resources according to another embodiment of the present invention. The method is applied to an electronic device that is installed with one or more jail-breaking software for its operating system. Referring to fig. 3, the method includes:
step 301, determining a public directory in which one or more operating resources of the jail-breaking software in the electronic device are located.
This step is the same as the description of step 101, and is not described again here.
Step 302, responding to user operation, accessing the public directory, and determining the operating resource corresponding to at least one jail-breaking software selected by the user under the public directory.
Providing a user interface, accessing the public directory determined in step 301 according to at least one piece of jail-breaking software selected by user input, and determining running resources corresponding to at least one piece of jail-breaking software in the public directory. Wherein the operating resources comprise dynamic library files corresponding to the jail crossing software.
Fig. 4 is a schematic diagram of a user interface 400 for selecting jail crossing software in accordance with an embodiment of the invention. As shown in fig. 4, the user interface 400 includes the names 410 of the jail software, the current operating state 420 of each jail software, and the operating state 430 for the user to operate to change the jail software. Wherein, for each jail, the current running state 420 comprises start buttons 421, 422, 424, 426 and disable buttons 423, 425; changing the operational state 430 of the jail crossing software means changing activation to disabled or disabling to activated, and accordingly includes disable buttons 431, 432, 434, 436 and activate buttons 433, 435.
Through the user interface 400, the user may be informed of the current operating state of each of the jail crossing software and, by selecting the corresponding button at 430, may determine one or more jail crossing software that the user wishes to change operating state while also determining whether to change operating state to enabled or disabled. For example, the user clicks on button 431 to change the jail-crossing software named "TEMain" from the enabled state to the disabled state; the user further clicks on button 433 to change the jail-crossing software named "TEGPS" from a disabled state to an enabled state.
It should be noted that the plurality of buttons in the change operation state 430 may also take other forms of implementation, such as a slide-to-right movement of the switch button, so that the user can select between the enabled state and the disabled state. The present invention is not particularly limited with respect to the specific form of the changing operation.
Each of the jail crossing software corresponds to a dynamic library file under a public directory. And aiming at one or more jail crossing software selected by a user, determining a dynamic library file corresponding to the jail crossing software in a public directory according to a preset determination rule. The preset determination rule may have the following three modes:
the first method is as follows: and determining the dynamic library file of which the main name is matched with the name of the jail crossing software.
At this time, the preset determination rule is: and the main name of the dynamic library file corresponding to each piece of the jail crossing software is matched with the name of the jail crossing software, and then which dynamic library file corresponds to the jail crossing software selected by the user is determined according to the main name of the dynamic library file.
For example, the name of each of the jail-breaking software shown in 410 in fig. 4 is a one-to-one correspondence with the primary name in the dynamic library file names listed in fig. 3. Then, after the user selects a certain jail-crossing software on the interface shown in fig. 4, the user finds the main name of the dynamic library file consistent with the name of the jail-crossing software in the public directory, and thus determines the corresponding dynamic library file.
The second method comprises the following steps: and determining the dynamic library file of which the preset field of the main name is matched with the name of the jail-crossing software.
At this time, the preset determination rule is: and the preset field of the main name of the dynamic library file corresponding to each piece of the jail crossing software is matched with the name of the jail crossing software. Wherein, the preset field can be a part of characters in the main name.
For example, the preset field is set to the character preceding the symbol "-" in the primary name. For the jail crossing software "TEMain" shown in 410 in fig. 4, there is one dynamic library file under the public directory named "TEMain-x.dylib", then the preset field is "TEMain", which is identical to the name of jail crossing software, so the dynamic library file named "TEMain-x.dylib" and jail crossing software "TEMain" are considered to correspond.
The third method comprises the following steps: and searching a corresponding relation table according to the name of the jail crossing software to obtain a corresponding dynamic library file.
At this time, the preset determination rule is: the method comprises the steps of configuring a corresponding relation table of names of the jail crossing software and names of corresponding dynamic library files in advance, and determining the corresponding dynamic library files in a public directory by searching the corresponding relation table according to the names of the jail crossing software selected by a user.
Fig. 5 is a diagram of a correspondence table listing names of jail crossing software and names of dynamic library files according to an embodiment of the invention. The name of the jail crossing software is set as a preset main name, and the 'dylib' is set as a preset extension name.
For example, the jail crossing software named "TEMain" knows the name of its corresponding dynamic library file as "tem. And judging that the current running state of the jail-crossing software is forbidden and the dynamic library file is not loaded into the memory because the main name in the name is different from the preset main name 'TEMain'.
For another example, the jail crossing software named "Mobilesafety" obtains the name "abc. efg" of the corresponding dynamic library file through table lookup, and since the main name "abc" in the name is different from the preset main name "Mobilesafety" and the extension "efg" is different from the preset extension "dylib", it is determined that the current running state of the jail crossing software is prohibited and the dynamic library file is not loaded to the memory.
For another example, the jail crossing software named libstatustabar knows that the name of the corresponding dynamic library file is 'libstatustabar.dylib' through table lookup, and judges that the current running state of the jail crossing software is starting and the dynamic library file is loaded to a memory because the main name of the name is the same as the preset main name (namely the name of the jail crossing software) and the extension is the same as the preset extension 'dylib'.
And step 303, changing the attribute of the running resource corresponding to the at least one jail-crossing software.
After the dynamic library files corresponding to at least one jail-breaking software in the public directory are determined, the attributes of the dynamic library files are changed through step 302.
Wherein changing the attribute of the dynamic library file may include changing the primary name and/or the extension name of the dynamic library file name by presetting a modification rule.
Specifically, the preset modification rule has the following three modes:
the first method is as follows: and modifying the extension of the dynamic library file.
At this time, the preset modification rule is: if the dynamic library file is loaded into the memory, modifying any character in the extension name of the dynamic library file, and changing the running state of the corresponding jail crossing software from starting to forbidden; if the dynamic library file is not loaded into the memory, the extension name of the dynamic library file is modified into a preset extension name, and the running state of the corresponding jail crossing software is changed from forbidden to started.
For example, the dynamic library file shown in fig. 3 is named "temain. dylib", and is loaded to memory as described above. If the running state of the corresponding jail crossing software ' TEMain ' is changed from starting to forbidden, the extension ' dylib ' can be modified into any extension which is not ' dylib ', for example, modified into ' TEMain.
As another example, the dynamic library file name shown in fig. 3 is "TEGPS. disabled", wherein the primary name "TEGPS" corresponds to the name of the jail-breaking software shown in fig. 4, and the extension "disabled" is different from the preset extension "dylib", so the dynamic library file is not loaded to the memory. If the running state of the corresponding jail crossing software 'TEGPS' is changed from forbidden to started, the extension name 'disabled' is changed to the preset extension name 'dylib'.
The second method comprises the following steps: the primary name of the dynamic library file is modified.
At this time, the preset modification rule is: if the dynamic library file is loaded to the memory, adding characters at a preset position in the main name of the dynamic library file, and if the dynamic library file is not loaded to the memory, deleting the characters at the preset position in the main name of the dynamic library file so as to modify the main name into the preset main name.
For example, the preset position is to add a character at the end of the main name. For the situation that the dynamic library file 'TEMain.dylib' is loaded into a memory, the name is modified into 'TEMain-X.dylib', and therefore the jail crossing software is forbidden; on the contrary, when the dynamic library file with the name of TEMain-X.dylib is not loaded into the memory, the character ' -X ' added at the tail of the main name is deleted, and the name is modified into TEMain.dylib ', so that the jail crossing software is started.
The third method comprises the following steps: and simultaneously modifying the main name and the extension name of the dynamic library file.
At this time, the preset determination rule is: if the dynamic library file is loaded to the memory, modifying any character in the main name and/or any character in the extension of the dynamic library file, and if the dynamic library file is not loaded to the memory, modifying the main name and/or the extension of the dynamic library file so that the dynamic library file has the preset main name and the preset extension; and recording the main name and the extension name of the modified dynamic library file in the corresponding relation table.
For example, for the jail-crossing software named "Mobilesafety" in fig. 5, when the running state of the jail-crossing software is changed from start to disable, the name of the dynamic library file loaded into the memory is changed from "mobilesafety.dylib" to "abc.efg", so as to disable the jail-crossing software; otherwise, when the cross-prison software is started, the name of the corresponding dynamic library file is known as' abc.
And after the name of the dynamic library file is modified each time, updating the corresponding relation table, and recording the main name and the extension name of the modified dynamic library file in the corresponding relation table for subsequently determining the operating resource corresponding to the jail-crossing software under the public directory and changing the attribute of the operating resource.
According to the three preset modification rules, the dynamic library file loaded into the memory when the jail-crossing software is in the starting state is an executable dynamic library file, the main name in the name is a preset main name, namely the name of the jail-crossing software, and the extension name is a preset extension name. When the jail crossing software is in a forbidden state, the corresponding dynamic library file is a nonexecutable dynamic library file, and any character in the name of the dynamic library file is different from the name of the executable dynamic library file loaded into the memory.
And step 304, updating resources occupied by the at least one piece of jail-crossing software in the memory so as to update the running state of the at least one piece of jail-crossing software.
And updating resources occupied by at least one piece of jail crossing software in the memory, including releasing memory resources, and loading the dynamic library file with the preset main name and the preset extension name in the public directory into the memory.
In specific implementation, after the attribute of the dynamic library file is changed, the electronic device running the jail-crossing software can be automatically restarted or cancelled, or a mode of updating resources occupied by at least one jail-crossing software in a memory is determined through a user interface, namely, the user selects to restart or cancel the electronic device running the jail-crossing software, so that the running state of the jail-crossing software is updated.
FIG. 6 is a diagram illustrating an exemplary user interface 600 for rebooting or logging off an electronic device. After the user changes the operating state of any of the jail crossing software in 430 of the user interface 400, the user interface 600 may be provided on the electronic device, and the user may restart the electronic device via button 610 or log off the use account of the electronic device via button 620.
Corresponding to the method, the embodiment of the invention also provides a management device of computer system resources. FIG. 7 is a block diagram of an apparatus 700 for managing computer system resources according to an embodiment of the present invention, including:
a determining module 710 for determining a public directory in which operating resources of one or more jail-breaking software in the electronic device are located;
a management module 720, configured to change the operating state of at least one of the jail crossing software by changing the attribute of the operating resource under the public directory determined by the determination module 710.
FIG. 8 is a block diagram of an apparatus 800 for managing computer system resources according to another embodiment of the present invention. Wherein, the management module 720 includes:
a changing unit 721 for changing an attribute of an operating resource of at least one jail crossing software;
and the updating unit 722 is used for updating resources occupied by the at least one piece of jail software in the memory so as to update the running state of the at least one piece of jail software.
In one embodiment, the apparatus 800 further comprises:
an interface module 730, configured to provide a user interface and receive an operation input by the user;
accordingly, the at least one jail-breaking software changed by the changing unit 721 is determined in response to a user operation.
An updating unit 722, configured to determine a manner of updating resources occupied by the at least one jail in the memory in response to a user operation.
In one embodiment, the run resources include dynamic library files;
accordingly, the changing unit 721 is used to change the name of the dynamic library file corresponding to the at least one piece of jail crossing software, or change the name and date of the dynamic library file corresponding to the at least one piece of jail crossing software.
In one embodiment, when the electronic device is started, loading a dynamic library file with a preset main name and a preset extension name in a public directory into a memory;
correspondingly, the changing unit 721 is configured to determine a corresponding dynamic library file according to the name of the at least one jail, and modify the main name and/or the extension of the determined dynamic library file;
the updating unit 722 is configured to release the memory, and load the dynamic library file with the preset main name and the preset extension name in the public directory into the memory.
In the above device embodiment, the specific method for each module and unit to implement its own function is described in the method embodiment, and is not described herein again.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each module may exist alone physically, or two or more modules are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device 900 according to an embodiment of the invention. The electronic device may include: a processor 910, a memory 920, a port 930, and a bus 940. The processor 910 and the memory 920 are interconnected by a bus 940. Processor 910 may receive and transmit data through port 930. Wherein the content of the first and second substances,
processor 910 is configured to execute modules of machine-readable instructions stored by memory 920.
Memory 920 stores modules of machine-readable instructions executable by processor 910. The processor 910 may execute instruction modules including: a determination module 921 and a management module 922. Wherein the determining module 921 when executed by the processor 910 may be: determining a public directory in which operating resources of one or more jail-surmounting software in the electronic device 900 are located; management module 922 when executed by processor 910 may be to: the operating state of at least one of the jail crossing software is changed by changing the attributes of the operating resources under the public directory as determined by the determination module 921.
In one embodiment, the memory 920 stores instruction modules executable by the processor 910 that further include: an interface module 923. The interface module 923 may be executed by the processor 910 to: and providing a user interface and receiving the operation input by the user.
It can thus be seen that the modules of instructions stored in memory 920, when executed by processor 910, perform the various functions of the determination module, the management module, and the interface module of the various embodiments described above.
In addition, each of the embodiments of the present invention can be realized by a data processing program executed by a data processing apparatus such as a computer. It is clear that the data processing program constitutes the invention. Further, the data processing program, which is generally stored in one storage medium, is executed by directly reading the program out of the storage medium or by installing or copying the program into a storage device (such as a hard disk and/or a memory) of the data processing device. Such a storage medium therefore also constitutes the present invention. The storage medium may use any type of recording means, such as a paper storage medium (e.g., paper tape, etc.), a magnetic storage medium (e.g., a flexible disk, a hard disk, a flash memory, etc.), an optical storage medium (e.g., a CD-ROM, etc.), a magneto-optical storage medium (e.g., an MO, etc.), and the like.
The invention also discloses a storage medium in which a data processing program is stored, which data processing program is adapted to carry out any one of the embodiments of the above-described method of the invention.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (17)

1. A method for managing computer system resources, applied to an electronic device having a plurality of jail-breaking software installed for a closed operating system, the method comprising:
determining a public directory in which operating resources of the plurality of jail crossing software in the electronic equipment are located, wherein the operating resources comprise dynamic library files;
responding to user operation, accessing the public directory, and displaying the current running state of each jail-breaking software, wherein the current running state refers to whether the jail-breaking software runs in the background of the closed operating system, and comprises a starting state and a forbidden state;
when the current running state is the forbidden state, responding to user operation, and determining at least one jail-breaking software selected by a user;
determining a corresponding dynamic library file according to the name of the at least one jail-crossing software, modifying the main name and/or the extension name of the determined dynamic library file, and modifying the date of the determined dynamic library file into a normal date;
and releasing the memory, loading the changed dynamic library file in the public directory into the memory, and changing the running state of the at least one jail crossing software from the forbidden state to the starting state.
2. The method of claim 1, wherein the changing the operational state of the at least one jail from the disabled state to the enabled state comprises:
and updating resources occupied by the at least one piece of jail-crossing software in the memory so as to change the running state of the at least one piece of jail-crossing software.
3. The method of claim 1 or 2, wherein the closed operating system is an IOS system.
4. The method of claim 1, wherein whether the jail-surmounting software is running in the background of the closed operating system refers to whether the jail-surmounting software occupies intrinsic resources of the closed operating system.
5. The method of claim 1, wherein the common directory is an absolute path.
6. The method of claim 1, wherein the primary name of the dynamic library file corresponding to each jail matches the name of the jail;
the modifying the determined extension of the dynamic library file comprises the following steps: and for each of the at least one piece of jail-crossing software, determining a dynamic library file of which the main name is matched with the name of the jail-crossing software, if the dynamic library file is loaded into a memory, modifying any character in the extension of the dynamic library file, and if the dynamic library file is not loaded into the memory, modifying the extension of the dynamic library file into a preset extension.
7. The method of claim 1, wherein the preset field of the master name of the dynamic library file corresponding to each of the jail-crossing software matches the name of the jail-crossing software;
the modifying the determined primary name of the dynamic library file comprises: and for each of the at least one piece of jail-crossing software, determining a dynamic library file of which the preset field of the main name is matched with the name of the jail-crossing software, if the dynamic library file is loaded into a memory, adding characters at a preset position in the main name of the dynamic library file, and if the dynamic library file is not loaded into the memory, deleting the characters at the preset position in the main name of the dynamic library file so as to modify the main name into a preset main name.
8. The method of claim 1, wherein a table of correspondence of jail names to dynamic library file names is preconfigured;
the modifying the determined primary name and/or extension name of the dynamic library file comprises: for each of the at least one piece of jail-crossing software, searching the corresponding relation table according to the name of the jail-crossing software to obtain the corresponding main name and extension of the dynamic library file, if the dynamic library file is loaded into a memory, modifying any character in the main name and/or any character in the extension of the dynamic library file, and if the dynamic library file is not loaded into the memory, modifying the main name and/or the extension of the dynamic library file to enable the dynamic library file to have a preset main name and a preset extension; and recording the main name and the extension name of the modified dynamic library file in the corresponding relation table.
9. The method of claim 1, wherein the electronic device loads a dynamic library file with a preset main name and a preset extension name in the public directory into a memory when starting.
10. An apparatus for managing computer system resources, applied to an electronic device installed with a plurality of jail breaking software for a closed operating system, the apparatus comprising:
the determining module is used for determining a public directory where operating resources of the plurality of jail crossing software in the electronic equipment are located, wherein the operating resources comprise dynamic library files; and a process for the preparation of a coating,
the interface module is used for providing a user interface and receiving operation input by a user; accessing the public directory, and displaying the current running state of each jail crossing software, wherein the current running state refers to whether the jail crossing software runs in a background of the closed operating system and comprises a starting state and a forbidden state;
the management module is used for responding to user operation when the current running state is the forbidden state and determining at least one piece of jail-breaking software selected by a user; determining a corresponding dynamic library file according to the name of the at least one jail-crossing software, modifying the main name and/or the extension name of the determined dynamic library file, and modifying the date of the determined dynamic library file into a normal date; and releasing the memory, loading the changed dynamic library file in the public directory into the memory, and changing the running state of the at least one jail crossing software from the forbidden state to the starting state.
11. The management device of claim 10, wherein the management module is configured to update resources occupied by the at least one jail in memory to change an operational state of the at least one jail.
12. The management apparatus according to claim 10 or 11, wherein the closed operating system is an IOS system.
13. The management device of claim 10, wherein whether the jail-surmounting software is running in the background of the closed operating system refers to whether the jail-surmounting software occupies intrinsic resources of the closed operating system.
14. The management device of claim 10, wherein the common directory is an absolute path.
15. The management device according to claim 10, wherein when the electronic device is started, the dynamic library file having a preset main name and a preset extension name in the common directory is loaded into a memory.
16. An electronic device comprising a memory and a processor, the memory having stored therein computer-readable instructions that, when executed by the processor, implement the method of any of claims 1-9.
17. A computer-readable storage medium having computer-readable instructions stored thereon, which, when executed by at least one processor, cause the method of any one of claims 1 to 9 to be carried out.
CN201510179506.8A 2015-04-16 2015-04-16 Method and device for managing computer system resources Active CN106155808B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510179506.8A CN106155808B (en) 2015-04-16 2015-04-16 Method and device for managing computer system resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510179506.8A CN106155808B (en) 2015-04-16 2015-04-16 Method and device for managing computer system resources

Publications (2)

Publication Number Publication Date
CN106155808A CN106155808A (en) 2016-11-23
CN106155808B true CN106155808B (en) 2020-10-13

Family

ID=58058211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510179506.8A Active CN106155808B (en) 2015-04-16 2015-04-16 Method and device for managing computer system resources

Country Status (1)

Country Link
CN (1) CN106155808B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372005B (en) * 2016-09-20 2019-10-11 深圳市华美兴泰科技股份有限公司 The method and device of image data is accessed in IOS system using external memorizer
CN107438078B (en) * 2017-08-17 2020-11-03 四川长虹电器股份有限公司 Application safety protection system and method
CN112784264B (en) * 2021-01-18 2024-04-02 北京洛塔信息技术有限公司 Jail-break state detection method, device, equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036183B (en) * 2013-05-17 2015-04-08 腾讯科技(深圳)有限公司 Method and system for installing software in sandbox
US20150093991A1 (en) * 2013-09-30 2015-04-02 Elwha Llc Mobile device sharing facilitation methods and systems
CN103902284A (en) * 2014-03-07 2014-07-02 中国人民解放军装甲兵工程学院 Data acquisition method and system based on dynamic library API interception

Also Published As

Publication number Publication date
CN106155808A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
US20210349750A1 (en) Enforcing compliance rules using guest management components
KR102048111B1 (en) Secure firmware updates
KR101530104B1 (en) Multi-os(operating system) boot via mobile device
CN108710515B (en) Application preloading method and device, storage medium and terminal
EP3108398B1 (en) Method and apparatus to sandbox run-time android applications with lightweight container
CN106445647B (en) Open the data manipulation method, device and mobile terminal of application more
CN106484547B (en) Multi-open application management method and device and terminal
CN106502703B (en) Function calling method and device
CN107026933B (en) Multi-open application message management method and device and intelligent terminal
WO2020206691A1 (en) Application processing method and apparatus, storage medium, and electronic device
CN106484538B (en) Memory control method and device of terminal equipment and terminal equipment
CN106681749B (en) Local code patch updating method and device based on android platform
KR20160090230A (en) Method for running multiple instances of a same application and electric device thereof
CN110442426B (en) Password resetting method, device and storage medium
CN108090345B (en) Linux system external command execution method and device
CN106155808B (en) Method and device for managing computer system resources
CN108563472B (en) Service plug-in loading method and device based on multi-open application
CN105260655A (en) Application program starting protection method, device and system
CN109117153B (en) Application processing method, device, terminal and storage medium
JP2018509692A (en) Selective block-based integrity protection techniques
CN106502732B (en) Application closing method and device and intelligent terminal
CN106445706B (en) Open the data transmission method, device and mobile terminal of application more
WO2015126133A1 (en) Method and apparatus to sandbox run-time android applications with lightweight container
EP3486823A1 (en) System notification service control method, apparatus, terminal device, and storage medium
KR20200125258A (en) Method for controlling application execution, electronic device and storage medium therefor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant