CN106874749A - A kind of method and apparatus for managing root authority - Google Patents
A kind of method and apparatus for managing root authority Download PDFInfo
- Publication number
- CN106874749A CN106874749A CN201710081794.2A CN201710081794A CN106874749A CN 106874749 A CN106874749 A CN 106874749A CN 201710081794 A CN201710081794 A CN 201710081794A CN 106874749 A CN106874749 A CN 106874749A
- Authority
- CN
- China
- Prior art keywords
- mark
- target partition
- mode information
- application program
- subregion
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method and apparatus for managing root authority, belong to field of computer technology.Methods described includes:The carry request that application program sends is received, the mark and operation mode information of the target partition for needing carry are carried in the carry request;If the mark for being designated default subregion of the target partition, and the operation mode information is read-write mode information, then ignore the carry request, keep the operator scheme of the target partition constant, wherein, it is stored with for the management data for distributing root authority in the default subregion.Using the present invention, the situation about cannot normally run of terminal can be avoided.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method and apparatus for managing root authority.
Background technology
At present, the species of application program is more and more, and purposes is also more and more extensive.Wherein, some application programs (can be described as
First application program) root authority of terminal can be obtained.The root authority of terminal is the highest administration of the system program of terminal
Authority.After first application program gets the root authority of terminal, root authority can be distributed to the other application in terminal
Program, for example, can change or deletion system program in the authority distribution of file give management data, user can then pass through
Management data are modified or are deleted to the file in the system program of terminal.
In practice, terminal can store the management data for distributing root authority, and management data can be included in terminal
Each application program and the corresponding relation of root authority installed.Management data can be stored in certain subregion of disk.Terminal
After startup, system program can carry out carry to the subregion, to run the application program in the subregion.System program is in carry subregion
During, the operator scheme of subregion can be set, such as a reading mode or read-write mode.Terminal would generally be by subregion correspondence
Operator scheme be set to a reading mode.When certain application program wants to obtain the root authority of terminal, can be to system journey
Sequence send to should subregion carry request, carry the mark of the subregion, and read-write mode information, system in carry request
Program then can carry subregion again, and the subregion is set to read-write mode, then, the first application program can be by this point
The management data of area's storage, replace with the management data of oneself, such that it is able to distribute root for the other application programs in terminal
Authority.
Realize it is of the invention during, inventor find prior art at least there is problems with:
After the root authority of terminal is obtained by certain application program, the root authority of terminal can be distributed to it by the application program
His application program, so, user may miss certain text in deletion system program when being operated to these application programs
Part, influences the normal operation of terminal, for example, root authority can be distributed to the application program " mobile phone house keeper ", user passes through
When " mobile phone house keeper " deletes application program, " short message " application program may be deleted, cause mobile phone to send short message.
The content of the invention
In order to solve problem of the prior art, a kind of method and dress for managing root authority is the embodiment of the invention provides
Put.The technical scheme is as follows:
First aspect, there is provided a kind of method of management root authority, methods described includes:
The carry request that application program sends is received, the mark of the target partition for needing carry is carried in the carry request
And operation mode information;
If the mark for being designated default subregion of the target partition, and the operation mode information would be read-write mode letter
Breath, then ignore the carry request, keeps the operator scheme of the target partition constant, wherein, stored in the default subregion
There are the management data for distributing root authority.
Optionally, methods described also includes:
If the mark and the operation mode information that are designated the default subregion of the target partition are not read-writes
Pattern information, or, the mark of the target partition is not the mark of the default subregion, then the target partition is hung
Load treatment, and the operator scheme of the target partition is set based on the operation mode information.
Optionally, methods described also includes:
If the mark for being designated the default subregion of the target partition, and the operation mode information would be read-write mould
Formula information, then obtain and store the mark of the application program, when the startup for receiving the mark for carrying the application program
During request, ignore described startup and ask.
So, the application program launching can be forbidden, is prevented the application program from sending carry again and asked, such that it is able to subtract
The treating capacity of few terminal.
Optionally, methods described also includes:
If the mark for being designated the default subregion of the target partition, and the operation mode information would be read-write mould
Formula information, then show the warning message of the correspondence application program.
So, the user application program can be pointed out to there is risk, so that user is processed the application program in time,
The application program is such as deleted, or the application program is set to disabling etc..
Second aspect, there is provided a kind of device of management root authority, described device includes:
Receiver module, the carry request for receiving application program transmission, carries in the carry request and needs carry
The mark and operation mode information of target partition;
Processing module, if believed for the mark for being designated default subregion of the target partition, and the operator scheme
It is read-write mode information to cease, then ignore the carry request, keeps the operator scheme of the target partition constant, wherein, it is described
It is stored with for the management data for distributing root authority in default subregion.
Optionally, the processing module, is additionally operable to:
If the mark and the operation mode information that are designated the default subregion of the target partition are not read-writes
Pattern information, or, the mark of the target partition is not the mark of the default subregion, then the target partition is hung
Load treatment, and the operator scheme of the target partition is set based on the operation mode information.
Optionally, described device also includes:
Acquisition module, if for the mark for being designated the default subregion of the target partition, and the operation mould
Formula information is read-write mode information, then obtain and store the mark of the application program, and the application journey is carried when receiving
When the startup of the mark of sequence is asked, ignore described startup and ask.
Optionally, described device also includes:
Display module, if for the mark for being designated the default subregion of the target partition, and the operation mould
Formula information is read-write mode information, then show the warning message of the correspondence application program.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:
In the embodiment of the present invention, the carry request that application program sends is received, the mesh for needing carry is carried in carry request
The mark and operation mode information of subregion are marked, if the mark for being designated default subregion of target partition, and operation mode information
It is read-write mode information, then ignores carry request, keeps the operator scheme of target partition constant, wherein, preset storage in subregion
There are the management data for distributing root authority, so, will be unable to be modified to presetting the data in subregion, it can be prevented
His application program obtains the root authority of terminal, it is to avoid user misses the file in deletion system program, so as to avoid the occurrence of terminal
Situation about cannot normally run.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is a kind of method flow diagram for managing root authority provided in an embodiment of the present invention;
Fig. 2 is a kind of interface display schematic diagram provided in an embodiment of the present invention;
Fig. 3 is a kind of apparatus structure schematic diagram for managing root authority provided in an embodiment of the present invention;
Fig. 4 is a kind of apparatus structure schematic diagram for managing root authority provided in an embodiment of the present invention;
Fig. 5 is a kind of apparatus structure schematic diagram for managing root authority provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention
Formula is described in further detail.
A kind of method for managing root authority is the embodiment of the invention provides, the executive agent of the method is terminal, also may be used
Being the system program in terminal.Wherein, the terminal can be the mobile terminals such as mobile phone or panel computer.Can pacify in the terminal
Equipped with system program and various application programs (such as video application and game application).Wherein, system program can be with
Including kernel program and process supervisory program.After terminal starts, process supervisory program (such as init processes) can be to kernel program
Transmission corresponds to the carry request of certain subregion, and mark and the operator scheme letter of the subregion for needing carry can be carried in carry request
Breath, for example, operation mode information can be the mark of read-only pattern or the mark of read-write mode.Kernel program receives carry please
After asking, carry can be carried out, to run the application journey in the subregion to the subregion according to the mark of the subregion in carry request
Sequence, also, in the carry subregion, kernel program can also set the subregion according to the operation mode information in carry request
Operator scheme (a such as reading mode or read-write mode).Wherein, for being stored with for the application program for distributing root authority
Subregion, process supervisory program send carry request in can carry read-only pattern information, to prevent user from applying journey to this
Sequence is modified.
Below in conjunction with specific embodiment, so that executive agent is as system program as an example, the handling process shown in Fig. 1 is entered
Row detailed description, content can be as follows:
Step 101, receives the carry request that application program sends, and the target partition for needing carry is carried in carry request
Mark and operation mode information.
In force, the application program can be the application program for obtaining the root authority of terminal, such as root works
Tool.The application program can send carry and ask when default trigger condition is reached to the system program of terminal.For example, should
Application program can send carry and ask to system program upon actuation, it is also possible to receive the instruction of acquisition root authority
Afterwards, carry is sent to system program to ask.The mark and operation mould of the target partition for needing carry can be carried in carry request
Formula information.After system program receives carry request, carry request can be parsed, obtain the mark of target partition
And operation mode information, to carry out subsequent treatment.The treatment can be realized by the kernel program in system program.
Step 102, if the mark for being designated default subregion of target partition, and operation mode information would be read-write mode letter
Breath, then ignore carry request, keeps the operator scheme of target partition constant.
Wherein, it is stored with for the management data for distributing root authority in default subregion.
In force, generally, data important in terminal can be stored in a fixed subregion, example
Such as, it is typically stored in system subregions for distributing the data (managing data) of root authority.Management data can include
Each application program and the corresponding relation of root authority installed in terminal, such as " mobile phone house keeper " can only delete cellphone subscriber's download
File, it is impossible to the file in deletion system program.System program can be prestored forbids the subregion for changing operator scheme (i.e.
Default subregion) mark.After carry request is received, system program can be by the mark of the target partition in carry request
Know, the mark with default subregion is contrasted, if the mark of target partition is identical with the mark of default subregion, and carry is asked
In operation model information be read-write mode information, then can ignore the carry request, carry treatment is not carried out to target partition,
Keep the operator scheme of target partition constant.For example, the mark for being designated system subregions of default subregion, if carry is asked
The mark and read-write mode information of middle carrying system subregions, then system program can ignore the carry request, keep system
The operator scheme of subregion is a reading mode.So, root instruments will be unable to be written and read operation to system subregions, can prevent
Root instruments will be used to distribute the management data of root authority in system program, replace with the application program of oneself.The treatment can
Realized with by the kernel program in system program.In addition, system program can also return to error message to the application program, should
After receiving the error message with program, can show that root authority obtains the prompt message of failure, for example, can show
" root failures ", points out with to user.
If system program judges the mark for being designated default subregion of target partition, and operation mode information is not read-write
Pattern information, or, system program judges that the mark of target partition is not the mark of default subregion, then can carry out following place
Reason:Carry treatment is carried out to target partition, and the operator scheme of target partition is set based on operation mode information.
In force, one or more file system can be provided with terminal, each file system can manage one
Or multiple subregions, wherein, each subregion can one file system of correspondence.System program judges that being designated for target partition is pre-
If the mark of subregion, and operation mode information is not when being read-write mode information, or, system program judges the mark of target partition
When not being the mark of default subregion, target partition can be determined according to the subregion and the corresponding relation of file system for prestoring
Corresponding target file system, the carry request that then will be received is sent to target file system, and target file system is received
To after carry request, carry request can be parsed, the mark and operator scheme of the target partition that acquisition is wherein carried
Information, then can carry out carry to target partition, with the application program in operational objective subregion, also, in the carry subregion
When, system program can set the operator scheme of target partition according to the operation mode information in carry request.
Optionally, if the mark for being designated default subregion of target partition, and operation mode information be read-write mode letter
Breath, then can also be added to the application program in blacklist by system program, to prevent the application program again to presetting subregion
In data modify, corresponding processing procedure can be as follows:Obtain and store the mark of the application program;Taken when receiving
When the startup of the mark with the application program is asked, ignore startup request.
In force, the system program of terminal can obtain the mark of the application program, for example, can be with carry request
The mark of the application program is carried, system program can obtain the mark of the application program from carry request, or, system journey
Sequence can also by other means obtain the mark of the application program, and the present embodiment is not limited.System program gets this should
After with the mark of program, the mark of the application program can be added in No starting list.System program receives startup
After request, can will start the mark of the application program to be launched carried in request, with the application journey in No starting list
The mark of sequence is contrasted, and is the mark of the application program in No starting list if the mark of application program to be launched,
Startup request can then be ignored, it is the application assigned process resource to forbid, so as to forbid the application program automatic.This
Sample, when the startup for receiving the mark for carrying the application program is asked, will ignore startup request, prevent the application program
Start, so as to prevent the application program from being modified to presetting the data in subregion again, improve the Information Security of terminal.
Optionally, if the mark for being designated default subregion of target partition, and operation mode information be read-write mode letter
Breath, then system program can also be to user's display warning message, to remind user to process the application program, corresponding place
Reason process can be as follows:Show to should application program warning message.
In force, system program can obtain the mark (title of such as application program) of the application program, Ran Houke
With show to should application program warning message, in warning message can include the application program mark, for example, can show
Show " application program root instruments have risk, it is proposed that delete ", as shown in Figure 2.After user sees the alert message, can know
There is risk in the application program, then the application program can be processed accordingly.For example, user can delete in the terminal
Except the application program, or, the use state for obtaining root authority function can be set to taboo by user in the application program
With.So, can timely point out user, with prevent the application program obtain terminal root authority, and cause user can by mistake
Certain file in deletion system program, influences the normal operation of terminal.
In the embodiment of the present invention, the carry request that application program sends is received, the mesh for needing carry is carried in carry request
The mark and operation mode information of subregion are marked, if the mark for being designated default subregion of target partition, and operation mode information
It is read-write mode information, then ignores carry request, keeps the operator scheme of target partition constant, wherein, preset storage in subregion
There are the management data for distributing root authority, so, will be unable to be modified to presetting the data in subregion, it can be prevented
His application program obtains the root authority of terminal, it is to avoid user misses the file in deletion system program, so as to avoid the occurrence of terminal
Situation about cannot normally run.
Based on identical technology design, the embodiment of the present invention additionally provides a kind of device for managing root authority, such as Fig. 3 institutes
Show, the device includes:
Receiver module 310, the carry request for receiving application program transmission, carries in the carry request and needs carry
Target partition mark and operation mode information;
Processing module 320, if for the mark for being designated default subregion of the target partition, and the operator scheme
Information is read-write mode information, then ignore the carry request, keeps the operator scheme of the target partition constant, wherein, institute
State and be stored with for the management data for distributing root authority in default subregion.
Optionally, the processing module 320, is additionally operable to:
If the mark and the operation mode information that are designated the default subregion of the target partition are not read-writes
Pattern information, or, the mark of the target partition is not the mark of the default subregion, then the target partition is hung
Load treatment, and the operator scheme of the target partition is set based on the operation mode information.
Optionally, as shown in figure 4, described device also includes:
Acquisition module 330, if for the mark for being designated the default subregion of the target partition, and the operation
Pattern information is read-write mode information, then obtain and store the mark of the application program, and the application is carried when receiving
When the startup of the mark of program is asked, ignore described startup and ask.
Optionally, as shown in figure 5, described device also includes:
Display module 340, if for the mark for being designated the default subregion of the target partition, and the operation
Pattern information is read-write mode information, then show the warning message of the correspondence application program.
In the embodiment of the present invention, the carry request that application program sends is received, the mesh for needing carry is carried in carry request
The mark and operation mode information of subregion are marked, if the mark for being designated default subregion of target partition, and operation mode information
It is read-write mode information, then ignores carry request, keeps the operator scheme of target partition constant, wherein, preset storage in subregion
There are the management data for distributing root authority, so, will be unable to be modified to presetting the data in subregion, it can be prevented
His application program obtains the root authority of terminal, it is to avoid user misses the file in deletion system program, so as to avoid the occurrence of terminal
Situation about cannot normally run.
It should be noted that:Above-described embodiment provide management root authority device management root authority when, only with
The division of above-mentioned each functional module is carried out for example, in practical application, as needed can distribute by not above-mentioned functions
With functional module complete, will the internal structure of equipment be divided into different functional modules, to complete whole described above
Or partial function.In addition, the method implementation of the device and management root authority of the management root authority that above-described embodiment is provided
Example belongs to same design, and it implements process and refers to embodiment of the method, repeats no more here.
The another exemplary embodiment of the disclosure provides a kind of structural representation of terminal.Reference picture 6, terminal 800 can be with
Including following one or more assemblies:Processing assembly 802, memory 804, power supply module 806, multimedia groupware 808, audio group
Part 810, the interface 812 of input/output (I/O), sensor cluster 814, and communication component 816.
The integrated operation of the usual control terminal 800 of processing assembly 802, such as with display, data communication, camera operation and note
The associated operation of record operation.Treatment element 802 can carry out execute instruction including one or more processors 820, with completion
The all or part of step of the method stated.Additionally, processing assembly 802 can include one or more modules, it is easy to processing assembly
Interaction between 802 and other assemblies.For example, processing component 802 can include multi-media module, to facilitate multimedia groupware
Interaction between 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in terminal 800.These data are shown
Example includes the instruction for any application program or method operated in terminal 800.Memory 804 can be by any kind of
Volatibility or non-volatile memory device or combinations thereof realization, such as static RAM (SRAM), electrically erasable
Except programmable read only memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory
(PROM), read-only storage (ROM), magnetic memory, flash memory, disk or CD.
Electric power assembly 806 provides electric power for the various assemblies of terminal 800.Electric power assembly 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for audio output apparatus 800.
Multimedia groupware 808 is included in one screen of output interface of offer between the terminal 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detection and the touch or slide related duration and pressure.In certain embodiments, many matchmakers
Body component 808 includes a front camera and/or rear camera.When terminal 800 be in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when audio output apparatus 800 are in operator scheme, such as call model, logging mode and speech recognition mode, wheat
Gram wind is configured as receiving external audio signal.The audio signal for being received can be further stored in memory 804 or warp
Sent by communication component 816.
, to provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, and the state for providing various aspects for terminal 800 is commented
Estimate.For example, sensor cluster 814 can detect the opening/closed mode of terminal 800, the relative positioning of component is for example described
Component is the display and keypad of terminal 800, and sensor cluster 814 can also detect 800 1 components of terminal 800 or terminal
Position change, user is presence or absence of with what terminal 800 was contacted, the orientation of terminal 800 or acceleration/deceleration and terminal 800
Temperature change.Sensor cluster 814 can include proximity transducer, be configured to be detected when without any physical contact
The presence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal 800 and other equipment.Terminal
800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realization, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of terminal 800.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is held by the processor of terminal
During row so that the method that terminal can hold above-mentioned management root authority.
In the embodiment of the present invention, the carry request that application program sends is received, carried in carry request and need to be hung the present invention
In embodiment, receive application program send carry request, carry request in carry need carry target partition mark and
Operation mode information, if the mark for being designated default subregion of target partition, and operation mode information is read-write mode information,
Then ignore carry request, keep the operator scheme of target partition constant, wherein, it is stored with default subregion for distributing root power
The management data of limit, so, will be unable to be modified to presetting the data in subregion, can prevent other application programs from obtaining eventually
The root authority at end, it is to avoid user misses the file in deletion system program, so as to avoid the occurrence of the feelings that terminal cannot normally be run
Condition.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware
To complete, it is also possible to instruct the hardware of correlation to complete by program, described program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all it is of the invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.
Claims (8)
1. it is a kind of manage root authority method, it is characterised in that methods described includes:
The carry request that application program sends is received, mark and the behaviour of the target partition for needing carry are carried in the carry request
Operation mode information;
If the mark for being designated default subregion of the target partition, and the operation mode information is read-write mode information,
Then ignore the carry request, keep the operator scheme of the target partition constant, wherein, be stored with use in the default subregion
In the management data of distribution root authority.
2. method according to claim 1, it is characterised in that methods described also includes:
If the mark and the operation mode information that are designated the default subregion of the target partition are not read-write modes
Information, or, the mark of the target partition is not the mark of the default subregion, then the target partition is carried out at carry
Reason, and the operator scheme of the target partition is set based on the operation mode information.
3. method according to claim 1, it is characterised in that methods described also includes:
If the mark for being designated the default subregion of the target partition, and the operation mode information would be read-write mode letter
Breath, then obtain and store the mark of the application program, when the startup for receiving the mark for carrying the application program is asked
When, ignore described startup and ask.
4. method according to claim 1, it is characterised in that methods described also includes:
If the mark for being designated the default subregion of the target partition, and the operation mode information would be read-write mode letter
Breath, then show the warning message of the correspondence application program.
5. it is a kind of manage root authority device, it is characterised in that described device includes:
Receiver module, the carry request for receiving application program transmission, the target for needing carry is carried in the carry request
The mark and operation mode information of subregion;
Processing module, if being for the mark for being designated default subregion of the target partition, and the operation mode information
Read-write mode information, then ignore the carry request, keeps the operator scheme of the target partition constant, wherein, it is described default
It is stored with subregion for the management data for distributing root authority.
6. device according to claim 5, it is characterised in that the processing module, is additionally operable to:
If the mark and the operation mode information that are designated the default subregion of the target partition are not read-write modes
Information, or, the mark of the target partition is not the mark of the default subregion, then the target partition is carried out at carry
Reason, and the operator scheme of the target partition is set based on the operation mode information.
7. device according to claim 5, it is characterised in that described device also includes:
Acquisition module, if believed for the mark for being designated the default subregion of the target partition, and the operator scheme
It is read-write mode information to cease, then obtain and store the mark of the application program, and the application program is carried when receiving
When the startup of mark is asked, ignore described startup and ask.
8. device according to claim 5, it is characterised in that described device also includes:
Display module, if believed for the mark for being designated the default subregion of the target partition, and the operator scheme
It is read-write mode information to cease, then show the warning message of the correspondence application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710081794.2A CN106874749A (en) | 2017-02-15 | 2017-02-15 | A kind of method and apparatus for managing root authority |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710081794.2A CN106874749A (en) | 2017-02-15 | 2017-02-15 | A kind of method and apparatus for managing root authority |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106874749A true CN106874749A (en) | 2017-06-20 |
Family
ID=59167365
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710081794.2A Pending CN106874749A (en) | 2017-02-15 | 2017-02-15 | A kind of method and apparatus for managing root authority |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106874749A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107742076A (en) * | 2017-10-12 | 2018-02-27 | 广东欧珀移动通信有限公司 | System is forbidden to put forward the method, apparatus, storage medium and terminal device of power |
CN113127010A (en) * | 2019-12-31 | 2021-07-16 | 深圳云天励飞技术有限公司 | Application management method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140181238A1 (en) * | 2012-12-26 | 2014-06-26 | International Business Machines Corporation | Access and control of mainframe-based data in non-mainframe format |
CN104049914A (en) * | 2014-05-30 | 2014-09-17 | 青岛海信移动通信技术股份有限公司 | Method and device for executing write operation on protected partition |
CN104268462A (en) * | 2014-09-25 | 2015-01-07 | 福建联迪商用设备有限公司 | Sub-zone protecting method and device of Android system |
CN106354502A (en) * | 2016-08-26 | 2017-01-25 | 北京小米移动软件有限公司 | Warning method and device of application |
-
2017
- 2017-02-15 CN CN201710081794.2A patent/CN106874749A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140181238A1 (en) * | 2012-12-26 | 2014-06-26 | International Business Machines Corporation | Access and control of mainframe-based data in non-mainframe format |
CN104049914A (en) * | 2014-05-30 | 2014-09-17 | 青岛海信移动通信技术股份有限公司 | Method and device for executing write operation on protected partition |
CN104268462A (en) * | 2014-09-25 | 2015-01-07 | 福建联迪商用设备有限公司 | Sub-zone protecting method and device of Android system |
CN106354502A (en) * | 2016-08-26 | 2017-01-25 | 北京小米移动软件有限公司 | Warning method and device of application |
Non-Patent Citations (1)
Title |
---|
沈健等: "《Linux系统管理》", 31 August 2014 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107742076A (en) * | 2017-10-12 | 2018-02-27 | 广东欧珀移动通信有限公司 | System is forbidden to put forward the method, apparatus, storage medium and terminal device of power |
CN113127010A (en) * | 2019-12-31 | 2021-07-16 | 深圳云天励飞技术有限公司 | Application management method and device, electronic equipment and storage medium |
CN113127010B (en) * | 2019-12-31 | 2023-11-17 | 深圳云天励飞技术有限公司 | Application management method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104239094B (en) | Control method, device and the terminal device of background application | |
EP3151117B1 (en) | Method and device for delaying information broadcasting | |
KR101723556B1 (en) | Method, device, program and recording medium for deleting smart scene | |
CN104298547B (en) | terminal setting method and device | |
CN104765552A (en) | Authority management method and device | |
CN105807873A (en) | Temperature control method and device | |
EP3179397A1 (en) | Methods and devices for managing automatic parallel login and logout in several applications | |
CN104063654B (en) | The monitoring method and device of application program | |
EP3232323A1 (en) | Method and apparatus for displaying status information of application | |
CN104536783A (en) | Method and device for setting reserved space | |
CN107147779A (en) | Information cuing method and device | |
CN107357613A (en) | Using update method, device and computer-readable recording medium | |
CN106648730A (en) | Processing method and device of abnormal application | |
CN104360875B (en) | Privacy mode starts method and apparatus | |
CN108476379A (en) | Information recording method and information record carrier | |
CN104899059B (en) | Operating system update method and device | |
CN106658467A (en) | Virtual SIM card management method and device | |
CN106874749A (en) | A kind of method and apparatus for managing root authority | |
CN105975305A (en) | Operating system event processing method and device as well as terminal | |
CN105607979A (en) | Network interconnection control method and device | |
CN105786561B (en) | Method and device for calling process | |
CN106775234A (en) | Application management method and device | |
CN112163192A (en) | root authority acquisition method, root authority acquisition device, root authority acquisition medium and electronic equipment | |
CN107071008A (en) | Localization method, device and the equipment of terminal device | |
CN106101372A (en) | Method to set up and device are reminded in application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170620 |
|
RJ01 | Rejection of invention patent application after publication |