CN107679373A - Method for acquiring authorized information, device and electronic equipment - Google Patents

Method for acquiring authorized information, device and electronic equipment Download PDF

Info

Publication number
CN107679373A
CN107679373A CN201710928685.XA CN201710928685A CN107679373A CN 107679373 A CN107679373 A CN 107679373A CN 201710928685 A CN201710928685 A CN 201710928685A CN 107679373 A CN107679373 A CN 107679373A
Authority
CN
China
Prior art keywords
application program
feedback data
description information
closing
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710928685.XA
Other languages
Chinese (zh)
Other versions
CN107679373B (en
Inventor
张磊
张文明
陈少杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Internet Service Co ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710928685.XA priority Critical patent/CN107679373B/en
Publication of CN107679373A publication Critical patent/CN107679373A/en
Priority to PCT/CN2018/081384 priority patent/WO2019071927A1/en
Application granted granted Critical
Publication of CN107679373B publication Critical patent/CN107679373B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Stored Programmes (AREA)

Abstract

A kind of method for acquiring authorized information, device and electronic equipment provided by the invention.Methods described includes:First application program is according to description information, call the first agreement pre-set in electronic equipment, the startup page pre-defined in the application program of implicit opening second, when the second application program obtains authorization code before the second closing application program, generated according to authorization code and authorize feedback data;After second closing application program, by second protocol feedback data will be authorized to feed back to the first application program, so that the first application program obtains the authorization message of the second application program.After cleverly applying the first agreement the second application program of startup, it is allowed to which the second application program sends feedback data to the function of the first application program, and then reduces the coupled relation between application program.The efficiency of effective lifting inter-application communication.Meanwhile first agreement belong to the agreement of system level, security is higher.

Description

Method for acquiring authorized information, device and electronic equipment
Technical field
The present invention relates to field of computer technology, in particular to a kind of method for acquiring authorized information, device and electronics Equipment.
Background technology
Realize and interact between different application, it is the first step generally to authorize login.And mandate login is substantially Communicated between two application programs.The method to be communicated between two application programs is typically by using Android The mode that interface language defines (Android Interface Definition Language, AIDL) is realized.
But many defects be present by way of AIDL to carry out the method for interprocess communication, when AIDL changes When, two application programs are required to be changed and upgraded aidl files simultaneously.It may result between two stand-alone utilities Coupled relation it is very close.Once one side of appearance, which has upgraded the opposing party, does not upgrade aidl files communication failure etc. can be caused abnormal Situation.
The content of the invention
It is above-mentioned to improve it is an object of the invention to provide a kind of method for acquiring authorized information, device and electronic equipment Problem.
To achieve these goals, the technical scheme that the embodiment of the present invention uses is as follows:
The embodiments of the invention provide a kind of method for acquiring authorized information, applied to electronic equipment, in the electronic equipment Multiple application programs are stored, methods described includes:First application response user, which operates, to be obtained corresponding to the second application program Description information;First application program calls pre-set in the electronic equipment first to assist according to the description information Discuss, the startup page pre-defined in the second application program described in implicit opening, wherein, first agreement, which is used to realize, to be started Program process corresponding with the description information and to allow the program process to be feedbacked data to after closing described First application program, wherein, the feedback data is that the second application program launching page starts the data generated afterwards;When When second application program obtains authorization code before second closing application program, generated and authorized according to the authorization code Feedback data, wherein, the feedback data includes authorizing feedback data;After second closing application program, by pre-seting Second protocol the mandate feedback data is fed back into first application program so that first application program obtains the The authorization message of two application programs, wherein, second protocol is used to realize after second closing application program by the feedback coefficient The application program for allowing to receive the feedback data according to being transferred to.
The embodiment of the present invention additionally provides a kind of authorization message acquisition device, applied to electronic equipment, the electronic equipment The multiple application programs of memory storage, described device include:First acquisition module, starting module, generation module and feedback module.Its In, the first acquisition module, operated for the first application response user and obtain description information corresponding to the second application program;Open Dynamic model block, for first application program according to the description information, call first pre-set in the electronic equipment Agreement, the startup page pre-defined in the second application program described in implicit opening, wherein, first agreement opens for realization Move program process corresponding with the description information and allow the program process to feedback data to institute after closing The first application program is stated, wherein, the feedback data is that the second application program launching page starts the data generated afterwards; Generation module, for when second application program obtains authorization code before second closing application program, according to institute State authorization code generation and authorize feedback data, wherein, the feedback data includes authorizing feedback data;Feedback module, for described After second closing application program, the mandate feedback data is fed back to described first by the second protocol pre-seted and applies journey Sequence, so that first application program obtains the authorization message of the second application program, wherein, second protocol is used to realize described the The feedback data is transferred to the application program for allowing to receive the feedback data after two closing application programs.
The embodiment of the present invention additionally provides a kind of electronic equipment, and the electronic equipment includes:Memory;Processor;And Authorization message acquisition device, the authorization message acquisition device are stored in the memory and including one or more by described The software function module of computing device, it includes:First acquisition module, operate and obtain for the first application response user Description information corresponding to second application program;Starting module, for first application program according to the description information, call The first agreement pre-set in the electronic equipment, the startup page pre-defined in the second application program described in implicit opening Face, wherein, first agreement is used for should described in realization startup program process corresponding with the description information and permission First application program will be feedbacked data to after being closed with program process, wherein, the feedback data is second application Program starts the page and starts the data generated afterwards;Generation module, for when second application program is in the described second application When authorization code is obtained before stop, generated according to the authorization code and authorize feedback data, wherein, the feedback data includes Authorize feedback data;Feedback module, after second closing application program, awarded by the second protocol pre-seted by described Power feedback data feeds back to first application program, so that first application program obtains the mandate letter of the second application program Breath, wherein, second protocol is used to realize to be transferred to the feedback data after second closing application program and allows to receive institute State the application program of feedback data.
Compared with prior art, a kind of method for acquiring authorized information, device and electronic equipment provided by the invention.Described One application program in a manner of implicitly starting by according to description information and the first agreement, opening the second application program.Cleverly After applying the first agreement the second application program of startup, it is allowed to which the second application program sends feedback data to the first application program Function replacement serviced in the prior art using AIDL into row data communication, and then reduce coupling between application program pass System.The efficiency of effective lifting inter-application communication.Meanwhile first agreement belong to the agreement of system level, security is higher, It is more reliable.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as pair The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 shows the block diagram of electronic equipment provided in an embodiment of the present invention.
Fig. 2 shows a part for the step flow chart for the method for acquiring authorized information that present pre-ferred embodiments provide.
Fig. 3 shows another portion of the step flow chart for the method for acquiring authorized information that present pre-ferred embodiments provide Point.
Fig. 4 shows the schematic diagram for the authorization message acquisition device that present pre-ferred embodiments provide.
Icon:100- electronic equipments;101- memories;102- storage controls;103- processors;200- authorization messages obtain Take device;The acquisition modules of 201- first;202- starting modules;203- generation modules;204- feedback modules;205- parsing modules; The acquisition modules of 206- second;207- add modules.
Embodiment
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Generally exist The component of the embodiment of the present invention described and illustrated in accompanying drawing can be configured to arrange and design with a variety of herein.Cause This, the detailed description of the embodiments of the invention to providing in the accompanying drawings is not intended to limit claimed invention below Scope, but it is merely representative of the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not doing The every other embodiment obtained on the premise of going out creative work, belongs to the scope of protection of the invention.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent accompanying drawing in individual accompanying drawing.Meanwhile the present invention's In description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
Fig. 1 is refer to, Fig. 1 shows the block diagram of electronic equipment 100 provided in an embodiment of the present invention.Electronic equipment 100 may be, but not limited to, smart mobile phone, tablet personal computer, pocket computer on knee, vehicle-mounted computer, personal digital assistant (personal digital assistant, PDA), wearable mobile terminal etc..The electronic equipment 100 is provided with iOS System, it includes authorization message acquisition device 200, memory 101, storage control 102 and processor 103.
The memory 101, storage control 102 and 103 each element of processor are directly or indirectly electrical between each other Connection, to realize the transmission of data or interaction.For example, these elements can pass through one or more communication bus or letter between each other Number line, which is realized, to be electrically connected with.The authorization message acquisition device 200 include it is at least one can be with software or firmware (firmware) Form be stored in the memory 101 or be solidificated in the operating system (operating of the electronic equipment 100 System, OS) in software function module or the application program that is installed in electronic equipment 100.The processor 103 is used to hold The executable module stored in line storage 101, for example, the software function module that includes of the authorization message acquisition device 200 or Computer program.
Wherein, memory 101 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only storage (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc.. Wherein, memory 101 is used for storage program, and the processor 103 performs described program, this hair after execute instruction is received Method performed by the server for the flow definition that bright any embodiment discloses can apply in processor 103, or by Reason device 103 is realized.
Processor 103 can be a kind of IC chip, have signal handling capacity.Above-mentioned processor 103 can be with It is general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP), speech processor and video processor etc.;Can also be digital signal processor, application specific integrated circuit, Field programmable gate array either other PLDs, discrete gate or transistor logic, discrete hardware components. It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor can be Microprocessor or the processor 103 can also be any conventional processors 103 etc..
First embodiment
Fig. 2 is refer to, Fig. 2 shows the flow chart for the method for acquiring authorized information that present pre-ferred embodiments provide.Award Power information acquisition method comprises the following steps:
Step S201, obtain as the description information corresponding to each application program.
In the present embodiment, the description information is corresponding with application program, to facilitate corresponding application program to pass through description Information searching arrives.Description information can be the information that the function of application program is described, for example, will retrieval as browse answer With the description information of program;It can also be application package name.In the present embodiment, using each application package name corresponding to The description information of application program, the bag name of each application program is unique in electronic equipment 100.
Step S202, the description information is added into the description file of the corresponding application program.
In the present embodiment, the surface of a wound one is used to start the startup page authorized in each application program.Start the page Including describing file.Description information is added into corresponding description file.It should be noted that description file is a setting File, substantially it is an XML file.
, can be by adding filter an intent-filter, Ran Hou in file is described as a kind of embodiment Filter method action is added in the filter.Action events can be<action android:Name=" com.xxx.xxx.getuserinfo">, com.xxx.xxx.getuserinfo here is description information.When with the application Activity corresponding to filter method action corresponding to program occurs, i.e., when action things corresponding to application program occurs in system When part, it is possible to which the startup page to the application program starts.
As shown in figure 3, the method for acquiring authorized information that the present embodiment provides is further comprising the steps of:
Step S101, the first application response user, which operates, obtains description information corresponding to the second application program.
In the present embodiment, multiple application programs are mounted with electronic equipment 100, in the first application program running In, response user operates the description information for obtaining the second application program.For example, response user, which operates, obtains the second application program Bag name.
Step S102, first application program are called and set in advance in the electronic equipment 100 according to the description information The first agreement put, the startup page pre-defined in the second application program described in implicit opening.
In the present embodiment, first agreement, which is used to realize, starts program process corresponding with the description information And allow the program process to feedback data to first application program after closing, wherein, the feedback data is The second application program launching page starts the data generated afterwards.Alternatively, first agreement can include using StartActivityforResult functions.In startActivityforResult functions, beaten in a manner of implicitly starting Open the startup page of the second application program corresponding to the description information.
As a kind of embodiment, when the first application program is run, by Intent classes building method obtain The example of Intent objects, then by calling addAction (" the com.xxx.xxx.getuserinfo ") sides in intent Method adds an action event to the intention object, then by calling intent.addAction (" Android.intent.action.VIEW "), addition is intended to the action description of object, and in the present embodiment, action description is to take It must authorize.By above-mentioned two step, the startup page for opening that action is android.intent.getuserinfo is realized. Then in the first application program by calling startActivityforResult (intent) methods to be on the page.Need It is noted that startActivityforResult functions are typically only capable to be applied in same application between each process Startup, in the present embodiment, cleverly using the method combination startActivityforResult functions implicitly started, gram The limitation used that startActivityforResult functions are only limitted in same application has been taken, simultaneously as StartActivityforResult functions can make to allow after startup page close feedback data so that realize not by AIDL can still realize data interaction between different application.And startActivityforResult functions belong to system-level Other function, and AIDL is only to service, therefore, startActivityforResult functions are compared to security performance for AIDL It is higher.
Step S103, when second application program obtains authorization code before second closing application program, root Generated according to the authorization code and authorize feedback data, wherein, the feedback data includes authorizing feedback data.
In the present embodiment, authorization code is obtained in the clicking operation for starting response user in the page of the second application program. For example, user clicks on the mandate button started in the page of the second application program, the click generation authorization code of user is responded.Institute Before the startup page close for stating the second application program, generated according to the authorization code of acquisition and authorize feedback data.Alternatively, institute is worked as When stating the second application program and getting the authorization code in the given time, successfully feedback coefficient is authorized according to authorization code generation According to;When second application program does not get the authorization code in the given time, generated and authorized according to the authorization code Failure feedback data.
Step S104, when second application program gets not authorization message before second closing application program When, generate authorization failure feedback data.
In the present embodiment, after generating authorization failure feedback data and second closing application program, by pre-seting Second protocol the authorization failure feedback data is fed back into first application program.It should be noted that do not authorize letter Breath can have user to click on the information that refusal is authorized and generated in the startup page of the second application program.
Step S105, after second closing application program, by the second protocol that pre-sets by the mandate feedback coefficient According to first application program is fed back to, so that first application program obtains the authorization message of the second application program.
In the present embodiment, second protocol is used to after realizing second closing application program transmit the feedback data To the application program for allowing to receive the feedback data.Alternatively, second protocol can include real using setResult methods It is existing.
As a kind of embodiment, setResult (RESULT_OK, the intent) method of calling carries out feedback data Return.Wherein RESULT_OK is that an integer is used to represent that result obtains successfully, when the feedback data is successfully anti-including authorizing Data are presented, then RESULT_OK is normal value;When feedback data includes authorization failure feedback data, then RESULT_OK is abnormal. Intent represents an intention object, the authorization code that encapsulation needs return in the intention object.One is contained in the Intent Individual bundl e objects, bundle objects are used to store authorization code.Specifically, wherein authorization code is by calling in bun dler PutString (AUTH_CODE, code) modes stored, what wherein AUTH_C ODE were represented is the key of authorization code Title, what code was represented is the value of authorization code.It is when the page returns after so being set by setR esult methods System can return to the intent message in the first application program, so as to just complete the biography of the message between different application It is defeated.
Step S106, when the mandate feedback data that first application program judges to receive to authorize successfully feedback data When, to it is described authorize successfully feedback data parse, to obtain the authorization code.
As a kind of embodiment, it can formerly examine what the second application program was passed over by setResult methods In information, whether RESULT_OK is abnormal.When the RESULT_OK exceptions, this authorization failure, the first application program are judged The mandate of the second application program is not obtained.When the RESULT_OK is normal, the first application program is to the intent that passes over Object is parsed, with the content of authorized access code.Specific resolving is by calling the getBundle in intent first First get bundle objects and then getString (AUTH_CODE) method in bundler objects are called is awarded to get The content of weighted code is come, and thus completes the acquisition of authorization code information.
Second embodiment
Fig. 4 is refer to, Fig. 4 is the schematic diagram for the authorization message acquisition device 200 that present pre-ferred embodiments provide.Authorize Information acquisition device 200 includes the first acquisition module 201, starting module 202, generation module 203, feedback module 204, parsing mould Block 205, the second acquisition module 206 and add module 207.
First acquisition module 201, operate to obtain for the first application response user and retouched corresponding to the second application program State information.
In embodiments of the present invention, step S101 can be performed by the first acquisition module 201.
Starting module 202, for first application program according to the description information, call the electronic equipment 100 The first agreement inside pre-set, the startup page pre-defined in the second application program described in implicit opening, wherein, described the One agreement, which is used to realize, to be started program process corresponding with the description information and allows the program process to close After will feedback data to first application program, the feedback data is after the second application program launching page starts The data of generation.
In embodiments of the present invention, step S102 can be performed by starting module 202.
Generation module 203, for obtaining mandate before second closing application program when second application program During code, generated according to the authorization code and authorize feedback data, wherein, the feedback data includes authorizing feedback data.And also use In when second application program gets not authorization message before second closing application program, authorization failure is generated Feedback data.
In embodiments of the present invention, step S103 and step S104 can be performed by generation module 203.
Feedback module 204, after second closing application program, by the second protocol that pre-sets by the mandate Feedback data feeds back to first application program, so that first application program obtains the mandate letter of the second application program Breath, wherein, second protocol is used to realize to be transferred to the feedback data after second closing application program and allows to receive institute State the application program of feedback data.
In embodiments of the present invention, step S105 can be performed by feedback module 204.
Parsing module 205, for the mandate feedback data that judges to receive when first application program to authorize successfully During feedback data, to it is described authorize successfully feedback data parse, to obtain the authorization code.
In embodiments of the present invention, step S106 can be performed by parsing module 205.
Second acquisition module 206, for obtaining the description information corresponding to each application program, wherein, it is described Description information includes application package name.
In embodiments of the present invention, step S201 can be performed by the second acquisition module 206.
Add module 207, for the description information to be added into the description file of the corresponding application program.
In embodiments of the present invention, step S202 can be performed by add module 207.
In summary, a kind of method for acquiring authorized information, device and electronic equipment provided by the invention, set applied to electronics Standby, the multiple application programs of electronic equipment memory storage, methods described includes:First application response user, which operates, obtains the Description information corresponding to two application programs;First application program is called in the electronic equipment according to the description information The first agreement pre-set, the startup page pre-defined in the second application program described in implicit opening, wherein, described first After agreement is used for realization startup program process corresponding with the description information and allows the program process to close First application program will be feedbacked data to, wherein, the feedback data is that the second application program launching page starts The data generated afterwards;When second application program obtains authorization code before second closing application program, according to The authorization code generation authorizes feedback data, wherein, the feedback data includes authorizing feedback data;Second application program After closing, the mandate feedback data is fed back to by first application program by the second protocol pre-seted, so that described First application program obtains the authorization message of the second application program, wherein, second protocol is used to realize second application program The feedback data is transferred to the application program for allowing to receive the feedback data after closing.Cleverly apply the first agreement After starting the second application program, it is allowed to which it is existing that feedback data is sent function replacement to first application program by the second application program Have in technology and serviced using AIDL into row data communication, and then reduce the coupled relation between application program.Effective lifting The efficiency of inter-application communication.Meanwhile first agreement belong to the agreement of system level, security is higher, more reliable.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can also pass through Other modes are realized.Device embodiment described above is only schematical, for example, flow chart and block diagram in accompanying drawing Show the device of multiple embodiments according to the present invention, method and computer program product architectural framework in the cards, Function and operation.At this point, each square frame in flow chart or block diagram can represent the one of a module, program segment or code Part, a part for the module, program segment or code include one or more and are used to realize holding for defined logic function Row instruction.It should also be noted that at some as in the implementation replaced, the function that is marked in square frame can also with different from The order marked in accompanying drawing occurs.For example, two continuous square frames can essentially perform substantially in parallel, they are sometimes It can perform in the opposite order, this is depending on involved function.It is it is also noted that every in block diagram and/or flow chart The combination of individual square frame and block diagram and/or the square frame in flow chart, function or the special base of action as defined in performing can be used Realize, or can be realized with the combination of specialized hardware and computer instruction in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply and deposited between these entities or operation In any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Other identical element also be present in process, method, article or equipment including the key element.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.It should be noted that:Similar label and letter exists Similar terms is represented in following accompanying drawing, therefore, once being defined in a certain Xiang Yi accompanying drawing, is then not required in subsequent accompanying drawing It is further defined and explained.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. a kind of method for acquiring authorized information, it is characterised in that applied to electronic equipment, the electronic equipment memory storage is multiple should With program, methods described includes:
First application response user, which operates, obtains description information corresponding to the second application program;
First application program calls the first agreement pre-set in the electronic equipment according to the description information, hidden Formula opens the startup page pre-defined in second application program, wherein, first agreement is used to realize startup and institute State program process corresponding to description information and allow the program process to feedback data to described first after closing Application program, the feedback data are that the second application program launching page starts the data generated afterwards;
When second application program obtains authorization code before second closing application program, given birth to according to the authorization code Into mandate feedback data, wherein, the feedback data includes authorizing feedback data;
After second closing application program, the mandate feedback data is fed back to described the by the second protocol that pre-sets One application program, so that first application program obtains the authorization message of the second application program, wherein, second protocol is used for real The feedback data is transferred to the application program for allowing to receive the feedback data after existing second closing application program.
2. the method as described in claim 1, it is characterised in that the startup page includes description file, and methods described is also wrapped Include:
The description information corresponding to each application program is obtained, wherein, the description information includes application package name;
The description information is added into the description file of the corresponding application program.
3. the method as described in claim 1, it is characterised in that when second application program is closed in second application program When authorization code is obtained before closing, generating the step of authorizing feedback data according to the authorization code includes:
When second application program gets the authorization code in the given time, according to the authorization code generation authorize into Work(feedback data;
When second application program does not get the authorization code in the given time, generated and authorized according to the authorization code Failure feedback data.
4. method as claimed in claim 3, it is characterised in that methods described also includes:
When second application program gets not authorization message before second closing application program, generation, which authorizes, loses Lose feedback data;
After second closing application program, the authorization failure feedback data is fed back to by institute by the second protocol pre-seted State the first application program.
5. method as claimed in claim 4, it is characterised in that methods described also includes:
When the mandate feedback data that first application program judges to receive is authorizes successfully feedback data, to the mandate Success feedback data is parsed, to obtain the authorization code.
6. the method as described in claim any one of 1-5, it is characterised in that first agreement includes using StartActivityforResult functions.
7. the method as described in claim any one of 1-5, it is characterised in that the second protocol includes using setResult Method.
8. a kind of authorization message acquisition device, it is characterised in that applied to electronic equipment, the electronic equipment memory storage is multiple should With program, described device includes:
First acquisition module, operated for the first application response user and obtain description information corresponding to the second application program;
Starting module, for first application program according to the description information, call and pre-set in the electronic equipment The first agreement, the startup page pre-defined in the second application program described in implicit opening, wherein, first agreement is used for Realize and start corresponding with description information program process and allow feedback coefficient after the program process closing According to first application program, the feedback data is that the second application program launching page starts the number generated afterwards According to;
Generation module, for when second application program obtains authorization code before second closing application program, root Generated according to the authorization code and authorize feedback data, wherein, the feedback data includes authorizing feedback data;
Feedback module, after second closing application program, by the second protocol that pre-sets by the mandate feedback coefficient According to feeding back to first application program, so that first application program obtains the authorization message of the second application program, wherein, Second protocol is used to realizing to be transferred to the feedback data after second closing application program and allows to receive the feedback coefficient According to application program.
9. device as claimed in claim 8, it is characterised in that the startup page includes description file, and described device is also wrapped Include:
Second acquisition module, for obtaining the description information corresponding to each application program, wherein, the description information Including application package name;
Add module, for the description information to be added into the description file of the corresponding application program.
10. a kind of electronic equipment, it is characterised in that the electronic equipment includes:
Memory;
Processor;And
Authorization message acquisition device, the authorization message acquisition device be stored in the memory and including it is one or more by The software function module of the computing device, it includes:
First acquisition module, operated for the first application response user and obtain description information corresponding to the second application program;
Starting module, for first application program according to the description information, call and pre-set in the electronic equipment The first agreement, the startup page pre-defined in the second application program described in implicit opening, wherein, first agreement is used for Realize and start corresponding with description information program process and allow feedback coefficient after the program process closing According to extremely first application program, wherein, the feedback data is generated after the second application program launching page starts Data;
Generation module, for when second application program obtains authorization code before second closing application program, root Generated according to the authorization code and authorize feedback data, wherein, the feedback data includes authorizing feedback data;
Feedback module, after second closing application program, by the second protocol that pre-sets by the mandate feedback coefficient According to feeding back to first application program, so that first application program obtains the authorization message of the second application program, wherein, Second protocol is used to realizing to be transferred to the feedback data after second closing application program and allows to receive the feedback coefficient According to application program.
CN201710928685.XA 2017-10-09 2017-10-09 Method for acquiring authorized information, device and electronic equipment Active CN107679373B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710928685.XA CN107679373B (en) 2017-10-09 2017-10-09 Method for acquiring authorized information, device and electronic equipment
PCT/CN2018/081384 WO2019071927A1 (en) 2017-10-09 2018-03-30 Authorization information obtaining method and apparatus, electronic device, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710928685.XA CN107679373B (en) 2017-10-09 2017-10-09 Method for acquiring authorized information, device and electronic equipment

Publications (2)

Publication Number Publication Date
CN107679373A true CN107679373A (en) 2018-02-09
CN107679373B CN107679373B (en) 2019-09-10

Family

ID=61137933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710928685.XA Active CN107679373B (en) 2017-10-09 2017-10-09 Method for acquiring authorized information, device and electronic equipment

Country Status (2)

Country Link
CN (1) CN107679373B (en)
WO (1) WO2019071927A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019071927A1 (en) * 2017-10-09 2019-04-18 武汉斗鱼网络科技有限公司 Authorization information obtaining method and apparatus, electronic device, and readable storage medium
WO2020216204A1 (en) * 2019-04-25 2020-10-29 上海连尚网络科技有限公司 Information acquisition method and apparatus
CN115080928A (en) * 2022-06-30 2022-09-20 北京亚控科技发展有限公司 Application authorization management method and related equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014014793A1 (en) * 2012-07-17 2014-01-23 CallSign, Inc. Anti-cloning system and method
CN104102537A (en) * 2013-04-07 2014-10-15 华为技术有限公司 Application calling method and user terminal
CN104462980A (en) * 2014-12-30 2015-03-25 北京奇虎科技有限公司 Authority management method, device and system of application programs and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679373B (en) * 2017-10-09 2019-09-10 武汉斗鱼网络科技有限公司 Method for acquiring authorized information, device and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014014793A1 (en) * 2012-07-17 2014-01-23 CallSign, Inc. Anti-cloning system and method
CN104102537A (en) * 2013-04-07 2014-10-15 华为技术有限公司 Application calling method and user terminal
CN104462980A (en) * 2014-12-30 2015-03-25 北京奇虎科技有限公司 Authority management method, device and system of application programs and mobile terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019071927A1 (en) * 2017-10-09 2019-04-18 武汉斗鱼网络科技有限公司 Authorization information obtaining method and apparatus, electronic device, and readable storage medium
WO2020216204A1 (en) * 2019-04-25 2020-10-29 上海连尚网络科技有限公司 Information acquisition method and apparatus
CN115080928A (en) * 2022-06-30 2022-09-20 北京亚控科技发展有限公司 Application authorization management method and related equipment

Also Published As

Publication number Publication date
WO2019071927A1 (en) 2019-04-18
CN107679373B (en) 2019-09-10

Similar Documents

Publication Publication Date Title
DE112014006112T5 (en) Applet migration in a secure element
CN107679373A (en) Method for acquiring authorized information, device and electronic equipment
CN111414193A (en) Method for implementing service system based on micro-service framework and related device
CN106169042A (en) The method and device of administration authority
CN104424028A (en) Terminal device and switching method thereof
CN106992975A (en) The recognition methods of malice network address and device
CN111144878B (en) Instruction generation method and instruction generation device
CN105741444B (en) Application authentication method and device based on linux system financial self-service equipment
CN107154975A (en) One kind application method for down loading and device
CN108713200A (en) For the method being loaded into the embedded-type security element of mobile terminal device will to be subscribed to
CN110300049B (en) Message shielding method, device and system based on instant messaging
CN104995635B (en) Picture sending method and device and terminal device
CN116501311A (en) Code generation method, device, computing and storage medium and electronic equipment
CN110502885A (en) Identity identifying method, system, computer equipment and computer readable storage medium
CN109242055A (en) Smart card peripheral device, command processing method, electronic equipment and storage medium
CN102547661B (en) Method and device for establishing communication between Android system and telecommunications smart card
CN113873450B (en) Short message configuration method, device, computer equipment and storage medium
CN106550117B (en) A kind of method and apparatus preventing telecommunication fraud on intelligent terminal
CN111343170B (en) Electronic signing method and system
CN108681448A (en) Network request method, storage medium, electronic equipment and the system of IOS systems
CN114924783A (en) Interface calling method, device, equipment and storage medium of application program
EP2624176A1 (en) Menu assembly method, menu assembly system and terminal
CN115174618B (en) Internet of vehicles module, internet of vehicles access method, equipment and medium
CN117807609A (en) Authority authorization method, electronic equipment and storage medium
CN107528819A (en) Account binding method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231123

Address after: Room 606-609, Compound Office Complex Building, No. 757, Dongfeng East Road, Yuexiu District, Guangzhou, Guangdong Province, 510699

Patentee after: China Southern Power Grid Internet Service Co.,Ltd.

Address before: 11 / F, building B1, software industry phase 4.1, No.1, Software Park East Road, Donghu New Technology Development Zone, Wuhan City, Hubei Province, 430000

Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.