CN107704295B - Method, device and storage medium for setting self-starting authority - Google Patents

Method, device and storage medium for setting self-starting authority Download PDF

Info

Publication number
CN107704295B
CN107704295B CN201711049443.XA CN201711049443A CN107704295B CN 107704295 B CN107704295 B CN 107704295B CN 201711049443 A CN201711049443 A CN 201711049443A CN 107704295 B CN107704295 B CN 107704295B
Authority
CN
China
Prior art keywords
application
target
self
target application
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711049443.XA
Other languages
Chinese (zh)
Other versions
CN107704295A (en
Inventor
刘鸣
刘海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201711049443.XA priority Critical patent/CN107704295B/en
Publication of CN107704295A publication Critical patent/CN107704295A/en
Application granted granted Critical
Publication of CN107704295B publication Critical patent/CN107704295B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The disclosure relates to a method, a device and a storage medium for setting self-starting authority, relating to the technical field of terminals, wherein the method comprises the following steps: when detecting that the target application needs to set the self-starting right, acquiring an application identifier, an application package name and a target state of the target application from the target application, wherein the target state is a state which the target application expects to set the self-starting right, and the target state is an open state or a closed state; and setting the state of the self-starting authority of the target application to be a target state based on the application identification and the application package name acquired from the target application. According to the method and the device, the self-starting permission of the target application can be automatically set by automatically acquiring the application identifier, the application package name and the target state of the target application from the target application, and a user does not need to set the self-starting permission of the application through complex manual operation, so that the operation is simplified, and the self-starting permission is more convenient to set.

Description

Method, device and storage medium for setting self-starting authority
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a method and an apparatus for setting a self-starting permission, and a storage medium.
Background
In recent years, with the development of mobile internet technology, functions of applications installed in terminals are becoming more powerful. Wherein, many applications will apply for opening the self-starting authority. When the application has the self-starting right, the application is allowed to be automatically started when the terminal is started, and in the standby process of the terminal, the application can be awakened by other applications at any time, is not influenced by the process operation of the cleaning application, and continuously runs in the background.
In the related art, when setting the self-starting right of an application, a user may enter a setting page of the application through a setting page of a terminal, and click a right management option in the setting page of the application. After the terminal detects that the authority management option is clicked, a plurality of authority options including self-starting authority can be displayed, and at this time, the user can manually set the self-starting authority of the application to be on or off.
Disclosure of Invention
In order to solve the problem that in the related art, when a user sets the self-starting permission of an application through manual operation, the operation is complicated, the present disclosure provides a method and an apparatus for setting the self-starting permission, and a computer-readable storage medium.
According to a first aspect of the embodiments of the present disclosure, there is provided a method for setting a self-starting right, the method including:
when detecting that a target application needs to set a self-starting right, acquiring an application identifier, an application package name and a target state of the target application from the target application, wherein the target state is a state in which the self-starting right is expected to be set by the target application, and the target state is an open state or a closed state;
and setting the state of the self-starting authority of the target application to be the target state based on the application identification and the application package name acquired from the target application.
Optionally, when it is detected that the target application needs to set the self-starting right, acquiring the application identifier, the application package name, and the target state of the target application from the target application includes:
when the calling operation of the third-party application to the target application is detected, and the self-starting permission state of the target application is not an opening state, determining that the target application needs to set the self-starting permission;
detecting whether an application package name and the target state of the target application are received, wherein the application package name and the target state are sent by the target application after the target application fails to be started according to the calling operation;
and when the application package name and the target state of the target application are received, acquiring the application identifier of the target application from the target application through a first specified function.
Optionally, when it is detected that the target application needs to set the self-starting right, acquiring the application identifier, the application package name, and the target state of the target application from the target application includes:
when a self-starting permission setting request is received, determining that the target application needs to be set with a self-starting permission, wherein the self-starting permission setting request carries an application package name and the target state of the target application;
and acquiring the application package name and the target state carried in the self-starting permission setting request, and acquiring the application identifier of the target application from the target application through a first specified function.
Optionally, the method further comprises:
verifying the legality of the target application;
and when the target application is verified to be legal, executing the step of setting the state of the self-starting authority of the target application to the target state based on the application identification and the application package name acquired from the target application.
Optionally, the verifying the validity of the target application includes:
acquiring signature information of the target application from the target application;
based on the application package name of the target application, acquiring stored application information comprising the application identification and signature information of the target application through a second specified function;
and when the signature information acquired from the target application is the same as the signature information included in the application information and the application identifier acquired from the target application is the same as the application identifier included in the application information, determining that the target application is verified to be legal.
Optionally, the setting the state of the self-starting right of the target application to the target state based on the application identifier and the application package name acquired from the target application includes:
calling a self-starting permission setting function, wherein the self-starting permission setting function is a function which is allowed to be called by a content provider;
and setting the self-starting permission state of the target application to be the target state through the self-starting permission setting function based on the application identification and the application package name acquired from the target application.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for setting a self-starting right, the apparatus including:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring an application identifier, an application package name and a target state of a target application from the target application when the target application is detected to be required to set a self-starting right, the target state refers to a state that the target application expects to set the self-starting right, and the target state is an open state or a closed state;
and the setting module is used for setting the state of the self-starting authority of the target application to be the target state based on the application identifier and the application package name which are acquired from the target application.
Optionally, the obtaining module includes:
the first determining submodule is used for determining that the target application needs to set the self-starting permission when the calling operation of the third-party application to the target application is detected and the self-starting permission of the target application is not in the opening state;
the detection submodule is used for detecting whether an application package name and the target state of the target application are received or not, wherein the application package name and the target state are sent by the target application after the self-starting of the target application is failed according to the calling operation;
and the first obtaining submodule is used for obtaining the application identifier of the target application from the target application through a first specified function when the application package name and the target state of the target application are received.
Optionally, the obtaining module includes:
the second determining submodule is used for determining that the target application needs to set the self-starting permission when receiving a self-starting permission setting request, wherein the self-starting permission setting request carries the application package name and the target state of the target application;
and the second obtaining submodule is used for obtaining the application package name and the target state carried in the self-starting permission setting request and obtaining the application identifier of the target application from the target application through a first specified function.
Optionally, the apparatus further comprises:
the verification module is used for verifying the legality of the target application;
and the triggering module is used for triggering the setting module to set the self-starting permission state of the target application to the target state based on the application identifier and the application package name which are acquired from the target application when the target application is verified to be legal.
Optionally, the verification module comprises:
a third obtaining sub-module, configured to obtain signature information of the target application from the target application;
the fourth obtaining submodule is used for obtaining stored application information comprising the application identification and the signature information of the target application through a second specified function based on the application package name of the target application;
and a third determining sub-module, configured to determine that the target application is verified to be legitimate when the signature information obtained from the target application is the same as the signature information included in the application information, and the application identifier obtained from the target application is the same as the application identifier included in the application information.
Optionally, the setting module includes:
the calling submodule is used for calling a self-starting permission setting function, and the self-starting permission setting function is a function which is allowed to be called by a content provider;
and the setting submodule is used for setting the self-starting permission state of the target application to the target state through the self-starting permission setting function based on the application identification and the application package name acquired from the target application.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for setting a self-starting right, the apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the steps of any one of the methods of the first aspect.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon instructions which, when executed by a processor, implement the steps of any one of the methods of the first aspect described above.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: when it is detected that the target application needs to set the self-starting right, the application identifier, the application package name and the target state that the target application is expected to set the self-starting right of the target application can be obtained from the target application, and then the state of the self-starting right of the target application can be set to the target state based on the application identifier and the application package name of the target application obtained from the target application. That is, in the embodiment of the present disclosure, the self-starting permission of the target application may be automatically set by automatically obtaining the application identifier, the application package name, and the target state of the target application from the target application, and a user does not need to set the self-starting permission of the application through a complicated manual operation, which simplifies the operation and makes setting of the self-starting permission more convenient.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart illustrating a method of setting bootstrapping rights in accordance with an exemplary embodiment.
FIG. 2 is a flow diagram illustrating a method of setting bootstrapping permissions in accordance with an example embodiment.
Fig. 3A is a block diagram illustrating an apparatus for setting a self-starting right according to an example embodiment.
FIG. 3B is a block diagram illustrating an acquisition module in accordance with an exemplary embodiment.
FIG. 3C is a block diagram illustrating another acquisition module, according to an example embodiment.
Fig. 3D is a block diagram illustrating an apparatus for setting a self-starting right according to an example embodiment.
FIG. 3E is a block diagram illustrating a setup module according to an example embodiment.
Fig. 4 is a block diagram illustrating an apparatus for setting a self-starting right according to an example embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
Before explaining the embodiments of the present disclosure in detail, an application scenario related to the embodiments of the present disclosure will be described.
Currently, the number of applications installed in a terminal is increasing, and the functions of the applications are also increasing. Wherein many applications will apply for opening the self-starting right. After the self-starting authority of the application is opened, when the terminal is started, the application can be automatically started along with the starting of the terminal. Or, in the process of running after the terminal is started, if a third-party application calls the application, the application can also be automatically started. In addition, once the application with the self-starting authority is automatically started, when the user cleans the application process of the background application, the application process of the application is not affected and can continuously run in the background.
Since the application is automatically started when the application is started or called after the application has the self-starting permission, and the application can continuously run in the background all the time after the application is started, the application occupies system resources of the terminal and consumes power of the terminal. However, in some cases, the application may only need to be automatically started when the terminal is powered on, and then the functions in the application will not be used any more, so that if the application keeps the self-starting permission state as an open state all the time, the application will continue to run in the background, which wastes system resources and power of the terminal. In addition, or alternatively, the function of the application may be used only in the process of being called by the third-party application, so that the function of the application may not be used any more after the call of the third-party application to the application is ended, in this case, if the state of the self-starting right of the application is always kept in the open state, the application will continue to run in the background after the call is ended, which wastes system resources and power of the terminal. As can be seen from the above description, if the self-starting right of the application is opened, in the running process of the terminal, it may not be necessary to keep the self-starting right of the application in the opened state all the time, but it may be necessary to reset the self-starting right of the application in due time. In addition, if the self-starting authority of the application is not started, in the running process of the terminal, when the application is called by a third-party application, the application cannot be automatically started, and at this time, the self-starting authority of the application also needs to be set. Therefore, for the above scenario, a method for setting a self-starting permission is urgently needed, and the method for setting a self-starting permission provided by the embodiment of the present disclosure can be used for setting a self-starting permission of an application in the above application scenario or a scenario similar to the above application scenario, so that the self-starting permission setting is more flexible and convenient.
In the related art, when the self-starting right of the application is set, the self-starting right is manually operated by a user, so that the operation is complicated and the efficiency is low. For example, for an application with a self-starting permission, after the application is started, when the function of the application is no longer used, a user needs to manually close the self-starting permission of the application through a setting page of the terminal, and the operation is cumbersome and not intelligent. For another example, for an application without the self-starting right, when a third-party application calls the application due to the fact that a function in the application needs to be used, the application cannot be called because the application does not have the self-starting right, and at this time, a user is also required to manually open the self-starting right of the application through a setting page of the terminal, so that normal use of the third-party application is affected, and operations of the user are increased. In order to solve the above problem, an embodiment of the present disclosure provides a method for setting a self-starting right, which will be explained in detail with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a method for setting a self-starting right according to an exemplary embodiment, where the method is used in a terminal, as shown in fig. 1, and includes the following steps:
in step 101, when it is detected that the target application needs to set the self-starting right, an application identifier, an application package name, and a target state of the target application are obtained from the target application, where the target state is a state in which the self-starting right is expected to be set by the target application, and the target state is an open state or a closed state.
In step 102, the state of the self-starting authority of the target application is set to the target state based on the application identification and the application package name acquired from the target application.
In the embodiment of the present disclosure, when it is detected that the target application needs to set the self-starting permission, the application identifier, the application package name of the target application and the target state that the target application expects to set the self-starting permission may be obtained from the target application, and then, the state of the self-starting permission of the target application may be set to the target state based on the application identifier and the application package name of the target application obtained from the target application. That is, in the embodiment of the present disclosure, the self-starting permission of the target application may be automatically set by automatically obtaining the application identifier, the application package name, and the target state of the target application from the target application, and a user does not need to set the self-starting permission of the application through a complicated manual operation, which simplifies the operation and makes setting of the self-starting permission more convenient.
Optionally, when it is detected that the target application needs to set the self-starting right, acquiring the application identifier, the application package name, and the target state of the target application from the target application, including:
when the calling operation of the third-party application to the target application is detected, and the self-starting permission state of the target application is not an opening state, determining that the target application needs to set the self-starting permission;
detecting whether an application package name and a target state of a target application are received, wherein the application package name and the target state are sent by the target application after the target application fails to be started according to a calling operation;
and when the application package name and the target state of the target application are received, acquiring the application identifier of the target application from the target application through a first specified function.
Optionally, when it is detected that the target application needs to set the self-starting right, acquiring the application identifier, the application package name, and the target state of the target application from the target application, including:
when a self-starting permission setting request is received, determining that a target application needs to be set with a self-starting permission, wherein the self-starting permission setting request carries an application package name and a target state of the target application;
and acquiring the application package name and the target state carried in the self-starting permission setting request, and acquiring the application identifier of the target application from the target application through a first specified function.
Optionally, the method further comprises:
verifying the legality of the target application;
and when the target application is verified to be legal, executing a step of setting the state of the self-starting authority of the target application to be a target state based on the application identification and the application package name acquired from the target application.
Optionally, verifying the legitimacy of the target application comprises:
acquiring signature information of a target application from the target application;
based on the application package name of the target application, acquiring stored application information comprising the application identification and signature information of the target application through a second specified function;
and when the signature information acquired from the target application is the same as the signature information included in the application information and the application identifier acquired from the target application is the same as the application identifier included in the application information, determining that the target application is verified to be legal.
Optionally, setting the state of the self-starting right of the target application to the target state based on the application identifier and the application package name acquired from the target application, includes:
calling a self-starting authority setting function, wherein the self-starting authority setting function is a function which is allowed to be called by a content provider;
and setting the state of the self-starting authority of the target application to be a target state through a self-starting authority setting function based on the application identification and the application package name acquired from the target application.
All the above optional technical solutions can be combined arbitrarily to form optional embodiments of the present disclosure, and the embodiments of the present disclosure are not described in detail again.
Fig. 2 is a flowchart illustrating a method of setting a self-starting right, which is used in a terminal according to an exemplary embodiment, as shown in fig. 2, the method including the steps of:
step 201: and judging whether the target application needs to set the self-starting authority or not.
In the embodiment of the disclosure, the terminal may determine whether the target application needs to set the self-starting permission in multiple ways.
The first mode is as follows: the terminal can detect whether the application package name and the target state of the target application sent by the target application are received in real time, and when the terminal receives the application package name and the target state of the target application, the terminal can determine that the target application needs to set the self-starting permission.
In this implementation manner, the target application may obtain a self-starting permission state after a self-starting failure is performed when the terminal is started, or after the self-starting failure is performed when the terminal is called by a third-party application, and determine whether the self-starting permission state is an open state, and if the self-starting permission state is not the open state, may send an application package name and a target state to the terminal, where the target state is the open state.
Optionally, the target application may also obtain a self-starting permission state of the target application after detecting that the third-party application is called and ended or when detecting that the target application is in the background running state, and determine whether the self-starting permission state is an open state, and if the self-starting permission state is the open state, may send the application package name and the target state to the terminal, where the target state is a closed state.
In addition, in this implementation manner, after the third-party application fails to call the target application, a notification message of the call failure may be sent to the target application, after receiving the notification message, the target application sends the application package name and the target state of the target application to the terminal by determining the state of the self-starting permission of the target application, and when receiving the application package name and the target state of the target application, the terminal determines that the target application needs to set the self-starting permission.
It should be noted that, when the target application sends the application package name and the target state of the target application to the terminal, the application package name and the target state may be transmitted to the terminal as parameters in the Bundle extract ().
The second mode is as follows: the terminal can detect whether the calling operation of the third-party application to the target application exists in real time, after the calling operation of the third-party application to the target application is detected, the state of the self-starting permission of the target application can be obtained, whether the state of the self-starting permission of the target application is an open state or not is judged, and when the state of the self-starting permission of the target application is not the open state, the fact that the target application needs to be provided with the self-starting permission can be determined.
In the implementation mode, the terminal can directly monitor the target application, and when the target application is called by the third-party application, the state of the self-starting permission of the target application can be directly acquired, so that whether the self-starting permission of the target application needs to be set or not is determined.
Optionally, in this implementation manner, the terminal may not only determine whether the target application needs to set the self-starting permission by detecting a call operation of the third-party application to the target application, but also detect whether the target application is currently in a background running state and whether the self-starting permission state of the target application is an open state for the started target application. When the target application is currently in a background running state and the self-starting permission state of the target application is an open state, the terminal can determine that the target application needs to be set with the self-starting permission.
The third mode is as follows: the terminal can judge whether the self-starting permission setting request is received, and when the self-starting permission setting request is received, the terminal can determine that the target application needs to set the self-starting permission. The self-starting setting request carries an application package name and a target state of the target application, wherein the target state refers to a state that the target application expects to set a self-starting permission, and the target state can be an open state or a closed state.
In this implementation manner, when the self-starting right needs to be set, the target application may transmit the application package name and the target state of the target application to the terminal by sending a self-starting right request to the terminal. And when the terminal receives the self-starting permission setting request, determining that the target application needs to set the self-starting permission.
It should be noted that, in this implementation, in what case, the relevant description for triggering the target application to send the self-starting permission setting request to the terminal may refer to the trigger condition when the target application sends the application package name and the target state to the terminal in the first implementation, and this is not specifically limited in the embodiment of the present disclosure.
When the terminal determines that the target application needs to set the self-starting right, the self-starting right of the target application can be set through the following steps.
Step 202: and acquiring the application identification, the application package name and the target state of the target application from the target application.
In the embodiment of the present disclosure, a system API (Application Programming Interface) of the terminal may be provided to the target Application in a manner of a content provider for calling. The authority of the content manager can be defined to be safe in a manifest file authorized to be managed, and the setting of the self-starting authority is completed by calling a call function in the content manager.
When the terminal determines that the target application needs to set the self-starting right, a call function in the content manager can be called to acquire parameters needed for setting the self-starting right.
It should be noted that, because the terminal may determine whether the target application needs to set the self-starting right in different manners, correspondingly, the terminal may also obtain the application identifier, the application package name, and the target state of the target application from the target application in different manners.
When the terminal determines whether the target application needs to set the self-starting right by detecting whether the application package name and the target state sent by the target application are received, the terminal can directly acquire the received application package name and the target state. After the application package name and the target state are obtained, because the self-starting permission is set subsequently, the application identifier of the target application is needed, and under a normal condition, the target application can only actively transmit the application package name and the target state to the terminal, but cannot actively transmit the application identifier of the target application to the terminal, so that the terminal can obtain the application identifier of the target application from the target application through the first specified function.
The application identifier refers to information that is allocated by the terminal to the application and used for uniquely identifying the application, and for example, the application identifier may be a User Identification (UID). In addition, the first specific function may be a function for acquiring the UID of the application, for example, the first specific function may be a binder.
Optionally, when the terminal determines that the target application needs to set the self-starting right by monitoring the target application, the terminal may send a notification message for setting the self-starting right to the target application, the target application may send an application package name and a target state of the target application to the terminal after receiving the notification message, and after receiving the application package name and the target state, the terminal may obtain an application identifier of the target application from the target application through the first specified function.
Optionally, when the terminal determines that the target application needs to set the self-starting permission after receiving the self-starting permission setting request sent by the target application, because the self-starting permission setting request may carry the application package name and the target state of the target application, the terminal may directly obtain the application package name and the target state carried in the self-starting permission setting request, and obtain the application identifier of the target application from the target application through the first specified function.
In the embodiment of the present disclosure, because the target application may directly transmit the application package name and the target state to the terminal, and the application identifier needs to be obtained through the first specified function, in order to further determine that the target application really desires to set the self-starting permission so as to avoid the terminal from doing useless work, the terminal may obtain the application identifier through the first specified function after determining and obtaining the application package name and the target state. Of course, in order to save time, the terminal may also obtain the application identifier, the application package name, and the target state of the target application when it is determined that the target application needs to set the self-starting right, which is not specifically limited in this embodiment of the disclosure.
Optionally, in order to prevent the application installed in the terminal from maliciously calling the system API to open the self-starting permission, after the terminal acquires the application identifier, the application package name, and the target state of the target application from the target application, the terminal may also verify the validity of the target application according to the acquired application package name of the target application, and when the target application is verified to be valid, the state of the self-starting permission of the target application is set through step 203.
The specific operation of the terminal for verifying the validity of the target application may be: the terminal can acquire the signature information of the target application from the target application, and acquire the stored application information including the application identifier and the signature information of the target application through a second specified function based on the application package name of the target application. After that, the terminal may determine whether the signature information acquired from the target application and the signature information included in the stored application information are the same, and determine whether the application identifier acquired from the target application and the application identifier included in the stored application information are the same. If the signature information acquired from the target application is the same as the signature information included in the application information, and the application identifier acquired from the target application is also the same as the application identifier included in the application information, it can be determined that the identity verification of the target application passes, and at this time, the terminal can determine that the target application verification is legal, that is, the verification of the target application passes.
It should be noted that, in the embodiment of the present invention, no matter what manner is adopted to determine whether the target application needs to set the self-starting permission, and no matter what manner is adopted to obtain the application identifier, the application package name, and the target state of the target application from the target application, after obtaining the application identifier and the application package name from the target application, the terminal may verify the validity of the target application by the above-described method, and after verifying the validity, set the state of the self-starting permission of the target application by step 203. Certainly, the method for verifying the validity of the target application is only an exemplary verification method provided in the embodiment of the present invention, and in actual application, the validity of the target application may also be verified by other methods, so as to prevent an application installed in the terminal from maliciously calling a system API to change the state of the self-starting right.
Step 203: and setting the state of the self-starting authority of the target application to be a target state based on the application identification and the application package name acquired from the target application.
After the application identifier and the application package name are obtained from the target application, the terminal may call a self-starting permission setting function, and set the state of the self-starting permission of the target application to a target state through the self-starting permission setting function based on the application identifier and the application package name obtained from the target application.
Of course, if the terminal needs to verify the identity of the target application, the terminal may set the self-starting permission by calling the self-starting permission setting function according to the application identifier, the application package name, and the target state acquired from the target application after determining that the identity of the target application passes the verification. Of course, if the identity check of the terminal on the target application is not passed, the setting of the self-starting permission of the target application may be stopped.
It should be noted that, as can be seen from the foregoing description, in the embodiment of the present disclosure, the system API is provided to the target application by way of the content provider ContentProvider to make a call, and the setting of the self-starting right is completed by calling a call function in the content manager. Therefore, after the terminal calls the call function to acquire the application identifier, the application package name and the target state of the target application, the terminal can use the acquired application identifier, the acquired application package name and the target state as parameters of the self-starting permission setting function in the call function, so that the self-starting permission of the application is set to be in the target state. For example, the self-starting permission setting function may be permissionmanageservice.getlnstance (context). setMode (), where a first parameter in setMode () may be used to indicate a preset parameter for setting self-starting permission, a second parameter may be an application identifier, a third parameter may be an application package name, and a fourth parameter may be a target state. Or, the first parameter is a preset parameter for indicating the start-up self-starting permission, the second parameter is an application identifier, the third parameter is an application package name, and the fourth parameter is a parameter converted according to the target state, for example, if the target state is the start state, the fourth parameter is allowed. If the target state is the off state, the fourth parameter may be ignored. Of course, the first parameter and the fourth parameter may have other setting manners, so that the self-starting permission setting function may set the self-starting permission of the application according to the parameters, which is not specifically limited in the embodiment of the present disclosure.
In the embodiment of the present disclosure, the system API may be provided to the target application for calling in a manner of a content provider ContentProvider, so that when the terminal determines that the target application needs to set the self-starting right, the application identifier, the application package name, and the target state of the target application may be automatically obtained, and the self-starting right of the target application may be automatically set according to the obtained application identifier, the obtained application package name, and the target state. The self-starting permission of the application is not required to be set by a user through complex manual operation, so that the operation is simplified, and the self-starting permission is more convenient to set. In addition, in the embodiment of the present disclosure, since the terminal can automatically determine whether the target application needs to set the self-starting permission in different ways under different situations, the terminal can complete the setting of the self-starting permission of the target application in the shortest time, and thus, the waste of terminal system resources and electric quantity caused by the continuous background operation of the target application under the condition that the self-starting permission is in an open state for a long time and the function of the target application is not used is avoided. Meanwhile, for the target application with the self-starting permission in the closed state, the terminal can also automatically set the self-starting permission of the target application to the open state within the shortest time when the function in the target application is used, so that the efficiency of setting the self-starting permission is improved, and convenience is brought to the use of a user.
The above embodiments mainly describe in detail the flow of the method for setting the self-starting permission provided by the embodiments of the present disclosure. Next, an exemplary code for automatically setting the self-starting right of the yellow page will be given, taking the target application as the yellow page as an example.
It should be noted that the yellow page has a number identification function, and when the terminal receives a call request, the yellow page can be self-started to perform number identification. If the self-starting authority of the yellow page is in a closed state, when a call request is received, the yellow page cannot be subjected to number identification because the yellow page does not have the self-starting authority, and at the moment, the terminal can set the self-starting authority of the yellow page to be in an open state through the provided method for setting the self-starting authority. If the state of the self-starting permission of the yellow page is the open state, then, after the number identification is completed, the yellow page enters a background running state, and at this time, in order to avoid waste of system resources and consumption of the electric quantity of the terminal caused by continuous background running of the yellow page, the terminal may set the self-starting permission of the yellow page to the closed state by the method for setting the self-starting permission provided in the above embodiment. The implementation code for setting the self-starting authority of the yellow page to be in the open state by the terminal is as follows:
Figure BDA0001452889210000131
Figure BDA0001452889210000141
Figure BDA0001452889210000151
next, an explanation will be given on an apparatus for setting a self-starting right provided in an embodiment of the present disclosure.
Fig. 3A is a block diagram illustrating an apparatus 300 for setting a self-starting right according to an example embodiment. Referring to fig. 3A, the apparatus 300 includes an acquisition module 301 and a setting module 302.
An obtaining module 301, configured to obtain, when it is detected that the target application needs to set the self-starting right, an application identifier, an application package name, and a target state of the target application from the target application, where the target state is a state in which the self-starting right is expected to be set by the target application, and the target state is an open state or a closed state;
a setting module 302, configured to set a state of a self-starting right of the target application to a target state based on the application identifier and the application package name acquired from the target application.
Optionally, referring to fig. 3B, the obtaining module 301 includes:
the first determining submodule 3011 is configured to determine that the target application needs to set a self-starting permission when it is detected that the third-party application calls the target application and the self-starting permission of the target application is not in an open state;
the detection submodule 3012 is configured to detect whether an application package name and a target state of the target application are received, where the application package name and the target state are sent by the target application after a self-start failure according to a call operation;
the first obtaining sub-module 3013 is configured to, when receiving the application package name and the target status of the target application, obtain an application identifier of the target application from the target application through a first specified function.
Optionally, referring to fig. 3C, the obtaining module 301 includes:
the second determining submodule 3014 is configured to determine that the target application needs to set the self-starting permission when receiving the self-starting permission setting request, where the self-starting permission setting request carries an application package name and a target state of the target application;
the second obtaining sub-module 3014 is configured to obtain the application package name and the target state carried in the self-starting permission setting request, and obtain the application identifier of the target application from the target application through the first specified function.
Optionally, referring to fig. 3D, the apparatus 300 further comprises:
a verification module 303, configured to verify validity of the target application;
the trigger module 304 is configured to, when the target application is verified to be legal, the trigger setting module 302 sets the state of the self-starting right of the target application to the target state based on the application identifier and the application package name acquired from the target application.
Optionally, the verification module 303 comprises:
the third obtaining submodule is used for obtaining signature information of the target application from the target application;
the fourth obtaining submodule is used for obtaining the stored application information comprising the application identification and the signature information of the target application through a second specified function based on the application package name of the target application;
and the third determining sub-module is used for determining that the target application is verified to be legal when the signature information acquired from the target application is the same as the signature information included in the application information and the application identifier acquired from the target application is the same as the application identifier included in the application information.
Optionally, referring to fig. 3E, the setting module 302 includes:
a calling submodule 3021 configured to call a self-starting right setting function, where the self-starting right setting function is a function that allows calling by a content provider;
the setting sub-module 3022 is configured to set, by using the self-starting permission setting function, the state of the self-starting permission of the target application to the target state based on the application identifier and the application package name acquired from the target application.
In the embodiment of the present disclosure, when it is detected that the target application needs to set the self-starting permission, the application identifier, the application package name of the target application and the target state that the target application expects to set the self-starting permission may be obtained from the target application, and then, the state of the self-starting permission of the target application may be set to the target state based on the application identifier and the application package name of the target application obtained from the target application. That is, in the embodiment of the present disclosure, the self-starting permission of the target application may be automatically set by automatically obtaining the application identifier, the application package name, and the target state of the target application from the target application, and a user does not need to set the self-starting permission of the application through a complicated manual operation, which simplifies the operation and makes setting of the self-starting permission more convenient.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 4 is a block diagram illustrating an apparatus 400 for setting a self-starting right according to an example embodiment. For example, the apparatus 400 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 4, the apparatus 400 may include one or more of the following components: processing components 402, memory 404, power components 406, multimedia components 408, audio components 410, input/output (I/O) interfaces 412, sensor components 414, and communication components 416.
The processing component 402 generally controls overall operation of the apparatus 400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 402 may include one or more processors 420 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 402 can include one or more modules that facilitate interaction between the processing component 402 and other components. For example, the processing component 402 can include a multimedia module to facilitate interaction between the multimedia component 408 and the processing component 402.
The memory 404 is configured to store various types of data to support operations at the apparatus 400. Examples of such data include instructions for any application or method operating on the device 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 404 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power supply components 406 provide power to the various components of device 400. The power components 406 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power supplies for the apparatus 400.
The multimedia component 408 includes a screen that provides an output interface between the device 400 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 408 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the apparatus 400 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 410 is configured to output and/or input audio signals. For example, audio component 410 includes a Microphone (MIC) configured to receive external audio signals when apparatus 400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 404 or transmitted via the communication component 416. In some embodiments, audio component 410 also includes a speaker for outputting audio signals.
The I/O interface 412 provides an interface between the processing component 402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 414 includes one or more sensors for providing various aspects of status assessment for the apparatus 400. For example, the sensor assembly 414 may detect an open/closed state of the apparatus 400, the relative positioning of the components, such as a display and keypad of the apparatus 400, the sensor assembly 414 may also detect a change in the position of the apparatus 400 or a component of the apparatus 400, the presence or absence of user contact with the apparatus 400, orientation or acceleration/deceleration of the apparatus 400, and a change in the temperature of the apparatus 400. The sensor assembly 414 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 416 is configured to facilitate wired or wireless communication between the apparatus 400 and other devices. The apparatus 400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 416 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the methods provided by the embodiments illustrated in fig. 1 and 2 and described above.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 404 comprising instructions, executable by the processor 420 of the apparatus 400 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium, wherein instructions of the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform a method of setting a self-booting right as provided in the embodiments shown in fig. 1 and 2.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. A method for setting self-starting rights, the method comprising:
when detecting that a target application needs to set a self-starting right, acquiring an application identifier, an application package name and a target state of the target application from the target application, wherein the application identifier is information which is distributed by a terminal for the target application and is used for uniquely identifying the target application, the target state refers to a state which is expected to be set by the target application according to the self-starting right, and the target state is an open state or a closed state;
acquiring signature information of the target application from the target application; based on the application package name of the target application, acquiring stored application information comprising the application identification and signature information of the target application through a second specified function;
when the signature information acquired from the target application is the same as the signature information included in the application information, and the application identifier acquired from the target application is the same as the application identifier included in the application information, determining that the target application is verified to be legal, and setting the state of the self-starting authority of the target application to be the target state based on the application identifier acquired from the target application and the application package name.
2. The method according to claim 1, wherein when it is detected that a target application needs to set a self-starting right, acquiring an application identifier, an application package name, and a target state of the target application from the target application comprises:
when the calling operation of a third-party application to the target application is detected, and the self-starting permission state of the target application is not an opening state, determining that the target application needs to set the self-starting permission;
detecting whether an application package name and the target state of the target application are received, wherein the application package name and the target state are sent by the target application after the target application fails to be started according to the calling operation;
and when the application package name and the target state of the target application are received, acquiring the application identifier of the target application from the target application through a first specified function.
3. The method according to claim 1, wherein when it is detected that the target application needs to set the self-starting right, acquiring the application identifier, the application package name, and the target state of the target application from the target application comprises:
when a self-starting permission setting request is received, determining that the target application needs to be set with a self-starting permission, wherein the self-starting permission setting request carries an application package name and the target state of the target application;
and acquiring the application package name and the target state carried in the self-starting permission setting request, and acquiring the application identifier of the target application from the target application through a first specified function.
4. The method according to any one of claims 1 to 3, wherein the setting the state of the self-starting right of the target application to the target state based on the application identifier and the application package name acquired from the target application comprises:
calling a self-starting permission setting function, wherein the self-starting permission setting function is a function which is allowed to be called by a content provider;
and setting the self-starting permission state of the target application to be the target state through the self-starting permission setting function based on the application identification and the application package name acquired from the target application.
5. An apparatus for setting a self-starting right, the apparatus comprising:
an obtaining module, configured to obtain, when it is detected that a target application needs to set a self-starting permission, an application identifier, an application package name, and a target state of the target application from the target application, where the application identifier is information that is allocated by a terminal to the target application and is used to uniquely identify the target application, the target state is a state in which the self-starting permission is expected to be set by the target application, and the target state is an open state or a closed state;
the setting module is used for setting the state of the self-starting authority of the target application to be the target state based on the application identification and the application package name which are acquired from the target application;
the device further comprises:
the verification module is used for verifying the legality of the target application;
the trigger module is used for triggering the setting module to set the self-starting permission state of the target application to be the target state based on the application identifier and the application package name which are acquired from the target application when the target application is verified to be legal;
the authentication module includes:
a third obtaining sub-module, configured to obtain signature information of the target application from the target application;
the fourth obtaining submodule is used for obtaining stored application information comprising the application identification and the signature information of the target application through a second specified function based on the application package name of the target application;
and a third determining sub-module, configured to determine that the target application is verified to be legitimate when the signature information obtained from the target application is the same as the signature information included in the application information, and the application identifier obtained from the target application is the same as the application identifier included in the application information.
6. The apparatus of claim 5, wherein the obtaining module comprises:
the first determining submodule is used for determining that the target application needs to set the self-starting permission when the calling operation of the third-party application to the target application is detected and the self-starting permission of the target application is not in the opening state;
the detection submodule is used for detecting whether an application package name and the target state of the target application are received or not, wherein the application package name and the target state are sent by the target application after the self-starting of the target application is failed according to the calling operation;
and the first obtaining submodule is used for obtaining the application identifier of the target application from the target application through a first specified function when the application package name and the target state of the target application are received.
7. The apparatus of claim 5, wherein the obtaining module comprises:
the second determining submodule is used for determining that the target application needs to set the self-starting permission when receiving a self-starting permission setting request, wherein the self-starting permission setting request carries the application package name and the target state of the target application;
and the second obtaining submodule is used for obtaining the application package name and the target state carried in the self-starting permission setting request and obtaining the application identifier of the target application from the target application through a first specified function.
8. The apparatus of any of claims 5-7, the setup module comprising:
the calling submodule is used for calling a self-starting permission setting function, and the self-starting permission setting function is a function which is allowed to be called by a content provider;
and the setting submodule is used for setting the self-starting permission state of the target application to the target state through the self-starting permission setting function based on the application identification and the application package name acquired from the target application.
9. A computer device, characterized in that the computer device comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured as a step of the method of any one of claims 1-4.
10. A computer-readable storage medium having instructions stored thereon, wherein the instructions, when executed by a processor, implement the steps of the method of any of claims 1-4.
CN201711049443.XA 2017-10-31 2017-10-31 Method, device and storage medium for setting self-starting authority Active CN107704295B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711049443.XA CN107704295B (en) 2017-10-31 2017-10-31 Method, device and storage medium for setting self-starting authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711049443.XA CN107704295B (en) 2017-10-31 2017-10-31 Method, device and storage medium for setting self-starting authority

Publications (2)

Publication Number Publication Date
CN107704295A CN107704295A (en) 2018-02-16
CN107704295B true CN107704295B (en) 2021-07-23

Family

ID=61176628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711049443.XA Active CN107704295B (en) 2017-10-31 2017-10-31 Method, device and storage medium for setting self-starting authority

Country Status (1)

Country Link
CN (1) CN107704295B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852090A (en) * 2005-11-28 2006-10-25 华为技术有限公司 Method for controlling using authority of application information
CN103281189A (en) * 2013-05-23 2013-09-04 无锡昶达信息技术有限公司 Light weight class safe protocol certification system and method for radio frequency identification equipment
CN104166564A (en) * 2014-08-11 2014-11-26 成都瑞博慧窗信息技术有限公司 Display terminal program updating method
CN104283678A (en) * 2013-07-04 2015-01-14 中国移动通信集团公司 Application authentication method and device
CN104461725A (en) * 2014-12-30 2015-03-25 小米科技有限责任公司 Application process starting control method and device
CN104683299A (en) * 2013-11-28 2015-06-03 中兴通讯股份有限公司 Control method for software registration, authentication server and terminal
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
CN106406944A (en) * 2016-09-05 2017-02-15 Tcl集团股份有限公司 Control method and system for forbidding self-starting of application
CN106549957A (en) * 2016-10-26 2017-03-29 上海众人网络安全技术有限公司 A kind of legal authentication method of terminal applies and system
CN107133513A (en) * 2017-05-10 2017-09-05 中南大学 It is a kind of support Android run when authority mechanism third-party application between communications access control method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130213481A1 (en) * 2011-10-05 2013-08-22 Gohypersonic, Inc. Self-starting supersonic inlet
US9086013B2 (en) * 2013-03-12 2015-07-21 Ethan W Franklin Gerotor rotary Stirling cycle engine
CN103744503A (en) * 2014-01-08 2014-04-23 广州市久邦数码科技有限公司 Method and system for prohibiting automatic running of applications after boot
CN103823699A (en) * 2014-02-27 2014-05-28 广州视源电子科技股份有限公司 Method and device for controlling self-starting of application program
CN105100074A (en) * 2015-07-01 2015-11-25 小米科技有限责任公司 Data operation processing method, device and terminal equipment
CN106022101B (en) * 2016-05-17 2019-12-06 Oppo广东移动通信有限公司 application management method and terminal
CN106656953A (en) * 2016-09-23 2017-05-10 焦点科技股份有限公司 Method for realizing safe interface calling between systems based on Internet

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852090A (en) * 2005-11-28 2006-10-25 华为技术有限公司 Method for controlling using authority of application information
CN103281189A (en) * 2013-05-23 2013-09-04 无锡昶达信息技术有限公司 Light weight class safe protocol certification system and method for radio frequency identification equipment
CN104283678A (en) * 2013-07-04 2015-01-14 中国移动通信集团公司 Application authentication method and device
CN104683299A (en) * 2013-11-28 2015-06-03 中兴通讯股份有限公司 Control method for software registration, authentication server and terminal
CN104166564A (en) * 2014-08-11 2014-11-26 成都瑞博慧窗信息技术有限公司 Display terminal program updating method
CN104461725A (en) * 2014-12-30 2015-03-25 小米科技有限责任公司 Application process starting control method and device
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
CN106406944A (en) * 2016-09-05 2017-02-15 Tcl集团股份有限公司 Control method and system for forbidding self-starting of application
CN106549957A (en) * 2016-10-26 2017-03-29 上海众人网络安全技术有限公司 A kind of legal authentication method of terminal applies and system
CN107133513A (en) * 2017-05-10 2017-09-05 中南大学 It is a kind of support Android run when authority mechanism third-party application between communications access control method

Also Published As

Publication number Publication date
CN107704295A (en) 2018-02-16

Similar Documents

Publication Publication Date Title
EP3136648B1 (en) Method and device for determining control authority on user device
EP3151507B1 (en) Methods and apparatuses for controlling device
CN105847243B (en) Method and device for accessing intelligent camera
EP3076716A1 (en) Method and apparatus for network access
US10764934B2 (en) Method, apparatus for terminal device to access wireless network
EP3068154A1 (en) Method and apparatus for setting smart device management account
CN108811179B (en) Wireless network connection method, device and storage medium
CN106453052B (en) Message interaction method and device
CN109219036B (en) Method and device for unbinding equipment and electronic equipment
EP3232385A1 (en) Method, device and system for executing business process
EP3163834B1 (en) Method and device for equipment control
CN107230060B (en) Account loss reporting method and device
CN110049062B (en) Verification code verification method, device, system, server, electronic equipment and storage medium
CN107959757B (en) User information processing method and device, APP server and terminal equipment
CN106302528B (en) Short message processing method and device
KR20160064033A (en) Method and apparatus of verifying terminal
CN105809440B (en) Online payment method and device
CN107612888B (en) Enterprise user space creation method and device
CN111277984A (en) Wireless local area network access method and device
CN105791409B (en) Remote connection establishing method and device
CN107070707B (en) Method and device for determining initialization mode of router
CN107704295B (en) Method, device and storage medium for setting self-starting authority
CN106060104B (en) Application management method and device
CN108011882B (en) Method, device and system for data synchronization
EP3239880B1 (en) Legal installation package acquiring method and apparatus, computer program and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant