CN109284605A - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN109284605A
CN109284605A CN201811160733.6A CN201811160733A CN109284605A CN 109284605 A CN109284605 A CN 109284605A CN 201811160733 A CN201811160733 A CN 201811160733A CN 109284605 A CN109284605 A CN 109284605A
Authority
CN
China
Prior art keywords
application
permission
information
communication interface
objective function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811160733.6A
Other languages
Chinese (zh)
Inventor
王欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201811160733.6A priority Critical patent/CN109284605A/en
Publication of CN109284605A publication Critical patent/CN109284605A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Abstract

This application provides a kind of information processing method and devices, this method comprises: the with the first permission first application carries out information transmission based on communication interface and the second application with the second permission, to realize the objective function of second application;Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.The application realizes the realization of the correlation function to the second application limited with permission by the permission of the first application, and then realizes the purpose that limited information is able to access that the application with access limitation.

Description

Information processing method and device
Technical field
Present application relates generally to fields of communication technology, more particularly to a kind of information processing method and device.
Background technique
Along with the intelligence of electronic equipment, various application platforms are also constantly improve and are developing.Due to different applications Operating environment locating for platform is different, and certain applications or function will appear the restricted problem of access.For example, UWP (UniversalWindows Platform, windows common application platform) it is new general to be that Microsoft introduces in Windows 10 It reads, UWP is not to design for some terminal, but can run in all 10 equipment of windows.Due to all UWP application operate in virtual sandbox environment, it is specific due to its running environment although increasing its safety Change, can make UWP application that certain information can not be accessed, during being developed to UWP application, if necessary to these spies Determine information, will be unable to continue to complete corresponding development.As it can be seen that how to solve to be able to access that the application with access limitation The problem of to limited information, have become the Important Problems to specific application development.
Summary of the invention
In view of this, this application provides a kind of information processing method and devices.
A kind of information processing method, comprising:
The first application with the first permission carries out information biography based on communication interface and the second application with the second permission It is defeated, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
It optionally, include command information in response to the information transmitted based on the communication interface, it is described to have first First application of permission carries out information transmission based on communication interface and the second application with the second permission, to realize described second The objective function of application, comprising:
It is described when first application monitors that second application sends described instruction information by the communication interface First application executes control processing according to described instruction information, to realize the objective function of second application.
Optionally, first application executes the first processing according to described instruction information, comprising:
First application obtains monitor event corresponding with described instruction information;
First application is based on the monitor event, control processing is carried out to target hardware, so that the target hardware State and described instruction information indicated by state consistency.
It optionally, include solicited message in response to the information transmitted based on the communication interface, it is described to have first First application of permission carries out information transmission based on communication interface and the second application with the second permission, to realize described second The objective function of application, comprising:
When first application monitors that second application sends solicited message by communication interface, first application Feedback information is obtained according to the solicited message, and the feedback information is fed back into second application, to realize described the The objective function of two applications.
Optionally, first application obtains feedback information according to the solicited message, and the feedback information is fed back To second application, to realize the objective function of second application, comprising:
First application obtains registry information corresponding with the solicited message according to the solicited message;
First application pre-processes the registry information, obtains feedback information;
The feedback information is fed back to second application by the communication interface by first application, to realize State the objective function of the second application.
A kind of information processing method, comprising:
The second application with the second permission carries out information biography based on communication interface and the first application with the first permission It is defeated, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to the second permission.
It optionally, include command information in response to the information transmitted based on the communication interface, it is described to have second Second application of permission carries out information transmission based on communication interface and the first application with the first permission, to realize described second The objective function of application, comprising:
Second application sends command information to first application based on the communication interface, makes first application Control processing is executed based on described instruction information, to realize the objective function of second application.
It optionally, include solicited message in response to the information transmitted based on the communication interface, it is described to have second Second application of permission carries out information transmission based on communication interface and the first application with the first permission, to realize described second The objective function of application, comprising:
Second application sends solicited message to first application based on the communication interface, makes first application Feedback information is obtained according to the solicited message, and the feedback information is sent to described second by the communication interface and is answered With to realize the objective function of second application.
First device, comprising: memory and first processor, wherein
The first processor, for the first application with the first permission based on communication interface and with the second permission Second application carries out information transmission, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
Second device, comprising: memory and second processor, wherein
The second processor, for the second application with the second permission based on communication interface and with the first permission First application carries out information transmission, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
It can be seen that compared with prior art, this application provides information processing method and device, this method includes having First application of the first permission carries out information transmission based on communication interface and the second application with the second permission, to realize second The objective function of application.It is not belonging to the second permission since the permission of objective function belongs to the first permission, can be answered by first Processing information corresponding with objective function or feedback information etc. are passed into the second application with based on communication interface, answered by first Permission realizes the realization of the correlation function to the second application limited with permission, and then realizes to access limit The application of system is able to access that the purpose of limited information.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of signaling diagram of information processing provided by the embodiments of the present application;
Fig. 2 is a kind of method flow diagram of command information processing provided by the embodiments of the present application;
Fig. 3 is a kind of method flow diagram of solicited message processing provided by the embodiments of the present application;
Fig. 4 is a kind of method flow diagram for obtaining feedback information provided by the embodiments of the present application;
Fig. 5 is the schematic diagram that the first application and the second application provided by the embodiments of the present application carry out information exchange;
Fig. 6 is a kind of structural schematic diagram of first device provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of second device provided by the embodiments of the present application;
Fig. 8 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
First application in this application and the second application are to operate in system program environment, and there is information to transmit function The application of energy.Specifically, the first application and the second application can be to operate in application software on electronic equipment, and set to electronics The standby form of expression can be mobile phone, computer or other communication terminals with no restrictions.But the first application and the second application Permission it is different, i.e., the first application and second applies the function that may be implemented different, and the reason for causing its permission different can have A variety of, the application is without limitation, can (the such as first application fortune different with the running environment of the second application due to the first application In real system environment, the second application operates in virtual sandbox environment row), it causes the permission of the two different, is also possible to Since the first application is different with the security mechanism of the second application, cause the permission of the two different.But it should be recognized that and different It surely is that the Permission Levels of the first application are higher than the Permission Levels of the second application, the Permission Levels for being also not necessarily the second application are higher than The Permission Levels of first application, only permission of the two in certain fields exists different, for example, the second application cannot achieve to mesh The access authority of resource is marked, and the access to the target resource may be implemented in the first application.
A kind of information processing method is provided in the embodiment of the present application, and referring to Figure 1, this method is applied to the first application 101, wherein the first application 101 has the first permission, and the first application 101 executes:
S10, the first application carry out information transmission based on communication interface and the second application.
The second application 102 is made to realize objective function by executing step S10.
Wherein, the second application 102 has the second permission.The permission for the objective function that second application 102 is realized belongs to first Permission, and it is not belonging to the second permission.I.e. objective function is the function that the second application cannot achieve based on the second current permission.The One application 101 and the second application 102 can be the application that can arbitrarily receive/send information, and only the permission of the two is different.The The function that the first application of one permission characterization can be realized, the function that the second application of the second permission characterization can be realized, but first Permission is different with the range of the second permission.The first permission is different with the range of the second permission in the embodiment of the present application, is not Extent of competence of the extent of competence of second permission less than the first permission, but the second function for cannot achieve based on the second permission of application Can, it can be realized by the first application based on the first permission.For example, since the second application does not have the power of access first resource Limit needs to access the first resource by the first application if the second application needs to access the first resource, and then first First resource is returned into the second application using by communication interface, realizes access of second application to first resource.
Communication interface realizes the information transmission between the first application and the second application, the application in the embodiment of the present application With no restrictions to the form of expression of the communication interface, can be serial communication interface (such as com interface), or network is logical Believe interface.The first application and the are realized by the communication interface established between the first application and the second application in the embodiment of the present application Communication between two applications, every group first application and the corresponding communication interface of the second application.
This application provides information processing method, this method includes the first application with the first permission based on communication interface Information transmission is carried out with the second application with the second permission, to realize the objective function of the second application.Due to objective function Permission belongs to the first permission and is not belonging to the second permission, and can be based on communication interface by the first application will be corresponding with objective function Processing information or feedback information etc. pass to the second application, realized by the permission of the first application to being limited with permission The realization of the correlation function of second application, and then realize the mesh that limited information is able to access that the application with access limitation 's.
The objective function for the second application realized by the first application can may be acquisition of information function for control function Energy.Corresponding, the information transmitted based on communication interface can may be solicited message for command information.
Furthermore, it is understood that in conjunction with preceding method process, if the first application is different with the running environment of the second application, and second When using operating in virtual system program environment, since the limitation of the virtual system program environment can make second application In a closed running environment, i.e., the second application can not know that the message that it is issued or the purpose source that instruction reaches are assorted Or the instruction of its instruction is realized by which application or system.If the letter transmitted at this time based on communication interface Breath is command information, then the method for realizing the second application target function by the first application are as follows:
When S20, the first application monitor that the second application sends command information by communication interface, the first application is according to instruction Information executes control processing, to realize the objective function of the second application.
Fig. 2 is referred to, above-mentioned steps S20 is based on, in the step of the first application end mainly executes are as follows:
S201, the first application monitor the command information that second application issues;
S202, the first application receive command information, execute control processing.
It should be noted that the second application might not will explicitly can instruct due to the running environment of the second application Information is sent directly to the first application, it is understood that there may be command information has been sent to system hardware or the second application by the second application There is no clear adding purpose sources when sending instruction.But the corresponding objective function of the command information is not in the second power It limits in range, then the command information that the first application can issue the second application is monitored, when monitoring the command information, then Corresponding control processing can be executed, so that objective function is realized in the second application.For example, if the command information is to some hardware Control, then corresponding objective function is that the hardware is made to reach the second state by first state, wherein first state is that the hardware is worked as Preceding original state, and the second state is the dbjective state that the second application reaches the hardware.
First applies after the command information for monitoring the second application transmission, is executed according to the command information matching Control processing, i.e. control processing can be to control the processing that above-mentioned hardware reach dbjective state.
Furthermore, it is understood that additionally providing a kind of first application execution in the embodiment of the present application in conjunction with preceding method process The method for controlling processing, comprising:
S30, first application obtain monitor event corresponding with described instruction information;
S31, first application are based on the monitor event, control processing are carried out to target hardware, so that the target State consistency indicated by the state and described instruction information of hardware.
When first apply monitoring obtain command information after, the command information can be parsed to obtain corresponding monitoring thing Part, the monitor event are the second event handled using the objective function event for needing to realize, i.e., the first application, example It such as can be to the access of certain hardware, or the write-in to certain information.
If monitor event is to certain hardware controls, the first application needs to judge it is to which based on the monitor event Hardware is handled, and using the hardware as target hardware, then carries out control processing to the target hardware, so that the target hardware End-state with second application issue command information indicated by state consistency.
For example, the first application monitors the instruction if the command information that the second application issues is to open keyboard light Afterwards, due to target hardware be keyboard light according to the state that the monitor event that command information parsing acquires is keyboard light need into Row changes, corresponding, if currently the state of keyboard light is to close, the control processing of the first application execution is the unlatching keyboard Lamp, if the state of current keyboard light is open state, the control processing of the first application execution is to maintain the unlatching of the keyboard light State.I.e. by the control processing of the first application, so that the open state indicated in the state of keyboard light and command information is consistent.
Further, in conjunction with preceding method process, change in response to the state of target hardware, the information of the first application execution Processing method further include:
S40, the first application creation and the matched registration table of target hardware, so that the status information of target hardware is written to this In registration table.
I.e. for not having the second application of creation registration table, the first application can create registration table, and by target hardware Corresponding status information is written in registration table, can not be by the shape of target hardware if having there is registration table to be the second application certainly State information is written in registration table, and the status information of target hardware can be written in registration table by the first application.
Illustrate that monitor event is the access to hardware in above-described embodiment, monitor event may be to certain information Write-in.For example, corresponding monitor event is note if command information is that the activation bit of hardware is written in registration table The information write-in of volume table.Certainly, the first application directly can not execute control processing to the monitor event, can monitor the monitoring The state of event, i.e., whether second apply and the activation bit of hardware be written in registration table cannot predict to can be realized in advance When, it can attempt for the activation bit of the hardware to be written in registration table, when the first application monitors the second application write-in failure, Control processing can be executed, i.e., the activation bit of the hardware is written in registration table.It can be in the first application prison under the conditions of this The command information process for surveying the second application adds a trigger mechanism, that is, triggers when first application executes control processing.
It is corresponding, if the information transmitted based on communication interface is solicited message, the is realized by the first application The method of two application target functions are as follows:
When S50, the first application monitor that the second application sends solicited message by communication interface, the first application is according to request Information acquisition feedback information, and feedback information is fed back into the second application, to realize the objective function of the second application.
Refer to Fig. 3, in step S50 the information process of the first application execution can with specifically includes the following steps:
S301, the first application monitor the solicited message that the second application issues;
S302, the first application obtain feedback information according to solicited message;
Feedback information is sent to the second application by S302, the first application.
Specifically, the second application can only issue solicited message, can not know that this is asked due to being limited by running environment at this time The relevant information in the purpose source for asking information to be sent to, and the corresponding application of objective function second of the solicited message cannot achieve. After the first application monitors the solicited message, feedback information can be obtained based on its first permission, and feedback information is sent to Second application.For example, the access authority of the second application is restricted, i.e., the second application cannot achieve pair based on the second current permission The access of certain information, then the second application can issue the solicited message of an acquisition restricted information, and the first application can monitor The solicited message, and know the information of the second application expectation access.Namely first application based on the solicited message obtain and ask The corresponding feedback information of information is sought, feedback information is sent to the second application, realizes access of second application to this partial information.
If the solicited message of the second application is the information accessed in registration table, referring to fig. 4, the first application obtains feedback information Process, can specifically include:
S401, the first application obtain registry information corresponding with solicited message according to solicited message;
S402, the first application pre-process registry information, obtain feedback information;
Feedback information is fed back to the second application by communication interface by S403, the first application, to realize the mesh of the second application Mark function.
It should be noted that obtaining registry information corresponding with the solicited message according to solicited message in the first application Afterwards, which can be transmitted directly to the second application, after can also pre-processing to the information in the registration table The second application is sent to as feedback information.
For example, the solicited message of the second application is to obtain the sound driver information of the first hardware, and record in the registration table The activation bit of first hardware is so that existing for aggregate form, i.e., the activation bit not only includes that sound driver information further includes Image-driven information, then pretreatment at this time is to delete pretreatment, i.e. deletion image-driven information, and sound driver information made The second application is fed back to for feedback information.
If the second application requires the reception format of data, corresponding pretreatment can be handled for form modifying, It needs that registry information is changed to corresponding format according to the reception format of the second application after obtaining registry information, so After be sent to the second application.
Above-mentioned pretreatment be do not have the function of being handled registry data based on second application and realize, if the The permission of two applications is only the information that can not be obtained in registration table, can be handled the information in the registration table received, Then corresponding, the first application is not necessarily to carry out above-mentioned pretreatment, the registry information of acquisition can be transmitted directly to the second application, It is handled by the second application registry information is obtained, obtains target information.Alternatively, the second application is only to need to access registration Registry information is directly sent to the second application without being pre-processed by the information in table, the first application.
Based on the above embodiments, the control authority or information access rights of the either second application are limited, can be with Command information or solicited message are sent to the first application based on communication interface, corresponding control processing is carried out by the first application Or acquisition of information, it realizes the objective function of the second application, solves the problems, such as that the second application permission is limited.
Referring to Fig. 5, for the schematic diagram of the first application provided by the embodiments of the present application and the second application progress information exchange.? The second application is that UWP is applied in the embodiment, wherein UWP is the concept that Microsoft introduces in Windows10, due to all UWP application operates in virtual system program environment, such as virtual sandbox environment, the limitation based on its running environment so that UWP application, which can not access, is locally registered table and control local hardware.Corresponding, the first application is operation in this embodiment Win32 application in real system program environment.And table and control local hardware is locally registered using accessible in win32.
Specifically, win32 application in the present embodiment operates in the first system environment, UWP operates in second system ring In border, i.e., the first system environment is real system program environment, and second system environment is virtual system program environment.At this time, COM communication interface is as the communication interface that can be used as between win32 application and UWP application.Since UWP application can not be to hardware Registry information is controlled or is accessed, then win32 application can be based on win32API (Application Programming Interface, application programming interface) access registration table or with ACPI (Advanced Configuration and Power Management Interface, advanced configuration and power-management interface) it is communicated with hardware, it then will be corresponding Information is transmitted to UWP application, realizes the communication of UWP Yu hardware and registration table.
Therefore, can solve UWP by embodiment provided by the present application cannot access hardware and registry information, caused by Hardware vendor is difficult the problem of developing using UWP application.
Due to storing various parameters in registration table, it contain application program and computer system all with confidence Breath, system and the initialization information of application program, the incidence relation of application program and document files, hardware device explanation, state With attribute and various status informations and data.So the information in registration table is more important, when win32 application receives UWP When using the solicited message for obtaining registry information, UWP application can be authenticated, if it is that the UWP recorded in advance is answered With the registry information that can then will acquire is sent to UWP application, if it is not the UWP application recorded in advance, the win 32 can ignore the solicited message, to improve the safety of information transmitting.
It should be noted that if first application second application between do not have the communication interface that can communicate or It, can be according to the ginseng of the second application when current communication interface between the two has certain limitation for the transmitting of certain information Number pass through mechanism, calls xlm function existing communication interface protocol to be modified or generated new communication interface standard, comes real Information transmission between existing first application and the second application.
Another information processing method is additionally provided in the embodiment of the present application, and this method is applied to the second application, comprising:
S60, the second application with the second permission carry out letter based on communication interface and the first application with the first permission Breath transmission, to realize the objective function of second application;Wherein, realize that the permission of the objective function belongs to first power Limit, and it is not belonging to the second permission.
Correspondingly, the second application realizes that the specific method process of objective function is referred to and echoed in the embodiment of the present application Step S10 and correlation step are stated, such as step S20, S201, S202, step S30, S31, step S40, step S50, step S301 To step S303, step S401 to step S403 etc..
Also, furthermore, it is understood that if the second application can specify its extent of competence, i.e., the second application can know that it can be with Control or the hardware that cannot be controlled and its clear registry information that is accessible or cannot accessing.So second Using issue command information or when solicited message can clearly receive these information purpose source (be clearly system hardware or First application), command information or solicited message explicitly can be sent to system hardware or be sent to the by the second application One application.For example, corresponding information can be sent to the first application when the second application can not be directly realized by certain functions, with Indicate first application to realize above-mentioned function.Following step can specifically be participated in.
When second application realizes objective function based on the first application, the second application can send command information to the first application And/or solicited message.If the second application is command information with what is sent to first, in response to being carried out based on the communication interface The information of transmission includes command information, and second application with the second permission is based on communication interface and has the first permission First application carries out information transmission, to realize the objective function of second application, comprising:
S70, second application send command information to first application based on the communication interface, make described first Control processing is executed using based on described instruction information, to realize the objective function of second application.
Specifically, in step S70 the detailed process of the information processing of the first application execution can be first application pass through Monitor event corresponding with command information is obtained, control processing is then carried out to target hardware according to monitor event, so that target The state consistency of state and the execution information instruction of hardware can refer to above-mentioned step to realize the objective function of the second application Rapid S30 and step S31.
Furthermore, it is understood that in conjunction with preceding method process, if the second application solicited message is sent to first in application, if ring Ying Yu includes solicited message based on the information that the communication interface is transmitted, and second application with the second permission is based on Communication interface carries out information transmission with the first application with the first permission, to realize the objective function of second application, packet It includes:
S80, second application send solicited message to first application based on the communication interface, make described first Feedback information is obtained using according to the solicited message, and the feedback information is sent to described the by the communication interface Two applications, to realize the objective function of second application.
It should be noted that after the first application receives the solicited message in step S80, the first application execution process Specific steps can be and directly acquire information in registration table, is fed back to after can also pre-processing to information in registration table Two applications, can be with reference to above-mentioned steps S401 to step S403, and this will not be repeated here.
In this embodiment, the second application helps it to realize objective function by sending information to the first application, i.e., The realization of the correlation function to the second application limited with permission is realized by the permission of the first application, and then is realized pair Application with access limitation is able to access that the purpose of limited information.
A kind of first device is additionally provided in the embodiment of the present application, and referring to Fig. 6, which includes memory 601 With first processor 602, wherein memory 601 is for storing executable program, and first processor 602 is for executing memory The program of 601 storages, i.e. first processor 602 are specifically used for:
S6010, the first application with the first permission are carried out based on communication interface and the second application with the second permission Information transmission, to realize the objective function of second application;Wherein, realize that the permission of the objective function belongs to described first Permission, and it is not belonging to second permission.
In one embodiment, first processor 602 is also used to real by executing the executable program stored in memory 601 It is existing:
S6011, first application monitor that second application sends described instruction information by the communication interface When, first application executes control processing according to described instruction information, to realize the objective function of second application.
In one embodiment, first processor 602 can also be real by executing the executable program stored in memory 601 It is existing:
S6012, first application obtain monitor event corresponding with described instruction information;
S6013, first application are based on the monitor event, control processing are carried out to target hardware, so that the mesh Mark state consistency indicated by the state and described instruction information of hardware.
In one embodiment, first processor 602 can also be real by executing the executable program stored in memory 601 It is existing:
S6014, the first application creation and the matched registration table of the target hardware, so that the shape of the target hardware State information is written to the registration table.
Corresponding, in one embodiment, first processor 602 can also be held by what is stored in execution memory 601 Line program is realized:
When S6015, first application monitor second application by communication interface transmission solicited message, described the One application obtains feedback information according to the solicited message, and the feedback information is fed back to second application, to realize The objective function of second application.
Specifically, in one embodiment, first processor 602 can also be held by what is stored in execution memory 601 Line program is realized:
S6016, first application obtain registry information corresponding with the solicited message according to the solicited message;
S6017, first application pre-process the registry information, obtain feedback information;
The feedback information is fed back to second application by the communication interface by S6018, first application, with Realize the objective function of second application.
A kind of second device is additionally provided in the embodiment of the present application, and referring to Fig. 7, which includes memory 701 With second processor 702, wherein memory 701 is for storing executable program, and second processor 702 is for executing memory The program of 701 storages, i.e. second processor 702 are specifically used for:
S7010, the second application with the second permission are carried out based on communication interface and the first application with the first permission Information transmission, to realize the objective function of second application;Wherein, realize that the permission of the objective function belongs to described first Permission, and it is not belonging to the second permission.
In one embodiment, second processor 702 can also be real by executing the executable program stored in memory 701 It is existing:
S7011, second application send command information to first application based on the communication interface, make described the One application executes control processing based on described instruction information, to realize the objective function of second application.
In one embodiment, second processor 702 can also be real by executing the executable program stored in memory 701 It is existing:
S7012, second application send solicited message to first application based on the communication interface, make described the One application obtains feedback information according to the solicited message, and described in by the communication interface being sent to the feedback information Second application, to realize the objective function of second application.
It is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application, in the information processing system referring to Fig. 8 In include the first chip 801 and the second chip 802, wherein in the first chip 801 operation there is first with the first permission to answer With operation has the second application with the second permission in the second chip 802.It and include communication interface in the first chip 801 8011, it include communication interface 8021 in the second chip 802, the first application and the second application are connect based on communication interface 8011 and communication Mouth 8021 carries out information transmission, realizes the objective function of the second application, wherein realize that the permission of the objective function belongs to the first power It limits and is not belonging to the second permission.
And then the realization that the second application does not have the objective function for realizing permission, solution are realized by the permission of the first application The problem of access or control that second application permission of having determined is limited.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.
In addition, it should also be noted that, about in the various embodiments described above, such as first, second or the like relational terms Be used merely to an operation, unit or module and another operated, unit or module distinguish, and not necessarily require or Imply that there are any actual relationship or orders between these units, operation or module.Moreover, term " includes ", " packet Containing " or any other variant thereof is intended to cover non-exclusive inclusion, so that including the process, method of a series of elements Or system not only includes those elements, but also including other elements that are not explicitly listed, or it is this for further including Process, method or the intrinsic element of system.In the absence of more restrictions, being limited by sentence "including a ..." Element, it is not excluded that include the element process, method or system in there is also other identical elements.
The above is only the preferred embodiment of the application, it is noted that is come for those of ordinary skill in the art It says, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications also should be regarded as The protection scope of the application.

Claims (10)

1. a kind of information processing method, comprising:
The first application with the first permission carries out information transmission based on communication interface and the second application with the second permission, with Realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
2. according to the method described in claim 1, including instruction letter in response to the information transmitted based on the communication interface Breath, first application with the first permission carry out information biography based on communication interface and the second application with the second permission It is defeated, to realize the objective function of second application, comprising:
When first application monitors that second application sends described instruction information by the communication interface, described first Control processing is executed using according to described instruction information, to realize the objective function of second application.
3. according to the method described in claim 2, first application executes control processing according to described instruction information, comprising:
First application obtains monitor event corresponding with described instruction information;
First application is based on the monitor event, control processing is carried out to target hardware, so that the shape of the target hardware State consistency indicated by state and described instruction information.
4. according to the method described in claim 1, including request letter in response to the information transmitted based on the communication interface Breath, first application with the first permission carry out information biography based on communication interface and the second application with the second permission It is defeated, to realize the objective function of second application, comprising:
When first application monitors that second application sends solicited message by communication interface, described first applies basis The solicited message obtains feedback information, and the feedback information is fed back to second application, to realize that described second answers Objective function.
5. according to the method described in claim 4, first application obtains feedback information according to the solicited message, and by institute It states feedback information and feeds back to second application, to realize the objective function of second application, comprising:
First application obtains registry information corresponding with the solicited message according to the solicited message;
First application pre-processes the registry information, obtains feedback information;
The feedback information is fed back to described second by the communication interface and applied by first application, to realize described the The objective function of two applications.
6. a kind of information processing method, comprising:
The second application with the second permission carries out information transmission based on communication interface and the first application with the first permission, with Realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to the second permission.
7. according to the method described in claim 6, including instruction letter in response to the information transmitted based on the communication interface Breath, second application with the second permission carry out information biography based on communication interface and the first application with the first permission It is defeated, to realize the objective function of second application, comprising:
Second application sends command information to first application based on the communication interface, is based on first application Described instruction information executes control processing, to realize the objective function of second application.
8. according to the method described in claim 6, including request letter in response to the information transmitted based on the communication interface Breath, second application with the second permission carry out information biography based on communication interface and the first application with the first permission It is defeated, to realize the objective function of second application, comprising:
Second application sends solicited message to first application based on the communication interface, makes described first to apply basis The solicited message obtains feedback information, and the feedback information is sent to second application by the communication interface, To realize the objective function of second application.
9. first device, comprising: memory and first processor, wherein
The first processor, for the first application with the first permission based on communication interface and second with the second permission Using information transmission is carried out, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
10. second device, comprising: memory and second processor, wherein
The second processor, for the second application with the second permission based on communication interface and first with the first permission Using information transmission is carried out, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
CN201811160733.6A 2018-09-30 2018-09-30 Information processing method and device Pending CN109284605A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811160733.6A CN109284605A (en) 2018-09-30 2018-09-30 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811160733.6A CN109284605A (en) 2018-09-30 2018-09-30 Information processing method and device

Publications (1)

Publication Number Publication Date
CN109284605A true CN109284605A (en) 2019-01-29

Family

ID=65182722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811160733.6A Pending CN109284605A (en) 2018-09-30 2018-09-30 Information processing method and device

Country Status (1)

Country Link
CN (1) CN109284605A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101097592A (en) * 2006-06-26 2008-01-02 华为技术有限公司 Method and apparatus for operating authority
CN101297317A (en) * 2005-10-24 2008-10-29 康坦夹德控股股份有限公司 Method and system to support dynamic rights and resources sharing
CN104063284A (en) * 2013-03-18 2014-09-24 腾讯科技(深圳)有限公司 Method and device operating application program
CN104125335A (en) * 2014-06-24 2014-10-29 小米科技有限责任公司 Method, device and system for managing authority
CN105893839A (en) * 2016-06-20 2016-08-24 北京奇虎科技有限公司 Agent processing method and device for broadcast of Android application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101297317A (en) * 2005-10-24 2008-10-29 康坦夹德控股股份有限公司 Method and system to support dynamic rights and resources sharing
CN101097592A (en) * 2006-06-26 2008-01-02 华为技术有限公司 Method and apparatus for operating authority
CN104063284A (en) * 2013-03-18 2014-09-24 腾讯科技(深圳)有限公司 Method and device operating application program
CN104125335A (en) * 2014-06-24 2014-10-29 小米科技有限责任公司 Method, device and system for managing authority
CN105893839A (en) * 2016-06-20 2016-08-24 北京奇虎科技有限公司 Agent processing method and device for broadcast of Android application

Similar Documents

Publication Publication Date Title
US8713177B2 (en) Remote management of networked systems using secure modular platform
CN104376256B (en) Program process hatching control and device
CN111698283B (en) Management and control method, device, equipment and storage medium of distributed cluster host
CN104376268B (en) Using method for hidden controlling and device
CN110995511A (en) Cloud computing operation and maintenance management method and device based on micro-service architecture and terminal equipment
CN108804313B (en) Method and device for remotely debugging program and server
US11809882B2 (en) Interface calling method and apparatus, and computer-readable storage medium
CN109725950A (en) A kind of method, apparatus and storage medium for realizing the operation of client list example
CN113014452A (en) Network flow testing method, device, testing end and storage medium
CN111339194A (en) Automatic scheduling method and device for middleware of database access layer
CN114817115A (en) Serial port communication method and related device
CN109284605A (en) Information processing method and device
RU2373565C2 (en) Automatic generation of message exchange scheme modeling code
CN112448909A (en) Electronic lock management method, device, system and storage medium
CN113419962A (en) Remote debugging control and execution method and device, equipment and medium thereof
CN115643109B (en) Remote control method, system, equipment and medium based on virtualization platform
CN112579872B (en) Network resource access intermediary system based on resource plug-in and processing method thereof
CN216904929U (en) Network integration system
CN111181907B (en) Host side plug-in login method, device and equipment and storage medium
CN114706662B (en) Method and system for realizing dynamic simulation of business operation and data based on JVM sandbox
CN114980103A (en) Host behavior monitoring method and device based on block chain
CN112202728B (en) Method and system for mobile terminal to call module through routing protocol
CN114780931A (en) Mobile terminal based on application program locking state and locking method thereof
CN116521314A (en) Virtual machine data management method, device, equipment and storage medium
CN115514757A (en) Data security processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190129