CN109284605A - Information processing method and device - Google Patents
Information processing method and device Download PDFInfo
- Publication number
- CN109284605A CN109284605A CN201811160733.6A CN201811160733A CN109284605A CN 109284605 A CN109284605 A CN 109284605A CN 201811160733 A CN201811160733 A CN 201811160733A CN 109284605 A CN109284605 A CN 109284605A
- Authority
- CN
- China
- Prior art keywords
- application
- permission
- information
- communication interface
- objective function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3055—Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
Abstract
This application provides a kind of information processing method and devices, this method comprises: the with the first permission first application carries out information transmission based on communication interface and the second application with the second permission, to realize the objective function of second application;Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.The application realizes the realization of the correlation function to the second application limited with permission by the permission of the first application, and then realizes the purpose that limited information is able to access that the application with access limitation.
Description
Technical field
Present application relates generally to fields of communication technology, more particularly to a kind of information processing method and device.
Background technique
Along with the intelligence of electronic equipment, various application platforms are also constantly improve and are developing.Due to different applications
Operating environment locating for platform is different, and certain applications or function will appear the restricted problem of access.For example, UWP
(UniversalWindows Platform, windows common application platform) it is new general to be that Microsoft introduces in Windows 10
It reads, UWP is not to design for some terminal, but can run in all 10 equipment of windows.Due to all
UWP application operate in virtual sandbox environment, it is specific due to its running environment although increasing its safety
Change, can make UWP application that certain information can not be accessed, during being developed to UWP application, if necessary to these spies
Determine information, will be unable to continue to complete corresponding development.As it can be seen that how to solve to be able to access that the application with access limitation
The problem of to limited information, have become the Important Problems to specific application development.
Summary of the invention
In view of this, this application provides a kind of information processing method and devices.
A kind of information processing method, comprising:
The first application with the first permission carries out information biography based on communication interface and the second application with the second permission
It is defeated, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
It optionally, include command information in response to the information transmitted based on the communication interface, it is described to have first
First application of permission carries out information transmission based on communication interface and the second application with the second permission, to realize described second
The objective function of application, comprising:
It is described when first application monitors that second application sends described instruction information by the communication interface
First application executes control processing according to described instruction information, to realize the objective function of second application.
Optionally, first application executes the first processing according to described instruction information, comprising:
First application obtains monitor event corresponding with described instruction information;
First application is based on the monitor event, control processing is carried out to target hardware, so that the target hardware
State and described instruction information indicated by state consistency.
It optionally, include solicited message in response to the information transmitted based on the communication interface, it is described to have first
First application of permission carries out information transmission based on communication interface and the second application with the second permission, to realize described second
The objective function of application, comprising:
When first application monitors that second application sends solicited message by communication interface, first application
Feedback information is obtained according to the solicited message, and the feedback information is fed back into second application, to realize described the
The objective function of two applications.
Optionally, first application obtains feedback information according to the solicited message, and the feedback information is fed back
To second application, to realize the objective function of second application, comprising:
First application obtains registry information corresponding with the solicited message according to the solicited message;
First application pre-processes the registry information, obtains feedback information;
The feedback information is fed back to second application by the communication interface by first application, to realize
State the objective function of the second application.
A kind of information processing method, comprising:
The second application with the second permission carries out information biography based on communication interface and the first application with the first permission
It is defeated, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to the second permission.
It optionally, include command information in response to the information transmitted based on the communication interface, it is described to have second
Second application of permission carries out information transmission based on communication interface and the first application with the first permission, to realize described second
The objective function of application, comprising:
Second application sends command information to first application based on the communication interface, makes first application
Control processing is executed based on described instruction information, to realize the objective function of second application.
It optionally, include solicited message in response to the information transmitted based on the communication interface, it is described to have second
Second application of permission carries out information transmission based on communication interface and the first application with the first permission, to realize described second
The objective function of application, comprising:
Second application sends solicited message to first application based on the communication interface, makes first application
Feedback information is obtained according to the solicited message, and the feedback information is sent to described second by the communication interface and is answered
With to realize the objective function of second application.
First device, comprising: memory and first processor, wherein
The first processor, for the first application with the first permission based on communication interface and with the second permission
Second application carries out information transmission, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
Second device, comprising: memory and second processor, wherein
The second processor, for the second application with the second permission based on communication interface and with the first permission
First application carries out information transmission, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
It can be seen that compared with prior art, this application provides information processing method and device, this method includes having
First application of the first permission carries out information transmission based on communication interface and the second application with the second permission, to realize second
The objective function of application.It is not belonging to the second permission since the permission of objective function belongs to the first permission, can be answered by first
Processing information corresponding with objective function or feedback information etc. are passed into the second application with based on communication interface, answered by first
Permission realizes the realization of the correlation function to the second application limited with permission, and then realizes to access limit
The application of system is able to access that the purpose of limited information.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of signaling diagram of information processing provided by the embodiments of the present application;
Fig. 2 is a kind of method flow diagram of command information processing provided by the embodiments of the present application;
Fig. 3 is a kind of method flow diagram of solicited message processing provided by the embodiments of the present application;
Fig. 4 is a kind of method flow diagram for obtaining feedback information provided by the embodiments of the present application;
Fig. 5 is the schematic diagram that the first application and the second application provided by the embodiments of the present application carry out information exchange;
Fig. 6 is a kind of structural schematic diagram of first device provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of second device provided by the embodiments of the present application;
Fig. 8 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
First application in this application and the second application are to operate in system program environment, and there is information to transmit function
The application of energy.Specifically, the first application and the second application can be to operate in application software on electronic equipment, and set to electronics
The standby form of expression can be mobile phone, computer or other communication terminals with no restrictions.But the first application and the second application
Permission it is different, i.e., the first application and second applies the function that may be implemented different, and the reason for causing its permission different can have
A variety of, the application is without limitation, can (the such as first application fortune different with the running environment of the second application due to the first application
In real system environment, the second application operates in virtual sandbox environment row), it causes the permission of the two different, is also possible to
Since the first application is different with the security mechanism of the second application, cause the permission of the two different.But it should be recognized that and different
It surely is that the Permission Levels of the first application are higher than the Permission Levels of the second application, the Permission Levels for being also not necessarily the second application are higher than
The Permission Levels of first application, only permission of the two in certain fields exists different, for example, the second application cannot achieve to mesh
The access authority of resource is marked, and the access to the target resource may be implemented in the first application.
A kind of information processing method is provided in the embodiment of the present application, and referring to Figure 1, this method is applied to the first application
101, wherein the first application 101 has the first permission, and the first application 101 executes:
S10, the first application carry out information transmission based on communication interface and the second application.
The second application 102 is made to realize objective function by executing step S10.
Wherein, the second application 102 has the second permission.The permission for the objective function that second application 102 is realized belongs to first
Permission, and it is not belonging to the second permission.I.e. objective function is the function that the second application cannot achieve based on the second current permission.The
One application 101 and the second application 102 can be the application that can arbitrarily receive/send information, and only the permission of the two is different.The
The function that the first application of one permission characterization can be realized, the function that the second application of the second permission characterization can be realized, but first
Permission is different with the range of the second permission.The first permission is different with the range of the second permission in the embodiment of the present application, is not
Extent of competence of the extent of competence of second permission less than the first permission, but the second function for cannot achieve based on the second permission of application
Can, it can be realized by the first application based on the first permission.For example, since the second application does not have the power of access first resource
Limit needs to access the first resource by the first application if the second application needs to access the first resource, and then first
First resource is returned into the second application using by communication interface, realizes access of second application to first resource.
Communication interface realizes the information transmission between the first application and the second application, the application in the embodiment of the present application
With no restrictions to the form of expression of the communication interface, can be serial communication interface (such as com interface), or network is logical
Believe interface.The first application and the are realized by the communication interface established between the first application and the second application in the embodiment of the present application
Communication between two applications, every group first application and the corresponding communication interface of the second application.
This application provides information processing method, this method includes the first application with the first permission based on communication interface
Information transmission is carried out with the second application with the second permission, to realize the objective function of the second application.Due to objective function
Permission belongs to the first permission and is not belonging to the second permission, and can be based on communication interface by the first application will be corresponding with objective function
Processing information or feedback information etc. pass to the second application, realized by the permission of the first application to being limited with permission
The realization of the correlation function of second application, and then realize the mesh that limited information is able to access that the application with access limitation
's.
The objective function for the second application realized by the first application can may be acquisition of information function for control function
Energy.Corresponding, the information transmitted based on communication interface can may be solicited message for command information.
Furthermore, it is understood that in conjunction with preceding method process, if the first application is different with the running environment of the second application, and second
When using operating in virtual system program environment, since the limitation of the virtual system program environment can make second application
In a closed running environment, i.e., the second application can not know that the message that it is issued or the purpose source that instruction reaches are assorted
Or the instruction of its instruction is realized by which application or system.If the letter transmitted at this time based on communication interface
Breath is command information, then the method for realizing the second application target function by the first application are as follows:
When S20, the first application monitor that the second application sends command information by communication interface, the first application is according to instruction
Information executes control processing, to realize the objective function of the second application.
Fig. 2 is referred to, above-mentioned steps S20 is based on, in the step of the first application end mainly executes are as follows:
S201, the first application monitor the command information that second application issues;
S202, the first application receive command information, execute control processing.
It should be noted that the second application might not will explicitly can instruct due to the running environment of the second application
Information is sent directly to the first application, it is understood that there may be command information has been sent to system hardware or the second application by the second application
There is no clear adding purpose sources when sending instruction.But the corresponding objective function of the command information is not in the second power
It limits in range, then the command information that the first application can issue the second application is monitored, when monitoring the command information, then
Corresponding control processing can be executed, so that objective function is realized in the second application.For example, if the command information is to some hardware
Control, then corresponding objective function is that the hardware is made to reach the second state by first state, wherein first state is that the hardware is worked as
Preceding original state, and the second state is the dbjective state that the second application reaches the hardware.
First applies after the command information for monitoring the second application transmission, is executed according to the command information matching
Control processing, i.e. control processing can be to control the processing that above-mentioned hardware reach dbjective state.
Furthermore, it is understood that additionally providing a kind of first application execution in the embodiment of the present application in conjunction with preceding method process
The method for controlling processing, comprising:
S30, first application obtain monitor event corresponding with described instruction information;
S31, first application are based on the monitor event, control processing are carried out to target hardware, so that the target
State consistency indicated by the state and described instruction information of hardware.
When first apply monitoring obtain command information after, the command information can be parsed to obtain corresponding monitoring thing
Part, the monitor event are the second event handled using the objective function event for needing to realize, i.e., the first application, example
It such as can be to the access of certain hardware, or the write-in to certain information.
If monitor event is to certain hardware controls, the first application needs to judge it is to which based on the monitor event
Hardware is handled, and using the hardware as target hardware, then carries out control processing to the target hardware, so that the target hardware
End-state with second application issue command information indicated by state consistency.
For example, the first application monitors the instruction if the command information that the second application issues is to open keyboard light
Afterwards, due to target hardware be keyboard light according to the state that the monitor event that command information parsing acquires is keyboard light need into
Row changes, corresponding, if currently the state of keyboard light is to close, the control processing of the first application execution is the unlatching keyboard
Lamp, if the state of current keyboard light is open state, the control processing of the first application execution is to maintain the unlatching of the keyboard light
State.I.e. by the control processing of the first application, so that the open state indicated in the state of keyboard light and command information is consistent.
Further, in conjunction with preceding method process, change in response to the state of target hardware, the information of the first application execution
Processing method further include:
S40, the first application creation and the matched registration table of target hardware, so that the status information of target hardware is written to this
In registration table.
I.e. for not having the second application of creation registration table, the first application can create registration table, and by target hardware
Corresponding status information is written in registration table, can not be by the shape of target hardware if having there is registration table to be the second application certainly
State information is written in registration table, and the status information of target hardware can be written in registration table by the first application.
Illustrate that monitor event is the access to hardware in above-described embodiment, monitor event may be to certain information
Write-in.For example, corresponding monitor event is note if command information is that the activation bit of hardware is written in registration table
The information write-in of volume table.Certainly, the first application directly can not execute control processing to the monitor event, can monitor the monitoring
The state of event, i.e., whether second apply and the activation bit of hardware be written in registration table cannot predict to can be realized in advance
When, it can attempt for the activation bit of the hardware to be written in registration table, when the first application monitors the second application write-in failure,
Control processing can be executed, i.e., the activation bit of the hardware is written in registration table.It can be in the first application prison under the conditions of this
The command information process for surveying the second application adds a trigger mechanism, that is, triggers when first application executes control processing.
It is corresponding, if the information transmitted based on communication interface is solicited message, the is realized by the first application
The method of two application target functions are as follows:
When S50, the first application monitor that the second application sends solicited message by communication interface, the first application is according to request
Information acquisition feedback information, and feedback information is fed back into the second application, to realize the objective function of the second application.
Refer to Fig. 3, in step S50 the information process of the first application execution can with specifically includes the following steps:
S301, the first application monitor the solicited message that the second application issues;
S302, the first application obtain feedback information according to solicited message;
Feedback information is sent to the second application by S302, the first application.
Specifically, the second application can only issue solicited message, can not know that this is asked due to being limited by running environment at this time
The relevant information in the purpose source for asking information to be sent to, and the corresponding application of objective function second of the solicited message cannot achieve.
After the first application monitors the solicited message, feedback information can be obtained based on its first permission, and feedback information is sent to
Second application.For example, the access authority of the second application is restricted, i.e., the second application cannot achieve pair based on the second current permission
The access of certain information, then the second application can issue the solicited message of an acquisition restricted information, and the first application can monitor
The solicited message, and know the information of the second application expectation access.Namely first application based on the solicited message obtain and ask
The corresponding feedback information of information is sought, feedback information is sent to the second application, realizes access of second application to this partial information.
If the solicited message of the second application is the information accessed in registration table, referring to fig. 4, the first application obtains feedback information
Process, can specifically include:
S401, the first application obtain registry information corresponding with solicited message according to solicited message;
S402, the first application pre-process registry information, obtain feedback information;
Feedback information is fed back to the second application by communication interface by S403, the first application, to realize the mesh of the second application
Mark function.
It should be noted that obtaining registry information corresponding with the solicited message according to solicited message in the first application
Afterwards, which can be transmitted directly to the second application, after can also pre-processing to the information in the registration table
The second application is sent to as feedback information.
For example, the solicited message of the second application is to obtain the sound driver information of the first hardware, and record in the registration table
The activation bit of first hardware is so that existing for aggregate form, i.e., the activation bit not only includes that sound driver information further includes
Image-driven information, then pretreatment at this time is to delete pretreatment, i.e. deletion image-driven information, and sound driver information made
The second application is fed back to for feedback information.
If the second application requires the reception format of data, corresponding pretreatment can be handled for form modifying,
It needs that registry information is changed to corresponding format according to the reception format of the second application after obtaining registry information, so
After be sent to the second application.
Above-mentioned pretreatment be do not have the function of being handled registry data based on second application and realize, if the
The permission of two applications is only the information that can not be obtained in registration table, can be handled the information in the registration table received,
Then corresponding, the first application is not necessarily to carry out above-mentioned pretreatment, the registry information of acquisition can be transmitted directly to the second application,
It is handled by the second application registry information is obtained, obtains target information.Alternatively, the second application is only to need to access registration
Registry information is directly sent to the second application without being pre-processed by the information in table, the first application.
Based on the above embodiments, the control authority or information access rights of the either second application are limited, can be with
Command information or solicited message are sent to the first application based on communication interface, corresponding control processing is carried out by the first application
Or acquisition of information, it realizes the objective function of the second application, solves the problems, such as that the second application permission is limited.
Referring to Fig. 5, for the schematic diagram of the first application provided by the embodiments of the present application and the second application progress information exchange.?
The second application is that UWP is applied in the embodiment, wherein UWP is the concept that Microsoft introduces in Windows10, due to all
UWP application operates in virtual system program environment, such as virtual sandbox environment, the limitation based on its running environment so that
UWP application, which can not access, is locally registered table and control local hardware.Corresponding, the first application is operation in this embodiment
Win32 application in real system program environment.And table and control local hardware is locally registered using accessible in win32.
Specifically, win32 application in the present embodiment operates in the first system environment, UWP operates in second system ring
In border, i.e., the first system environment is real system program environment, and second system environment is virtual system program environment.At this time,
COM communication interface is as the communication interface that can be used as between win32 application and UWP application.Since UWP application can not be to hardware
Registry information is controlled or is accessed, then win32 application can be based on win32API (Application Programming
Interface, application programming interface) access registration table or with ACPI (Advanced Configuration and
Power Management Interface, advanced configuration and power-management interface) it is communicated with hardware, it then will be corresponding
Information is transmitted to UWP application, realizes the communication of UWP Yu hardware and registration table.
Therefore, can solve UWP by embodiment provided by the present application cannot access hardware and registry information, caused by
Hardware vendor is difficult the problem of developing using UWP application.
Due to storing various parameters in registration table, it contain application program and computer system all with confidence
Breath, system and the initialization information of application program, the incidence relation of application program and document files, hardware device explanation, state
With attribute and various status informations and data.So the information in registration table is more important, when win32 application receives UWP
When using the solicited message for obtaining registry information, UWP application can be authenticated, if it is that the UWP recorded in advance is answered
With the registry information that can then will acquire is sent to UWP application, if it is not the UWP application recorded in advance, the win
32 can ignore the solicited message, to improve the safety of information transmitting.
It should be noted that if first application second application between do not have the communication interface that can communicate or
It, can be according to the ginseng of the second application when current communication interface between the two has certain limitation for the transmitting of certain information
Number pass through mechanism, calls xlm function existing communication interface protocol to be modified or generated new communication interface standard, comes real
Information transmission between existing first application and the second application.
Another information processing method is additionally provided in the embodiment of the present application, and this method is applied to the second application, comprising:
S60, the second application with the second permission carry out letter based on communication interface and the first application with the first permission
Breath transmission, to realize the objective function of second application;Wherein, realize that the permission of the objective function belongs to first power
Limit, and it is not belonging to the second permission.
Correspondingly, the second application realizes that the specific method process of objective function is referred to and echoed in the embodiment of the present application
Step S10 and correlation step are stated, such as step S20, S201, S202, step S30, S31, step S40, step S50, step S301
To step S303, step S401 to step S403 etc..
Also, furthermore, it is understood that if the second application can specify its extent of competence, i.e., the second application can know that it can be with
Control or the hardware that cannot be controlled and its clear registry information that is accessible or cannot accessing.So second
Using issue command information or when solicited message can clearly receive these information purpose source (be clearly system hardware or
First application), command information or solicited message explicitly can be sent to system hardware or be sent to the by the second application
One application.For example, corresponding information can be sent to the first application when the second application can not be directly realized by certain functions, with
Indicate first application to realize above-mentioned function.Following step can specifically be participated in.
When second application realizes objective function based on the first application, the second application can send command information to the first application
And/or solicited message.If the second application is command information with what is sent to first, in response to being carried out based on the communication interface
The information of transmission includes command information, and second application with the second permission is based on communication interface and has the first permission
First application carries out information transmission, to realize the objective function of second application, comprising:
S70, second application send command information to first application based on the communication interface, make described first
Control processing is executed using based on described instruction information, to realize the objective function of second application.
Specifically, in step S70 the detailed process of the information processing of the first application execution can be first application pass through
Monitor event corresponding with command information is obtained, control processing is then carried out to target hardware according to monitor event, so that target
The state consistency of state and the execution information instruction of hardware can refer to above-mentioned step to realize the objective function of the second application
Rapid S30 and step S31.
Furthermore, it is understood that in conjunction with preceding method process, if the second application solicited message is sent to first in application, if ring
Ying Yu includes solicited message based on the information that the communication interface is transmitted, and second application with the second permission is based on
Communication interface carries out information transmission with the first application with the first permission, to realize the objective function of second application, packet
It includes:
S80, second application send solicited message to first application based on the communication interface, make described first
Feedback information is obtained using according to the solicited message, and the feedback information is sent to described the by the communication interface
Two applications, to realize the objective function of second application.
It should be noted that after the first application receives the solicited message in step S80, the first application execution process
Specific steps can be and directly acquire information in registration table, is fed back to after can also pre-processing to information in registration table
Two applications, can be with reference to above-mentioned steps S401 to step S403, and this will not be repeated here.
In this embodiment, the second application helps it to realize objective function by sending information to the first application, i.e.,
The realization of the correlation function to the second application limited with permission is realized by the permission of the first application, and then is realized pair
Application with access limitation is able to access that the purpose of limited information.
A kind of first device is additionally provided in the embodiment of the present application, and referring to Fig. 6, which includes memory 601
With first processor 602, wherein memory 601 is for storing executable program, and first processor 602 is for executing memory
The program of 601 storages, i.e. first processor 602 are specifically used for:
S6010, the first application with the first permission are carried out based on communication interface and the second application with the second permission
Information transmission, to realize the objective function of second application;Wherein, realize that the permission of the objective function belongs to described first
Permission, and it is not belonging to second permission.
In one embodiment, first processor 602 is also used to real by executing the executable program stored in memory 601
It is existing:
S6011, first application monitor that second application sends described instruction information by the communication interface
When, first application executes control processing according to described instruction information, to realize the objective function of second application.
In one embodiment, first processor 602 can also be real by executing the executable program stored in memory 601
It is existing:
S6012, first application obtain monitor event corresponding with described instruction information;
S6013, first application are based on the monitor event, control processing are carried out to target hardware, so that the mesh
Mark state consistency indicated by the state and described instruction information of hardware.
In one embodiment, first processor 602 can also be real by executing the executable program stored in memory 601
It is existing:
S6014, the first application creation and the matched registration table of the target hardware, so that the shape of the target hardware
State information is written to the registration table.
Corresponding, in one embodiment, first processor 602 can also be held by what is stored in execution memory 601
Line program is realized:
When S6015, first application monitor second application by communication interface transmission solicited message, described the
One application obtains feedback information according to the solicited message, and the feedback information is fed back to second application, to realize
The objective function of second application.
Specifically, in one embodiment, first processor 602 can also be held by what is stored in execution memory 601
Line program is realized:
S6016, first application obtain registry information corresponding with the solicited message according to the solicited message;
S6017, first application pre-process the registry information, obtain feedback information;
The feedback information is fed back to second application by the communication interface by S6018, first application, with
Realize the objective function of second application.
A kind of second device is additionally provided in the embodiment of the present application, and referring to Fig. 7, which includes memory 701
With second processor 702, wherein memory 701 is for storing executable program, and second processor 702 is for executing memory
The program of 701 storages, i.e. second processor 702 are specifically used for:
S7010, the second application with the second permission are carried out based on communication interface and the first application with the first permission
Information transmission, to realize the objective function of second application;Wherein, realize that the permission of the objective function belongs to described first
Permission, and it is not belonging to the second permission.
In one embodiment, second processor 702 can also be real by executing the executable program stored in memory 701
It is existing:
S7011, second application send command information to first application based on the communication interface, make described the
One application executes control processing based on described instruction information, to realize the objective function of second application.
In one embodiment, second processor 702 can also be real by executing the executable program stored in memory 701
It is existing:
S7012, second application send solicited message to first application based on the communication interface, make described the
One application obtains feedback information according to the solicited message, and described in by the communication interface being sent to the feedback information
Second application, to realize the objective function of second application.
It is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application, in the information processing system referring to Fig. 8
In include the first chip 801 and the second chip 802, wherein in the first chip 801 operation there is first with the first permission to answer
With operation has the second application with the second permission in the second chip 802.It and include communication interface in the first chip 801
8011, it include communication interface 8021 in the second chip 802, the first application and the second application are connect based on communication interface 8011 and communication
Mouth 8021 carries out information transmission, realizes the objective function of the second application, wherein realize that the permission of the objective function belongs to the first power
It limits and is not belonging to the second permission.
And then the realization that the second application does not have the objective function for realizing permission, solution are realized by the permission of the first application
The problem of access or control that second application permission of having determined is limited.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.
In addition, it should also be noted that, about in the various embodiments described above, such as first, second or the like relational terms
Be used merely to an operation, unit or module and another operated, unit or module distinguish, and not necessarily require or
Imply that there are any actual relationship or orders between these units, operation or module.Moreover, term " includes ", " packet
Containing " or any other variant thereof is intended to cover non-exclusive inclusion, so that including the process, method of a series of elements
Or system not only includes those elements, but also including other elements that are not explicitly listed, or it is this for further including
Process, method or the intrinsic element of system.In the absence of more restrictions, being limited by sentence "including a ..."
Element, it is not excluded that include the element process, method or system in there is also other identical elements.
The above is only the preferred embodiment of the application, it is noted that is come for those of ordinary skill in the art
It says, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications also should be regarded as
The protection scope of the application.
Claims (10)
1. a kind of information processing method, comprising:
The first application with the first permission carries out information transmission based on communication interface and the second application with the second permission, with
Realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
2. according to the method described in claim 1, including instruction letter in response to the information transmitted based on the communication interface
Breath, first application with the first permission carry out information biography based on communication interface and the second application with the second permission
It is defeated, to realize the objective function of second application, comprising:
When first application monitors that second application sends described instruction information by the communication interface, described first
Control processing is executed using according to described instruction information, to realize the objective function of second application.
3. according to the method described in claim 2, first application executes control processing according to described instruction information, comprising:
First application obtains monitor event corresponding with described instruction information;
First application is based on the monitor event, control processing is carried out to target hardware, so that the shape of the target hardware
State consistency indicated by state and described instruction information.
4. according to the method described in claim 1, including request letter in response to the information transmitted based on the communication interface
Breath, first application with the first permission carry out information biography based on communication interface and the second application with the second permission
It is defeated, to realize the objective function of second application, comprising:
When first application monitors that second application sends solicited message by communication interface, described first applies basis
The solicited message obtains feedback information, and the feedback information is fed back to second application, to realize that described second answers
Objective function.
5. according to the method described in claim 4, first application obtains feedback information according to the solicited message, and by institute
It states feedback information and feeds back to second application, to realize the objective function of second application, comprising:
First application obtains registry information corresponding with the solicited message according to the solicited message;
First application pre-processes the registry information, obtains feedback information;
The feedback information is fed back to described second by the communication interface and applied by first application, to realize described the
The objective function of two applications.
6. a kind of information processing method, comprising:
The second application with the second permission carries out information transmission based on communication interface and the first application with the first permission, with
Realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to the second permission.
7. according to the method described in claim 6, including instruction letter in response to the information transmitted based on the communication interface
Breath, second application with the second permission carry out information biography based on communication interface and the first application with the first permission
It is defeated, to realize the objective function of second application, comprising:
Second application sends command information to first application based on the communication interface, is based on first application
Described instruction information executes control processing, to realize the objective function of second application.
8. according to the method described in claim 6, including request letter in response to the information transmitted based on the communication interface
Breath, second application with the second permission carry out information biography based on communication interface and the first application with the first permission
It is defeated, to realize the objective function of second application, comprising:
Second application sends solicited message to first application based on the communication interface, makes described first to apply basis
The solicited message obtains feedback information, and the feedback information is sent to second application by the communication interface,
To realize the objective function of second application.
9. first device, comprising: memory and first processor, wherein
The first processor, for the first application with the first permission based on communication interface and second with the second permission
Using information transmission is carried out, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
10. second device, comprising: memory and second processor, wherein
The second processor, for the second application with the second permission based on communication interface and first with the first permission
Using information transmission is carried out, to realize the objective function of second application;
Wherein, it realizes that the permission of the objective function belongs to first permission, and is not belonging to second permission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811160733.6A CN109284605A (en) | 2018-09-30 | 2018-09-30 | Information processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811160733.6A CN109284605A (en) | 2018-09-30 | 2018-09-30 | Information processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109284605A true CN109284605A (en) | 2019-01-29 |
Family
ID=65182722
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811160733.6A Pending CN109284605A (en) | 2018-09-30 | 2018-09-30 | Information processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109284605A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101097592A (en) * | 2006-06-26 | 2008-01-02 | 华为技术有限公司 | Method and apparatus for operating authority |
CN101297317A (en) * | 2005-10-24 | 2008-10-29 | 康坦夹德控股股份有限公司 | Method and system to support dynamic rights and resources sharing |
CN104063284A (en) * | 2013-03-18 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Method and device operating application program |
CN104125335A (en) * | 2014-06-24 | 2014-10-29 | 小米科技有限责任公司 | Method, device and system for managing authority |
CN105893839A (en) * | 2016-06-20 | 2016-08-24 | 北京奇虎科技有限公司 | Agent processing method and device for broadcast of Android application |
-
2018
- 2018-09-30 CN CN201811160733.6A patent/CN109284605A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101297317A (en) * | 2005-10-24 | 2008-10-29 | 康坦夹德控股股份有限公司 | Method and system to support dynamic rights and resources sharing |
CN101097592A (en) * | 2006-06-26 | 2008-01-02 | 华为技术有限公司 | Method and apparatus for operating authority |
CN104063284A (en) * | 2013-03-18 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Method and device operating application program |
CN104125335A (en) * | 2014-06-24 | 2014-10-29 | 小米科技有限责任公司 | Method, device and system for managing authority |
CN105893839A (en) * | 2016-06-20 | 2016-08-24 | 北京奇虎科技有限公司 | Agent processing method and device for broadcast of Android application |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8713177B2 (en) | Remote management of networked systems using secure modular platform | |
CN104376256B (en) | Program process hatching control and device | |
CN111698283B (en) | Management and control method, device, equipment and storage medium of distributed cluster host | |
CN104376268B (en) | Using method for hidden controlling and device | |
CN110995511A (en) | Cloud computing operation and maintenance management method and device based on micro-service architecture and terminal equipment | |
CN108804313B (en) | Method and device for remotely debugging program and server | |
US11809882B2 (en) | Interface calling method and apparatus, and computer-readable storage medium | |
CN109725950A (en) | A kind of method, apparatus and storage medium for realizing the operation of client list example | |
CN113014452A (en) | Network flow testing method, device, testing end and storage medium | |
CN111339194A (en) | Automatic scheduling method and device for middleware of database access layer | |
CN114817115A (en) | Serial port communication method and related device | |
CN109284605A (en) | Information processing method and device | |
RU2373565C2 (en) | Automatic generation of message exchange scheme modeling code | |
CN112448909A (en) | Electronic lock management method, device, system and storage medium | |
CN113419962A (en) | Remote debugging control and execution method and device, equipment and medium thereof | |
CN115643109B (en) | Remote control method, system, equipment and medium based on virtualization platform | |
CN112579872B (en) | Network resource access intermediary system based on resource plug-in and processing method thereof | |
CN216904929U (en) | Network integration system | |
CN111181907B (en) | Host side plug-in login method, device and equipment and storage medium | |
CN114706662B (en) | Method and system for realizing dynamic simulation of business operation and data based on JVM sandbox | |
CN114980103A (en) | Host behavior monitoring method and device based on block chain | |
CN112202728B (en) | Method and system for mobile terminal to call module through routing protocol | |
CN114780931A (en) | Mobile terminal based on application program locking state and locking method thereof | |
CN116521314A (en) | Virtual machine data management method, device, equipment and storage medium | |
CN115514757A (en) | Data security processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190129 |