CN109697356B - Application software permission adaptation method and device - Google Patents

Application software permission adaptation method and device Download PDF

Info

Publication number
CN109697356B
CN109697356B CN201811612694.9A CN201811612694A CN109697356B CN 109697356 B CN109697356 B CN 109697356B CN 201811612694 A CN201811612694 A CN 201811612694A CN 109697356 B CN109697356 B CN 109697356B
Authority
CN
China
Prior art keywords
permission
authority
target
application software
auxiliary service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811612694.9A
Other languages
Chinese (zh)
Other versions
CN109697356A (en
Inventor
石家乐
裴彦礼
吴怀鹏
张迪
冯兆超
罗翊方
陈宇翔
何嘉维
官慧敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201811612694.9A priority Critical patent/CN109697356B/en
Publication of CN109697356A publication Critical patent/CN109697356A/en
Application granted granted Critical
Publication of CN109697356B publication Critical patent/CN109697356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an application software permission adaptation method and device, wherein the method comprises the following steps: judging whether an authority adaptation trigger signal is acquired or not; when the permission adaptation trigger signal is acquired, judging whether the auxiliary service is in an open state; when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: target authority to be started in application software; aiming at each target authority, a process query request is sent to an authority server, wherein the process query request comprises: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device; according to the permission opening process, the target permission opening operation is executed, so that one-key adaptation can be performed on all non-system standard permissions related to the application software, the permission adaptation efficiency is improved, and the applicability is good.

Description

Application software permission adaptation method and device
Technical Field
The invention relates to the technical field of computers, in particular to an application software permission adaptation method and device.
Background
At present, many functions of application software need to rely on system authority to be normally used. Wherein, the system authority includes: system standard permissions and non-system standard permissions. And aiming at the system standard permission, the application software can call the corresponding permission through the corresponding API interface. For the non-system standard authority, the authority needs to be adapted before the corresponding function is used, and the corresponding function can be used after the adaptation is successful.
When the current function of the application software depends on the unopened non-system standard authority, jumping to the authority-related page and prompting the user so that the user can complete the authority opening operation according to the prompt. The permission opening operation may involve multiple pages, the user is required to click the multiple pages, the operation is complex, the permission adaptation efficiency is low, the permission opening operation is difficult to be applied to people who do not know the operation of the terminal equipment or people who are inconvenient to operate, and the applicability is poor.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, a first objective of the present invention is to provide an application software permission adaptation method, which is used for solving the problems of low permission adaptation efficiency and poor applicability in the prior art.
A second object of the present invention is to provide an application software permission adaptation apparatus.
A third object of the invention is to propose another application rights adaptation device.
A fourth object of the invention is to propose a non-transitory computer-readable storage medium.
A fifth object of the invention is to propose a computer program product.
In order to achieve the above object, an embodiment of a first aspect of the present invention provides an application software permission adaptation method, including:
judging whether an authority adaptation trigger signal is acquired or not;
when the permission adaptation trigger signal is acquired, judging whether the auxiliary service is in an open state;
when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: target authority to be started in the application software;
aiming at each target authority, a process query request is sent to an authority server, wherein the process query request comprises: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device;
and executing target authority opening operation according to the authority opening flow.
Further, the determining whether the permission adaptation trigger signal is acquired includes:
acquiring a function currently used by application software;
judging whether the use of the function depends on unopened non-system standard authority;
and if the function depends on the unopened non-system standard permission, determining to acquire a permission adaptation trigger signal.
Further, when the auxiliary service is in an open state, acquiring a target permission list corresponding to the application software includes:
when the auxiliary service is in an open state, acquiring an identifier of the terminal equipment and a permission detection strategy corresponding to the identifier;
detecting the terminal equipment according to the permission detection strategy to acquire a target permission to be started in the application software; the target permission is detected and unopened permission in the non-system standard permission relied by the application software;
and generating a target authority list according to the target authority.
Further, the acquiring a target permission list corresponding to the application software when the auxiliary service is in an open state further includes:
detecting the terminal equipment according to the permission detection strategy, and judging whether a first permission is obtained; the first authority is an authority which is not detected and is not opened in the non-system standard authorities which the application software depends on;
and displaying prompt information to a user according to the first permission so that the user can open the first permission.
Further, the permission opening process includes: the authority related page matched with the target authority and the terminal equipment, the operation on the authority related page and the page displayed after the operation on the authority related page.
Further, the identifier of the terminal device includes any one or more of the following information: the number of the terminal equipment, the rom model in the terminal equipment and the system information in the terminal equipment.
Further, the method further comprises the following steps: and when the auxiliary service is in the unopened state, displaying an auxiliary service page to guide a user to open the auxiliary service.
According to the application software permission adaptation method, whether a permission adaptation trigger signal is acquired or not is judged; when the permission adaptation trigger signal is acquired, judging whether the auxiliary service is in an open state; when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: target authority to be started in application software; aiming at each target authority, a process query request is sent to an authority server, wherein the process query request comprises: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device; according to the permission opening process, the target permission opening operation is executed, so that one-key adaptation can be performed on all non-system standard permissions related to the application software functions, the permission adaptation efficiency is improved, the method can be suitable for people who do not know the operation of the terminal equipment or people who are inconvenient to operate, and the applicability is good.
In order to achieve the above object, a second embodiment of the present invention provides an application software permission adaptation apparatus, including:
the judging module is used for judging whether an authority adaption triggering signal is acquired or not;
the judging module is further used for judging whether the auxiliary service is in an open state or not when the permission adaptation triggering signal is acquired;
an obtaining module, configured to obtain a target permission list corresponding to application software when the auxiliary service is in an open state, where the target permission list includes: target authority to be started in the application software;
a sending module, configured to send a process query request to the permission server for each target permission, where the process query request includes: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device;
and the execution module is used for executing the target permission opening operation according to the permission opening process.
Further, the judging module is specifically configured to,
acquiring a function currently used by application software;
judging whether the use of the function depends on unopened non-system standard authority;
and if the function depends on the unopened non-system standard permission, determining to acquire a permission adaptation trigger signal.
Further, the obtaining module is specifically configured to,
when the auxiliary service is in an open state, acquiring an identifier of the terminal equipment and a permission detection strategy corresponding to the identifier;
detecting the terminal equipment according to the permission detection strategy to acquire a target permission to be started in the application software; the target permission is detected and unopened permission in the non-system standard permission relied by the application software;
and generating a target authority list according to the target authority.
Further, the obtaining module is specifically further configured to,
detecting the terminal equipment according to the permission detection strategy, and judging whether a first permission is obtained; the first authority is an authority which is not detected and is not opened in the non-system standard authorities which the application software depends on;
and displaying prompt information to a user according to the first permission so that the user can open the first permission.
Further, the permission opening process includes: the authority related page matched with the target authority and the terminal equipment, the operation on the authority related page and the page displayed after the operation on the authority related page.
Further, the identifier of the terminal device includes any one or more of the following information: the number of the terminal equipment, the rom model in the terminal equipment and the system information in the terminal equipment.
Further, the device further comprises: and the display module is used for displaying the auxiliary service page when the auxiliary service is not started so as to guide a user to start the auxiliary service.
The application software permission adaptation device of the embodiment of the invention judges whether a permission adaptation trigger signal is acquired; when the permission adaptation trigger signal is acquired, judging whether the auxiliary service is in an open state; when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: target authority to be started in application software; aiming at each target authority, a process query request is sent to an authority server, wherein the process query request comprises: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device; according to the permission opening process, the target permission opening operation is executed, so that one-key adaptation can be performed on all non-system standard permissions related to the application software functions, the permission adaptation efficiency is improved, the method can be suitable for people who do not know the operation of the terminal equipment or people who are inconvenient to operate, and the applicability is good.
In order to achieve the above object, an embodiment of a third aspect of the present invention provides an application software permission adaptation device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the program, the application software permission adaptation device implements the application software permission adaptation method described above.
To achieve the above object, a fourth aspect of the present invention provides a non-transitory computer-readable storage medium, wherein instructions of the storage medium, when executed by a processor, implement the method as described above.
To achieve the above object, a fifth embodiment of the present invention provides a computer program product, which when executed by an instruction processor in the computer program product, implements the method as described above.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of an application software permission adaptation method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an application software permission adaptation apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of another application software permission adaptation apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an application software permission adaptation device according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The following describes an application software permission adaptation method and device according to an embodiment of the present invention with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating an application software permission adaptation method according to an embodiment of the present invention. As shown in fig. 1, the method for adapting the application software permission includes the following steps:
s101, judging whether an authority adaptation trigger signal is acquired.
The execution main body of the application software permission adaptation method provided by the invention is an application software permission adaptation device, and the application software permission adaptation device can be specifically application software. In this embodiment, a code is added to the application software, and different permission detection strategies are set in the code for different terminal device identifiers. And the authority server is also provided with authority opening processes matched with all authorities and the terminal equipment identification, so that the application software can automatically execute the authority opening operation according to the authority opening processes.
In this embodiment, the process of executing step 101 by the application software may specifically be to acquire a function currently used by the application software; judging whether the function is used depending on unopened non-system standard authority; if the function depends on unopened non-system standard permission, determining to acquire a permission adaptation trigger signal; and if the function does not depend on the unopened non-system standard authority, the application software continues to use the corresponding function. The functions used by the application software may be, for example, a floating window function, a call show function, and the like.
S102, when the permission adaptation trigger signal is acquired, whether the auxiliary service is in an open state or not is judged.
In this embodiment, the auxiliary service may be, for example, an android auxiliary service, and the auxiliary service is embedded in the system and is used for providing the auxiliary service for the user, for example, when the user is inconvenient to watch information, the information is broadcasted by voice; or automatically answer the phone when the user is inconvenient to answer the phone, and the like.
And if the auxiliary function is not in the opening state, displaying an auxiliary service page to guide a user to open the auxiliary service. The auxiliary service page is provided with an opening button, and after a user clicks the opening button, the auxiliary service is in an opening state.
S103, when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: and target authority to be opened in the application software.
In this embodiment, the process of executing step 103 by the application software may specifically be to acquire the identifier of the terminal device and the permission detection policy corresponding to the identifier when the auxiliary service is in an open state; detecting the terminal equipment according to the permission detection strategy to acquire a target permission to be started in the application software; the target permission is detected and unopened permission in the non-system standard permission which the application software depends on; and generating a target authority list according to the target authority.
In this embodiment, the identifier of the terminal device may include any one or more of the following information: the number of the terminal device, the rom type in the terminal device, the system information in the terminal device, the manufacturer identification of the terminal device and the like. In terminal devices corresponding to different rom models, different system types and different system versions, the authority management is greatly different, so that different authority detection strategies need to be set.
In this embodiment, the application software may first obtain all non-system standard permissions relied on when using the function, then detect, for each non-system standard permission, by using the permission detection policy, determine whether the permission is detected and whether the permission is not opened, and further determine a target permission to be opened in the application software. The application software can find the permission detection strategy in odex files of system/APP/APP similar to a permission manager under a terminal device directory through decompiling.
Further, on the basis of the above embodiment, the application software may further perform the following processes: detecting the terminal equipment according to the permission detection strategy, and judging whether a first permission is obtained; the first authority is an undetected and unopened authority in the non-system standard authority on which the application software depends; and displaying prompt information to the user according to the first permission so that the user can open the first permission, and further realizing the opening operation of the first permission on which the application software depends so that the application software can normally use each function.
S104, aiming at each target authority, sending a process query request to the authority server, wherein the process query request comprises: and the identifier of the target authority and the identifier of the terminal device corresponding to the application software are used for acquiring the authority opening process matched with the target authority and the terminal device.
In this embodiment, the permission opening process may include: the system comprises a permission related page matched with the target permission and the terminal equipment, an operation on the permission related page, and a page displayed after the operation on the permission related page. For example, assume that the rights opening procedure includes: the method comprises the steps of obtaining a first permission related page, obtaining a second permission related page, operating the first permission related page, jumping to the second permission related page after operating the first permission related page, and completing permission starting operation after operating the second permission related page. The first permission related page and the second permission related page can be represented by a link address, a path and the like; the operation may be represented by an object, an operated position.
And S105, executing target authority opening operation according to the authority opening process.
In this embodiment, taking the permission opening process mentioned in step 104 as an example, the process of executing step 105 by the application software may specifically be to first obtain a first permission-related page and operate the first permission-related page; and jumping to a second authority related page according to the operation, and operating the second authority related page to finish the authority opening operation.
In this embodiment, after the target permission opening operation is completed, a mark may be written in a position corresponding to the corresponding permission in the share reference and the like to identify that the permission has been opened.
Further, on the basis of the above embodiment, in the process of executing the target permission opening operation, the opened permission-related pages and the number of the jump pages may also be recorded. And sequentially executing the starting operation of each target authority, and after the starting operation of each target authority is completed, using the simulated back function of the auxiliary service for a back designated time to obtain an initially opened authority-related page, and further completing the starting operation of all target authorities by the initially opened authority-related page.
According to the application software permission adaptation method, whether a permission adaptation trigger signal is acquired or not is judged; when the permission adaptation trigger signal is acquired, judging whether the auxiliary service is in an open state; when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: target authority to be started in application software; aiming at each target authority, a process query request is sent to an authority server, wherein the process query request comprises: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device; according to the permission opening process, the target permission opening operation is executed, so that one-key adaptation can be performed on all non-system standard permissions related to the application software functions, the permission adaptation efficiency is improved, the method can be suitable for people who do not know the operation of the terminal equipment or people who are inconvenient to operate, and the applicability is good.
Fig. 2 is a schematic structural diagram of an application software permission adaptation apparatus according to an embodiment of the present invention. As shown in fig. 2, includes: a judging module 21, an obtaining module 22, a sending module 23 and an executing module 24.
The judging module 21 is configured to judge whether an authority adaptation trigger signal is acquired;
the judging module 21 is further configured to judge whether the auxiliary service is in an open state when the permission adaptation trigger signal is obtained;
an obtaining module 22, configured to obtain a target permission list corresponding to the application software when the auxiliary service is in an open state, where the target permission list includes: target authority to be started in the application software;
a sending module 23, configured to send a process query request to the authority server for each target authority, where the process query request includes: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device;
and the execution module 24 is configured to execute a target permission opening operation according to the permission opening process.
The application software permission adaptation device provided by the invention can be specifically application software. In this embodiment, a code is added to the application software, and different permission detection strategies are set in the code for different terminal device identifiers. And the authority server is also provided with authority opening processes matched with all authorities and the terminal equipment identification, so that the application software can automatically execute the authority opening operation according to the authority opening processes.
In this embodiment, the determining module 21 is specifically configured to obtain a function currently used by the application software; judging whether the use of the function depends on unopened non-system standard authority; if the function depends on unopened non-system standard permission, determining to acquire a permission adaptation trigger signal; and if the function does not depend on the unopened non-system standard authority, the application software continues to use the corresponding function. The functions used by the application software may be, for example, a floating window function, a call show function, and the like.
In this embodiment, the auxiliary service may be, for example, an android auxiliary service, and the auxiliary service is embedded in the system and is used for providing the auxiliary service for the user, for example, when the user is inconvenient to watch information, the information is broadcasted by voice; or automatically answer the phone when the user is inconvenient to answer the phone, and the like.
Further, with reference to fig. 3, on the basis of the embodiment shown in fig. 2, the apparatus may further include: and a display module 25, configured to display an auxiliary service page to guide a user to open the auxiliary service when the auxiliary function is not in an open state. The auxiliary service page is provided with an opening button, and after a user clicks the opening button, the auxiliary service is in an opening state.
In this embodiment, the obtaining module 22 is specifically configured to, when the auxiliary service is in an on state, obtain an identifier of the terminal device and an authority detection policy corresponding to the identifier; detecting the terminal equipment according to the permission detection strategy to acquire a target permission to be started in the application software; the target permission is detected and unopened permission in the non-system standard permission relied by the application software; and generating a target authority list according to the target authority.
In this embodiment, the identifier of the terminal device may include any one or more of the following information: the number of the terminal device, the rom type in the terminal device, the system information in the terminal device, the manufacturer identification of the terminal device and the like. In terminal devices corresponding to different rom models, different system types and different system versions, the authority management is greatly different, so that different authority detection strategies need to be set.
In this embodiment, the obtaining module 22 may first obtain all the non-system standard permissions relied on when using the function, and then detect, by using the permission detection policy, each non-system standard permission, to determine whether the permission is detected and whether the permission is not opened, thereby determining a target permission to be opened in the application software. The application software can find the permission detection strategy in odex files of system/APP/APP similar to a permission manager under a terminal device directory through decompiling.
Further, on the basis of the above embodiment, the obtaining module 22 may be further specifically configured to: detecting the terminal equipment according to the permission detection strategy, and judging whether a first permission is obtained; the first authority is an undetected and unopened authority in the non-system standard authority on which the application software depends; and displaying prompt information to the user according to the first permission so that the user can open the first permission, and further realizing the opening operation of the first permission on which the application software depends so that the application software can normally use each function.
In this embodiment, the permission opening process may include: the system comprises a permission related page matched with the target permission and the terminal equipment, an operation on the permission related page, and a page displayed after the operation on the permission related page. For example, assume that the rights opening procedure includes: the method comprises the steps of obtaining a first permission related page, obtaining a second permission related page, operating the first permission related page, jumping to the second permission related page after operating the first permission related page, and completing permission starting operation after operating the second permission related page. The first permission related page and the second permission related page can be represented by a link address, a path and the like; the operation may be represented by an object, an operated position.
In this embodiment, after the target permission opening operation is completed, a mark may be written in a position corresponding to the corresponding permission in the share reference and the like to identify that the permission has been opened.
Further, on the basis of the above embodiment, in the process of executing the target permission opening operation, the opened permission-related pages and the number of the jump pages may also be recorded. And sequentially executing the starting operation of each target authority, and after the starting operation of each target authority is completed, using the simulated back function of the auxiliary service for a back designated time to obtain an initially opened authority-related page, and further completing the starting operation of all target authorities by the initially opened authority-related page.
The application software permission adaptation device of the embodiment of the invention judges whether a permission adaptation trigger signal is acquired; when the permission adaptation trigger signal is acquired, judging whether the auxiliary service is in an open state; when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: target authority to be started in application software; aiming at each target authority, a process query request is sent to an authority server, wherein the process query request comprises: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device; according to the permission opening process, the target permission opening operation is executed, so that one-key adaptation can be performed on all non-system standard permissions related to the application software functions, the permission adaptation efficiency is improved, the method can be suitable for people who do not know the operation of the terminal equipment or people who are inconvenient to operate, and the applicability is good.
Fig. 4 is a schematic structural diagram of an application software permission adaptation device according to an embodiment of the present invention. The application software permission adaptation device comprises:
memory 1001, processor 1002, and computer programs stored on memory 1001 and executable on processor 1002.
The processor 1002, when executing the program, implements the application software permission adaptation method provided in the above-described embodiments.
Further, the application software permission adaptation device further comprises:
a communication interface 1003 for communicating between the memory 1001 and the processor 1002.
A memory 1001 for storing computer programs that may be run on the processor 1002.
Memory 1001 may include high-speed RAM memory and may also include non-volatile memory (e.g., at least one disk memory).
The processor 1002 is configured to implement the method for adapting application software permission according to the foregoing embodiment when executing the program.
If the memory 1001, the processor 1002, and the communication interface 1003 are implemented independently, the communication interface 1003, the memory 1001, and the processor 1002 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
Optionally, in a specific implementation, if the memory 1001, the processor 1002, and the communication interface 1003 are integrated on one chip, the memory 1001, the processor 1002, and the communication interface 1003 may complete communication with each other through an internal interface.
The processor 1002 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention.
The present embodiment also provides a computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the application software permission adaptation method as described above.
The present embodiment also provides a computer program product, wherein when the instruction processor in the computer program product executes, the method for adapting application software permission as described above is provided.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (16)

1. An application software permission adaptation method is characterized by comprising the following steps:
judging whether an authority adaptation trigger signal is acquired or not;
when the permission adaptation trigger signal is acquired, judging whether the auxiliary service is in an open state;
when the auxiliary service is in an open state, acquiring a target authority list corresponding to the application software, wherein the target authority list comprises: target authority to be started in the application software;
aiming at each target authority, a process query request is sent to an authority server, wherein the process query request comprises: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device;
executing target authority opening operation according to the authority opening flow;
recording the opened right related pages and the number of the jumping pages in the process of executing the target right opening operation;
after the execution of each target authority opening operation is completed, the simulation back function of the auxiliary service is used, the back specifies the times, the initially opened authority-related page is obtained, and then the opening operation of all the target authorities is completed on the initially opened authority-related page.
2. The method according to claim 1, wherein the determining whether the permission adaptation trigger signal is acquired comprises:
acquiring a function currently used by application software;
judging whether the use of the function depends on unopened non-system standard authority;
and if the function depends on the unopened non-system standard permission, determining to acquire a permission adaptation trigger signal.
3. The method according to claim 1, wherein obtaining the target permission list corresponding to the application software when the auxiliary service is in an open state comprises:
when the auxiliary service is in an open state, acquiring an identifier of the terminal equipment and a permission detection strategy corresponding to the identifier;
detecting the terminal equipment according to the permission detection strategy to acquire a target permission to be started in the application software; the target permission is detected and unopened permission in the non-system standard permission relied by the application software;
and generating a target authority list according to the target authority.
4. The method according to claim 3, wherein when the auxiliary service is in an open state, obtaining a target permission list corresponding to the application software further comprises:
detecting the terminal equipment according to the permission detection strategy, and judging whether a first permission is obtained; the first authority is an authority which is not detected and is not opened in the non-system standard authorities which the application software depends on;
and displaying prompt information to a user according to the first permission so that the user can open the first permission.
5. The method of claim 1, wherein the permission opening procedure comprises: the authority related page matched with the target authority and the terminal equipment, the operation on the authority related page and the page displayed after the operation on the authority related page.
6. The method of claim 1, wherein the identity of the terminal device comprises any one or more of the following information: the number of the terminal equipment, the rom model in the terminal equipment and the system information in the terminal equipment.
7. The method of claim 1, further comprising:
and when the auxiliary service is in the unopened state, displaying an auxiliary service page to guide a user to open the auxiliary service.
8. An application rights adaptation apparatus, comprising:
the judging module is used for judging whether an authority adaption triggering signal is acquired or not;
the judging module is further used for judging whether the auxiliary service is in an open state or not when the permission adaptation triggering signal is acquired;
an obtaining module, configured to obtain a target permission list corresponding to application software when the auxiliary service is in an open state, where the target permission list includes: target authority to be started in the application software;
a sending module, configured to send a process query request to the permission server for each target permission, where the process query request includes: the method comprises the steps that an identifier of a target authority and an identifier of a terminal device corresponding to application software are used for obtaining an authority starting process matched with the target authority and the terminal device;
the execution module is used for executing target authority opening operation according to the authority opening process;
the execution module is also used for recording the opened right related pages and the number of the jumping pages in the process of executing the target right starting operation; after the execution of each target authority opening operation is completed, the simulation back function of the auxiliary service is used, the back specifies the times, the initially opened authority-related page is obtained, and then the opening operation of all the target authorities is completed on the initially opened authority-related page.
9. The apparatus according to claim 8, wherein the determining module is specifically configured to,
acquiring a function currently used by application software;
judging whether the use of the function depends on unopened non-system standard authority;
and if the function depends on the unopened non-system standard permission, determining to acquire a permission adaptation trigger signal.
10. The apparatus of claim 8, wherein the obtaining module is specifically configured to,
when the auxiliary service is in an open state, acquiring an identifier of the terminal equipment and a permission detection strategy corresponding to the identifier;
detecting the terminal equipment according to the permission detection strategy to acquire a target permission to be started in the application software; the target permission is detected and unopened permission in the non-system standard permission relied by the application software;
and generating a target authority list according to the target authority.
11. The apparatus according to claim 10, wherein the obtaining means is further configured to,
detecting the terminal equipment according to the permission detection strategy, and judging whether a first permission is obtained; the first authority is an authority which is not detected and is not opened in the non-system standard authorities which the application software depends on;
and displaying prompt information to a user according to the first permission so that the user can open the first permission.
12. The apparatus of claim 8, wherein the permission opening procedure comprises: the authority related page matched with the target authority and the terminal equipment, the operation on the authority related page and the page displayed after the operation on the authority related page.
13. The apparatus of claim 8, wherein the identity of the terminal device comprises any one or more of the following information: the number of the terminal equipment, the rom model in the terminal equipment and the system information in the terminal equipment.
14. The apparatus of claim 8, further comprising: and the display module is used for displaying the auxiliary service page when the auxiliary service is not started so as to guide a user to start the auxiliary service.
15. An application rights adaptation device, comprising:
memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the application software permission adaptation method as claimed in any one of claims 1 to 7 when executing the program.
16. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method for application software privilege adaptation as claimed in any one of claims 1 to 7.
CN201811612694.9A 2018-12-27 2018-12-27 Application software permission adaptation method and device Active CN109697356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811612694.9A CN109697356B (en) 2018-12-27 2018-12-27 Application software permission adaptation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811612694.9A CN109697356B (en) 2018-12-27 2018-12-27 Application software permission adaptation method and device

Publications (2)

Publication Number Publication Date
CN109697356A CN109697356A (en) 2019-04-30
CN109697356B true CN109697356B (en) 2021-07-23

Family

ID=66232970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811612694.9A Active CN109697356B (en) 2018-12-27 2018-12-27 Application software permission adaptation method and device

Country Status (1)

Country Link
CN (1) CN109697356B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851863B (en) * 2019-11-07 2022-06-03 北京无限光场科技有限公司 Application program authority control method and device and electronic equipment

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514397A (en) * 2013-09-29 2014-01-15 西安酷派软件科技有限公司 Server, terminal and authority management and permission method
CN105787300B (en) * 2015-12-24 2019-05-07 广东小天才科技有限公司 Method and system for controlling use of software
CN105677385A (en) * 2015-12-29 2016-06-15 北京金山安全软件有限公司 Application program adaptation method and device and electronic equipment
CN106445345B (en) * 2016-09-30 2019-06-28 北京金山安全软件有限公司 Suspension window display method and device and electronic equipment
CN107943531A (en) * 2017-11-03 2018-04-20 珠海市君天电子科技有限公司 A kind of authority control method, user terminal, electronic equipment and storage medium
CN108959939B (en) * 2018-04-18 2020-12-25 腾讯科技(深圳)有限公司 System authority opening method, device, system and storage medium
CN108875354A (en) * 2018-05-31 2018-11-23 上海连尚网络科技有限公司 Permission open method, terminal device and computer-readable medium
CN109086625A (en) * 2018-08-08 2018-12-25 国云科技股份有限公司 A kind of method that cloud platform Host Security is reinforced

Also Published As

Publication number Publication date
CN109697356A (en) 2019-04-30

Similar Documents

Publication Publication Date Title
CN108073519B (en) Test case generation method and device
CN108446222B (en) Application testing method, device and equipment
CN108268024B (en) Vehicle diagnosis method, device, terminal and computer-readable storage medium
CN110908888B (en) Server testing method and device
WO2020019483A1 (en) Emulator identification method, identification device, and computer readable medium
CN106528791B (en) A kind of method and device of sending out notice message
US11422916B2 (en) Usage amount monitoring method and monitoring unit of electronic control unit for vehicle
CN111708584A (en) Vehicle diagnosis method and device, diagnosis equipment and storage medium
CN110298936B (en) Vehicle key configuration method, system and equipment thereof
WO2020019485A1 (en) Simulator identification method, identification device, and computer readable medium
CN112612715A (en) System testing method and device based on chaotic engineering, computer equipment and storage medium
CN110889116B (en) Advertisement interception method and device and electronic equipment
CN112996020B (en) Bluetooth-based automatic test method and device and Bluetooth test terminal
CN108519935B (en) Board card testing method and device, readable storage medium and computer equipment
CN109697356B (en) Application software permission adaptation method and device
CN113133041B (en) Method and device for testing vehicle-to-vehicle communication function in dynamic interval train control vehicle
CN110825451B (en) Configuration and verification method and device for applet page address
CN106775834A (en) Brush machine verification method and device
CN111128139B (en) Non-invasive voice test method and device
CN105787302B (en) A kind of processing method of application program, device and electronic equipment
CN111340635A (en) Data checking method, equipment, server and readable storage medium
CN114356769A (en) Software learning method, device, equipment and storage medium
CN111831551B (en) Non-blocking embedded software testing method, device and storage medium
CN115757165A (en) Automatic testing method, device, equipment and storage medium
CN105631318B (en) A kind of acquisition methods and device of registration table key assignments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant