CN110390205A - The determination method and apparatus of authority configuration strategy - Google Patents

The determination method and apparatus of authority configuration strategy Download PDF

Info

Publication number
CN110390205A
CN110390205A CN201810354753.0A CN201810354753A CN110390205A CN 110390205 A CN110390205 A CN 110390205A CN 201810354753 A CN201810354753 A CN 201810354753A CN 110390205 A CN110390205 A CN 110390205A
Authority
CN
China
Prior art keywords
terminal
authority configuration
configuration strategy
identification information
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810354753.0A
Other languages
Chinese (zh)
Other versions
CN110390205B (en
Inventor
周留井
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810354753.0A priority Critical patent/CN110390205B/en
Publication of CN110390205A publication Critical patent/CN110390205A/en
Application granted granted Critical
Publication of CN110390205B publication Critical patent/CN110390205B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves a kind of determination methods of authority configuration strategy, comprising: obtains the first object identification information of first terminal, the first object identification information includes at least one of device-fingerprint information and rights management program identification information of the first terminal;Based on permission fitting relation, candidate policy is determined;The permission fitting relation includes the corresponding relationship between the second target identification information and authority configuration strategy, and the candidate policy includes and authority configuration strategy corresponding to the second target identification information of the first object identification information match;Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.Scheme provided by the present application can effectively improve actually can fitting percentage.

Description

The determination method and apparatus of authority configuration strategy
Technical field
This application involves field of computer technology, determination method, apparatus, meter more particularly to a kind of authority configuration strategy Calculation machine readable storage medium storing program for executing and computer equipment.
Background technique
With the development of computer technology, each Terminal Type is developed and be installed to more and more third party applications, Such as in smart phone, tablet computer, so that people's lives be made to become more to enrich and fast.
For third party application, missing specified permission may cause it and be unable to operate normally, such as missing is certainly Starting permission, which will lead to its process, to survive, and missing camera permission will lead to its function of being related to Image Acquisition can not be real It is existing.In view of this, it is thus necessary to determine that the adaptation authority configuration strategy of terminal is enabled the terminal to the corresponding of third party application Permission is configured.
In conventional method, preset authority configuration strategy in the third party application installed at the terminal is answered by third party With program from its preset each authority configuration strategy, basic identification information (such as manufacturer's information and operation with the terminal are searched System version information) the authority configuration strategy that matches, the adaptation authority configuration strategy of the terminal is determined with this.However, in reality In the situation of border, determining adaptation authority configuration strategy by this way, it tends to be difficult to terminal adaptation, i.e., actually can suitability it is low Under.
Summary of the invention
Based on this, it is necessary to for traditional approach determine authority configuration strategy reality can the low technology of suitability ask Topic, provides determination method, apparatus, computer readable storage medium and the computer equipment of a kind of authority configuration strategy.
A kind of determination method of authority configuration strategy, comprising:
The first object identification information of first terminal is obtained, the first object identification information includes the first terminal At least one of device-fingerprint information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation include the second target identification information and Corresponding relationship between authority configuration strategy, the candidate policy include the second mesh with the first object identification information match Mark authority configuration strategy corresponding to identification information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
A kind of determining device of authority configuration strategy, comprising:
First object identifier acquisition module, for obtaining the first object identification information of first terminal, the first object Identification information includes at least one of device-fingerprint information and rights management program identification information of the first terminal;
Candidate policy determining module determines candidate policy for being based on permission fitting relation;The permission fitting relation packet The corresponding relationship between the second target identification information and authority configuration strategy is included, the candidate policy includes and the first object Authority configuration strategy corresponding to second target identification information of identification information match;
Adaptation strategies determining module determines the adaptation authority configuration of the first terminal for being based on the candidate policy Strategy.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor It performs the steps of
The first object identification information of first terminal is obtained, the first object identification information includes the first terminal At least one of device-fingerprint information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation include the second target identification information and Corresponding relationship between authority configuration strategy, the candidate policy include the second mesh with the first object identification information match Mark authority configuration strategy corresponding to identification information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
The first object identification information of first terminal is obtained, the first object identification information includes the first terminal At least one of device-fingerprint information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation include the second target identification information and Corresponding relationship between authority configuration strategy, the candidate policy include the second mesh with the first object identification information match Mark authority configuration strategy corresponding to identification information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
Determination method, apparatus, storage medium and the computer equipment of above-mentioned authority configuration strategy, server obtain terminal At least one of device-fingerprint information and rights management program identification information determine terminal further according to permission fitting relation It is adapted to authority configuration strategy.On the one hand, identical for basic identification information (such as manufacturer's information and operating system version information), but Device-fingerprint information and/or the different terminal of rights management program, the authority configuration strategy of actual fit may not be identical, Thus according to device-fingerprint information and/or rights management program identification information, more fine-grained differentiation can be made to terminal, from And adaptation authority configuration strategy more targetedly is determined for terminal.On the other hand, permission fitting relation is safeguarded by server, just Dynamic update is carried out to fitting relation in more fully covering various fitting relations, and in time.Accordingly, provided by the present application Scheme can effectively improve actually can fitting percentage.
Detailed description of the invention
Fig. 1 is the applied environment figure of the determination method of authority configuration strategy in one embodiment;
Fig. 2 is the flow diagram of the determination method of authority configuration strategy in one embodiment;
Fig. 3 is the schematic diagram of the Relationship Between Size of terminal identification information in one embodiment;
Fig. 4 be one embodiment in define the competence fitting relation method flow diagram;
Fig. 5 is the schematic illustration of the determination method of authority configuration strategy in one embodiment;
Fig. 6 is the flow diagram of authority configuring method in one embodiment;
Fig. 7 is the interface schematic diagram that guidance user carries out authority configuration in one embodiment;
Fig. 8 is the interface schematic diagram that a key realizes authority configuration in one embodiment;
Fig. 9 is the interaction schematic diagram of the determination system of authority configuration strategy in one embodiment;
Figure 10 be in one embodiment it is overall can fitting percentage variation schematic diagram;
Figure 11 is the variation schematic diagram of failure number of users in one embodiment;
Figure 12 is the structural block diagram of the determining device of authority configuration strategy in one embodiment;
The structural block diagram of computer equipment in Figure 13 one embodiment;
The structural block diagram of computer equipment in Figure 14 one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the purpose, technical tactic and advantage of the application is more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
It should be noted that term " first " used in this application, " second " etc. are for making to similar object Differentiation in name, but these objects itself should not be limited by these terms.It should be appreciated that in the feelings for not departing from scope of the present application Under condition, these terms can be interchanged in appropriate circumstances.For example, " the first total number " can be described as " the second total number ", And similarly, " the second total number " is described as " the first total number ".
In addition, the terms "include", "comprise", " having " and their any deformation, it is intended that cover non-exclusive Include.For example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to clearly arrange Out the step of or unit, but be not clearly listed or these process, methods, product or equipment are consolidated The other step or units having.Also, term as used herein "and/or" includes one or more relevant listed items Any and all combinations.
The determination method of authority configuration strategy provided by the present application, can be applied in application environment as shown in Figure 1.This is answered It can be related to terminal 110 and server 120 with environment, terminal 110 and server 120 pass through network connection.Wherein, in terminal 110 The mountable third party application, server 120 can be used for determining the adaptation authority configuration strategy of terminal 110, adaptation power Limit configuration strategy may be used to indicate terminal 110 and configure to the corresponding authority of the third party application.
Specifically, its target identification information can be sent to server 120 by terminal 110.Wherein, target identification information can be with At least one of device-fingerprint information and rights management program identification information including terminal 110.
Correspondingly, server 120 can be closed based on the target identification information and permission adaptation that the terminal 110 received is sent It is to determine candidate policy.Wherein, permission fitting relation includes the corresponding relationship of target identification information Yu authority configuration strategy, candidate Strategy includes: permission corresponding to the matched target identification information of target identification information in permission fitting relation, with terminal 110 Configuration strategy.In turn, server 120 can determine the adaptation authority configuration strategy of terminal 110 based on candidate policy.
In addition, the adaptation authority configuration strategy can also be sent to terminal 110 by server so that terminal 110 to this with The corresponding authority of the corresponding third party application of permission adaptation strategies is configured.
Wherein, terminal 110 can be terminal console or mobile terminal, and mobile terminal may include mobile phone, tablet computer, pen Remember at least one of this computer, personal digital assistant and wearable device etc..Server 120 can use independent physical services Server cluster that device or multiple physical servers are constituted is realized.
In one embodiment, as shown in Fig. 2, providing a kind of determination method of authority configuration strategy.It applies in this way It is illustrated for server 120 in above-mentioned Fig. 1.This method may include steps of S202 to S206.
S202, obtains the first object identification information of first terminal, and first object identification information includes setting for first terminal Standby at least one of finger print information and rights management program identification information.
First terminal refers to the terminal for needing that adaptation authority configuration strategy is determined for it.Authority configuration strategy can be used for referring to Show that terminal configures the corresponding authority of specified third party application.Correspondingly, adaptation authority configuration strategy refers to and end The authority configuration strategy of adaptation is held, i.e. terminal can be adapted to authority configuration strategy successfully to specified third-party application journey according to it The corresponding authority of sequence is configured.
In one embodiment, authority configuration strategy may include route guidance information, which may be used to indicate First terminal carries out page jump, to guide the corresponding permission of user setting.In another embodiment, except route guidance information with Outside, authority configuration strategy also may include operation prompt information, which may be used to indicate first terminal and show accordingly Operation indicating message, so that user be made to understand to the correct operation mode of current page.In addition, the data of authority configuration strategy Form can be configuration file or script file.
In one embodiment, server can be in the permission for receiving the transmission of terminal locating for client (third party application) When configuration strategy determines request, judgement needs to determine adaptation authorization policy for the terminal, which is first terminal.It illustrates It is bright, the client of " Tencent house keeper " is installed on terminal P1, when " Tencent house keeper " needs to obtain " reading phone directory " this permission, " Tencent house keeper " can determine to 1 sending permission strategy of server S and request.In the case, terminal P1 can be first terminal.This Outside, server S 1 can be the server of realization " Tencent house keeper ".
Target identification information refers to the information that can be used for characterizing the configuring condition of its corresponding terminal.Wherein, configuring condition The case where may include the hardware case, operating system situation and its application program installed of terminal etc..It can manage Solution, the terminal with different configuring conditions, adaptation priority assignation strategy may be different, thus server can pass through end The target identification information at end identifies the correspondence configuring condition of the terminal, and then for according to the correspondence configuring condition, is directed to Property the determining authority configuration strategy with the terminal adaptation.In addition, first object identification information refers to the target mark of first terminal Know information.
It should be noted that target identification information generally may include basic identification information.Basic identification information, can be used for The configuring condition of the relatively coarseness of its corresponding terminal is characterized, that is, is that comparison is thick to the differentiation of terminal according to basic identification information General.
In one specific example, basic identification information usually may include manufacturer's information, model information and operating system version At least one of this information.Wherein, manufacturer's information refers to the identification information of the manufacturer of terminal, is by home-made cellphone of terminal Example, can distinguish Huawei's mobile phone, OPPO mobile phone, millet mobile phone etc. by manufacturer's information.Model information refers to the machine of terminal The identification information of type number, the partitioning standards for being typically based on manufacturer's formulation divide machine models, such as pass through machine type Number can honor V9, Mate9, Mate9Pro, P10, P10Plus etc. to Huawei's mobile phone distinguish.Operating system version information Also referred to as rom version information refers to that the identification information of the version of the operating system of terminal, such as the operating system of OPPO mobile phone are ColorOS system, operating system version may include ColorOS 3.0, ColorOS 3.1, ColorOS 3.2 etc.;This Outside, operating system version information may include operating system version number.
However, the differentiation compared with coarseness can be only made to terminal according to basic identification information.That is, basic identification information Identical terminal, adaptation authority configuration strategy very maximum probability be not identical.Thus, if according only to specified basic identification information pair Terminal distinguishes, and then determines that it is adapted to authority configuration strategy, and finally determining adaptation authority configuration strategy is likely to invalid Or mistake, i.e., it is not adapted to certain terminals actually.
It may include additional identification information in target identification information based on this.Additional identification information, it is right to can be used for characterizing its The configuring condition of the finer grain for the terminal answered, that is, be that comparison is fine to the differentiation of terminal according to additional identification information.
In implementing the present invention, it may, the inventors discovered that, it is identical for basic identification information, but device-fingerprint information For different terminal, the authority configuration strategy of adaptation may not be identical.Based on this, in one embodiment, target identification Information may include device-fingerprint information, and correspondingly, server can determine the adaptation power of first terminal according to device-fingerprint information Limit configuration strategy.
Specifically, device-fingerprint information refers to the identification information of equipment.For carrying the terminal of Android system, device-fingerprint Information can refer to FingerPrint information, can pass through API (the Application Programming of Android system Interface, application programming interface) it obtains.By taking manufacturer is OPPO and type is a mobile phone of R9m as an example, by such as After the I that gives an order calls the corresponding API of Android system, the following character string St of acquisition can be the device-fingerprint information of the mobile phone.
It instructs I:SystemProperties.get (" ro.build.fingerprint ").
Character string St:OPPO/R9m/R9:5.1/LMY47I/1515760704:user/release-keys.
It should be noted that it is all the same for manufacturer and type, and the mobile phone of same batch factory, device-fingerprint information It is identical.But if the subsequent ROM to mobile phone makes change, such as ROM is upgraded, device-fingerprint information is just It can change.
In implementing the present invention, it may, the present inventors have additionally discovered that, it is identical for basic identification information, but difference is installed For the terminal of the rights management program of version, the authority configuration strategy of adaptation may not be identical.Such as OPPO mobile phone house keeper The authority configuration strategy in 3.0 version of authority configuration strategy and OPPO mobile phone house keeper in 2.0 versions is not just completely identical.
It in the case, will be same basic if determining adaptation authority configuration strategy according only to basic identification information Identification information but be equipped with different editions rights management program terminal, finally determine identical adaptation authority configuration strategy, However its adaptation authority configuration strategy determined is likely to invalid or wrong for certain terminals, i.e., it is actually and uncomfortable With these terminals.It can be OPPO mobile phone pipe if being determined according only to operating system version information still by taking OPPO mobile phone as an example The terminal of 3.0 version of terminal and OPPO mobile phone house keeper of 2.0 versions of family, determines identical adaptation authority configuration strategy, however, real In the situation of border, can there is what the adaptation authority configuration strategy was not adapted to the terminal of the terminal of a collection of 2.0 versions or 3.0 versions Problem.
Based on this, in another embodiment, first object identification information may include rights management program identification information, phase Ying Di, server can determine the adaptation authority configuration strategy of terminal according to rights management program identification information.
Specifically, rights management program identification information refers to available rights management program (the i.e. permission pipe installed in terminal Manage software) identification information.Wherein, rights management software can refer to the software of the permission of management third party application. In one embodiment, rights management program identification information can be used for identifying the title and version of corresponding authority management program, that is, weigh Limit management program identification information may include: the name information and version information of rights management program.
In addition, distinguishing according to provider, rights management software may include official's rights management software and third party Rights management software.Wherein, official's rights management software can refer to the rights management software that manufacturer terminal provides, when terminal is dispatched from the factory Official's rights management software will usually be carried, and user can not unload it under normal circumstances, for example, Huawei, OPPO, And " the mobile phone house keeper " of the cell phone manufacturers such as millet etc..Third party's rights management software can refer to the rights management that third party provides Software, such as KingoUser software.
It should be noted that since manufacturer terminal would generally be customized exploitation to the operating system of terminal, such as based on Android system is customized exploitation, the ColorOS system of OPPO customized development, MIUI system of millet customized development etc..It is right In different operating system, usually there is very big difference in the corresponding authority configuration strategy (such as path of navigation) that is adapted to.And And most manufacturer terminals aperiodically can update its operating system (such as patch installing or upgrading) by OTA, and its it is corresponding can Adaptation authority configuration strategy updates official's rights management software when changing.Therefore, official's rights management software can be compared with subject to The corresponding difference for being adapted to authority configuration strategy of terminal really is characterized, that is, for terminal, official's permission of installation Management software is different, and the authority configuration strategy that can be adapted to i.e. may not be identical.
Based on this, in one embodiment, terminal can be distinguished according to the official's rights management software installed in terminal, And then determine that it is adapted to authority configuration strategy.Correspondingly, rights management program identification information can refer to: install on first terminal The identification information of official's rights management software.
It can simultaneously include device-fingerprint information and rights management program in first object identification information in another embodiment Identification information, correspondingly, server can determine jointly terminal according to device-fingerprint information and rights management program identification information It is adapted to authority configuration strategy, to more subtly distinguish to terminal.
In addition, different target identifies as shown in figure 3, right as shown in figure 3, the permission limitation fragmentation of manufacturer terminal is serious For different terminals, the granularity of identification information used in distinguishing terminal is thinner, the accuracy of identified authority configuration strategy It is higher.
S204 is based on permission fitting relation, determines candidate policy;Permission fitting relation include the second target identification information and Corresponding relationship between authority configuration strategy, candidate policy include believing with the second target identification of first object identification information match The corresponding authority configuration strategy of breath.
Permission fitting relation may include the corresponding relationship between the second target identification information and authority configuration strategy.Its In, the second target identification information refers to the target identification information in permission fitting relation.In permission fitting relation, for its note For any second target identification information of record, a corresponding authority configuration strategy may be present, also, corresponding Authority configuration strategy be applicable to its target identification information and the matched terminal of the second target identification information.In addition, should Corresponding relationship can be " many-one ", i.e., multiple different second target identification informations can correspond to the same authority configuration plan Slightly.
It should be noted that the second target identification information may include first object identification information.In one specific example, the The information category number that two target identification informations include can be identical as the information category number of first object identification information, such as the second mesh Mark identification information includes the version information of device-fingerprint information, the name information of rights management program and rights management program, clothes The first object identification information that business device obtains also just includes device-fingerprint information, the name information and version of rights management program Information.In the case, it is based on permission fitting relation, it is finding with first object identification information match the second target identification Information it is general only one, i.e., candidate policy only one.
In another specific example, the information category number of first object identification information can include less than the second target identification information Information category number, but the second target identification information includes all information category in first object identification information.For example, second Target identification information includes the version information of device-fingerprint information, the name information of rights management program, rights management program, but The first object identification information that server obtains only includes device-fingerprint information.In the case, it is based on permission fitting relation, is looked into The number with the second target identification information of first object identification information match is found possibly more than one, it is correspondingly, corresponding The number of authority configuration strategy is also therewith more than one (i.e. candidate policy is more than one).At this point, can by with find with it is each The corresponding each authority configuration strategy of second target identification information is used as candidate policy.
For example, the second target identification information includes device-fingerprint information, rights management journey in permission fitting relation The version information of the name information of sequence, rights management program, and the permission fitting relation includes following three groups of corresponding relationships (R1, R2 and R3):
Corresponding relationship the R1: the second target identification information MS1 corresponding authority configuration strategy T1;Wherein, the second target identification is believed Breath MS1 include device-fingerprint information F1, the name information N1 of rights management program, rights management program version information V1.It is right It should be related to the R2: the second target identification information MS2 corresponding authority configuration strategy T2;Wherein, the second target identification information MS2 includes setting Standby finger print information F2, the name information N2 of rights management program, rights management program version information V2.Corresponding relationship R3: the Two target identification information MS3 corresponding authority configuration strategy T3;Wherein, the second target identification information MS3 includes device-fingerprint information F1, the name information N3 of rights management program, rights management program version information V3.
Based on this, in a specific example, if the first object identification information MT1 of the first terminal E1 obtained includes equipment Finger print information F1, the name information N1 of rights management program, rights management program version information V1, then can be suitable based on the permission With relationship, determine that first object identification information MT1 is matched with the second target identification information MS1, and then the second target identification information The corresponding authority configuration strategy T1 of MS1 can be identified as candidate policy (hereinafter referred example E-1).
In another specific example, if the first object identification information MT2 of the first terminal E2 obtained includes device-fingerprint letter F1 is ceased, then can be based on the permission fitting relation, determines first object identification information MT1 and the second target identification information MS1, second Target identification information MS3 is matched, in turn, can be by the corresponding authority configuration strategy T1 and second of the second target identification information MS1 The corresponding authority configuration strategy T3 of target identification information MS3 is determined as candidate policy (hereinafter referred example E-2).
S206 is based on candidate policy, determines the adaptation authority configuration strategy of first terminal.
It should be noted that the number of candidate policy may only have one, it is also possible to more than one.Only have in candidate policy In the case where one, which is directly exactly the adaptation authority configuration strategy of first terminal.It is more than one in candidate policy In the case where, adaptation authority configuration strategy of the candidate policy as first terminal can be determined in each candidate policy.
For example, for above-mentioned example E-1, since candidate policy only includes authority configuration strategy T1, thus can be direct Authority configuration strategy T1 is determined as to the adaptation authority configuration strategy of first terminal E1.For above-mentioned example E-1, due to candidate Strategy includes authority configuration strategy T1 and T3, thus one in authority configuration strategy T1 and T3 can be determined as first terminal E2 Adaptation authority configuration strategy.
In addition, be based on permission fitting relation if first object identification information for some first terminal, do not find with Second target identification information of the first object identification information match, also the number of candidate policy is zero.This show server it Before may not record authority configuration strategy corresponding with the first object identification information, at this point, can remember in permission fitting relation One is determined in the authority configuration strategy of record at random, the authority configuration strategy as the first terminal.
Also, by the first object identification information feedback at relevant staff, so that relevant staff can be true Determine the new authority configuration strategy of one with the first object identification information match, which can be used as this The adaptation authority configuration of the corresponding first terminal of first object identification information.In turn, which is added to power Limit fitting relation.It is subsequent, if server gets the first object identification information again, can by the new authority configuration strategy, It is determined as candidate policy.
In addition, server can pass through the third party on first terminal after the adaptation authority configuration strategy of determining first terminal The adaptation authority configuration strategy is sent to the first terminal by application program, so that first terminal can be according to the adaptation authority configuration Strategy configures the corresponding authority of the third party application.
The determination method of above-mentioned authority configuration strategy, server obtain the device-fingerprint information and rights management program of terminal At least one of identification information determines the adaptation authority configuration strategy of terminal further according to permission fitting relation.On the one hand, right It is identical in basic identification information (such as manufacturer's information and operating system version information), but device-fingerprint information and/or rights management The authority configuration strategy of the different terminal of program, actual fit may not be identical, thus according to device-fingerprint information and/or Rights management program identification information can make more fine-grained differentiation to terminal, to more targetedly determine for terminal It is adapted to authority configuration strategy.On the other hand, permission fitting relation is safeguarded by server, is closed convenient for more fully covering various adaptations System, and dynamic update is carried out to fitting relation in time.Accordingly, can effectively improve actually can fitting percentage by the application.
In one embodiment, as shown in figure 3, the method for determination of permission fitting relation, may include steps of S402 extremely S408.S402 sends authority configuration strategy to be tested to second terminal.It is anti-to receive the first terminal that each second terminal is passed back by S404 Feedforward information;First terminal feedback information include second terminal third target identification information and with authority configuration strategy pair to be tested The Policy evaluation parameter answered.S406 is based on each Policy evaluation parameter, carries out validation verification to authority configuration strategy to be tested. S408, based on the authority configuration strategy to be tested and its corresponding third target identification information being verified, the adaptation that defines the competence is closed System, the second target identification information includes: the corresponding third target identification information of authority configuration strategy to be tested being verified.
It should be noted that before not set up permission fitting relation, for an authority configuration strategy, server energy Enough determining matched target identification information is more unilateral.For example, staff carries out a certain sample mobile phone SP Authority configuration test, so that it is determined that the adaptation authority configuration strategy of sample mobile phone SP is authority configuration strategy TS1, due to work The target identification information of sample mobile phone SP can be uniquely determined by making personnel, and server can also safeguard the target mark of sample mobile phone SP Know the corresponding relationship (hereinafter referred example E-3) that information is adapted to authority configuration strategy with this.
But for an authority configuration strategy, can matched target identification information may have it is multiple, i.e., should The target identification information of sample mobile phone SP may be it is numerous being capable of one in matched target identification information.In this situation Under, server just can not accurately determine that there are also which target identification informations in addition to the target identification information of sample mobile phone SP Being can be matched with authority configuration strategy TS1.In addition, server also can not accurately determine the adaptation authority configuration strategy with Which target identification information is unmatched.
To solve the above-mentioned problems, staff can test more sample mobile phones, on the spot by staff Test the corresponding relationship to determine more target identification informations Yu authority configuration strategy.However, staff is surveyed on the spot The time of examination, human and material resources cost are very high, the inefficiency for the fitting relation that defines the competence, and are also difficult to and cover comprehensively Lid.
Based on this, frame diagram as shown in connection with fig. 5, in the present embodiment, after obtaining authority configuration strategy to be tested, server can be first The authority configuration strategy to be tested is thrown to second terminal.Receive the first terminal feedback information that second terminal is passed back again, first Terminal feedback information include the second terminal third target identification information and with for received authority configuration plan to be tested Policy evaluation parameter slightly.Then, server is according to the Policy evaluation parameter in first terminal feedback information, to the power to be verified It limits configuration strategy and carries out validation verification, that is, judge that the authority configuration strategy to be verified is effective authority configuration strategy, still Invalid authority configuration strategy.In turn, for the authority configuration strategy to be tested (i.e. effective authority configuration strategy) that is verified and Its corresponding third target identification information establishes corresponding relationship, so that it is determined that permission fitting relation.
It should be noted that the validation verification in the present embodiment, is not used to characterize a certain authority configuration plan to be tested It whether can be slightly adapted to the corresponding third terminal of the authority configuration strategy to be tested, but for whether assessing authority configuration strategy to be tested It needs formal online.Wherein, if formal online, just record has the authority configuration to be tested in the permission fitting relation of server maintenance Strategy, with determined by the first terminal feedback information that is fed back according to second terminal, each target identification that can be matched believes The corresponding relationship of breath, with for determining the adaptation authority configuration strategy of first terminal, i.e. subsequent server may be by the power to be tested Limit configuration strategy is determined as the adaptation authority configuration strategy of a certain first terminal.If informal online, show that server eliminates Authority configuration strategy to be tested, that server can not record the authority configuration strategy to be tested is corresponding with any target identification information Relationship, correspondingly, subsequent server will not match the adaptation permission that authority configuration strategy to be tested is determined as any first terminal Set strategy.
It can be seen that server can be directly according to the first terminal feedback letter of each second terminal return in the present embodiment Breath, determines which target identification information can be with authority configuration strategy matching to be tested and which target identification information It can not be with the authority configuration strategy matching to be tested.On the one hand, the work that staff tests one by one is eliminated, on the other hand, In such a way that server issues, the terminal with different target identification information can be more fully covered, in another aspect, respectively Second terminal can be concurrently to server feedback information, to sum up, and the present embodiment greatly improves server and establishes permission adaptation The efficiency of relationship, and can guarantee the comprehensive of the permission fitting relation that it is safeguarded.
It should be noted that third target identification information refers to the target identification information of second terminal, recorded to power After limiting fitting relation, in permission fitting relation, referred to as the second target identification information.
In one embodiment, before sending authority configuration strategy to be tested to second terminal, i.e. before step S402, may be used also To include the following steps: to obtain reference identification information, reference identification information includes third corresponding with authority configuration strategy to be tested The basic identification information of terminal, basic identification information include manufacturer's information, model information, in operating system version information at least It is a kind of.Then, it is determined that second terminal, second terminal includes its basic identification information and the terminal that reference identification information matches.
Wherein, reference identification information is obtained, can refer to the basis mark of third terminal corresponding with authority configuration strategy to be tested Know information.As described above, third terminal refers to staff for carrying out authority configuration test, so that it is determined that it is adapted to permission The terminal of configuration strategy.By taking previous example E-3 as an example, sample mobile phone SP is third terminal, the basis mark of sample mobile phone SP Knowing information is reference identification information.
Second terminal refers to the selected terminal for being used to participate in establishing permission fitting relation of server, may include it Basic identification information and reference identification information match and are equipped with the terminal of specified third party application.
For the number of second terminal, in one embodiment, server can be in its basic identification information and reference identification Information matches, and is equipped in each terminal of specified third party application, chooses a part of terminal as second terminal.Separately In one embodiment, server can also match its basic identification information with reference identification information, and be equipped with specified the All terminals of tripartite's application program, are determined as second terminal totally.It should be noted that in practical application, in order to guarantee to use Family experience, can generally control the scale of user to be tested, i.e., one is only chosen in all terminals for meeting the first screening conditions Divide terminal, as second terminal.
Match for the basic identification information and reference identification information of terminal, can refer in the basic identification information of terminal Any one of at least match with the respective items in reference identification information.Also, basis mark letter can be set according to actual needs Target item in breath needs the item to match with the respective items in reference identification information.It can be seen that server is whole to second When authority configuration strategy to be tested is launched at end, it can be launched based on the basic identification information of coarseness.
For example, for the example E-3 being described above, if sample mobile phone SP is a mobile phone of OPPO R9m, ginseng Examining identification information includes manufacturer's information (OPPO), model information (R9m), operating system version number (ColorOS 3.0).
In one specific example, its manufacturer's information can be characterized to OPPO, model information characterizes R9m, operating system version Number characterization ColorOS 3.0 and be equipped in each terminal or each terminal of specified third party application a part eventually End, is selected as second terminal.Also that is, target item includes simultaneously manufacturer's information, model information and operating system version in this example Number.
It in another specific example, can also be launched to more coarseness, such as its manufacturer's information is characterized into OPPO, behaviour Make system version number characterization ColorOS 3.0 and is equipped in each terminal or each terminal of specified third party application A part of terminal, be selected as second terminal.Also that is, target item includes simultaneously manufacturer's information and operating system version in this example Number.
In another specific example, can also more coarseness it be launched, such as its operating system version number is characterized ColorOS 3.0 and a part of terminal being equipped in each terminal or each terminal of specified third party application, choosing For second terminal.Also that is, target item only includes operating system version number in this example.
In addition, after determining second terminal, the third party application installed in server and identified second terminal into Row data communication launches the authority configuration strategy TS1 of sample mobile phone SP to them.To which server can be according to this part second The first terminal feedback information that terminal returns respectively determines in each target identification information that this part second terminal is related to, which Target identification information be can and which target identification information matched with authority configuration strategy TS1 be can not be with the permission Configuration strategy TS1 is matched.
Also, as it was noted above, server can also be fed back according to the first terminal that this part second terminal returns respectively Information judges the validity of authority configuration strategy TS1, i.e. authority configuration strategy TS1 is effective authority configuration strategy, also It is invalid authority configuration strategy.It should be noted that validity herein is not used to characterize authority configuration strategy TS1 Whether can be adapted to sample mobile phone SP, but for assess authority configuration strategy TS1 whether need it is formal online.
If formal online, in the permission fitting relation of server maintenance, just record has the authority configuration strategy TS1 and sample The corresponding relationship of the target identification information of mobile phone SP and the authority configuration strategy TS1 with can be with authority configuration strategy TS1 The corresponding relationship of the third target identification information of matched each second terminal.Some first end subsequent, that server receives The first object identification information at end, matched second target identification information corresponds to the authority configuration plan in permission fitting relation When slightly TS1, authority configuration strategy TS1 can be determined as the candidate policy of the first terminal by server.
If informal online, show that server has eliminated authority configuration strategy TS1, server can not record the power Limit the corresponding relationship of the target identification information of configuration strategy TS1 and sample mobile phone SP.Correspondingly, subsequent server will not should Authority configuration strategy TS1 is determined as the adaptation authority configuration strategy of any first terminal.
In one embodiment, Policy evaluation parameter include strategy can suitability assessment parameter and strategy execution state parameter in At least one.Accordingly, it is based on each Policy evaluation parameter, validation verification is carried out to authority configuration strategy to be tested, may include Following steps: the first net assessment parameter is determined based on each Policy evaluation parameter;First net assessment parameter includes one kind or more Index parameter, the type of index parameter include overall conversion ratio, the rate that runs succeeded and it is overall can fitting percentage;It is total based on first Body assesses parameter, carries out validation verification to authority configuration strategy to be tested.
Wherein, overall conversion ratio is determined based on the first total number and the second total number, and the rate that runs succeeded is based on the second sum Mesh and third total number determine, totally can fitting percentage be based on the first total number and the determination of the 4th total number.Also, the first total number For the sum of second terminal, the second total number is that the second terminal of successful execution authority configuration strategy to be tested is confirmed through user Sum, third total number are the sum for having executed the second terminal of authority configuration strategy to be tested, the 4th total number be with it is to be tested The sum of the second terminal of authority configuration strategy adaptation.In addition, the second total number and third total number are based on each strategy execution shape The determination of state parameter, the 4th total number can suitability assessment parameter determinations based on each strategy.
Wherein, strategy can suitability assess parameter, can be used for characterizing its corresponding authority configuration strategy to be tested whether with hair Give the strategy can suitability assessment parameter second terminal adaptation.For example, server to second terminal PT1 have sent one it is to be tested Authority configuration strategy TS1, second terminal PT1 can be fitted to server return for the strategy of the authority configuration strategy TS1 to be tested Parameter is assessed with property.It is appreciated that the strategy can suitability assessment parameter can be used for characterizing the authority configuration strategy TS1 to be tested and be It is no to be adapted to second terminal PT1.
It should be noted that the strategy can suitability assessment parameter can be by the specified third-party application journey with server communication Sequence obtains.It specifically, can be automatically after which receives the authority configuration strategy to be tested that server is sent Corresponding operation is executed, determines that can locating terminal according to the authority configuration strategy to be tested successfully to the third party application Corresponding authority configured, thus generate corresponding strategy can suitability assessment parameter.Also, third party application determines Can its locating terminal successfully match the corresponding authority of the third party application according to the authority configuration strategy to be tested The process set is participated in without user (actual user of terminal).
Strategy execution state parameter, can be used for characterizing whether its corresponding authority configuration strategy to be tested is held in second terminal It goes successfully.For example, server has sent an authority configuration strategy TS1 to be tested to second terminal PT1, second terminal PT1 is executed After the authority configuration strategy TS1 to be tested, the implementing result of user's input can receive, and generate strategy corresponding with the implementing result Execute state parameter.It executes the permission to be tested it is appreciated that the strategy execution state parameter can be used for characterizing second terminal PT1 and matches After setting tactful TS1, if having successfully completed and configured to the corresponding authority of the third party application.
It should be noted that the strategy execution state parameter be generated according to the implementing result of user feedback, thus really The process for determining strategy execution state parameter needs user to participate in.For example, after second terminal has executed authority configuration strategy to be tested, In User is popped up in respective page and confirms frame, which confirms in frame to may include " successfully configuration " and " failed configuration " two Button.When user clicks " successfully configure " button, the strategy execution state parameter that second terminal generates, can be used for characterizing this Two terminals successful execution authority configuration strategy to be tested;Conversely, when user clicks " failed configuration " button, second terminal The strategy execution state parameter of generation can be used for characterization and be not carried out success.
First net assessment parameter can be generated according to the Policy evaluation parameter that each second terminal returns respectively, and be can be used In determining whether authority configuration strategy to be tested is effective rights configuration strategy.In the present embodiment, the first net assessment parameter can be with Including overall conversion ratio, the rate that runs succeeded and it is overall can at least one of fitting percentage.
Any authority configuration strategy to be tested of second terminal is delivered to firstly, for server, server can be according to each The strategy that two terminals return respectively can suitability assess parameter, determine in each second terminal, can match with the permission to be tested Set the sum of the second terminal of strategy adaptation and the sum for the second terminal that can not be adapted to the authority configuration strategy to be tested. Furthermore it is possible to the sum for the second terminal being adapted to the authority configuration strategy to be tested with can not be suitable with the authority configuration strategy to be tested The sum of sum of second terminal matched, as server launch the sum of the second terminal of the authority configuration strategy to be tested, i.e., and Four total numbers.
Secondly, being delivered to any authority configuration strategy to be tested of second terminal for server, server can be according to each The strategy execution state parameter that two terminals return respectively determines in each second terminal, has been successfully executed the power to be tested The sum of the second terminal of configuration strategy is limited, it is in other words, successfully complete after which executes the authority configuration strategy to be tested At the sum of the second terminal configured to the corresponding authority of the third party application, i.e. the second total number.And clothes Business device can determine the sum for having executed the authority configuration strategy to be tested but having executed the second terminal to fail, i.e. the second terminal is held After the row authority configuration strategy to be tested, does not successfully complete and the corresponding authority of the third party application is configured The sum of second terminal.In addition, being successfully executed the sum of the second terminal of the authority configuration strategy to be tested and having held The row authority configuration strategy to be tested but the sum of the sum of second terminal for executing failure, to have executed authority configuration strategy to be tested Second terminal sum, i.e. third total number.
Based on this, overall conversion ratio is that the sum (the first total number) of second terminal confirms that successful execution waits for through user Test the ratio of the sum of the terminal of authority configuration strategy, the i.e. ratio of the second total number and the first total number.Run succeeded rate, is The sum of the terminal of successful execution authority configuration strategy to be tested is confirmed through user and has executed authority configuration strategy to be tested The ratio of the sum of terminal, the i.e. ratio of the second total number and third total number.Totally can fitting percentage, be and authority configuration to be tested The ratio of the sum of the sum and second terminal of the terminal of strategy adaptation, the i.e. ratio of the 4th total number and the first total number.
In one embodiment, the Policy evaluation parameter further includes executing number.Accordingly, when the Policy evaluation parameter packet When including the execution number and the strategy execution state parameter, the type of the index parameter further include run succeeded it is averagely secondary Number.
Refer to during an authority configuration it should be noted that executing number, terminal to be measured execute that it receives to Test the number of authority configuration strategy.The strategy execution state parameter sent for any second terminal in conjunction with it and execution Number can determine that the second terminal runs succeeded execution number experienced.
In addition, being delivered to any authority configuration strategy to be tested of second terminal for server, server can be according to each The strategy execution state parameter and execute number that two terminals return respectively, determine that running succeeded for the authority configuration strategy to be tested is flat Equal number.For example, server has launched authority configuration strategy TS1 to be tested to this five second terminals of second terminal PT1 to PT5, Then, second terminal PT1 to PT5 returns to the strategy execution for characterizing its successful execution authority configuration strategy to be tested State parameter.Also, the execution number returned is respectively 2,3,5,4 and 1, and server can determine the authority configuration plan to be tested accordingly The average time that runs succeeded slightly is 3 times.
In one embodiment, when the first net assessment parameter includes the index parameter of two classes or more, totally commented based on first The step of estimating parameter, carrying out validation verification to authority configuration strategy to be tested, may include steps of: totally comment based on first Estimate all kinds of index parameters that parameter includes, determines integrated decision-making parameter corresponding with authority configuration strategy to be tested;It is determined based on synthesis Plan parameter carries out validation verification to authority configuration strategy to be tested.
In the present embodiment, first net assessment parameter corresponding for any authority configuration strategy to be tested, this is first overall Assessment parameter includes the index parameter of two classes or more.In the case, can include based on the first net assessment parameter be all kinds of Index parameter determines an integrated decision-making parameter corresponding with authority configuration strategy to be tested.It is appreciated that can be by the integrated decision-making Parameter uniquely determines the validation verification result of the authority configuration strategy to be tested.
For example, the corresponding first net assessment parameter of authority configuration strategy TS1 to be tested can include overall conversion simultaneously Rate, the rate that runs succeeded and it is overall can fitting percentage, in the case, can the overall conversion ratio for including based on it, the rate that runs succeeded, And it is overall can fitting percentage determine an integrated decision-making parameter corresponding with the authority configuration strategy TS1 to be tested jointly.It is appreciated that The validation verification result of the authority configuration strategy TS1 to be tested can be uniquely determined by the integrated decision-making parameter.
In one embodiment, based on all kinds of index parameters that the first net assessment parameter includes, determination is matched with permission to be tested The step of setting tactful corresponding integrated decision-making parameter, can also include the following steps: include based on the first net assessment parameter The weighted value of all kinds of index parameters and all kinds of index parameters determines integrated decision-making ginseng corresponding with authority configuration strategy to be tested Number.
It in the present embodiment, can be corresponding based on the authority configuration strategy to be tested for any authority configuration strategy to be tested The weighted value of all kinds of index parameters included by first net assessment parameter and all kinds of index parameters, determining and power to be tested Limit the corresponding integrated decision-making parameter of configuration strategy.Wherein, weighted value can be used for characterizing its corresponding this kind of index parameter, right Determine the influence degree of the validation verification result of the authority configuration strategy to be tested.It is appreciated that weighted value can be needed based on practical It asks and is preset.
In one embodiment, it can determine that an integrated decision-making corresponding with authority configuration strategy to be tested is joined by following formula Number.It should be noted that different i values represents different authority configuration strategies to be tested, different c value generations for following formula The different classes of index parameter for including in the corresponding first net assessment parameter of table authority configuration strategy to be verified.
Wherein, RFiIntegrated decision-making parameter corresponding to the authority configuration strategy to be tested represented for i;PcThe index represented for c The weighted value of parameter;RicThe index parameter represented for the corresponding c of authority configuration strategy to be tested represented in i.
It is assumed that i represents authority configuration strategy TS1 to be tested for 1, c is 1 to 3, successively respectively represents " overall conversion ratio ", " holds Row success rate ", " totally can fitting percentage " these three types of index parameters.In the case, when c=1, Rci indicates authority configuration to be tested Tactful TS1 is corresponding " overall conversion ratio ", when c=2, RciIndicate authority configuration strategy TS1 to be tested corresponding " run succeeded rate " Deng.
In one embodiment, based on all kinds of index parameters that the first net assessment parameter includes, determination is matched with permission to be tested The corresponding integrated decision-making parameter of strategy is set, may include steps of: all kinds of indexs for including based on the first net assessment parameter The priority-level of parameter, successively judges whether all kinds of index parameters meet its corresponding first screening conditions;It is full when detecting When the index parameter of its corresponding first screening conditions of foot, which is determined as corresponding with authority configuration strategy to be tested Integrated decision-making parameter.
In the present embodiment, all kinds of index parameters that the first net assessment parameter includes all have corresponding priority-level. The priority-level can be used for characterizing its corresponding this kind of index parameter, test the validity for determining the authority configuration strategy to be tested Demonstrate,prove the influence degree of result.Also, all kinds of index parameters all have corresponding first screening conditions.
The priority-level for all kinds of index parameters that can include according to the first net assessment parameter as a result, from high-level Successively judge whether all kinds of index parameters meet its corresponding first screening conditions to low level, once there is a kind of index parameter Meet, then such index parameter is determined as integrated decision-making parameter corresponding with the authority configuration strategy to be tested.It also that is, can basis Such index parameter determines the validation verification result of the authority configuration strategy to be tested.
It illustrates, it is assumed that the corresponding first net assessment parameter of authority configuration strategy TS1 to be tested includes " overall to turn simultaneously Change rate ", " run succeeded rate ", " totally can fitting percentage ", " run succeeded average time " these four types of index parameters.Wherein, excellent First grade is from high to low successively are as follows: " overall conversion ratio ", " totally can fitting percentage ", " run succeeded rate " and " runs succeeded average Number ".Also, it is more than 80% that " overall conversion ratio " corresponding the one the first screening conditions, which may include: overall conversion ratio,.It " holds It is more than 95% that corresponding the two the first screening conditions of row success rate ", which may include: the rate of running succeeded,." totally can fitting percentage " be corresponding The the three the first screening conditions may include: it is overall can fitting percentage be more than 90%." run succeeded average time " the corresponding 4th First screening conditions may include: to run succeeded average time less than 5 times.
In the case, first judge in the first net assessment parameter, the overall conversion ratio of highest priority whether be more than 80%, if so, the authority configuration strategy TS1 to be tested can be effective rights configuration plan according to the first net assessment parameter decision Slightly.In turn, the first terminal feedback information that server records the authority configuration strategy TS1 to be tested and fed back according to second terminal Identified, each target identification information that can be matched corresponding relationship, to carry out permission fitting relation.If it is not, then Continue to judge the high totality of priority second can fitting percentage whether more than 90%, and so on, until finding, to meet its corresponding The index parameter of first screening conditions.If all kinds of index parameters that the first net assessment parameter includes be not satisfied its corresponding One screening conditions then determine that the authority configuration strategy TS1 to be tested is invalid authority configuration strategy, are eliminated.
In one embodiment, it is being based on each Policy evaluation parameter, the authority configuration strategy to be tested is being carried out effective Property verifying the step of before, i.e. before step S306, can also include the following steps: the first total number be more than first launch always When number threshold value, into each Policy evaluation parameter is based on, the step of validation verification is carried out to the authority configuration strategy to be tested Suddenly.
It should be noted that receiving the of the authority configuration strategy to be tested for any authority configuration strategy to be tested When the sum (i.e. the first total number) of two terminals is less, show that the number of the second terminal participated in is few, thus the first of its feedback Terminal feedback information can not describe the problem on the whole, and may be an other occasional case.
Therefore, in the present embodiment, need to guarantee that the sum of second terminal for receiving authority configuration strategy to be tested is more than First launches total threshold value, that is, when guaranteeing that it reaches certain magnitude, just carries out validation verification to the authority configuration strategy to be tested. In addition, the total threshold value of the first dispensing can be set based on actual conditions, the total threshold value of the first dispensing is bigger, validation verification As a result more has convincingness.
In one embodiment, it is being based on the first net assessment parameter, validation verification is carried out to authority configuration strategy to be tested The step of before, can also include the following steps: based on blacklist eliminate condition authority configuration strategy to be tested is filtered, really It is fixed not eliminate authority configuration strategy.Accordingly, it is based on the first net assessment parameter, validity is carried out to authority configuration strategy to be tested and is tested The step of card, may include steps of: based on the corresponding first net assessment parameter of authority configuration strategy is not eliminated, wait for this It tests authority configuration strategy and carries out validation verification.
It should be noted that blacklist eliminate condition may include: the first total number be more than first launch sum threshold value but Totally can fitting percentage be not up to fitting percentage threshold value.In addition, it is more than first that the superseded condition of blacklist, which also may include: third total number, It executes total threshold value but the rate that runs succeeded is not up to the rate threshold value that runs succeeded, that is, executed the second of authority configuration strategy to be tested The sum of terminal is more than the total threshold value of the first execution, but the rate that runs succeeded is not up to the rate threshold value that runs succeeded.
It is appreciated that blacklist eliminates condition can also be set based on actual demand, however it is not limited to above two reality Apply mode.In addition, fitting percentage threshold value, the total threshold value of the first execution, the rate threshold value of running succeeded can be set based on actual conditions It is fixed.
In the present embodiment, condition is eliminated based on blacklist and first eliminates the authority configuration plan to be tested that a part is unsatisfactory for demand Slightly, and then validation verification is being carried out to remaining authority configuration strategy (not eliminating authority configuration strategy) to be tested.
In one embodiment, permission fitting relation further includes pair between authority configuration strategy and the second net assessment parameter It should be related to, the second net assessment parameter includes the index parameter of one kind or more, and the type of index parameter includes overall conversion ratio, holds Row success rate and totality can fitting percentages.Accordingly, when the number of candidate policy is more than two, method further include: based on power Fitting relation is limited, determines the corresponding second net assessment parameter of each candidate policy;The second net assessment based on each candidate policy Parameter determines the adaptation authority configuration strategy of first terminal from each candidate policy.
It should be noted that the second net assessment parameter in the present embodiment and above the first net assessment in embodiment The main distinction of parameter, the two is that the corresponding object of the first net assessment parameter is authority configuration strategy to be tested, and second is total It is the authority configuration strategy recorded in permission fitting relation that body, which assesses the corresponding object of parameter,.In addition, the first net assessment parameter It is to be determined according to the first terminal feedback information of second terminal feedback, and the second net assessment parameter is in the first net assessment parameter On the basis of, update has been made according to the second terminal feedback information that subsequent first terminal is fed back.In addition to above-mentioned difference, this reality Apply the specific restriction in example to the second net assessment parameter, can with treat what verifying authorization configuration strategy was related in embodiment above The accordingly restriction of first net assessment parameter is identical.
In one embodiment, the second net assessment parameter based on each candidate policy determines the adaptation permission of first terminal The step of configuration strategy, may include steps of: based on all kinds of index parameters in each second net assessment parameter, determine with The corresponding integrated decision-making parameter of each candidate policy;Based on integrated decision-making parameter, first terminal is determined from each candidate policy Adaptation authority configuration strategy.
In the present embodiment, the second net assessment parameter corresponding for any candidate policy, the second net assessment parameter Including index parameters more than two classes.In the case, can based on all kinds of index parameters that the second net assessment parameter includes, Determine an integrated decision-making parameter corresponding with candidate policy.
Wherein, in one embodiment, based on all kinds of indexs ginseng in the corresponding second net assessment parameter of each candidate policy The step of number, determining integrated decision-making parameter corresponding with each candidate policy, can also include the following steps: based on each second The weighted value of all kinds of index parameters and all kinds of index parameters that net assessment parameter includes, it is determining to distinguish with each candidate policy Corresponding integrated decision-making parameter.
In the present embodiment, for any candidate policy, the corresponding second net assessment parameter of the candidate policy can be based on The weighted value of included all kinds of index parameters and all kinds of index parameters determines a synthesis corresponding with candidate policy Decision parameters.It is appreciated that weighted value can be preset based on actual demand.
In another embodiment, the second net assessment parameter based on each candidate policy determines the adaptation power of first terminal The step of limiting configuration strategy, can also include the following steps: all kinds of index parameters for including based on the second net assessment parameter Priority-level, successively judges whether each index parameter corresponding with current priority rank meets its corresponding second screening item Part;When detecting the index parameter for meeting its corresponding second screening conditions, by candidate policy corresponding to the index parameter It is determined as the adaptation authority configuration strategy of first terminal.
In one embodiment, in the second net assessment parameter based on each candidate policy, the is determined from each candidate policy Before the step of the adaptation authority configuration strategy of one terminal, it can also include the steps of determining that and sieve candidate policy, sieve time Selecting strategy may include the candidate policy for meeting third screening conditions.Accordingly, second based on each candidate policy is totally commented Estimate parameter, the step of the adaptation authority configuration strategy of first terminal is determined from each candidate policy, may include steps of: institute It states based on the second net assessment parameter for respectively having sieved candidate policy, determines that the adaptation of first terminal is weighed in candidate policy from respectively having sieved Limit configuration strategy.
In one embodiment, third screening conditions may include: that its corresponding 5th total number is more than the second dispensing sum Threshold value, the 5th total number are the sum for currently having received the terminal of the alternate strategies.In another embodiment, third screens item Part may include: its corresponding 5th total number be more than second launch total threshold value and its corresponding totality can fitting percentage reach suitable With rate threshold value.In another embodiment, third screening conditions may include: that its corresponding 6th total number is more than that the second execution is total Number threshold value and the rate of running succeeded reach the rate threshold value that runs succeeded, and the 6th total number is the end for currently having executed the alternate strategies The sum at end.
In one embodiment, after determining the adaptation authority configuration strategy of first terminal, i.e. after step S206, may be used also To include the following steps: to receive the second terminal feedback information passed back of first terminal;Second terminal feedback information includes the first mesh Mark identification information, and the corresponding Policy evaluation parameter of adaptation authority configuration strategy;Policy evaluation parameter includes that strategy can suitability Assess at least one of parameter and strategy execution state parameter.Then, based on the Policy evaluation in second terminal feedback information Parameter, renewal authority fitting relation.
In the present embodiment, first end can be collected after the adaptation authority configuration strategy for determining first terminal each time Hold the second terminal feedback information returned.Subsequent, server can be according to the second terminal feedback information that each first terminal is fed back more The permission fitting relation of new demand servicing device maintenance, with dynamic renewal authority fitting relation, to guarantee the timeliness of permission fitting relation Property and accuracy.
Specifically, the second terminal feedback information that can be returned according to first terminal, renewal authority fitting relation record each Second net assessment parameter corresponding to authority configuration strategy.In addition, the second terminal feedback information in the present embodiment refers to The terminal feedback information of one terminal, the specific restriction in the present embodiment to terminal feedback information, can in embodiment above to end Hold the restriction of feedback information identical.
In one embodiment, as shown in fig. 6, providing a kind of authority configuring method.It is applied in above-mentioned Fig. 1 in this way Terminal 110 for be illustrated.This method may include steps of S602 to S608.
S602, receives the authority configuration strategy that server is sent, which is that server is adapted to based on permission Relationship determines.S604 carries out authority configuration based on authority configuration strategy, and based on configuration result determination and authority configuration strategy pair The Policy evaluation parameter answered.S606, obtains terminal feedback information, and terminal feedback information carries the target identification information of locating terminal With Policy evaluation parameter corresponding with authority configuration strategy.The terminal feedback information of acquisition is sent to server by S608.
In practical applications, server defines the competence after configuration strategy, can also be sent to the authority configuration strategy pair The terminal answered.After terminal receives the authority configuration strategy, authority configuration is on the one hand carried out according to authority configuration strategy, thus real Now the corresponding authority of specified third party application is configured.On the other hand, terminal is also based on configuration result and determines Policy evaluation parameter corresponding with authority configuration strategy, and then generate the terminal for carrying target identification information and Policy evaluation parameter Feedback information, then terminal feedback information is fed back into server, it enables the server to suitable to permission according to terminal feedback information It is updated with relationship.
It should be noted that permission fitting relation, Policy evaluation parameter, terminal feedback information, target in the present embodiment The specific restriction of identification information, can in embodiment above to permission fitting relation, Policy evaluation parameter, terminal feedback letter Breath, target identification information are identical.
In one embodiment, the authority configuration strategy that server is sent may include guidance information, which can wrap Include route guidance information.In one specific example, for the authority configuration for needing user to authorize, as shown in fig. 7, the Route guiding Information may be used to indicate first terminal and carry out page jump, to guide the corresponding permission of user setting.In addition, another specifically show In example, in addition to route guidance information, authority configuration strategy also may include operation prompt information, which can be used for Instruction first terminal shows the prompt elements for prompting correct operation mode of the user on current page.For example, can be Bullet frame element on the page shown in display diagram 7 may include at least one in text, image and animation etc. in the bullet frame element It is a.In another specific example, for the authority configuration without user's authorization, terminal obtains the authority configuration strategy that server is sent Afterwards, automatically the corresponding authority of the third party application can be configured, in configuration process, interface that terminal is shown It can be as shown in Figure 8.
In one embodiment, the data mode of authority configuration strategy can be configuration file or script file.
In one embodiment, as shown in figure 9, providing a kind of determination method of authority configuration strategy.This method can relate to And it establishes the permission fitting relation stage and formally determines the stage of adaptation strategies for user undetermined.Wherein, permission adaptation is established to close It is to be related to step S90a the stage, which may include following steps S90a1 to step S90a6.It is formally determined for user undetermined suitable Stage with strategy is related to step S90b, which may include following S90b1 to step S90b6.
S90a1, server determine that reference identification information, reference identification information include corresponding with authority configuration strategy to be tested The basic identification information of third terminal, basic identification information include manufacturer's information, model information, in operating system version information It is at least one.S90a2, server determine that second terminal, second terminal include its basic identification information and reference identification information phase Matched terminal.S90a3, to each second terminal, (second terminal 1 to N) sends authority configuration strategy to be tested to server.S90a4, Second terminal passes first terminal feedback information back to server;First terminal feedback information includes the third target mark of second terminal Know information and Policy evaluation parameter corresponding with authority configuration strategy to be tested;S90a5, server are based on each Policy evaluation parameter, Whether effective verify authority configuration strategy to be tested;If effectively, go to step S90a6.S90a6, it is logical that server is based on verifying The authority configuration strategy to be tested and its corresponding third target identification information crossed, define the competence fitting relation, the second target identification Information includes: the corresponding third target identification information of authority configuration strategy to be tested being verified.
S90b1, first terminal send its first object identification information to server, and first object identification information includes first At least one of the device-fingerprint information of terminal and rights management program identification information.S90b2, server are adapted to based on permission Relationship determines candidate policy;Permission fitting relation includes the corresponding pass between the second target identification information and authority configuration strategy System, candidate policy include authority configuration strategy corresponding to the second target identification information with first object identification information match. S90b3, server are based on candidate policy, determine the adaptation authority configuration strategy of first terminal.S90b4, server weigh adaptation Limit configuration strategy is sent to first terminal.S90b5, first terminal carry out authority configuration, pass second terminal feedback back to server Information;Second terminal feedback information includes first object identification information and the corresponding Policy evaluation ginseng of adaptation authority configuration strategy Number, Policy evaluation parameter include that strategy can suitability assessment at least one of parameter and strategy execution state parameter.S90b6, Server is closed based on the first object identification information and Policy evaluation parameter in second terminal feedback information, renewal authority adaptation System.
It should be noted that the technical characteristic of each step in the present embodiment can step corresponding with each embodiment above Rapid technical characteristic is identical, is not added and repeats herein.
Although it should be understood that each step in the flow chart that each embodiment is related to above according to arrow instruction according to Secondary display, but these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless having herein explicitly Bright, there is no stringent sequences to limit for the execution of these steps, these steps can execute in other order.Moreover, above At least part step in the flow chart that each embodiment is related to may include multiple sub-steps or multiple stages, these sub-steps The rapid or stage is not necessarily to execute completion in synchronization, but can execute at different times, these sub-steps or The execution sequence in person's stage is also not necessarily and successively carries out, but can with the sub-step of other steps or other steps or At least part in stage executes in turn or alternately.
It is produced it should be noted that Figure 10 is shown using the software of the determination method of authority configuration strategy provided by the present application Product, into online 7 day period afterwards, totality can according to determined by the terminal feedback information of user feedback within 6 days before line on it The change curve of fitting percentage, according to the curve it is found that the determination method of authority configuration strategy provided by the present application can be effectively Improving totally can fitting percentage.In addition, Figure 11 shows before line on the product 6 days into 7 day period after online, nothing is received The variation column diagram for imitating the number of users of authority configuration strategy, is also learnt by the column diagram, receives invalid authority configuration strategy Number of users gradually decrease, the determination method for showing authority configuration strategy provided by the present application more can be determined accurately The adaptation authority configuration strategy of terminal.
In one embodiment, as shown in figure 12, a kind of determining device 1200 of authority configuration strategy is provided.The device 1200 may include following module 1202 to 1206.
First object identifier acquisition module 1202, for obtaining the first object identification information of first terminal, described first Target identification information includes at least one of device-fingerprint information and rights management program identification information of the first terminal. Candidate policy determining module 1204 determines candidate policy for being based on permission fitting relation;The permission fitting relation includes the Corresponding relationship between two target identification informations and authority configuration strategy, the candidate policy include identifying with the first object Authority configuration strategy corresponding to second target identification information of information matches.Adaptation strategies determining module 1206, for being based on The candidate policy determines the adaptation authority configuration strategy of the first terminal.
The determining device 1200 of above-mentioned authority configuration strategy, server obtain the device-fingerprint information and rights management of terminal At least one of program identification information determines the adaptation authority configuration strategy of terminal further according to permission fitting relation.One side Face, it is identical to basic identification information (such as manufacturer's information and operating system version information), but device-fingerprint information and/or permission pipe Manage the different terminal of program, the authority configuration strategy of actual fit may not be identical, thus according to device-fingerprint information and/ Or rights management program identification information, more fine-grained differentiation can be made to terminal, to more targetedly determine for terminal It is adapted to authority configuration strategy.On the other hand, permission fitting relation is safeguarded by server, is closed convenient for more fully covering various adaptations System, and dynamic update is carried out to fitting relation in time.Accordingly, scheme provided by the present application can effectively improve and actually may be used Fitting percentage.
In one embodiment, device 1200 can also include following module: strategy sending module to be tested, for whole to second End sends authority configuration strategy to be tested.First feedback information receiving module, the first terminal passed back for receiving each second terminal Feedback information;First terminal feedback information include second terminal third target identification information and with authority configuration strategy to be tested Corresponding Policy evaluation parameter.Validation verification module, for be based on each Policy evaluation parameter, to authority configuration strategy to be tested into Row validation verification.Permission fitting relation determining module, for based on the authority configuration strategy to be tested and its correspondence being verified Third target identification information, define the competence fitting relation, and the second target identification information includes: that the permission to be tested being verified is matched Set the corresponding third target identification information of strategy.
In one embodiment, device 1200 can also include following module: reference identification obtains module, for obtaining reference Identification information, reference identification information include the basic identification information of third terminal corresponding with authority configuration strategy to be tested, basis Identification information includes at least one of manufacturer's information, model information, operating system version information.Terminal deciding module to be measured, For determining second terminal;Second terminal includes its basic identification information and the terminal that reference identification information matches.
In one embodiment, Policy evaluation parameter include strategy can suitability assessment parameter and strategy execution state parameter in At least one.Accordingly, validation verification module may include such as lower unit: the first net assessment parameter determination unit is used for Based on each Policy evaluation parameter, the corresponding first net assessment parameter of configuration strategy to be verified is determined;First net assessment parameter Including index parameter more than one kind, the type of index parameter includes overall conversion ratio, the rate that runs succeeded and can totally be adapted to Rate.Validation verification unit carries out validation verification to authority configuration strategy to be tested for being based on the first net assessment parameter. Wherein, overall conversion ratio is determined based on the first total number and the second total number, and the rate that runs succeeded is based on the second total number and third Total number determine, totally can fitting percentage be based on the first total number and the 4th total number determination;First total number is second terminal Sum, the second total number are the sum that the second terminal of successful execution authority configuration strategy to be tested is confirmed through user, and third is total Number is the sum for having executed the second terminal of authority configuration strategy to be tested, and the 4th total number is and authority configuration strategy to be tested The sum of the second terminal of adaptation;Second total number and third total number determine that the 4th is total based on each strategy execution state parameter Number can suitability assessment parameter determination based on each strategy.
In one embodiment, Policy evaluation parameter further includes executing number.Accordingly, when Policy evaluation parameter includes execution time When several and strategy execution state parameter, the type of index parameter further includes the average time that runs succeeded.
In one embodiment, when the first net assessment parameter includes the index parameter of two classes or more, validation verification unit May include following subelement: decision parameters determine subelement, all kinds of indexs for including based on the first net assessment parameter Parameter determines integrated decision-making parameter corresponding with authority configuration strategy to be tested.Validation verification subelement is joined based on integrated decision-making Number carries out validation verification to authority configuration strategy to be tested.
In one embodiment, decision parameters determine all kinds of indexs of the subelement for including based on the first net assessment parameter The weighted value of parameter and all kinds of index parameters determines integrated decision-making parameter corresponding with authority configuration strategy to be tested.
In one embodiment, decision parameters determine all kinds of indexs of the subelement for including based on the first net assessment parameter The priority-level of parameter, successively judges whether all kinds of index parameters meet its corresponding screening conditions.And it is full when detecting When the index parameter of its corresponding screening conditions of foot, which is determined as synthesis corresponding with authority configuration strategy to be tested Decision parameters.
In one embodiment, device 1200 can also include following module: the second feedback information receiving module, for receiving The second terminal feedback information that first terminal is passed back;Second terminal feedback information includes first object identification information and adaptation power The corresponding Policy evaluation parameter of configuration strategy is limited, Policy evaluation parameter includes that strategy can suitability assessment parameter and strategy execution shape At least one of state parameter;Permission fitting relation update module, for based on the Policy evaluation in second terminal feedback information Parameter, renewal authority fitting relation.
In one embodiment, permission fitting relation further includes pair between authority configuration strategy and the second net assessment parameter It should be related to, the second net assessment parameter includes the index parameter of one kind or more, and the type of index parameter includes overall conversion ratio, holds Row success rate and totality can fitting percentages;Accordingly, when the number of candidate policy is more than two, adaptation strategies determining module is also May include such as lower unit: the second net assessment parameter determination unit determines each candidate policy for being based on permission fitting relation Corresponding second net assessment parameter;Adaptation strategies determination unit, for the second net assessment parameter based on each candidate policy, The adaptation authority configuration strategy of first terminal is determined from each candidate policy.
The specific restriction of determining device 1200 about authority configuration strategy may refer to hereinbefore for authority configuration plan The restriction of determination method slightly, details are not described herein.Modules in above-mentioned apparatus can be fully or partially through software, hardware And combinations thereof realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, It can be stored in a software form in the memory in computer equipment, execute the above modules pair in order to which processor calls The operation answered.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored with meter in memory Calculation machine program, the processor realize the determination for the authority configuration strategy that the application any embodiment provides when executing computer program The step of method.
In one embodiment, a kind of computer equipment is provided, which can be server shown in Fig. 1 120, internal structure chart can be as shown in figure 13.The computer equipment includes the processor connected by system bus, storage Device, network interface and database.Wherein, the processor is for providing calculating and control ability.The memory includes non-volatile Storage medium and built-in storage, the non-volatile memory medium are stored with operating system, computer program and database, the memory Reservoir provides environment for the operation of operating system and computer program in non-volatile memory medium.The database is for storing Target identification information and its corresponding adaptation authority configuration strategy.The network interface is used to pass through network connection with external terminal Communication.A kind of determination method of authority configuration strategy is realized when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 13, only with the application policy-related (noun) part The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to the application strategy, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, the determining device of authority configuration strategy provided by the present application can be implemented as a kind of computer journey The form of sequence, computer program can be run in computer equipment as shown in fig. 13 that.It can be deposited in the memory of computer equipment Storage forms each program module of the determining device of the authority configuration strategy, for example, the mark of first object shown in Figure 12 obtains Module 1202, candidate policy determining module 1204 and adaptation strategies determining module 1206.The computer that each program module is constituted In the determination method for the authority configuration strategy that program makes processor execute each embodiment of the application described in this specification The step of.For example, computer equipment shown in Figure 13 can pass through the determining device of authority configuration strategy as shown in figure 12 First object identifier acquisition module 1202 in 1200 executes step S202, executes step by candidate policy determining module 1204 S204, step S206 etc. is executed by adaptation strategies determining module 1206.
In another embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor realize the step for the authority configuring method that the application any embodiment provides when executing computer program Suddenly.
In one embodiment, a kind of computer equipment is provided, which can be terminal shown in Fig. 1 110, internal structure chart can be as shown in figure 14.The computer equipment includes the processor connected by system bus, storage Device, network interface, display screen and input unit.Wherein, the processor is for providing calculating and control ability.The memory includes Non-volatile memory medium and built-in storage, the non-volatile memory medium are stored with operating system and computer program, this is interior Memory provides environment for the operation of operating system and computer program in non-volatile memory medium, the computer program quilt To realize a kind of authority configuring method method when processor executes.The network interface is used to pass through network connection with external terminal Communication.The display screen can be liquid crystal display or electric ink display screen.The input unit of the computer equipment can be The touch layer covered on display screen is also possible to the key configured on computer equipment shell, trace ball or Trackpad, can be with It is external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Figure 14, only with the application policy-related (noun) part The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to the application strategy, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a non-volatile computer and can be read In storage medium, which may include the process such as the embodiment of above-mentioned each method when being executed.Wherein, the application is mentioned Any reference used in each embodiment supplied to memory, storage, database or other media may each comprise non-easy The property lost and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include depositing at random Access to memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as quiet State RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Accordingly, in one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, The determination method for the authority configuration strategy that the application any embodiment provides is realized when computer program is executed by processor.
Accordingly, in one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, The authority configuring method that the application any embodiment provides is realized when computer program is executed by processor.
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously The limitation to the application the scope of the patents therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art For, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (15)

1. a kind of determination method of authority configuration strategy characterized by comprising
The first object identification information of first terminal is obtained, the first object identification information includes the equipment of the first terminal At least one of finger print information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation includes the second target identification information and permission Corresponding relationship between configuration strategy, the candidate policy include the second target mark with the first object identification information match Know authority configuration strategy corresponding to information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
2. the method according to claim 1, wherein the method for determination of the permission fitting relation, comprising:
Authority configuration strategy to be tested is sent to second terminal;
Receive the first terminal feedback information that each second terminal is passed back;The first terminal feedback information includes described second The third target identification information of terminal and Policy evaluation parameter corresponding with the authority configuration strategy to be tested;
Based on each Policy evaluation parameter, validation verification is carried out to the authority configuration strategy to be tested;
Based on the authority configuration strategy to be tested being verified and its corresponding third target identification information, the power is determined Fitting relation is limited, second target identification information includes: that the authority configuration strategy to be tested that is verified is corresponding described Third target identification information.
3. according to the method described in claim 2, it is characterized in that, to second terminal send authority configuration strategy to be tested it Before, further includes:
Determine reference identification information, the reference identification information includes third terminal corresponding with the authority configuration strategy to be tested Basic identification information, the basis identification information include manufacturer's information, model information, in operating system version information at least It is a kind of;
Determine second terminal;The second terminal includes its basic identification information and the end that the reference identification information matches End.
4. according to the method described in claim 2, it is characterized in that, the Policy evaluation parameter includes that strategy can suitability assessment At least one of parameter and strategy execution state parameter;
It is described to be based on each Policy evaluation parameter, validation verification is carried out to the authority configuration strategy to be tested, comprising:
Based on each Policy evaluation parameter, the corresponding first net assessment parameter of the configuration strategy to be verified is determined;It is described First net assessment parameter includes the index parameter of one kind or more, and the type of the index parameter includes overall conversion ratio, executes Success rate and totality can fitting percentages;
Based on the first net assessment parameter, validation verification is carried out to the authority configuration strategy to be tested;
Wherein, the overall conversion ratio is determined based on the first total number and the second total number, and the rate that runs succeeded is based on described Second total number and third total number determine, the totality can fitting percentage be based on first total number and the 4th total number is true It is fixed;
First total number is the sum of the second terminal, and second total number is to confirm successful execution institute through user The sum of the second terminal of authority configuration strategy to be tested is stated, the third total number is to have executed the permission to be tested to match The sum of the second terminal of strategy is set, the 4th total number is described the be adapted to the authority configuration strategy to be tested The sum of two terminals;
Second total number and the third total number determine that the described 4th is total based on each strategy execution state parameter Mesh can suitability assessment parameter determination based on each strategy.
5. according to the method described in claim 4, it is characterized in that, the Policy evaluation parameter further includes executing number;
When the Policy evaluation parameter includes the execution number and the strategy execution state parameter, the index parameter Type further includes the average time that runs succeeded.
6. method according to claim 4 or 5, which is characterized in that the first net assessment parameter includes two classes or more Index parameter when, it is described to be based on the first net assessment parameter, validity is carried out to the authority configuration strategy to be tested and is tested Card, comprising:
Based on all kinds of index parameters that the first net assessment parameter includes, determination is corresponding with the authority configuration strategy to be tested Integrated decision-making parameter;
Based on the integrated decision-making parameter, validation verification is carried out to the authority configuration strategy to be tested.
7. according to the method described in claim 6, it is characterized in that, it is described based on the first net assessment parameter include it is each Class index parameter, determining integrated decision-making parameter corresponding with the authority configuration strategy to be tested, comprising:
The weighted value of all kinds of index parameters and all kinds of index parameters that include based on the first net assessment parameter determines Integrated decision-making parameter corresponding with the authority configuration strategy to be tested.
8. according to the method described in claim 6, it is characterized in that, it is described based on the first net assessment parameter include it is each Class index parameter, determining integrated decision-making parameter corresponding with the authority configuration strategy to be tested, comprising:
Priority-level based on all kinds of index parameters that the first net assessment parameter includes successively judges all kinds of index ginsengs Whether number meets its corresponding screening conditions;
When detecting the index parameter for meeting its corresponding screening conditions, by the index parameter be determined as with it is described to be tested The corresponding integrated decision-making parameter of authority configuration strategy.
9. the method according to claim 1, wherein in the adaptation authority configuration of the determination first terminal After strategy, further includes:
Receive the second terminal feedback information that the first terminal is passed back;The second terminal feedback information includes first mesh Identification information and the corresponding Policy evaluation parameter of the adaptation authority configuration strategy are marked, the Policy evaluation parameter includes strategy It can suitability assessment at least one of parameter and strategy execution state parameter;
Based on the first object identification information and Policy evaluation parameter in the second terminal feedback information, it is suitable to update the permission With relationship.
10. the method according to claim 1, wherein the permission fitting relation further includes authority configuration strategy With the corresponding relationship between the second net assessment parameter, the second net assessment parameter includes the index parameter of one kind or more, The type of the index parameter includes overall conversion ratio, the rate that runs succeeded and totality can fitting percentage;
When the number of the candidate policy is more than two, the method also includes:
Based on the permission fitting relation, the corresponding second net assessment parameter of each candidate policy is determined;
The second net assessment parameter based on each candidate policy determines the first terminal from each candidate policy It is adapted to authority configuration strategy.
11. a kind of determining device of authority configuration strategy, which is characterized in that described device includes:
First object identifier acquisition module, for obtaining the first object identification information of first terminal, the first object mark Information includes at least one of device-fingerprint information and rights management program identification information of the first terminal;
Candidate policy determining module determines candidate policy for being based on permission fitting relation;The permission fitting relation includes the Corresponding relationship between two target identification informations and authority configuration strategy, the candidate policy include identifying with the first object Authority configuration strategy corresponding to second target identification information of information matches;
Adaptation strategies determining module determines the adaptation authority configuration strategy of the first terminal for being based on the candidate policy.
12. device according to claim 11, which is characterized in that further include:
Strategy sending module to be tested, for sending authority configuration strategy to be tested to second terminal;
First feedback information receiving module, the first terminal feedback information passed back for receiving each second terminal;First terminal is anti- Feedforward information include second terminal third target identification information and Policy evaluation parameter corresponding with authority configuration strategy to be tested;
Validation verification module carries out validation verification to authority configuration strategy to be tested for being based on each Policy evaluation parameter;
Permission fitting relation determining module, for based on the authority configuration strategy to be tested and its corresponding third mesh being verified Identification information is marked, define the competence fitting relation;Second target identification information includes: the authority configuration strategy pair to be tested being verified The third target identification information answered.
13. device according to claim 12, which is characterized in that further include:
Reference identification obtains module, and for obtaining reference identification information, reference identification information includes and authority configuration strategy to be tested The basic identification information of corresponding third terminal, basic identification information include manufacturer's information, model information, operating system version letter At least one of breath;
Terminal deciding module to be measured, for determining second terminal;Second terminal includes that its basic identification information and reference identification are believed The matched terminal of manner of breathing.
14. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the computer program is located The step of reason device realizes method described in any one of claims 1 to 10 when executing.
15. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 10 the method when executing the computer program.
CN201810354753.0A 2018-04-19 2018-04-19 Method and device for determining permission configuration policy Active CN110390205B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810354753.0A CN110390205B (en) 2018-04-19 2018-04-19 Method and device for determining permission configuration policy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810354753.0A CN110390205B (en) 2018-04-19 2018-04-19 Method and device for determining permission configuration policy

Publications (2)

Publication Number Publication Date
CN110390205A true CN110390205A (en) 2019-10-29
CN110390205B CN110390205B (en) 2023-05-23

Family

ID=68284054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810354753.0A Active CN110390205B (en) 2018-04-19 2018-04-19 Method and device for determining permission configuration policy

Country Status (1)

Country Link
CN (1) CN110390205B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111079125A (en) * 2019-12-23 2020-04-28 飞天诚信科技股份有限公司 Method and device for calling third-party library dynamic lifting authority by application program

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101571897A (en) * 2009-06-04 2009-11-04 浙江大学 Method for controlling access permission of massive objects in computer system
CN103500300A (en) * 2013-10-15 2014-01-08 北京国双科技有限公司 User right verification method and device
CN103546436A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Security control method, terminal, and cloud server
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management
US20150200971A1 (en) * 2012-09-26 2015-07-16 Kabushiki Kaisha Toshiba Policy management system, id provider system, and policy evaluation device
CN107465687A (en) * 2017-08-31 2017-12-12 深圳英飞拓科技股份有限公司 A kind of implementation method of authority configuration, device and terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101571897A (en) * 2009-06-04 2009-11-04 浙江大学 Method for controlling access permission of massive objects in computer system
CN103546436A (en) * 2012-07-13 2014-01-29 中兴通讯股份有限公司 Security control method, terminal, and cloud server
US20150200971A1 (en) * 2012-09-26 2015-07-16 Kabushiki Kaisha Toshiba Policy management system, id provider system, and policy evaluation device
CN103500300A (en) * 2013-10-15 2014-01-08 北京国双科技有限公司 User right verification method and device
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management
CN107465687A (en) * 2017-08-31 2017-12-12 深圳英飞拓科技股份有限公司 A kind of implementation method of authority configuration, device and terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111079125A (en) * 2019-12-23 2020-04-28 飞天诚信科技股份有限公司 Method and device for calling third-party library dynamic lifting authority by application program

Also Published As

Publication number Publication date
CN110390205B (en) 2023-05-23

Similar Documents

Publication Publication Date Title
CN107894952A (en) Generation method, device, equipment and the readable storage medium storing program for executing of interface testing use-case
CN103886246B (en) The method and apparatus for supporting the dynamic that authentication device guides safely to change
CN109240838A (en) Interface call method, device, computer equipment and storage medium
CN104376266B (en) The determination method and device of application software level of security
US9235840B2 (en) Electronic transaction notification system and method
CN109063952B (en) Policy generation and risk control method and device
CN109509021A (en) Abnormality recognition method, device, server and the storage medium of Behavior-based control track
CN109272381A (en) Business recommended method, apparatus, electronic equipment and readable storage medium storing program for executing
CN107908485A (en) Interface parameters transmission method, device, equipment and computer-readable recording medium
CN110224855A (en) Register method, device, computer equipment and the storage medium of micro services example
CN108459964A (en) Test cases selection method, apparatus, equipment and computer readable storage medium
CN109726105A (en) Test data building method, device, equipment and storage medium
CN110363026A (en) File operation method, device, equipment, system and computer readable storage medium
CN109829277A (en) Terminal unlock method, device, computer equipment and storage medium
CN108845808A (en) Middleware installation method, device, computer equipment and storage medium
CN109669859A (en) Service test method, device, computer equipment and storage medium
CN107908556A (en) Interface test method, device, equipment and computer-readable recording medium
CN109245928A (en) Setting method and device, the terminal management system of configuration information
CN110177378A (en) A kind of automated testing method and relevant device
CN110362967A (en) The anti-tamper detection method of application program, device, terminal device and storage medium
CN109284198A (en) A kind of method and apparatus verifying data
CN110309099A (en) Interface managerial method, device, equipment and computer readable storage medium
CN109144487A (en) Into part business development method, apparatus, computer equipment and storage medium
CN110119354A (en) Method for testing software, device and electronic equipment based on Test cases technology
CN109582668A (en) Service data management method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant