CN110390205A - The determination method and apparatus of authority configuration strategy - Google Patents
The determination method and apparatus of authority configuration strategy Download PDFInfo
- Publication number
- CN110390205A CN110390205A CN201810354753.0A CN201810354753A CN110390205A CN 110390205 A CN110390205 A CN 110390205A CN 201810354753 A CN201810354753 A CN 201810354753A CN 110390205 A CN110390205 A CN 110390205A
- Authority
- CN
- China
- Prior art keywords
- terminal
- authority configuration
- configuration strategy
- identification information
- parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of determination methods of authority configuration strategy, comprising: obtains the first object identification information of first terminal, the first object identification information includes at least one of device-fingerprint information and rights management program identification information of the first terminal;Based on permission fitting relation, candidate policy is determined;The permission fitting relation includes the corresponding relationship between the second target identification information and authority configuration strategy, and the candidate policy includes and authority configuration strategy corresponding to the second target identification information of the first object identification information match;Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.Scheme provided by the present application can effectively improve actually can fitting percentage.
Description
Technical field
This application involves field of computer technology, determination method, apparatus, meter more particularly to a kind of authority configuration strategy
Calculation machine readable storage medium storing program for executing and computer equipment.
Background technique
With the development of computer technology, each Terminal Type is developed and be installed to more and more third party applications,
Such as in smart phone, tablet computer, so that people's lives be made to become more to enrich and fast.
For third party application, missing specified permission may cause it and be unable to operate normally, such as missing is certainly
Starting permission, which will lead to its process, to survive, and missing camera permission will lead to its function of being related to Image Acquisition can not be real
It is existing.In view of this, it is thus necessary to determine that the adaptation authority configuration strategy of terminal is enabled the terminal to the corresponding of third party application
Permission is configured.
In conventional method, preset authority configuration strategy in the third party application installed at the terminal is answered by third party
With program from its preset each authority configuration strategy, basic identification information (such as manufacturer's information and operation with the terminal are searched
System version information) the authority configuration strategy that matches, the adaptation authority configuration strategy of the terminal is determined with this.However, in reality
In the situation of border, determining adaptation authority configuration strategy by this way, it tends to be difficult to terminal adaptation, i.e., actually can suitability it is low
Under.
Summary of the invention
Based on this, it is necessary to for traditional approach determine authority configuration strategy reality can the low technology of suitability ask
Topic, provides determination method, apparatus, computer readable storage medium and the computer equipment of a kind of authority configuration strategy.
A kind of determination method of authority configuration strategy, comprising:
The first object identification information of first terminal is obtained, the first object identification information includes the first terminal
At least one of device-fingerprint information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation include the second target identification information and
Corresponding relationship between authority configuration strategy, the candidate policy include the second mesh with the first object identification information match
Mark authority configuration strategy corresponding to identification information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
A kind of determining device of authority configuration strategy, comprising:
First object identifier acquisition module, for obtaining the first object identification information of first terminal, the first object
Identification information includes at least one of device-fingerprint information and rights management program identification information of the first terminal;
Candidate policy determining module determines candidate policy for being based on permission fitting relation;The permission fitting relation packet
The corresponding relationship between the second target identification information and authority configuration strategy is included, the candidate policy includes and the first object
Authority configuration strategy corresponding to second target identification information of identification information match;
Adaptation strategies determining module determines the adaptation authority configuration of the first terminal for being based on the candidate policy
Strategy.
A kind of computer readable storage medium is stored with computer program, when the computer program is executed by processor
It performs the steps of
The first object identification information of first terminal is obtained, the first object identification information includes the first terminal
At least one of device-fingerprint information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation include the second target identification information and
Corresponding relationship between authority configuration strategy, the candidate policy include the second mesh with the first object identification information match
Mark authority configuration strategy corresponding to identification information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device performs the steps of when executing the computer program
The first object identification information of first terminal is obtained, the first object identification information includes the first terminal
At least one of device-fingerprint information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation include the second target identification information and
Corresponding relationship between authority configuration strategy, the candidate policy include the second mesh with the first object identification information match
Mark authority configuration strategy corresponding to identification information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
Determination method, apparatus, storage medium and the computer equipment of above-mentioned authority configuration strategy, server obtain terminal
At least one of device-fingerprint information and rights management program identification information determine terminal further according to permission fitting relation
It is adapted to authority configuration strategy.On the one hand, identical for basic identification information (such as manufacturer's information and operating system version information), but
Device-fingerprint information and/or the different terminal of rights management program, the authority configuration strategy of actual fit may not be identical,
Thus according to device-fingerprint information and/or rights management program identification information, more fine-grained differentiation can be made to terminal, from
And adaptation authority configuration strategy more targetedly is determined for terminal.On the other hand, permission fitting relation is safeguarded by server, just
Dynamic update is carried out to fitting relation in more fully covering various fitting relations, and in time.Accordingly, provided by the present application
Scheme can effectively improve actually can fitting percentage.
Detailed description of the invention
Fig. 1 is the applied environment figure of the determination method of authority configuration strategy in one embodiment;
Fig. 2 is the flow diagram of the determination method of authority configuration strategy in one embodiment;
Fig. 3 is the schematic diagram of the Relationship Between Size of terminal identification information in one embodiment;
Fig. 4 be one embodiment in define the competence fitting relation method flow diagram;
Fig. 5 is the schematic illustration of the determination method of authority configuration strategy in one embodiment;
Fig. 6 is the flow diagram of authority configuring method in one embodiment;
Fig. 7 is the interface schematic diagram that guidance user carries out authority configuration in one embodiment;
Fig. 8 is the interface schematic diagram that a key realizes authority configuration in one embodiment;
Fig. 9 is the interaction schematic diagram of the determination system of authority configuration strategy in one embodiment;
Figure 10 be in one embodiment it is overall can fitting percentage variation schematic diagram;
Figure 11 is the variation schematic diagram of failure number of users in one embodiment;
Figure 12 is the structural block diagram of the determining device of authority configuration strategy in one embodiment;
The structural block diagram of computer equipment in Figure 13 one embodiment;
The structural block diagram of computer equipment in Figure 14 one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the purpose, technical tactic and advantage of the application is more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and
It is not used in restriction the application.
It should be noted that term " first " used in this application, " second " etc. are for making to similar object
Differentiation in name, but these objects itself should not be limited by these terms.It should be appreciated that in the feelings for not departing from scope of the present application
Under condition, these terms can be interchanged in appropriate circumstances.For example, " the first total number " can be described as " the second total number ",
And similarly, " the second total number " is described as " the first total number ".
In addition, the terms "include", "comprise", " having " and their any deformation, it is intended that cover non-exclusive
Include.For example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to clearly arrange
Out the step of or unit, but be not clearly listed or these process, methods, product or equipment are consolidated
The other step or units having.Also, term as used herein "and/or" includes one or more relevant listed items
Any and all combinations.
The determination method of authority configuration strategy provided by the present application, can be applied in application environment as shown in Figure 1.This is answered
It can be related to terminal 110 and server 120 with environment, terminal 110 and server 120 pass through network connection.Wherein, in terminal 110
The mountable third party application, server 120 can be used for determining the adaptation authority configuration strategy of terminal 110, adaptation power
Limit configuration strategy may be used to indicate terminal 110 and configure to the corresponding authority of the third party application.
Specifically, its target identification information can be sent to server 120 by terminal 110.Wherein, target identification information can be with
At least one of device-fingerprint information and rights management program identification information including terminal 110.
Correspondingly, server 120 can be closed based on the target identification information and permission adaptation that the terminal 110 received is sent
It is to determine candidate policy.Wherein, permission fitting relation includes the corresponding relationship of target identification information Yu authority configuration strategy, candidate
Strategy includes: permission corresponding to the matched target identification information of target identification information in permission fitting relation, with terminal 110
Configuration strategy.In turn, server 120 can determine the adaptation authority configuration strategy of terminal 110 based on candidate policy.
In addition, the adaptation authority configuration strategy can also be sent to terminal 110 by server so that terminal 110 to this with
The corresponding authority of the corresponding third party application of permission adaptation strategies is configured.
Wherein, terminal 110 can be terminal console or mobile terminal, and mobile terminal may include mobile phone, tablet computer, pen
Remember at least one of this computer, personal digital assistant and wearable device etc..Server 120 can use independent physical services
Server cluster that device or multiple physical servers are constituted is realized.
In one embodiment, as shown in Fig. 2, providing a kind of determination method of authority configuration strategy.It applies in this way
It is illustrated for server 120 in above-mentioned Fig. 1.This method may include steps of S202 to S206.
S202, obtains the first object identification information of first terminal, and first object identification information includes setting for first terminal
Standby at least one of finger print information and rights management program identification information.
First terminal refers to the terminal for needing that adaptation authority configuration strategy is determined for it.Authority configuration strategy can be used for referring to
Show that terminal configures the corresponding authority of specified third party application.Correspondingly, adaptation authority configuration strategy refers to and end
The authority configuration strategy of adaptation is held, i.e. terminal can be adapted to authority configuration strategy successfully to specified third-party application journey according to it
The corresponding authority of sequence is configured.
In one embodiment, authority configuration strategy may include route guidance information, which may be used to indicate
First terminal carries out page jump, to guide the corresponding permission of user setting.In another embodiment, except route guidance information with
Outside, authority configuration strategy also may include operation prompt information, which may be used to indicate first terminal and show accordingly
Operation indicating message, so that user be made to understand to the correct operation mode of current page.In addition, the data of authority configuration strategy
Form can be configuration file or script file.
In one embodiment, server can be in the permission for receiving the transmission of terminal locating for client (third party application)
When configuration strategy determines request, judgement needs to determine adaptation authorization policy for the terminal, which is first terminal.It illustrates
It is bright, the client of " Tencent house keeper " is installed on terminal P1, when " Tencent house keeper " needs to obtain " reading phone directory " this permission,
" Tencent house keeper " can determine to 1 sending permission strategy of server S and request.In the case, terminal P1 can be first terminal.This
Outside, server S 1 can be the server of realization " Tencent house keeper ".
Target identification information refers to the information that can be used for characterizing the configuring condition of its corresponding terminal.Wherein, configuring condition
The case where may include the hardware case, operating system situation and its application program installed of terminal etc..It can manage
Solution, the terminal with different configuring conditions, adaptation priority assignation strategy may be different, thus server can pass through end
The target identification information at end identifies the correspondence configuring condition of the terminal, and then for according to the correspondence configuring condition, is directed to
Property the determining authority configuration strategy with the terminal adaptation.In addition, first object identification information refers to the target mark of first terminal
Know information.
It should be noted that target identification information generally may include basic identification information.Basic identification information, can be used for
The configuring condition of the relatively coarseness of its corresponding terminal is characterized, that is, is that comparison is thick to the differentiation of terminal according to basic identification information
General.
In one specific example, basic identification information usually may include manufacturer's information, model information and operating system version
At least one of this information.Wherein, manufacturer's information refers to the identification information of the manufacturer of terminal, is by home-made cellphone of terminal
Example, can distinguish Huawei's mobile phone, OPPO mobile phone, millet mobile phone etc. by manufacturer's information.Model information refers to the machine of terminal
The identification information of type number, the partitioning standards for being typically based on manufacturer's formulation divide machine models, such as pass through machine type
Number can honor V9, Mate9, Mate9Pro, P10, P10Plus etc. to Huawei's mobile phone distinguish.Operating system version information
Also referred to as rom version information refers to that the identification information of the version of the operating system of terminal, such as the operating system of OPPO mobile phone are
ColorOS system, operating system version may include ColorOS 3.0, ColorOS 3.1, ColorOS 3.2 etc.;This
Outside, operating system version information may include operating system version number.
However, the differentiation compared with coarseness can be only made to terminal according to basic identification information.That is, basic identification information
Identical terminal, adaptation authority configuration strategy very maximum probability be not identical.Thus, if according only to specified basic identification information pair
Terminal distinguishes, and then determines that it is adapted to authority configuration strategy, and finally determining adaptation authority configuration strategy is likely to invalid
Or mistake, i.e., it is not adapted to certain terminals actually.
It may include additional identification information in target identification information based on this.Additional identification information, it is right to can be used for characterizing its
The configuring condition of the finer grain for the terminal answered, that is, be that comparison is fine to the differentiation of terminal according to additional identification information.
In implementing the present invention, it may, the inventors discovered that, it is identical for basic identification information, but device-fingerprint information
For different terminal, the authority configuration strategy of adaptation may not be identical.Based on this, in one embodiment, target identification
Information may include device-fingerprint information, and correspondingly, server can determine the adaptation power of first terminal according to device-fingerprint information
Limit configuration strategy.
Specifically, device-fingerprint information refers to the identification information of equipment.For carrying the terminal of Android system, device-fingerprint
Information can refer to FingerPrint information, can pass through API (the Application Programming of Android system
Interface, application programming interface) it obtains.By taking manufacturer is OPPO and type is a mobile phone of R9m as an example, by such as
After the I that gives an order calls the corresponding API of Android system, the following character string St of acquisition can be the device-fingerprint information of the mobile phone.
It instructs I:SystemProperties.get (" ro.build.fingerprint ").
Character string St:OPPO/R9m/R9:5.1/LMY47I/1515760704:user/release-keys.
It should be noted that it is all the same for manufacturer and type, and the mobile phone of same batch factory, device-fingerprint information
It is identical.But if the subsequent ROM to mobile phone makes change, such as ROM is upgraded, device-fingerprint information is just
It can change.
In implementing the present invention, it may, the present inventors have additionally discovered that, it is identical for basic identification information, but difference is installed
For the terminal of the rights management program of version, the authority configuration strategy of adaptation may not be identical.Such as OPPO mobile phone house keeper
The authority configuration strategy in 3.0 version of authority configuration strategy and OPPO mobile phone house keeper in 2.0 versions is not just completely identical.
It in the case, will be same basic if determining adaptation authority configuration strategy according only to basic identification information
Identification information but be equipped with different editions rights management program terminal, finally determine identical adaptation authority configuration strategy,
However its adaptation authority configuration strategy determined is likely to invalid or wrong for certain terminals, i.e., it is actually and uncomfortable
With these terminals.It can be OPPO mobile phone pipe if being determined according only to operating system version information still by taking OPPO mobile phone as an example
The terminal of 3.0 version of terminal and OPPO mobile phone house keeper of 2.0 versions of family, determines identical adaptation authority configuration strategy, however, real
In the situation of border, can there is what the adaptation authority configuration strategy was not adapted to the terminal of the terminal of a collection of 2.0 versions or 3.0 versions
Problem.
Based on this, in another embodiment, first object identification information may include rights management program identification information, phase
Ying Di, server can determine the adaptation authority configuration strategy of terminal according to rights management program identification information.
Specifically, rights management program identification information refers to available rights management program (the i.e. permission pipe installed in terminal
Manage software) identification information.Wherein, rights management software can refer to the software of the permission of management third party application.
In one embodiment, rights management program identification information can be used for identifying the title and version of corresponding authority management program, that is, weigh
Limit management program identification information may include: the name information and version information of rights management program.
In addition, distinguishing according to provider, rights management software may include official's rights management software and third party
Rights management software.Wherein, official's rights management software can refer to the rights management software that manufacturer terminal provides, when terminal is dispatched from the factory
Official's rights management software will usually be carried, and user can not unload it under normal circumstances, for example, Huawei, OPPO,
And " the mobile phone house keeper " of the cell phone manufacturers such as millet etc..Third party's rights management software can refer to the rights management that third party provides
Software, such as KingoUser software.
It should be noted that since manufacturer terminal would generally be customized exploitation to the operating system of terminal, such as based on
Android system is customized exploitation, the ColorOS system of OPPO customized development, MIUI system of millet customized development etc..It is right
In different operating system, usually there is very big difference in the corresponding authority configuration strategy (such as path of navigation) that is adapted to.And
And most manufacturer terminals aperiodically can update its operating system (such as patch installing or upgrading) by OTA, and its it is corresponding can
Adaptation authority configuration strategy updates official's rights management software when changing.Therefore, official's rights management software can be compared with subject to
The corresponding difference for being adapted to authority configuration strategy of terminal really is characterized, that is, for terminal, official's permission of installation
Management software is different, and the authority configuration strategy that can be adapted to i.e. may not be identical.
Based on this, in one embodiment, terminal can be distinguished according to the official's rights management software installed in terminal,
And then determine that it is adapted to authority configuration strategy.Correspondingly, rights management program identification information can refer to: install on first terminal
The identification information of official's rights management software.
It can simultaneously include device-fingerprint information and rights management program in first object identification information in another embodiment
Identification information, correspondingly, server can determine jointly terminal according to device-fingerprint information and rights management program identification information
It is adapted to authority configuration strategy, to more subtly distinguish to terminal.
In addition, different target identifies as shown in figure 3, right as shown in figure 3, the permission limitation fragmentation of manufacturer terminal is serious
For different terminals, the granularity of identification information used in distinguishing terminal is thinner, the accuracy of identified authority configuration strategy
It is higher.
S204 is based on permission fitting relation, determines candidate policy;Permission fitting relation include the second target identification information and
Corresponding relationship between authority configuration strategy, candidate policy include believing with the second target identification of first object identification information match
The corresponding authority configuration strategy of breath.
Permission fitting relation may include the corresponding relationship between the second target identification information and authority configuration strategy.Its
In, the second target identification information refers to the target identification information in permission fitting relation.In permission fitting relation, for its note
For any second target identification information of record, a corresponding authority configuration strategy may be present, also, corresponding
Authority configuration strategy be applicable to its target identification information and the matched terminal of the second target identification information.In addition, should
Corresponding relationship can be " many-one ", i.e., multiple different second target identification informations can correspond to the same authority configuration plan
Slightly.
It should be noted that the second target identification information may include first object identification information.In one specific example, the
The information category number that two target identification informations include can be identical as the information category number of first object identification information, such as the second mesh
Mark identification information includes the version information of device-fingerprint information, the name information of rights management program and rights management program, clothes
The first object identification information that business device obtains also just includes device-fingerprint information, the name information and version of rights management program
Information.In the case, it is based on permission fitting relation, it is finding with first object identification information match the second target identification
Information it is general only one, i.e., candidate policy only one.
In another specific example, the information category number of first object identification information can include less than the second target identification information
Information category number, but the second target identification information includes all information category in first object identification information.For example, second
Target identification information includes the version information of device-fingerprint information, the name information of rights management program, rights management program, but
The first object identification information that server obtains only includes device-fingerprint information.In the case, it is based on permission fitting relation, is looked into
The number with the second target identification information of first object identification information match is found possibly more than one, it is correspondingly, corresponding
The number of authority configuration strategy is also therewith more than one (i.e. candidate policy is more than one).At this point, can by with find with it is each
The corresponding each authority configuration strategy of second target identification information is used as candidate policy.
For example, the second target identification information includes device-fingerprint information, rights management journey in permission fitting relation
The version information of the name information of sequence, rights management program, and the permission fitting relation includes following three groups of corresponding relationships
(R1, R2 and R3):
Corresponding relationship the R1: the second target identification information MS1 corresponding authority configuration strategy T1;Wherein, the second target identification is believed
Breath MS1 include device-fingerprint information F1, the name information N1 of rights management program, rights management program version information V1.It is right
It should be related to the R2: the second target identification information MS2 corresponding authority configuration strategy T2;Wherein, the second target identification information MS2 includes setting
Standby finger print information F2, the name information N2 of rights management program, rights management program version information V2.Corresponding relationship R3: the
Two target identification information MS3 corresponding authority configuration strategy T3;Wherein, the second target identification information MS3 includes device-fingerprint information
F1, the name information N3 of rights management program, rights management program version information V3.
Based on this, in a specific example, if the first object identification information MT1 of the first terminal E1 obtained includes equipment
Finger print information F1, the name information N1 of rights management program, rights management program version information V1, then can be suitable based on the permission
With relationship, determine that first object identification information MT1 is matched with the second target identification information MS1, and then the second target identification information
The corresponding authority configuration strategy T1 of MS1 can be identified as candidate policy (hereinafter referred example E-1).
In another specific example, if the first object identification information MT2 of the first terminal E2 obtained includes device-fingerprint letter
F1 is ceased, then can be based on the permission fitting relation, determines first object identification information MT1 and the second target identification information MS1, second
Target identification information MS3 is matched, in turn, can be by the corresponding authority configuration strategy T1 and second of the second target identification information MS1
The corresponding authority configuration strategy T3 of target identification information MS3 is determined as candidate policy (hereinafter referred example E-2).
S206 is based on candidate policy, determines the adaptation authority configuration strategy of first terminal.
It should be noted that the number of candidate policy may only have one, it is also possible to more than one.Only have in candidate policy
In the case where one, which is directly exactly the adaptation authority configuration strategy of first terminal.It is more than one in candidate policy
In the case where, adaptation authority configuration strategy of the candidate policy as first terminal can be determined in each candidate policy.
For example, for above-mentioned example E-1, since candidate policy only includes authority configuration strategy T1, thus can be direct
Authority configuration strategy T1 is determined as to the adaptation authority configuration strategy of first terminal E1.For above-mentioned example E-1, due to candidate
Strategy includes authority configuration strategy T1 and T3, thus one in authority configuration strategy T1 and T3 can be determined as first terminal E2
Adaptation authority configuration strategy.
In addition, be based on permission fitting relation if first object identification information for some first terminal, do not find with
Second target identification information of the first object identification information match, also the number of candidate policy is zero.This show server it
Before may not record authority configuration strategy corresponding with the first object identification information, at this point, can remember in permission fitting relation
One is determined in the authority configuration strategy of record at random, the authority configuration strategy as the first terminal.
Also, by the first object identification information feedback at relevant staff, so that relevant staff can be true
Determine the new authority configuration strategy of one with the first object identification information match, which can be used as this
The adaptation authority configuration of the corresponding first terminal of first object identification information.In turn, which is added to power
Limit fitting relation.It is subsequent, if server gets the first object identification information again, can by the new authority configuration strategy,
It is determined as candidate policy.
In addition, server can pass through the third party on first terminal after the adaptation authority configuration strategy of determining first terminal
The adaptation authority configuration strategy is sent to the first terminal by application program, so that first terminal can be according to the adaptation authority configuration
Strategy configures the corresponding authority of the third party application.
The determination method of above-mentioned authority configuration strategy, server obtain the device-fingerprint information and rights management program of terminal
At least one of identification information determines the adaptation authority configuration strategy of terminal further according to permission fitting relation.On the one hand, right
It is identical in basic identification information (such as manufacturer's information and operating system version information), but device-fingerprint information and/or rights management
The authority configuration strategy of the different terminal of program, actual fit may not be identical, thus according to device-fingerprint information and/or
Rights management program identification information can make more fine-grained differentiation to terminal, to more targetedly determine for terminal
It is adapted to authority configuration strategy.On the other hand, permission fitting relation is safeguarded by server, is closed convenient for more fully covering various adaptations
System, and dynamic update is carried out to fitting relation in time.Accordingly, can effectively improve actually can fitting percentage by the application.
In one embodiment, as shown in figure 3, the method for determination of permission fitting relation, may include steps of S402 extremely
S408.S402 sends authority configuration strategy to be tested to second terminal.It is anti-to receive the first terminal that each second terminal is passed back by S404
Feedforward information;First terminal feedback information include second terminal third target identification information and with authority configuration strategy pair to be tested
The Policy evaluation parameter answered.S406 is based on each Policy evaluation parameter, carries out validation verification to authority configuration strategy to be tested.
S408, based on the authority configuration strategy to be tested and its corresponding third target identification information being verified, the adaptation that defines the competence is closed
System, the second target identification information includes: the corresponding third target identification information of authority configuration strategy to be tested being verified.
It should be noted that before not set up permission fitting relation, for an authority configuration strategy, server energy
Enough determining matched target identification information is more unilateral.For example, staff carries out a certain sample mobile phone SP
Authority configuration test, so that it is determined that the adaptation authority configuration strategy of sample mobile phone SP is authority configuration strategy TS1, due to work
The target identification information of sample mobile phone SP can be uniquely determined by making personnel, and server can also safeguard the target mark of sample mobile phone SP
Know the corresponding relationship (hereinafter referred example E-3) that information is adapted to authority configuration strategy with this.
But for an authority configuration strategy, can matched target identification information may have it is multiple, i.e., should
The target identification information of sample mobile phone SP may be it is numerous being capable of one in matched target identification information.In this situation
Under, server just can not accurately determine that there are also which target identification informations in addition to the target identification information of sample mobile phone SP
Being can be matched with authority configuration strategy TS1.In addition, server also can not accurately determine the adaptation authority configuration strategy with
Which target identification information is unmatched.
To solve the above-mentioned problems, staff can test more sample mobile phones, on the spot by staff
Test the corresponding relationship to determine more target identification informations Yu authority configuration strategy.However, staff is surveyed on the spot
The time of examination, human and material resources cost are very high, the inefficiency for the fitting relation that defines the competence, and are also difficult to and cover comprehensively
Lid.
Based on this, frame diagram as shown in connection with fig. 5, in the present embodiment, after obtaining authority configuration strategy to be tested, server can be first
The authority configuration strategy to be tested is thrown to second terminal.Receive the first terminal feedback information that second terminal is passed back again, first
Terminal feedback information include the second terminal third target identification information and with for received authority configuration plan to be tested
Policy evaluation parameter slightly.Then, server is according to the Policy evaluation parameter in first terminal feedback information, to the power to be verified
It limits configuration strategy and carries out validation verification, that is, judge that the authority configuration strategy to be verified is effective authority configuration strategy, still
Invalid authority configuration strategy.In turn, for the authority configuration strategy to be tested (i.e. effective authority configuration strategy) that is verified and
Its corresponding third target identification information establishes corresponding relationship, so that it is determined that permission fitting relation.
It should be noted that the validation verification in the present embodiment, is not used to characterize a certain authority configuration plan to be tested
It whether can be slightly adapted to the corresponding third terminal of the authority configuration strategy to be tested, but for whether assessing authority configuration strategy to be tested
It needs formal online.Wherein, if formal online, just record has the authority configuration to be tested in the permission fitting relation of server maintenance
Strategy, with determined by the first terminal feedback information that is fed back according to second terminal, each target identification that can be matched believes
The corresponding relationship of breath, with for determining the adaptation authority configuration strategy of first terminal, i.e. subsequent server may be by the power to be tested
Limit configuration strategy is determined as the adaptation authority configuration strategy of a certain first terminal.If informal online, show that server eliminates
Authority configuration strategy to be tested, that server can not record the authority configuration strategy to be tested is corresponding with any target identification information
Relationship, correspondingly, subsequent server will not match the adaptation permission that authority configuration strategy to be tested is determined as any first terminal
Set strategy.
It can be seen that server can be directly according to the first terminal feedback letter of each second terminal return in the present embodiment
Breath, determines which target identification information can be with authority configuration strategy matching to be tested and which target identification information
It can not be with the authority configuration strategy matching to be tested.On the one hand, the work that staff tests one by one is eliminated, on the other hand,
In such a way that server issues, the terminal with different target identification information can be more fully covered, in another aspect, respectively
Second terminal can be concurrently to server feedback information, to sum up, and the present embodiment greatly improves server and establishes permission adaptation
The efficiency of relationship, and can guarantee the comprehensive of the permission fitting relation that it is safeguarded.
It should be noted that third target identification information refers to the target identification information of second terminal, recorded to power
After limiting fitting relation, in permission fitting relation, referred to as the second target identification information.
In one embodiment, before sending authority configuration strategy to be tested to second terminal, i.e. before step S402, may be used also
To include the following steps: to obtain reference identification information, reference identification information includes third corresponding with authority configuration strategy to be tested
The basic identification information of terminal, basic identification information include manufacturer's information, model information, in operating system version information at least
It is a kind of.Then, it is determined that second terminal, second terminal includes its basic identification information and the terminal that reference identification information matches.
Wherein, reference identification information is obtained, can refer to the basis mark of third terminal corresponding with authority configuration strategy to be tested
Know information.As described above, third terminal refers to staff for carrying out authority configuration test, so that it is determined that it is adapted to permission
The terminal of configuration strategy.By taking previous example E-3 as an example, sample mobile phone SP is third terminal, the basis mark of sample mobile phone SP
Knowing information is reference identification information.
Second terminal refers to the selected terminal for being used to participate in establishing permission fitting relation of server, may include it
Basic identification information and reference identification information match and are equipped with the terminal of specified third party application.
For the number of second terminal, in one embodiment, server can be in its basic identification information and reference identification
Information matches, and is equipped in each terminal of specified third party application, chooses a part of terminal as second terminal.Separately
In one embodiment, server can also match its basic identification information with reference identification information, and be equipped with specified the
All terminals of tripartite's application program, are determined as second terminal totally.It should be noted that in practical application, in order to guarantee to use
Family experience, can generally control the scale of user to be tested, i.e., one is only chosen in all terminals for meeting the first screening conditions
Divide terminal, as second terminal.
Match for the basic identification information and reference identification information of terminal, can refer in the basic identification information of terminal
Any one of at least match with the respective items in reference identification information.Also, basis mark letter can be set according to actual needs
Target item in breath needs the item to match with the respective items in reference identification information.It can be seen that server is whole to second
When authority configuration strategy to be tested is launched at end, it can be launched based on the basic identification information of coarseness.
For example, for the example E-3 being described above, if sample mobile phone SP is a mobile phone of OPPO R9m, ginseng
Examining identification information includes manufacturer's information (OPPO), model information (R9m), operating system version number (ColorOS 3.0).
In one specific example, its manufacturer's information can be characterized to OPPO, model information characterizes R9m, operating system version
Number characterization ColorOS 3.0 and be equipped in each terminal or each terminal of specified third party application a part eventually
End, is selected as second terminal.Also that is, target item includes simultaneously manufacturer's information, model information and operating system version in this example
Number.
It in another specific example, can also be launched to more coarseness, such as its manufacturer's information is characterized into OPPO, behaviour
Make system version number characterization ColorOS 3.0 and is equipped in each terminal or each terminal of specified third party application
A part of terminal, be selected as second terminal.Also that is, target item includes simultaneously manufacturer's information and operating system version in this example
Number.
In another specific example, can also more coarseness it be launched, such as its operating system version number is characterized
ColorOS 3.0 and a part of terminal being equipped in each terminal or each terminal of specified third party application, choosing
For second terminal.Also that is, target item only includes operating system version number in this example.
In addition, after determining second terminal, the third party application installed in server and identified second terminal into
Row data communication launches the authority configuration strategy TS1 of sample mobile phone SP to them.To which server can be according to this part second
The first terminal feedback information that terminal returns respectively determines in each target identification information that this part second terminal is related to, which
Target identification information be can and which target identification information matched with authority configuration strategy TS1 be can not be with the permission
Configuration strategy TS1 is matched.
Also, as it was noted above, server can also be fed back according to the first terminal that this part second terminal returns respectively
Information judges the validity of authority configuration strategy TS1, i.e. authority configuration strategy TS1 is effective authority configuration strategy, also
It is invalid authority configuration strategy.It should be noted that validity herein is not used to characterize authority configuration strategy TS1
Whether can be adapted to sample mobile phone SP, but for assess authority configuration strategy TS1 whether need it is formal online.
If formal online, in the permission fitting relation of server maintenance, just record has the authority configuration strategy TS1 and sample
The corresponding relationship of the target identification information of mobile phone SP and the authority configuration strategy TS1 with can be with authority configuration strategy TS1
The corresponding relationship of the third target identification information of matched each second terminal.Some first end subsequent, that server receives
The first object identification information at end, matched second target identification information corresponds to the authority configuration plan in permission fitting relation
When slightly TS1, authority configuration strategy TS1 can be determined as the candidate policy of the first terminal by server.
If informal online, show that server has eliminated authority configuration strategy TS1, server can not record the power
Limit the corresponding relationship of the target identification information of configuration strategy TS1 and sample mobile phone SP.Correspondingly, subsequent server will not should
Authority configuration strategy TS1 is determined as the adaptation authority configuration strategy of any first terminal.
In one embodiment, Policy evaluation parameter include strategy can suitability assessment parameter and strategy execution state parameter in
At least one.Accordingly, it is based on each Policy evaluation parameter, validation verification is carried out to authority configuration strategy to be tested, may include
Following steps: the first net assessment parameter is determined based on each Policy evaluation parameter;First net assessment parameter includes one kind or more
Index parameter, the type of index parameter include overall conversion ratio, the rate that runs succeeded and it is overall can fitting percentage;It is total based on first
Body assesses parameter, carries out validation verification to authority configuration strategy to be tested.
Wherein, overall conversion ratio is determined based on the first total number and the second total number, and the rate that runs succeeded is based on the second sum
Mesh and third total number determine, totally can fitting percentage be based on the first total number and the determination of the 4th total number.Also, the first total number
For the sum of second terminal, the second total number is that the second terminal of successful execution authority configuration strategy to be tested is confirmed through user
Sum, third total number are the sum for having executed the second terminal of authority configuration strategy to be tested, the 4th total number be with it is to be tested
The sum of the second terminal of authority configuration strategy adaptation.In addition, the second total number and third total number are based on each strategy execution shape
The determination of state parameter, the 4th total number can suitability assessment parameter determinations based on each strategy.
Wherein, strategy can suitability assess parameter, can be used for characterizing its corresponding authority configuration strategy to be tested whether with hair
Give the strategy can suitability assessment parameter second terminal adaptation.For example, server to second terminal PT1 have sent one it is to be tested
Authority configuration strategy TS1, second terminal PT1 can be fitted to server return for the strategy of the authority configuration strategy TS1 to be tested
Parameter is assessed with property.It is appreciated that the strategy can suitability assessment parameter can be used for characterizing the authority configuration strategy TS1 to be tested and be
It is no to be adapted to second terminal PT1.
It should be noted that the strategy can suitability assessment parameter can be by the specified third-party application journey with server communication
Sequence obtains.It specifically, can be automatically after which receives the authority configuration strategy to be tested that server is sent
Corresponding operation is executed, determines that can locating terminal according to the authority configuration strategy to be tested successfully to the third party application
Corresponding authority configured, thus generate corresponding strategy can suitability assessment parameter.Also, third party application determines
Can its locating terminal successfully match the corresponding authority of the third party application according to the authority configuration strategy to be tested
The process set is participated in without user (actual user of terminal).
Strategy execution state parameter, can be used for characterizing whether its corresponding authority configuration strategy to be tested is held in second terminal
It goes successfully.For example, server has sent an authority configuration strategy TS1 to be tested to second terminal PT1, second terminal PT1 is executed
After the authority configuration strategy TS1 to be tested, the implementing result of user's input can receive, and generate strategy corresponding with the implementing result
Execute state parameter.It executes the permission to be tested it is appreciated that the strategy execution state parameter can be used for characterizing second terminal PT1 and matches
After setting tactful TS1, if having successfully completed and configured to the corresponding authority of the third party application.
It should be noted that the strategy execution state parameter be generated according to the implementing result of user feedback, thus really
The process for determining strategy execution state parameter needs user to participate in.For example, after second terminal has executed authority configuration strategy to be tested, In
User is popped up in respective page and confirms frame, which confirms in frame to may include " successfully configuration " and " failed configuration " two
Button.When user clicks " successfully configure " button, the strategy execution state parameter that second terminal generates, can be used for characterizing this
Two terminals successful execution authority configuration strategy to be tested;Conversely, when user clicks " failed configuration " button, second terminal
The strategy execution state parameter of generation can be used for characterization and be not carried out success.
First net assessment parameter can be generated according to the Policy evaluation parameter that each second terminal returns respectively, and be can be used
In determining whether authority configuration strategy to be tested is effective rights configuration strategy.In the present embodiment, the first net assessment parameter can be with
Including overall conversion ratio, the rate that runs succeeded and it is overall can at least one of fitting percentage.
Any authority configuration strategy to be tested of second terminal is delivered to firstly, for server, server can be according to each
The strategy that two terminals return respectively can suitability assess parameter, determine in each second terminal, can match with the permission to be tested
Set the sum of the second terminal of strategy adaptation and the sum for the second terminal that can not be adapted to the authority configuration strategy to be tested.
Furthermore it is possible to the sum for the second terminal being adapted to the authority configuration strategy to be tested with can not be suitable with the authority configuration strategy to be tested
The sum of sum of second terminal matched, as server launch the sum of the second terminal of the authority configuration strategy to be tested, i.e., and
Four total numbers.
Secondly, being delivered to any authority configuration strategy to be tested of second terminal for server, server can be according to each
The strategy execution state parameter that two terminals return respectively determines in each second terminal, has been successfully executed the power to be tested
The sum of the second terminal of configuration strategy is limited, it is in other words, successfully complete after which executes the authority configuration strategy to be tested
At the sum of the second terminal configured to the corresponding authority of the third party application, i.e. the second total number.And clothes
Business device can determine the sum for having executed the authority configuration strategy to be tested but having executed the second terminal to fail, i.e. the second terminal is held
After the row authority configuration strategy to be tested, does not successfully complete and the corresponding authority of the third party application is configured
The sum of second terminal.In addition, being successfully executed the sum of the second terminal of the authority configuration strategy to be tested and having held
The row authority configuration strategy to be tested but the sum of the sum of second terminal for executing failure, to have executed authority configuration strategy to be tested
Second terminal sum, i.e. third total number.
Based on this, overall conversion ratio is that the sum (the first total number) of second terminal confirms that successful execution waits for through user
Test the ratio of the sum of the terminal of authority configuration strategy, the i.e. ratio of the second total number and the first total number.Run succeeded rate, is
The sum of the terminal of successful execution authority configuration strategy to be tested is confirmed through user and has executed authority configuration strategy to be tested
The ratio of the sum of terminal, the i.e. ratio of the second total number and third total number.Totally can fitting percentage, be and authority configuration to be tested
The ratio of the sum of the sum and second terminal of the terminal of strategy adaptation, the i.e. ratio of the 4th total number and the first total number.
In one embodiment, the Policy evaluation parameter further includes executing number.Accordingly, when the Policy evaluation parameter packet
When including the execution number and the strategy execution state parameter, the type of the index parameter further include run succeeded it is averagely secondary
Number.
Refer to during an authority configuration it should be noted that executing number, terminal to be measured execute that it receives to
Test the number of authority configuration strategy.The strategy execution state parameter sent for any second terminal in conjunction with it and execution
Number can determine that the second terminal runs succeeded execution number experienced.
In addition, being delivered to any authority configuration strategy to be tested of second terminal for server, server can be according to each
The strategy execution state parameter and execute number that two terminals return respectively, determine that running succeeded for the authority configuration strategy to be tested is flat
Equal number.For example, server has launched authority configuration strategy TS1 to be tested to this five second terminals of second terminal PT1 to PT5,
Then, second terminal PT1 to PT5 returns to the strategy execution for characterizing its successful execution authority configuration strategy to be tested
State parameter.Also, the execution number returned is respectively 2,3,5,4 and 1, and server can determine the authority configuration plan to be tested accordingly
The average time that runs succeeded slightly is 3 times.
In one embodiment, when the first net assessment parameter includes the index parameter of two classes or more, totally commented based on first
The step of estimating parameter, carrying out validation verification to authority configuration strategy to be tested, may include steps of: totally comment based on first
Estimate all kinds of index parameters that parameter includes, determines integrated decision-making parameter corresponding with authority configuration strategy to be tested;It is determined based on synthesis
Plan parameter carries out validation verification to authority configuration strategy to be tested.
In the present embodiment, first net assessment parameter corresponding for any authority configuration strategy to be tested, this is first overall
Assessment parameter includes the index parameter of two classes or more.In the case, can include based on the first net assessment parameter be all kinds of
Index parameter determines an integrated decision-making parameter corresponding with authority configuration strategy to be tested.It is appreciated that can be by the integrated decision-making
Parameter uniquely determines the validation verification result of the authority configuration strategy to be tested.
For example, the corresponding first net assessment parameter of authority configuration strategy TS1 to be tested can include overall conversion simultaneously
Rate, the rate that runs succeeded and it is overall can fitting percentage, in the case, can the overall conversion ratio for including based on it, the rate that runs succeeded,
And it is overall can fitting percentage determine an integrated decision-making parameter corresponding with the authority configuration strategy TS1 to be tested jointly.It is appreciated that
The validation verification result of the authority configuration strategy TS1 to be tested can be uniquely determined by the integrated decision-making parameter.
In one embodiment, based on all kinds of index parameters that the first net assessment parameter includes, determination is matched with permission to be tested
The step of setting tactful corresponding integrated decision-making parameter, can also include the following steps: include based on the first net assessment parameter
The weighted value of all kinds of index parameters and all kinds of index parameters determines integrated decision-making ginseng corresponding with authority configuration strategy to be tested
Number.
It in the present embodiment, can be corresponding based on the authority configuration strategy to be tested for any authority configuration strategy to be tested
The weighted value of all kinds of index parameters included by first net assessment parameter and all kinds of index parameters, determining and power to be tested
Limit the corresponding integrated decision-making parameter of configuration strategy.Wherein, weighted value can be used for characterizing its corresponding this kind of index parameter, right
Determine the influence degree of the validation verification result of the authority configuration strategy to be tested.It is appreciated that weighted value can be needed based on practical
It asks and is preset.
In one embodiment, it can determine that an integrated decision-making corresponding with authority configuration strategy to be tested is joined by following formula
Number.It should be noted that different i values represents different authority configuration strategies to be tested, different c value generations for following formula
The different classes of index parameter for including in the corresponding first net assessment parameter of table authority configuration strategy to be verified.
Wherein, RFiIntegrated decision-making parameter corresponding to the authority configuration strategy to be tested represented for i;PcThe index represented for c
The weighted value of parameter;RicThe index parameter represented for the corresponding c of authority configuration strategy to be tested represented in i.
It is assumed that i represents authority configuration strategy TS1 to be tested for 1, c is 1 to 3, successively respectively represents " overall conversion ratio ", " holds
Row success rate ", " totally can fitting percentage " these three types of index parameters.In the case, when c=1, Rci indicates authority configuration to be tested
Tactful TS1 is corresponding " overall conversion ratio ", when c=2, RciIndicate authority configuration strategy TS1 to be tested corresponding " run succeeded rate "
Deng.
In one embodiment, based on all kinds of index parameters that the first net assessment parameter includes, determination is matched with permission to be tested
The corresponding integrated decision-making parameter of strategy is set, may include steps of: all kinds of indexs for including based on the first net assessment parameter
The priority-level of parameter, successively judges whether all kinds of index parameters meet its corresponding first screening conditions;It is full when detecting
When the index parameter of its corresponding first screening conditions of foot, which is determined as corresponding with authority configuration strategy to be tested
Integrated decision-making parameter.
In the present embodiment, all kinds of index parameters that the first net assessment parameter includes all have corresponding priority-level.
The priority-level can be used for characterizing its corresponding this kind of index parameter, test the validity for determining the authority configuration strategy to be tested
Demonstrate,prove the influence degree of result.Also, all kinds of index parameters all have corresponding first screening conditions.
The priority-level for all kinds of index parameters that can include according to the first net assessment parameter as a result, from high-level
Successively judge whether all kinds of index parameters meet its corresponding first screening conditions to low level, once there is a kind of index parameter
Meet, then such index parameter is determined as integrated decision-making parameter corresponding with the authority configuration strategy to be tested.It also that is, can basis
Such index parameter determines the validation verification result of the authority configuration strategy to be tested.
It illustrates, it is assumed that the corresponding first net assessment parameter of authority configuration strategy TS1 to be tested includes " overall to turn simultaneously
Change rate ", " run succeeded rate ", " totally can fitting percentage ", " run succeeded average time " these four types of index parameters.Wherein, excellent
First grade is from high to low successively are as follows: " overall conversion ratio ", " totally can fitting percentage ", " run succeeded rate " and " runs succeeded average
Number ".Also, it is more than 80% that " overall conversion ratio " corresponding the one the first screening conditions, which may include: overall conversion ratio,.It " holds
It is more than 95% that corresponding the two the first screening conditions of row success rate ", which may include: the rate of running succeeded,." totally can fitting percentage " be corresponding
The the three the first screening conditions may include: it is overall can fitting percentage be more than 90%." run succeeded average time " the corresponding 4th
First screening conditions may include: to run succeeded average time less than 5 times.
In the case, first judge in the first net assessment parameter, the overall conversion ratio of highest priority whether be more than
80%, if so, the authority configuration strategy TS1 to be tested can be effective rights configuration plan according to the first net assessment parameter decision
Slightly.In turn, the first terminal feedback information that server records the authority configuration strategy TS1 to be tested and fed back according to second terminal
Identified, each target identification information that can be matched corresponding relationship, to carry out permission fitting relation.If it is not, then
Continue to judge the high totality of priority second can fitting percentage whether more than 90%, and so on, until finding, to meet its corresponding
The index parameter of first screening conditions.If all kinds of index parameters that the first net assessment parameter includes be not satisfied its corresponding
One screening conditions then determine that the authority configuration strategy TS1 to be tested is invalid authority configuration strategy, are eliminated.
In one embodiment, it is being based on each Policy evaluation parameter, the authority configuration strategy to be tested is being carried out effective
Property verifying the step of before, i.e. before step S306, can also include the following steps: the first total number be more than first launch always
When number threshold value, into each Policy evaluation parameter is based on, the step of validation verification is carried out to the authority configuration strategy to be tested
Suddenly.
It should be noted that receiving the of the authority configuration strategy to be tested for any authority configuration strategy to be tested
When the sum (i.e. the first total number) of two terminals is less, show that the number of the second terminal participated in is few, thus the first of its feedback
Terminal feedback information can not describe the problem on the whole, and may be an other occasional case.
Therefore, in the present embodiment, need to guarantee that the sum of second terminal for receiving authority configuration strategy to be tested is more than
First launches total threshold value, that is, when guaranteeing that it reaches certain magnitude, just carries out validation verification to the authority configuration strategy to be tested.
In addition, the total threshold value of the first dispensing can be set based on actual conditions, the total threshold value of the first dispensing is bigger, validation verification
As a result more has convincingness.
In one embodiment, it is being based on the first net assessment parameter, validation verification is carried out to authority configuration strategy to be tested
The step of before, can also include the following steps: based on blacklist eliminate condition authority configuration strategy to be tested is filtered, really
It is fixed not eliminate authority configuration strategy.Accordingly, it is based on the first net assessment parameter, validity is carried out to authority configuration strategy to be tested and is tested
The step of card, may include steps of: based on the corresponding first net assessment parameter of authority configuration strategy is not eliminated, wait for this
It tests authority configuration strategy and carries out validation verification.
It should be noted that blacklist eliminate condition may include: the first total number be more than first launch sum threshold value but
Totally can fitting percentage be not up to fitting percentage threshold value.In addition, it is more than first that the superseded condition of blacklist, which also may include: third total number,
It executes total threshold value but the rate that runs succeeded is not up to the rate threshold value that runs succeeded, that is, executed the second of authority configuration strategy to be tested
The sum of terminal is more than the total threshold value of the first execution, but the rate that runs succeeded is not up to the rate threshold value that runs succeeded.
It is appreciated that blacklist eliminates condition can also be set based on actual demand, however it is not limited to above two reality
Apply mode.In addition, fitting percentage threshold value, the total threshold value of the first execution, the rate threshold value of running succeeded can be set based on actual conditions
It is fixed.
In the present embodiment, condition is eliminated based on blacklist and first eliminates the authority configuration plan to be tested that a part is unsatisfactory for demand
Slightly, and then validation verification is being carried out to remaining authority configuration strategy (not eliminating authority configuration strategy) to be tested.
In one embodiment, permission fitting relation further includes pair between authority configuration strategy and the second net assessment parameter
It should be related to, the second net assessment parameter includes the index parameter of one kind or more, and the type of index parameter includes overall conversion ratio, holds
Row success rate and totality can fitting percentages.Accordingly, when the number of candidate policy is more than two, method further include: based on power
Fitting relation is limited, determines the corresponding second net assessment parameter of each candidate policy;The second net assessment based on each candidate policy
Parameter determines the adaptation authority configuration strategy of first terminal from each candidate policy.
It should be noted that the second net assessment parameter in the present embodiment and above the first net assessment in embodiment
The main distinction of parameter, the two is that the corresponding object of the first net assessment parameter is authority configuration strategy to be tested, and second is total
It is the authority configuration strategy recorded in permission fitting relation that body, which assesses the corresponding object of parameter,.In addition, the first net assessment parameter
It is to be determined according to the first terminal feedback information of second terminal feedback, and the second net assessment parameter is in the first net assessment parameter
On the basis of, update has been made according to the second terminal feedback information that subsequent first terminal is fed back.In addition to above-mentioned difference, this reality
Apply the specific restriction in example to the second net assessment parameter, can with treat what verifying authorization configuration strategy was related in embodiment above
The accordingly restriction of first net assessment parameter is identical.
In one embodiment, the second net assessment parameter based on each candidate policy determines the adaptation permission of first terminal
The step of configuration strategy, may include steps of: based on all kinds of index parameters in each second net assessment parameter, determine with
The corresponding integrated decision-making parameter of each candidate policy;Based on integrated decision-making parameter, first terminal is determined from each candidate policy
Adaptation authority configuration strategy.
In the present embodiment, the second net assessment parameter corresponding for any candidate policy, the second net assessment parameter
Including index parameters more than two classes.In the case, can based on all kinds of index parameters that the second net assessment parameter includes,
Determine an integrated decision-making parameter corresponding with candidate policy.
Wherein, in one embodiment, based on all kinds of indexs ginseng in the corresponding second net assessment parameter of each candidate policy
The step of number, determining integrated decision-making parameter corresponding with each candidate policy, can also include the following steps: based on each second
The weighted value of all kinds of index parameters and all kinds of index parameters that net assessment parameter includes, it is determining to distinguish with each candidate policy
Corresponding integrated decision-making parameter.
In the present embodiment, for any candidate policy, the corresponding second net assessment parameter of the candidate policy can be based on
The weighted value of included all kinds of index parameters and all kinds of index parameters determines a synthesis corresponding with candidate policy
Decision parameters.It is appreciated that weighted value can be preset based on actual demand.
In another embodiment, the second net assessment parameter based on each candidate policy determines the adaptation power of first terminal
The step of limiting configuration strategy, can also include the following steps: all kinds of index parameters for including based on the second net assessment parameter
Priority-level, successively judges whether each index parameter corresponding with current priority rank meets its corresponding second screening item
Part;When detecting the index parameter for meeting its corresponding second screening conditions, by candidate policy corresponding to the index parameter
It is determined as the adaptation authority configuration strategy of first terminal.
In one embodiment, in the second net assessment parameter based on each candidate policy, the is determined from each candidate policy
Before the step of the adaptation authority configuration strategy of one terminal, it can also include the steps of determining that and sieve candidate policy, sieve time
Selecting strategy may include the candidate policy for meeting third screening conditions.Accordingly, second based on each candidate policy is totally commented
Estimate parameter, the step of the adaptation authority configuration strategy of first terminal is determined from each candidate policy, may include steps of: institute
It states based on the second net assessment parameter for respectively having sieved candidate policy, determines that the adaptation of first terminal is weighed in candidate policy from respectively having sieved
Limit configuration strategy.
In one embodiment, third screening conditions may include: that its corresponding 5th total number is more than the second dispensing sum
Threshold value, the 5th total number are the sum for currently having received the terminal of the alternate strategies.In another embodiment, third screens item
Part may include: its corresponding 5th total number be more than second launch total threshold value and its corresponding totality can fitting percentage reach suitable
With rate threshold value.In another embodiment, third screening conditions may include: that its corresponding 6th total number is more than that the second execution is total
Number threshold value and the rate of running succeeded reach the rate threshold value that runs succeeded, and the 6th total number is the end for currently having executed the alternate strategies
The sum at end.
In one embodiment, after determining the adaptation authority configuration strategy of first terminal, i.e. after step S206, may be used also
To include the following steps: to receive the second terminal feedback information passed back of first terminal;Second terminal feedback information includes the first mesh
Mark identification information, and the corresponding Policy evaluation parameter of adaptation authority configuration strategy;Policy evaluation parameter includes that strategy can suitability
Assess at least one of parameter and strategy execution state parameter.Then, based on the Policy evaluation in second terminal feedback information
Parameter, renewal authority fitting relation.
In the present embodiment, first end can be collected after the adaptation authority configuration strategy for determining first terminal each time
Hold the second terminal feedback information returned.Subsequent, server can be according to the second terminal feedback information that each first terminal is fed back more
The permission fitting relation of new demand servicing device maintenance, with dynamic renewal authority fitting relation, to guarantee the timeliness of permission fitting relation
Property and accuracy.
Specifically, the second terminal feedback information that can be returned according to first terminal, renewal authority fitting relation record each
Second net assessment parameter corresponding to authority configuration strategy.In addition, the second terminal feedback information in the present embodiment refers to
The terminal feedback information of one terminal, the specific restriction in the present embodiment to terminal feedback information, can in embodiment above to end
Hold the restriction of feedback information identical.
In one embodiment, as shown in fig. 6, providing a kind of authority configuring method.It is applied in above-mentioned Fig. 1 in this way
Terminal 110 for be illustrated.This method may include steps of S602 to S608.
S602, receives the authority configuration strategy that server is sent, which is that server is adapted to based on permission
Relationship determines.S604 carries out authority configuration based on authority configuration strategy, and based on configuration result determination and authority configuration strategy pair
The Policy evaluation parameter answered.S606, obtains terminal feedback information, and terminal feedback information carries the target identification information of locating terminal
With Policy evaluation parameter corresponding with authority configuration strategy.The terminal feedback information of acquisition is sent to server by S608.
In practical applications, server defines the competence after configuration strategy, can also be sent to the authority configuration strategy pair
The terminal answered.After terminal receives the authority configuration strategy, authority configuration is on the one hand carried out according to authority configuration strategy, thus real
Now the corresponding authority of specified third party application is configured.On the other hand, terminal is also based on configuration result and determines
Policy evaluation parameter corresponding with authority configuration strategy, and then generate the terminal for carrying target identification information and Policy evaluation parameter
Feedback information, then terminal feedback information is fed back into server, it enables the server to suitable to permission according to terminal feedback information
It is updated with relationship.
It should be noted that permission fitting relation, Policy evaluation parameter, terminal feedback information, target in the present embodiment
The specific restriction of identification information, can in embodiment above to permission fitting relation, Policy evaluation parameter, terminal feedback letter
Breath, target identification information are identical.
In one embodiment, the authority configuration strategy that server is sent may include guidance information, which can wrap
Include route guidance information.In one specific example, for the authority configuration for needing user to authorize, as shown in fig. 7, the Route guiding
Information may be used to indicate first terminal and carry out page jump, to guide the corresponding permission of user setting.In addition, another specifically show
In example, in addition to route guidance information, authority configuration strategy also may include operation prompt information, which can be used for
Instruction first terminal shows the prompt elements for prompting correct operation mode of the user on current page.For example, can be
Bullet frame element on the page shown in display diagram 7 may include at least one in text, image and animation etc. in the bullet frame element
It is a.In another specific example, for the authority configuration without user's authorization, terminal obtains the authority configuration strategy that server is sent
Afterwards, automatically the corresponding authority of the third party application can be configured, in configuration process, interface that terminal is shown
It can be as shown in Figure 8.
In one embodiment, the data mode of authority configuration strategy can be configuration file or script file.
In one embodiment, as shown in figure 9, providing a kind of determination method of authority configuration strategy.This method can relate to
And it establishes the permission fitting relation stage and formally determines the stage of adaptation strategies for user undetermined.Wherein, permission adaptation is established to close
It is to be related to step S90a the stage, which may include following steps S90a1 to step S90a6.It is formally determined for user undetermined suitable
Stage with strategy is related to step S90b, which may include following S90b1 to step S90b6.
S90a1, server determine that reference identification information, reference identification information include corresponding with authority configuration strategy to be tested
The basic identification information of third terminal, basic identification information include manufacturer's information, model information, in operating system version information
It is at least one.S90a2, server determine that second terminal, second terminal include its basic identification information and reference identification information phase
Matched terminal.S90a3, to each second terminal, (second terminal 1 to N) sends authority configuration strategy to be tested to server.S90a4,
Second terminal passes first terminal feedback information back to server;First terminal feedback information includes the third target mark of second terminal
Know information and Policy evaluation parameter corresponding with authority configuration strategy to be tested;S90a5, server are based on each Policy evaluation parameter,
Whether effective verify authority configuration strategy to be tested;If effectively, go to step S90a6.S90a6, it is logical that server is based on verifying
The authority configuration strategy to be tested and its corresponding third target identification information crossed, define the competence fitting relation, the second target identification
Information includes: the corresponding third target identification information of authority configuration strategy to be tested being verified.
S90b1, first terminal send its first object identification information to server, and first object identification information includes first
At least one of the device-fingerprint information of terminal and rights management program identification information.S90b2, server are adapted to based on permission
Relationship determines candidate policy;Permission fitting relation includes the corresponding pass between the second target identification information and authority configuration strategy
System, candidate policy include authority configuration strategy corresponding to the second target identification information with first object identification information match.
S90b3, server are based on candidate policy, determine the adaptation authority configuration strategy of first terminal.S90b4, server weigh adaptation
Limit configuration strategy is sent to first terminal.S90b5, first terminal carry out authority configuration, pass second terminal feedback back to server
Information;Second terminal feedback information includes first object identification information and the corresponding Policy evaluation ginseng of adaptation authority configuration strategy
Number, Policy evaluation parameter include that strategy can suitability assessment at least one of parameter and strategy execution state parameter.S90b6,
Server is closed based on the first object identification information and Policy evaluation parameter in second terminal feedback information, renewal authority adaptation
System.
It should be noted that the technical characteristic of each step in the present embodiment can step corresponding with each embodiment above
Rapid technical characteristic is identical, is not added and repeats herein.
Although it should be understood that each step in the flow chart that each embodiment is related to above according to arrow instruction according to
Secondary display, but these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless having herein explicitly
Bright, there is no stringent sequences to limit for the execution of these steps, these steps can execute in other order.Moreover, above
At least part step in the flow chart that each embodiment is related to may include multiple sub-steps or multiple stages, these sub-steps
The rapid or stage is not necessarily to execute completion in synchronization, but can execute at different times, these sub-steps or
The execution sequence in person's stage is also not necessarily and successively carries out, but can with the sub-step of other steps or other steps or
At least part in stage executes in turn or alternately.
It is produced it should be noted that Figure 10 is shown using the software of the determination method of authority configuration strategy provided by the present application
Product, into online 7 day period afterwards, totality can according to determined by the terminal feedback information of user feedback within 6 days before line on it
The change curve of fitting percentage, according to the curve it is found that the determination method of authority configuration strategy provided by the present application can be effectively
Improving totally can fitting percentage.In addition, Figure 11 shows before line on the product 6 days into 7 day period after online, nothing is received
The variation column diagram for imitating the number of users of authority configuration strategy, is also learnt by the column diagram, receives invalid authority configuration strategy
Number of users gradually decrease, the determination method for showing authority configuration strategy provided by the present application more can be determined accurately
The adaptation authority configuration strategy of terminal.
In one embodiment, as shown in figure 12, a kind of determining device 1200 of authority configuration strategy is provided.The device
1200 may include following module 1202 to 1206.
First object identifier acquisition module 1202, for obtaining the first object identification information of first terminal, described first
Target identification information includes at least one of device-fingerprint information and rights management program identification information of the first terminal.
Candidate policy determining module 1204 determines candidate policy for being based on permission fitting relation;The permission fitting relation includes the
Corresponding relationship between two target identification informations and authority configuration strategy, the candidate policy include identifying with the first object
Authority configuration strategy corresponding to second target identification information of information matches.Adaptation strategies determining module 1206, for being based on
The candidate policy determines the adaptation authority configuration strategy of the first terminal.
The determining device 1200 of above-mentioned authority configuration strategy, server obtain the device-fingerprint information and rights management of terminal
At least one of program identification information determines the adaptation authority configuration strategy of terminal further according to permission fitting relation.One side
Face, it is identical to basic identification information (such as manufacturer's information and operating system version information), but device-fingerprint information and/or permission pipe
Manage the different terminal of program, the authority configuration strategy of actual fit may not be identical, thus according to device-fingerprint information and/
Or rights management program identification information, more fine-grained differentiation can be made to terminal, to more targetedly determine for terminal
It is adapted to authority configuration strategy.On the other hand, permission fitting relation is safeguarded by server, is closed convenient for more fully covering various adaptations
System, and dynamic update is carried out to fitting relation in time.Accordingly, scheme provided by the present application can effectively improve and actually may be used
Fitting percentage.
In one embodiment, device 1200 can also include following module: strategy sending module to be tested, for whole to second
End sends authority configuration strategy to be tested.First feedback information receiving module, the first terminal passed back for receiving each second terminal
Feedback information;First terminal feedback information include second terminal third target identification information and with authority configuration strategy to be tested
Corresponding Policy evaluation parameter.Validation verification module, for be based on each Policy evaluation parameter, to authority configuration strategy to be tested into
Row validation verification.Permission fitting relation determining module, for based on the authority configuration strategy to be tested and its correspondence being verified
Third target identification information, define the competence fitting relation, and the second target identification information includes: that the permission to be tested being verified is matched
Set the corresponding third target identification information of strategy.
In one embodiment, device 1200 can also include following module: reference identification obtains module, for obtaining reference
Identification information, reference identification information include the basic identification information of third terminal corresponding with authority configuration strategy to be tested, basis
Identification information includes at least one of manufacturer's information, model information, operating system version information.Terminal deciding module to be measured,
For determining second terminal;Second terminal includes its basic identification information and the terminal that reference identification information matches.
In one embodiment, Policy evaluation parameter include strategy can suitability assessment parameter and strategy execution state parameter in
At least one.Accordingly, validation verification module may include such as lower unit: the first net assessment parameter determination unit is used for
Based on each Policy evaluation parameter, the corresponding first net assessment parameter of configuration strategy to be verified is determined;First net assessment parameter
Including index parameter more than one kind, the type of index parameter includes overall conversion ratio, the rate that runs succeeded and can totally be adapted to
Rate.Validation verification unit carries out validation verification to authority configuration strategy to be tested for being based on the first net assessment parameter.
Wherein, overall conversion ratio is determined based on the first total number and the second total number, and the rate that runs succeeded is based on the second total number and third
Total number determine, totally can fitting percentage be based on the first total number and the 4th total number determination;First total number is second terminal
Sum, the second total number are the sum that the second terminal of successful execution authority configuration strategy to be tested is confirmed through user, and third is total
Number is the sum for having executed the second terminal of authority configuration strategy to be tested, and the 4th total number is and authority configuration strategy to be tested
The sum of the second terminal of adaptation;Second total number and third total number determine that the 4th is total based on each strategy execution state parameter
Number can suitability assessment parameter determination based on each strategy.
In one embodiment, Policy evaluation parameter further includes executing number.Accordingly, when Policy evaluation parameter includes execution time
When several and strategy execution state parameter, the type of index parameter further includes the average time that runs succeeded.
In one embodiment, when the first net assessment parameter includes the index parameter of two classes or more, validation verification unit
May include following subelement: decision parameters determine subelement, all kinds of indexs for including based on the first net assessment parameter
Parameter determines integrated decision-making parameter corresponding with authority configuration strategy to be tested.Validation verification subelement is joined based on integrated decision-making
Number carries out validation verification to authority configuration strategy to be tested.
In one embodiment, decision parameters determine all kinds of indexs of the subelement for including based on the first net assessment parameter
The weighted value of parameter and all kinds of index parameters determines integrated decision-making parameter corresponding with authority configuration strategy to be tested.
In one embodiment, decision parameters determine all kinds of indexs of the subelement for including based on the first net assessment parameter
The priority-level of parameter, successively judges whether all kinds of index parameters meet its corresponding screening conditions.And it is full when detecting
When the index parameter of its corresponding screening conditions of foot, which is determined as synthesis corresponding with authority configuration strategy to be tested
Decision parameters.
In one embodiment, device 1200 can also include following module: the second feedback information receiving module, for receiving
The second terminal feedback information that first terminal is passed back;Second terminal feedback information includes first object identification information and adaptation power
The corresponding Policy evaluation parameter of configuration strategy is limited, Policy evaluation parameter includes that strategy can suitability assessment parameter and strategy execution shape
At least one of state parameter;Permission fitting relation update module, for based on the Policy evaluation in second terminal feedback information
Parameter, renewal authority fitting relation.
In one embodiment, permission fitting relation further includes pair between authority configuration strategy and the second net assessment parameter
It should be related to, the second net assessment parameter includes the index parameter of one kind or more, and the type of index parameter includes overall conversion ratio, holds
Row success rate and totality can fitting percentages;Accordingly, when the number of candidate policy is more than two, adaptation strategies determining module is also
May include such as lower unit: the second net assessment parameter determination unit determines each candidate policy for being based on permission fitting relation
Corresponding second net assessment parameter;Adaptation strategies determination unit, for the second net assessment parameter based on each candidate policy,
The adaptation authority configuration strategy of first terminal is determined from each candidate policy.
The specific restriction of determining device 1200 about authority configuration strategy may refer to hereinbefore for authority configuration plan
The restriction of determination method slightly, details are not described herein.Modules in above-mentioned apparatus can be fully or partially through software, hardware
And combinations thereof realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment,
It can be stored in a software form in the memory in computer equipment, execute the above modules pair in order to which processor calls
The operation answered.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored with meter in memory
Calculation machine program, the processor realize the determination for the authority configuration strategy that the application any embodiment provides when executing computer program
The step of method.
In one embodiment, a kind of computer equipment is provided, which can be server shown in Fig. 1
120, internal structure chart can be as shown in figure 13.The computer equipment includes the processor connected by system bus, storage
Device, network interface and database.Wherein, the processor is for providing calculating and control ability.The memory includes non-volatile
Storage medium and built-in storage, the non-volatile memory medium are stored with operating system, computer program and database, the memory
Reservoir provides environment for the operation of operating system and computer program in non-volatile memory medium.The database is for storing
Target identification information and its corresponding adaptation authority configuration strategy.The network interface is used to pass through network connection with external terminal
Communication.A kind of determination method of authority configuration strategy is realized when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 13, only with the application policy-related (noun) part
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to the application strategy, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, the determining device of authority configuration strategy provided by the present application can be implemented as a kind of computer journey
The form of sequence, computer program can be run in computer equipment as shown in fig. 13 that.It can be deposited in the memory of computer equipment
Storage forms each program module of the determining device of the authority configuration strategy, for example, the mark of first object shown in Figure 12 obtains
Module 1202, candidate policy determining module 1204 and adaptation strategies determining module 1206.The computer that each program module is constituted
In the determination method for the authority configuration strategy that program makes processor execute each embodiment of the application described in this specification
The step of.For example, computer equipment shown in Figure 13 can pass through the determining device of authority configuration strategy as shown in figure 12
First object identifier acquisition module 1202 in 1200 executes step S202, executes step by candidate policy determining module 1204
S204, step S206 etc. is executed by adaptation strategies determining module 1206.
In another embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory
Computer program, the processor realize the step for the authority configuring method that the application any embodiment provides when executing computer program
Suddenly.
In one embodiment, a kind of computer equipment is provided, which can be terminal shown in Fig. 1
110, internal structure chart can be as shown in figure 14.The computer equipment includes the processor connected by system bus, storage
Device, network interface, display screen and input unit.Wherein, the processor is for providing calculating and control ability.The memory includes
Non-volatile memory medium and built-in storage, the non-volatile memory medium are stored with operating system and computer program, this is interior
Memory provides environment for the operation of operating system and computer program in non-volatile memory medium, the computer program quilt
To realize a kind of authority configuring method method when processor executes.The network interface is used to pass through network connection with external terminal
Communication.The display screen can be liquid crystal display or electric ink display screen.The input unit of the computer equipment can be
The touch layer covered on display screen is also possible to the key configured on computer equipment shell, trace ball or Trackpad, can be with
It is external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Figure 14, only with the application policy-related (noun) part
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to the application strategy, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a non-volatile computer and can be read
In storage medium, which may include the process such as the embodiment of above-mentioned each method when being executed.Wherein, the application is mentioned
Any reference used in each embodiment supplied to memory, storage, database or other media may each comprise non-easy
The property lost and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM),
Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include depositing at random
Access to memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as quiet
State RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM
(ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight
Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Accordingly, in one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with,
The determination method for the authority configuration strategy that the application any embodiment provides is realized when computer program is executed by processor.
Accordingly, in one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with,
The authority configuring method that the application any embodiment provides is realized when computer program is executed by processor.
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
The limitation to the application the scope of the patents therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the concept of this application, various modifications and improvements can be made, these belong to the guarantor of the application
Protect range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (15)
1. a kind of determination method of authority configuration strategy characterized by comprising
The first object identification information of first terminal is obtained, the first object identification information includes the equipment of the first terminal
At least one of finger print information and rights management program identification information;
Based on permission fitting relation, candidate policy is determined;The permission fitting relation includes the second target identification information and permission
Corresponding relationship between configuration strategy, the candidate policy include the second target mark with the first object identification information match
Know authority configuration strategy corresponding to information;
Based on the candidate policy, the adaptation authority configuration strategy of the first terminal is determined.
2. the method according to claim 1, wherein the method for determination of the permission fitting relation, comprising:
Authority configuration strategy to be tested is sent to second terminal;
Receive the first terminal feedback information that each second terminal is passed back;The first terminal feedback information includes described second
The third target identification information of terminal and Policy evaluation parameter corresponding with the authority configuration strategy to be tested;
Based on each Policy evaluation parameter, validation verification is carried out to the authority configuration strategy to be tested;
Based on the authority configuration strategy to be tested being verified and its corresponding third target identification information, the power is determined
Fitting relation is limited, second target identification information includes: that the authority configuration strategy to be tested that is verified is corresponding described
Third target identification information.
3. according to the method described in claim 2, it is characterized in that, to second terminal send authority configuration strategy to be tested it
Before, further includes:
Determine reference identification information, the reference identification information includes third terminal corresponding with the authority configuration strategy to be tested
Basic identification information, the basis identification information include manufacturer's information, model information, in operating system version information at least
It is a kind of;
Determine second terminal;The second terminal includes its basic identification information and the end that the reference identification information matches
End.
4. according to the method described in claim 2, it is characterized in that, the Policy evaluation parameter includes that strategy can suitability assessment
At least one of parameter and strategy execution state parameter;
It is described to be based on each Policy evaluation parameter, validation verification is carried out to the authority configuration strategy to be tested, comprising:
Based on each Policy evaluation parameter, the corresponding first net assessment parameter of the configuration strategy to be verified is determined;It is described
First net assessment parameter includes the index parameter of one kind or more, and the type of the index parameter includes overall conversion ratio, executes
Success rate and totality can fitting percentages;
Based on the first net assessment parameter, validation verification is carried out to the authority configuration strategy to be tested;
Wherein, the overall conversion ratio is determined based on the first total number and the second total number, and the rate that runs succeeded is based on described
Second total number and third total number determine, the totality can fitting percentage be based on first total number and the 4th total number is true
It is fixed;
First total number is the sum of the second terminal, and second total number is to confirm successful execution institute through user
The sum of the second terminal of authority configuration strategy to be tested is stated, the third total number is to have executed the permission to be tested to match
The sum of the second terminal of strategy is set, the 4th total number is described the be adapted to the authority configuration strategy to be tested
The sum of two terminals;
Second total number and the third total number determine that the described 4th is total based on each strategy execution state parameter
Mesh can suitability assessment parameter determination based on each strategy.
5. according to the method described in claim 4, it is characterized in that, the Policy evaluation parameter further includes executing number;
When the Policy evaluation parameter includes the execution number and the strategy execution state parameter, the index parameter
Type further includes the average time that runs succeeded.
6. method according to claim 4 or 5, which is characterized in that the first net assessment parameter includes two classes or more
Index parameter when, it is described to be based on the first net assessment parameter, validity is carried out to the authority configuration strategy to be tested and is tested
Card, comprising:
Based on all kinds of index parameters that the first net assessment parameter includes, determination is corresponding with the authority configuration strategy to be tested
Integrated decision-making parameter;
Based on the integrated decision-making parameter, validation verification is carried out to the authority configuration strategy to be tested.
7. according to the method described in claim 6, it is characterized in that, it is described based on the first net assessment parameter include it is each
Class index parameter, determining integrated decision-making parameter corresponding with the authority configuration strategy to be tested, comprising:
The weighted value of all kinds of index parameters and all kinds of index parameters that include based on the first net assessment parameter determines
Integrated decision-making parameter corresponding with the authority configuration strategy to be tested.
8. according to the method described in claim 6, it is characterized in that, it is described based on the first net assessment parameter include it is each
Class index parameter, determining integrated decision-making parameter corresponding with the authority configuration strategy to be tested, comprising:
Priority-level based on all kinds of index parameters that the first net assessment parameter includes successively judges all kinds of index ginsengs
Whether number meets its corresponding screening conditions;
When detecting the index parameter for meeting its corresponding screening conditions, by the index parameter be determined as with it is described to be tested
The corresponding integrated decision-making parameter of authority configuration strategy.
9. the method according to claim 1, wherein in the adaptation authority configuration of the determination first terminal
After strategy, further includes:
Receive the second terminal feedback information that the first terminal is passed back;The second terminal feedback information includes first mesh
Identification information and the corresponding Policy evaluation parameter of the adaptation authority configuration strategy are marked, the Policy evaluation parameter includes strategy
It can suitability assessment at least one of parameter and strategy execution state parameter;
Based on the first object identification information and Policy evaluation parameter in the second terminal feedback information, it is suitable to update the permission
With relationship.
10. the method according to claim 1, wherein the permission fitting relation further includes authority configuration strategy
With the corresponding relationship between the second net assessment parameter, the second net assessment parameter includes the index parameter of one kind or more,
The type of the index parameter includes overall conversion ratio, the rate that runs succeeded and totality can fitting percentage;
When the number of the candidate policy is more than two, the method also includes:
Based on the permission fitting relation, the corresponding second net assessment parameter of each candidate policy is determined;
The second net assessment parameter based on each candidate policy determines the first terminal from each candidate policy
It is adapted to authority configuration strategy.
11. a kind of determining device of authority configuration strategy, which is characterized in that described device includes:
First object identifier acquisition module, for obtaining the first object identification information of first terminal, the first object mark
Information includes at least one of device-fingerprint information and rights management program identification information of the first terminal;
Candidate policy determining module determines candidate policy for being based on permission fitting relation;The permission fitting relation includes the
Corresponding relationship between two target identification informations and authority configuration strategy, the candidate policy include identifying with the first object
Authority configuration strategy corresponding to second target identification information of information matches;
Adaptation strategies determining module determines the adaptation authority configuration strategy of the first terminal for being based on the candidate policy.
12. device according to claim 11, which is characterized in that further include:
Strategy sending module to be tested, for sending authority configuration strategy to be tested to second terminal;
First feedback information receiving module, the first terminal feedback information passed back for receiving each second terminal;First terminal is anti-
Feedforward information include second terminal third target identification information and Policy evaluation parameter corresponding with authority configuration strategy to be tested;
Validation verification module carries out validation verification to authority configuration strategy to be tested for being based on each Policy evaluation parameter;
Permission fitting relation determining module, for based on the authority configuration strategy to be tested and its corresponding third mesh being verified
Identification information is marked, define the competence fitting relation;Second target identification information includes: the authority configuration strategy pair to be tested being verified
The third target identification information answered.
13. device according to claim 12, which is characterized in that further include:
Reference identification obtains module, and for obtaining reference identification information, reference identification information includes and authority configuration strategy to be tested
The basic identification information of corresponding third terminal, basic identification information include manufacturer's information, model information, operating system version letter
At least one of breath;
Terminal deciding module to be measured, for determining second terminal;Second terminal includes that its basic identification information and reference identification are believed
The matched terminal of manner of breathing.
14. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the computer program is located
The step of reason device realizes method described in any one of claims 1 to 10 when executing.
15. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 10 the method when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810354753.0A CN110390205B (en) | 2018-04-19 | 2018-04-19 | Method and device for determining permission configuration policy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810354753.0A CN110390205B (en) | 2018-04-19 | 2018-04-19 | Method and device for determining permission configuration policy |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110390205A true CN110390205A (en) | 2019-10-29 |
CN110390205B CN110390205B (en) | 2023-05-23 |
Family
ID=68284054
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810354753.0A Active CN110390205B (en) | 2018-04-19 | 2018-04-19 | Method and device for determining permission configuration policy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110390205B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111079125A (en) * | 2019-12-23 | 2020-04-28 | 飞天诚信科技股份有限公司 | Method and device for calling third-party library dynamic lifting authority by application program |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101571897A (en) * | 2009-06-04 | 2009-11-04 | 浙江大学 | Method for controlling access permission of massive objects in computer system |
CN103500300A (en) * | 2013-10-15 | 2014-01-08 | 北京国双科技有限公司 | User right verification method and device |
CN103546436A (en) * | 2012-07-13 | 2014-01-29 | 中兴通讯股份有限公司 | Security control method, terminal, and cloud server |
CN104462978A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for application program authority management |
US20150200971A1 (en) * | 2012-09-26 | 2015-07-16 | Kabushiki Kaisha Toshiba | Policy management system, id provider system, and policy evaluation device |
CN107465687A (en) * | 2017-08-31 | 2017-12-12 | 深圳英飞拓科技股份有限公司 | A kind of implementation method of authority configuration, device and terminal |
-
2018
- 2018-04-19 CN CN201810354753.0A patent/CN110390205B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101571897A (en) * | 2009-06-04 | 2009-11-04 | 浙江大学 | Method for controlling access permission of massive objects in computer system |
CN103546436A (en) * | 2012-07-13 | 2014-01-29 | 中兴通讯股份有限公司 | Security control method, terminal, and cloud server |
US20150200971A1 (en) * | 2012-09-26 | 2015-07-16 | Kabushiki Kaisha Toshiba | Policy management system, id provider system, and policy evaluation device |
CN103500300A (en) * | 2013-10-15 | 2014-01-08 | 北京国双科技有限公司 | User right verification method and device |
CN104462978A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for application program authority management |
CN107465687A (en) * | 2017-08-31 | 2017-12-12 | 深圳英飞拓科技股份有限公司 | A kind of implementation method of authority configuration, device and terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111079125A (en) * | 2019-12-23 | 2020-04-28 | 飞天诚信科技股份有限公司 | Method and device for calling third-party library dynamic lifting authority by application program |
Also Published As
Publication number | Publication date |
---|---|
CN110390205B (en) | 2023-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107894952A (en) | Generation method, device, equipment and the readable storage medium storing program for executing of interface testing use-case | |
CN103886246B (en) | The method and apparatus for supporting the dynamic that authentication device guides safely to change | |
CN109240838A (en) | Interface call method, device, computer equipment and storage medium | |
CN104376266B (en) | The determination method and device of application software level of security | |
US9235840B2 (en) | Electronic transaction notification system and method | |
CN109063952B (en) | Policy generation and risk control method and device | |
CN109509021A (en) | Abnormality recognition method, device, server and the storage medium of Behavior-based control track | |
CN109272381A (en) | Business recommended method, apparatus, electronic equipment and readable storage medium storing program for executing | |
CN107908485A (en) | Interface parameters transmission method, device, equipment and computer-readable recording medium | |
CN110224855A (en) | Register method, device, computer equipment and the storage medium of micro services example | |
CN108459964A (en) | Test cases selection method, apparatus, equipment and computer readable storage medium | |
CN109726105A (en) | Test data building method, device, equipment and storage medium | |
CN110363026A (en) | File operation method, device, equipment, system and computer readable storage medium | |
CN109829277A (en) | Terminal unlock method, device, computer equipment and storage medium | |
CN108845808A (en) | Middleware installation method, device, computer equipment and storage medium | |
CN109669859A (en) | Service test method, device, computer equipment and storage medium | |
CN107908556A (en) | Interface test method, device, equipment and computer-readable recording medium | |
CN109245928A (en) | Setting method and device, the terminal management system of configuration information | |
CN110177378A (en) | A kind of automated testing method and relevant device | |
CN110362967A (en) | The anti-tamper detection method of application program, device, terminal device and storage medium | |
CN109284198A (en) | A kind of method and apparatus verifying data | |
CN110309099A (en) | Interface managerial method, device, equipment and computer readable storage medium | |
CN109144487A (en) | Into part business development method, apparatus, computer equipment and storage medium | |
CN110119354A (en) | Method for testing software, device and electronic equipment based on Test cases technology | |
CN109582668A (en) | Service data management method, device, equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |