CN110928595A - Permission operation method and device - Google Patents
Permission operation method and device Download PDFInfo
- Publication number
- CN110928595A CN110928595A CN201811012758.1A CN201811012758A CN110928595A CN 110928595 A CN110928595 A CN 110928595A CN 201811012758 A CN201811012758 A CN 201811012758A CN 110928595 A CN110928595 A CN 110928595A
- Authority
- CN
- China
- Prior art keywords
- application
- identification
- switching
- target application
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 238000001514 detection method Methods 0.000 claims description 12
- 238000010586 diagram Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 11
- 238000004590 computer program Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000033001 locomotion Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000011800 void material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Abstract
The embodiment of the application provides a permission operation method and a permission operation device, wherein the method comprises the following steps: the method comprises the steps of detecting an identification of an application which runs in a foreground after application switching every time, obtaining a switching request submitted by a target application, determining whether the switching request is intercepted or not according to the identification of the application which is detected last time and the identification of the target application, and prompting permission operation on the target application if the switching request is intercepted, so that the condition that the switching request is intercepted is found in real time when the target application does not obtain the permission to be switched from a background to the foreground, the problem that the prompt is not carried out when the target application is not switched to the foreground is solved, the prompt function of the permission operation is realized, and the influence on the use of a user is reduced.
Description
Technical Field
The present application relates to the field of rights control technologies, and in particular, to a rights operation method, a rights operation device, and a device for rights operation.
Background
At present, various Android operating systems are available on the market, and many manufacturers provide operating systems for deep customization based on the Android operating systems. The application programs are usually developed based on a standard Android operating system, so that modification of the Android operating system by some manufacturers may bring unexpected influence on the application programs.
The applicant finds that part of manufacturers newly set a right for the application running in the background in the operating system provided by the applicant, and the right can prohibit the application running in the background from popping up an interface, namely, switching to the foreground for running. The permission does not belong to the standard permission of Android, and the application program cannot acquire the permission from a system interface. For example, the input method is applied to an application which runs in a background in normal use, the authority makes the input method default to other pages which cannot start the input method from a keyboard in other applications, such as management pages of skin, expression, setting and the like, and no prompt exists, so that after a user clicks a button which jumps to an input method application program on the keyboard, the situation of no response occurs, and the function of the user for normally using the input method is influenced.
Disclosure of Invention
In view of the above problems, the embodiments of the present application provide an authority operation method, an authority operation device, and an authority operation device, which overcome the above problems or at least partially solve the above problems.
In order to solve the above problem, the present application discloses a permission operation method, including:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching includes:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching further includes:
the identity of the most recently detected application is recorded.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the obtaining the handover request submitted for the target application includes:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
Optionally, the prompting of the permission operation on the target application includes
And providing a setting guide for removing the limit authority of the target application.
The embodiment of the application further discloses an authority operating device, which includes:
the identification detection module is used for detecting the identification of the application running in the foreground after each occurrence of application switching;
the request acquisition module is used for acquiring a switching request submitted by a target application;
an interception determining module, configured to determine whether the handover request is intercepted according to an identifier of the application detected last time and an identifier of the target application;
and the operation prompting module is used for prompting to carry out authority operation on the target application if the switching request is intercepted.
Optionally, the identification detection module includes:
the switching detection submodule is used for detecting the generated application switching through a callback interface provided by the input method framework;
and the identifier acquisition submodule is used for acquiring the identifier of the switched foreground running application.
Optionally, the identification detection module further includes:
and the identification recording submodule is used for recording the identification of the application which is detected last time.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the request obtaining module includes:
the time acquisition submodule is used for acquiring the submission time of the switching request;
the interception determination module includes:
the identification comparison submodule is used for comparing whether the identification of the application detected last time is consistent with the identification of the target application or not when a preset time length passes after the submission time;
and the interception determining submodule is used for determining that the switching request is intercepted if the comparison result is inconsistent.
Optionally, the operation prompting module includes:
and the guide providing sub-module is used for providing a setting guide for removing the limit authority of the target application.
The embodiment of the application also discloses a device for permission operation, which comprises a memory and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs are configured to be executed by one or more processors and comprise instructions for:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching includes:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching further includes:
the identity of the most recently detected application is recorded.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the obtaining the handover request submitted for the target application includes:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
Optionally, the prompting of the permission operation on the target application includes
And providing a setting guide for removing the limit authority of the target application.
The embodiment of the application has the following advantages:
in summary, according to the embodiment of the present application, the identifier of the application that runs in the foreground after each occurrence of application switching is detected, the switching request submitted for the target application is obtained, whether the switching request is intercepted is determined according to the identifier of the application that is detected last time and the identifier of the target application, and if the switching request is intercepted, the permission operation is prompted to the target application, so that when the target application does not obtain the permission to be switched from the background to the foreground, the condition that the switching request is intercepted is found in real time, the problem that no prompt is performed when the target application is not switched to the foreground is solved, the prompt function for the permission operation is realized, and the influence on the use of the user is reduced.
Drawings
FIG. 1 is a flow chart illustrating the steps of a first embodiment of a rights operation method of the present application;
FIG. 2 is a flowchart illustrating steps of a second embodiment of a rights operation method according to the present application;
FIG. 3 is a block diagram of an embodiment of a rights management device according to the present application;
fig. 4 is a block diagram illustrating an apparatus for a rights operation according to an example embodiment.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating steps of a first embodiment of an authority operation method according to the present application is shown, which may specifically include the following steps:
In this embodiment of the application, the application includes an input method application, a social media application, a network communication application, an online shopping payment application, an audio/video playing application, a system security application, and the like, or any other application, which is not limited in this embodiment of the application. The application can be divided into two states of foreground operation and background operation, wherein the interface of the application can be displayed when the foreground operates, and the interface of the application can not be displayed when the background operates. When the application runs in the background, the interface can be popped up, and the application is switched to the foreground to run.
In this embodiment of the present application, the application switching includes switching an application running in the foreground to another application, or opening an application to the foreground to run, or the like, or switching any other application running in the foreground, which is not limited in this embodiment of the present application. For example, the input method application is switched from background running to foreground running, the application a running in foreground is switched to application B, and the like.
In this embodiment of the present application, the identifier of the application is used to uniquely identify one application in the system, and includes a package name (packageaname) of the application, or any other applicable identifier, which is not limited in this embodiment of the present application.
In this embodiment of the present application, optionally, the identifier of the application includes a package name of the application. In an operating system such as the Android system or any other suitable operating system, package names are used to uniquely identify an application, and different applications may have the same name, but package names may not be the same.
In the embodiment of the application, each occurrence of application switching is detected, and the identifier of the application running in the foreground after switching is obtained. The specific implementation mode can include: the method comprises the steps of detecting the application switching through a callback interface provided by an input method framework, acquiring an identifier of an application running in a foreground after the switching, recording the identifier of the application detected last time after the identifier is acquired, and specifically including any applicable implementation mode, wherein the method is not limited by the embodiment of the application.
In the embodiment of the application, when the target application needs to be switched to the foreground operation, a switching request is sent to the system service. For example, a switching request for switching the input method application from the background to the foreground is requested to display the interface of the input method application.
For example, when inputting in any application running in the foreground, the input method keyboard is called up, and a function button on the keyboard is clicked, so that the user can jump to an interface of the input method application such as an input method skin market, expression package management, input method setting and the like, that is, a switching request for the input method application is submitted to the system service.
In the embodiment of the application, after each application switching, the identifier of the application is detected, after the switching request is obtained, according to the identifier of the application detected last time and the identifier of the target application, if the identifier of the application detected last time is consistent with the identifier of the target application, it is determined that the switching request is not intercepted, and if the identifier of the application detected last time is inconsistent with the identifier of the target application, it is determined that the switching request is not switched to the target application, that is, the switching request is intercepted, which indicates that the target application does not have the right to be directly switched to the foreground when the application is operated in the background.
In the embodiment of the present application, an implementation manner of determining whether a handover request is intercepted includes: when a preset time length passes after the submission time, whether the switching request is intercepted or not is determined by comparing the application identifier detected last time with the target application identifier, or any other suitable implementation manner is determined, which is not limited in the embodiment of the present application.
And 104, if the switching request is intercepted, prompting to carry out permission operation on the target application.
In the embodiment of the application, if the switching request is intercepted, it is indicated that the target application running in the background is prohibited from popping up the interface, that is, the target application is switched to the foreground running, at this time, permission path guidance is given, a user is prompted to perform permission operation on the target application, and corresponding operation is performed in the permission management of the operating system, so that the target application has the permission to be switched to the foreground running.
In summary, according to the embodiment of the present application, the identifier of the application that runs in the foreground after each occurrence of application switching is detected, the switching request submitted for the target application is obtained, whether the switching request is intercepted is determined according to the identifier of the application that is detected last time and the identifier of the target application, and if the switching request is intercepted, the permission operation is prompted to the target application, so that when the target application does not obtain the permission to be switched from the background to the foreground, the condition that the switching request is intercepted is found in real time, the problem that no prompt is performed when the target application is not switched to the foreground is solved, the prompt function for the permission operation is realized, and the influence on the use of the user is reduced.
Referring to fig. 2, a flowchart illustrating steps of a second embodiment of the authority operation method of the present application is shown, which may specifically include the following steps:
In the embodiment of the present application, an Input Method Framework (IMF) includes a software product that provides basic functions required by specifications in order to implement an industry standard of an input method or a software component specification for completing basic tasks of an input method. The input method framework provides some callback interfaces, namely callback functions, for input method applications. One of the callback interfaces may be used to detect an occurrence of an application switch and to obtain an identification of an application running in foreground. For example, in the Android input method framework, a callback function public void onStartInput (EditorInfo attribute) is provided, which starts to execute when the input method runs in the background to detect an application switch that occurs. In the parameter attribute, the attribute. packagename object is the package name of the application running in foreground after switching.
In the embodiment of the application, after the callback interface detects the application switching, the identifier of the application running in the foreground after switching is acquired and returned to the input method application.
In the embodiment of the application, after the input method application acquires the application identifier, only the identifier of the application detected last time is recorded, that is, after a new application identifier is detected each time, the last detected application identifier is covered, and only the last detection result is retained.
In the embodiment of the application, when the handover request submitted by the target application is obtained, the time of receiving the handover request is obtained at the same time and is recorded as the submission time.
In the embodiment of the application, after the time is submitted and after the time is judged to be over the preset time length, the identification of the application detected last time is extracted from the record, and whether the identification of the application detected last time is consistent with the identification of the target application or not is compared. The target application runs in the background, and the target application can obtain the identification of the target application, so that whether the identifications are consistent or not is compared, that is, whether the application is switched or not can be judged, namely whether the application request is intercepted or not is judged. The preset duration can be set to any applicable time according to actual needs, and the embodiment of the application is not limited to this.
And step 206, if the comparison result is inconsistent, determining that the switching request is intercepted.
In this embodiment of the application, if the comparison result is inconsistent and the identifier of the application including the last detection is different from the identifier of the target application, it is determined that the application running in the foreground is not switched to the target application, that is, the switching request is intercepted.
In the embodiment of the application, the limit authority is that the target application is limited to be switched to the foreground for running from the background, for example, an operating system provided by some manufacturers adds a limit authority for the application running in the background, and the limit authority can prohibit the application running in the background from popping up an interface, namely, switching to the foreground for running. Any applicable restriction authority can be specifically included, and the embodiment of the application is not limited thereto.
In the embodiment of the present application, when the restriction right for the target application is in effect, the user cannot know the reason why the target application cannot be switched to the foreground operation, and even no method for solving the usage problem is known, so that it is necessary to provide a setting guidance for removing the restriction right of the target application to the user when it is determined that the switching request is intercepted. The set guidance includes guidance in a form of graphics and text, or automatic jump to a corresponding setting in the system, or any other applicable guidance form, which is not limited in the embodiment of the present application.
To sum up, according to the embodiments of the present application, an occurrence of application switching is detected through a callback interface provided by an input method framework, an identifier of an application running in a foreground after the switching is obtained, an identifier of a most recently detected application is recorded, a switching request submitted for a target application and a submission time of the switching request are obtained, when a preset time length passes after the submission time, whether the switching request is intercepted is determined by comparing the identifier of the most recently detected application with the identifier of the target application, if the switching request is intercepted, a setting guidance for removing a limit right of the target application is provided, so that when the target application does not obtain a right to be switched from a background to the foreground, a situation that the switching request is intercepted is found in real time, a problem that no prompt is given when the target application is not switched to the foreground is solved, and a user is helped to remove the limit right of a system to the target application, the impact on the user usage is reduced.
It should be noted that, for simplicity of description, the method embodiments are described as a series of motion combinations, but those skilled in the art should understand that the embodiment of the present application is not limited by the described sequence of motion actions, because some steps may be performed in other sequences or simultaneously according to the embodiment of the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are preferred and that the motions described are not necessarily required for the embodiments of the present application.
Referring to fig. 3, a block diagram of a structure of an embodiment of an authority operating apparatus according to the present application is shown, which may specifically include:
an identifier detection module 301, configured to detect an identifier of an application that runs in the foreground after each occurrence of application switching;
a request obtaining module 302, configured to obtain a handover request submitted for a target application;
an interception determining module 303, configured to determine whether the handover request is intercepted according to an identifier of the application detected last time and an identifier of the target application;
an operation prompting module 304, configured to prompt to perform an authority operation on the target application if the switching request is intercepted.
In this embodiment of the application, optionally, the identifier detecting module includes:
the switching detection submodule is used for detecting the generated application switching through a callback interface provided by the input method framework;
and the identifier acquisition submodule is used for acquiring the identifier of the switched foreground running application.
In this embodiment of the application, optionally, the identifier detecting module further includes:
and the identification recording submodule is used for recording the identification of the application which is detected last time.
In this embodiment of the present application, optionally, the identifier of the application includes a package name of the application.
In this embodiment of the application, optionally, the request obtaining module includes:
the time acquisition submodule is used for acquiring the submission time of the switching request;
the interception determination module includes:
the identification comparison submodule is used for comparing whether the identification of the application detected last time is consistent with the identification of the target application or not when a preset time length passes after the submission time;
and the interception determining submodule is used for determining that the switching request is intercepted if the comparison result is inconsistent.
In this embodiment of the application, optionally, the operation prompting module includes:
and the guide providing sub-module is used for providing a setting guide for removing the limit authority of the target application.
In summary, according to the embodiment of the present application, the identifier of the application that runs in the foreground after each occurrence of application switching is detected, the switching request submitted for the target application is obtained, whether the switching request is intercepted is determined according to the identifier of the application that is detected last time and the identifier of the target application, and if the switching request is intercepted, the permission operation is prompted to the target application, so that when the target application does not obtain the permission to be switched from the background to the foreground, the condition that the switching request is intercepted is found in real time, the problem that no prompt is performed when the target application is not switched to the foreground is solved, the prompt function for the permission operation is realized, and the influence on the use of the user is reduced.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 4 is a block diagram illustrating an apparatus 400 for a rights operation according to an example embodiment. For example, the apparatus 400 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 4, the apparatus 400 may include one or more of the following components: processing components 402, memory 404, power components 406, multimedia components 408, audio components 410, input/output (I/O) interfaces 412, sensor components 414, and communication components 416.
The processing component 402 generally controls overall operation of the apparatus 400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing element 402 may include one or more processors 420 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 402 can include one or more modules that facilitate interaction between the processing component 402 and other components. For example, the processing component 402 can include a multimedia module to facilitate interaction between the multimedia component 408 and the processing component 402.
The memory 404 is configured to store various types of data to support operations at the device 400. Examples of such data include instructions for any application or method operating on the device 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 404 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The multimedia component 408 includes a screen that provides an output interface between the device 400 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 408 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 400 is in an operational mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 410 is configured to output and/or input audio signals. For example, audio component 410 includes a Microphone (MIC) configured to receive external audio signals when apparatus 400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 404 or transmitted via the communication component 416. In some embodiments, audio component 410 also includes a speaker for outputting audio signals.
The I/O interface 412 provides an interface between the processing component 402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 414 includes one or more sensors for providing various aspects of status assessment for the apparatus 400. For example, the sensor component 414 can detect the open/closed state of the device 400, the relative positioning of components, such as a display and keypad of the apparatus 400, the sensor component 414 can also detect a change in the position of the apparatus 400 or a component of the apparatus 400, the presence or absence of user contact with the apparatus 400, orientation or acceleration/deceleration of the apparatus 400, and a change in the temperature of the apparatus 400. The sensor assembly 414 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 416 is configured to facilitate wired or wireless communication between the apparatus 400 and other devices. The apparatus 400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 416 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 504 comprising instructions, executable by the processor 520 of the apparatus 500 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium in which instructions, when executed by a processor of a device (smart terminal or server), enable the device to perform a method of operations for rights, the method comprising:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching includes:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching further includes:
the identity of the most recently detected application is recorded.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the obtaining the handover request submitted for the target application includes:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The authority operation method, the authority operation device and the authority operation device provided by the application are introduced in detail, specific examples are applied in the description to explain the principle and the implementation mode of the application, and the description of the above embodiments is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (10)
1. A method of rights manipulation, comprising:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
2. The method of claim 1, wherein detecting the identity of the application running in the foreground each time an application switch occurs comprises:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
3. The method of claim 2, wherein detecting the identity of the application running in the foreground each time an application switch occurs further comprises:
the identity of the most recently detected application is recorded.
4. The method of claim 1, wherein the identification of the application comprises a package name of the application.
5. The method of claim 1, wherein obtaining the handover request submitted for the target application comprises:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
6. The method of claim 1, wherein prompting for permission to operate on the target application comprises prompting for permission to operate on the target application
And providing a setting guide for removing the limit authority of the target application.
7. An authority operating apparatus, comprising:
the identification detection module is used for detecting the identification of the application running in the foreground after each occurrence of application switching;
the request acquisition module is used for acquiring a switching request submitted by a target application;
an interception determining module, configured to determine whether the handover request is intercepted according to an identifier of the application detected last time and an identifier of the target application;
and the operation prompting module is used for prompting to carry out authority operation on the target application if the switching request is intercepted.
8. The apparatus of claim 7, wherein the identity detection module comprises:
the switching detection submodule is used for detecting the generated application switching through a callback interface provided by the input method framework;
and the identifier acquisition submodule is used for acquiring the identifier of the switched foreground running application.
9. The apparatus of claim 8, wherein the identification detection module further comprises:
and the identification recording submodule is used for recording the identification of the application which is detected last time.
10. An apparatus for privilege operation comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors the one or more programs comprising instructions for:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811012758.1A CN110928595B (en) | 2018-08-31 | 2018-08-31 | Authority operation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811012758.1A CN110928595B (en) | 2018-08-31 | 2018-08-31 | Authority operation method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110928595A true CN110928595A (en) | 2020-03-27 |
CN110928595B CN110928595B (en) | 2024-02-02 |
Family
ID=69854998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811012758.1A Active CN110928595B (en) | 2018-08-31 | 2018-08-31 | Authority operation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110928595B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114518924A (en) * | 2022-01-29 | 2022-05-20 | 苏州达家迎信息技术有限公司 | Page display method, device, equipment and storage medium for mobile client |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077335A (en) * | 2011-08-24 | 2013-05-01 | 株式会社泛泰 | Apparatus and method for controlling permissions in mobile terminal |
CN103824015A (en) * | 2014-02-26 | 2014-05-28 | 珠海市君天电子科技有限公司 | Application program control method, device and system |
CN104376263A (en) * | 2014-12-09 | 2015-02-25 | 北京奇虎科技有限公司 | Application behavior intercepting method and application behavior intercepting device |
CN104462978A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for application program authority management |
CN104657213A (en) * | 2015-02-13 | 2015-05-27 | 深圳酷派技术有限公司 | Intersystem application switching method and terminal |
CN105868624A (en) * | 2016-03-23 | 2016-08-17 | 北京小米移动软件有限公司 | Application program authority management method and device |
CN106933633A (en) * | 2017-03-14 | 2017-07-07 | 北京奇虎科技有限公司 | Right management method, device and mobile terminal |
US20180089452A1 (en) * | 2016-09-28 | 2018-03-29 | International Business Machines Corporation | Application recommendation based on permissions |
CN107992360A (en) * | 2017-11-30 | 2018-05-04 | 努比亚技术有限公司 | Using switching handling method, mobile terminal and readable storage medium storing program for executing |
CN108347361A (en) * | 2018-03-06 | 2018-07-31 | 平安普惠企业管理有限公司 | Applied program testing method, device, computer equipment and storage medium |
CN108427530A (en) * | 2017-02-14 | 2018-08-21 | 腾讯科技(深圳)有限公司 | A kind of information processing method and terminal |
-
2018
- 2018-08-31 CN CN201811012758.1A patent/CN110928595B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077335A (en) * | 2011-08-24 | 2013-05-01 | 株式会社泛泰 | Apparatus and method for controlling permissions in mobile terminal |
CN103824015A (en) * | 2014-02-26 | 2014-05-28 | 珠海市君天电子科技有限公司 | Application program control method, device and system |
CN104376263A (en) * | 2014-12-09 | 2015-02-25 | 北京奇虎科技有限公司 | Application behavior intercepting method and application behavior intercepting device |
CN104462978A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Method and device for application program authority management |
CN104657213A (en) * | 2015-02-13 | 2015-05-27 | 深圳酷派技术有限公司 | Intersystem application switching method and terminal |
CN105868624A (en) * | 2016-03-23 | 2016-08-17 | 北京小米移动软件有限公司 | Application program authority management method and device |
US20180089452A1 (en) * | 2016-09-28 | 2018-03-29 | International Business Machines Corporation | Application recommendation based on permissions |
CN108427530A (en) * | 2017-02-14 | 2018-08-21 | 腾讯科技(深圳)有限公司 | A kind of information processing method and terminal |
CN106933633A (en) * | 2017-03-14 | 2017-07-07 | 北京奇虎科技有限公司 | Right management method, device and mobile terminal |
CN107992360A (en) * | 2017-11-30 | 2018-05-04 | 努比亚技术有限公司 | Using switching handling method, mobile terminal and readable storage medium storing program for executing |
CN108347361A (en) * | 2018-03-06 | 2018-07-31 | 平安普惠企业管理有限公司 | Applied program testing method, device, computer equipment and storage medium |
Non-Patent Citations (3)
Title |
---|
DIMITRIS GENEIATAKIS: "A Permission verification approach for android mobile applications", COMPUTERS & SECURITY, vol. 49 * |
张若平;柳培忠;: "基于安卓系统的动态权限泄漏检测系统", 网络安全技术与应用, no. 06 * |
徐尉;吴敬征;: "Android权限滥用检测系统", 计算机系统应用, no. 10 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114518924A (en) * | 2022-01-29 | 2022-05-20 | 苏州达家迎信息技术有限公司 | Page display method, device, equipment and storage medium for mobile client |
CN114518924B (en) * | 2022-01-29 | 2024-02-02 | 苏州达家迎信息技术有限公司 | Page display method, device and equipment of mobile client and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110928595B (en) | 2024-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3133528B1 (en) | Method and apparatus for fingerprint identification | |
EP3300407B1 (en) | Method and device for processing verification code | |
US9800666B2 (en) | Method and client terminal for remote assistance | |
EP3226167A1 (en) | Payment method and apparatus | |
US9648152B2 (en) | Methods and devices for labeling a number | |
CN107562349B (en) | Method and device for executing processing | |
EP3171554A1 (en) | Method and device for displaying a message | |
CN109284149B (en) | Method and device for starting application program | |
CN107491681B (en) | Fingerprint information processing method and device | |
CN106354504B (en) | Message display method and device | |
US10558328B2 (en) | Display screen unlocking method and apparatus | |
CN111614990A (en) | Method and device for acquiring loading duration and electronic equipment | |
CN107656616B (en) | Input interface display method and device and electronic equipment | |
CN106940653B (en) | Method, apparatus and computer-readable storage medium for controlling application program | |
US10402562B2 (en) | Method and device for encrypting application | |
EP3255575A1 (en) | Application triggering method and device | |
CN111338715A (en) | Page sharing method and device, electronic equipment and storage medium | |
CN111221593A (en) | Dynamic loading method and device | |
CN110928595A (en) | Permission operation method and device | |
CN107422954B (en) | Lock screen prolonging method and device | |
CN107103231B (en) | Method and device for installing and managing application | |
CN105868338B (en) | Application processing method and device | |
CN113806741A (en) | Information processing method and device | |
CN106919395B (en) | Application notification display method and device | |
CN112333233A (en) | Event information reporting method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |