CN110928595A - Permission operation method and device - Google Patents

Permission operation method and device Download PDF

Info

Publication number
CN110928595A
CN110928595A CN201811012758.1A CN201811012758A CN110928595A CN 110928595 A CN110928595 A CN 110928595A CN 201811012758 A CN201811012758 A CN 201811012758A CN 110928595 A CN110928595 A CN 110928595A
Authority
CN
China
Prior art keywords
application
identification
switching
target application
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811012758.1A
Other languages
Chinese (zh)
Other versions
CN110928595B (en
Inventor
李利平
代敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sogou Technology Development Co Ltd
Original Assignee
Beijing Sogou Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sogou Technology Development Co Ltd filed Critical Beijing Sogou Technology Development Co Ltd
Priority to CN201811012758.1A priority Critical patent/CN110928595B/en
Publication of CN110928595A publication Critical patent/CN110928595A/en
Application granted granted Critical
Publication of CN110928595B publication Critical patent/CN110928595B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

The embodiment of the application provides a permission operation method and a permission operation device, wherein the method comprises the following steps: the method comprises the steps of detecting an identification of an application which runs in a foreground after application switching every time, obtaining a switching request submitted by a target application, determining whether the switching request is intercepted or not according to the identification of the application which is detected last time and the identification of the target application, and prompting permission operation on the target application if the switching request is intercepted, so that the condition that the switching request is intercepted is found in real time when the target application does not obtain the permission to be switched from a background to the foreground, the problem that the prompt is not carried out when the target application is not switched to the foreground is solved, the prompt function of the permission operation is realized, and the influence on the use of a user is reduced.

Description

Permission operation method and device
Technical Field
The present application relates to the field of rights control technologies, and in particular, to a rights operation method, a rights operation device, and a device for rights operation.
Background
At present, various Android operating systems are available on the market, and many manufacturers provide operating systems for deep customization based on the Android operating systems. The application programs are usually developed based on a standard Android operating system, so that modification of the Android operating system by some manufacturers may bring unexpected influence on the application programs.
The applicant finds that part of manufacturers newly set a right for the application running in the background in the operating system provided by the applicant, and the right can prohibit the application running in the background from popping up an interface, namely, switching to the foreground for running. The permission does not belong to the standard permission of Android, and the application program cannot acquire the permission from a system interface. For example, the input method is applied to an application which runs in a background in normal use, the authority makes the input method default to other pages which cannot start the input method from a keyboard in other applications, such as management pages of skin, expression, setting and the like, and no prompt exists, so that after a user clicks a button which jumps to an input method application program on the keyboard, the situation of no response occurs, and the function of the user for normally using the input method is influenced.
Disclosure of Invention
In view of the above problems, the embodiments of the present application provide an authority operation method, an authority operation device, and an authority operation device, which overcome the above problems or at least partially solve the above problems.
In order to solve the above problem, the present application discloses a permission operation method, including:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching includes:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching further includes:
the identity of the most recently detected application is recorded.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the obtaining the handover request submitted for the target application includes:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
Optionally, the prompting of the permission operation on the target application includes
And providing a setting guide for removing the limit authority of the target application.
The embodiment of the application further discloses an authority operating device, which includes:
the identification detection module is used for detecting the identification of the application running in the foreground after each occurrence of application switching;
the request acquisition module is used for acquiring a switching request submitted by a target application;
an interception determining module, configured to determine whether the handover request is intercepted according to an identifier of the application detected last time and an identifier of the target application;
and the operation prompting module is used for prompting to carry out authority operation on the target application if the switching request is intercepted.
Optionally, the identification detection module includes:
the switching detection submodule is used for detecting the generated application switching through a callback interface provided by the input method framework;
and the identifier acquisition submodule is used for acquiring the identifier of the switched foreground running application.
Optionally, the identification detection module further includes:
and the identification recording submodule is used for recording the identification of the application which is detected last time.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the request obtaining module includes:
the time acquisition submodule is used for acquiring the submission time of the switching request;
the interception determination module includes:
the identification comparison submodule is used for comparing whether the identification of the application detected last time is consistent with the identification of the target application or not when a preset time length passes after the submission time;
and the interception determining submodule is used for determining that the switching request is intercepted if the comparison result is inconsistent.
Optionally, the operation prompting module includes:
and the guide providing sub-module is used for providing a setting guide for removing the limit authority of the target application.
The embodiment of the application also discloses a device for permission operation, which comprises a memory and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs are configured to be executed by one or more processors and comprise instructions for:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching includes:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching further includes:
the identity of the most recently detected application is recorded.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the obtaining the handover request submitted for the target application includes:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
Optionally, the prompting of the permission operation on the target application includes
And providing a setting guide for removing the limit authority of the target application.
The embodiment of the application has the following advantages:
in summary, according to the embodiment of the present application, the identifier of the application that runs in the foreground after each occurrence of application switching is detected, the switching request submitted for the target application is obtained, whether the switching request is intercepted is determined according to the identifier of the application that is detected last time and the identifier of the target application, and if the switching request is intercepted, the permission operation is prompted to the target application, so that when the target application does not obtain the permission to be switched from the background to the foreground, the condition that the switching request is intercepted is found in real time, the problem that no prompt is performed when the target application is not switched to the foreground is solved, the prompt function for the permission operation is realized, and the influence on the use of the user is reduced.
Drawings
FIG. 1 is a flow chart illustrating the steps of a first embodiment of a rights operation method of the present application;
FIG. 2 is a flowchart illustrating steps of a second embodiment of a rights operation method according to the present application;
FIG. 3 is a block diagram of an embodiment of a rights management device according to the present application;
fig. 4 is a block diagram illustrating an apparatus for a rights operation according to an example embodiment.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating steps of a first embodiment of an authority operation method according to the present application is shown, which may specifically include the following steps:
step 101, detecting the identifier of the foreground running application after each occurrence of application switching.
In this embodiment of the application, the application includes an input method application, a social media application, a network communication application, an online shopping payment application, an audio/video playing application, a system security application, and the like, or any other application, which is not limited in this embodiment of the application. The application can be divided into two states of foreground operation and background operation, wherein the interface of the application can be displayed when the foreground operates, and the interface of the application can not be displayed when the background operates. When the application runs in the background, the interface can be popped up, and the application is switched to the foreground to run.
In this embodiment of the present application, the application switching includes switching an application running in the foreground to another application, or opening an application to the foreground to run, or the like, or switching any other application running in the foreground, which is not limited in this embodiment of the present application. For example, the input method application is switched from background running to foreground running, the application a running in foreground is switched to application B, and the like.
In this embodiment of the present application, the identifier of the application is used to uniquely identify one application in the system, and includes a package name (packageaname) of the application, or any other applicable identifier, which is not limited in this embodiment of the present application.
In this embodiment of the present application, optionally, the identifier of the application includes a package name of the application. In an operating system such as the Android system or any other suitable operating system, package names are used to uniquely identify an application, and different applications may have the same name, but package names may not be the same.
In the embodiment of the application, each occurrence of application switching is detected, and the identifier of the application running in the foreground after switching is obtained. The specific implementation mode can include: the method comprises the steps of detecting the application switching through a callback interface provided by an input method framework, acquiring an identifier of an application running in a foreground after the switching, recording the identifier of the application detected last time after the identifier is acquired, and specifically including any applicable implementation mode, wherein the method is not limited by the embodiment of the application.
Step 102, a handover request submitted for a target application is obtained.
In the embodiment of the application, when the target application needs to be switched to the foreground operation, a switching request is sent to the system service. For example, a switching request for switching the input method application from the background to the foreground is requested to display the interface of the input method application.
For example, when inputting in any application running in the foreground, the input method keyboard is called up, and a function button on the keyboard is clicked, so that the user can jump to an interface of the input method application such as an input method skin market, expression package management, input method setting and the like, that is, a switching request for the input method application is submitted to the system service.
Step 103, determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application.
In the embodiment of the application, after each application switching, the identifier of the application is detected, after the switching request is obtained, according to the identifier of the application detected last time and the identifier of the target application, if the identifier of the application detected last time is consistent with the identifier of the target application, it is determined that the switching request is not intercepted, and if the identifier of the application detected last time is inconsistent with the identifier of the target application, it is determined that the switching request is not switched to the target application, that is, the switching request is intercepted, which indicates that the target application does not have the right to be directly switched to the foreground when the application is operated in the background.
In the embodiment of the present application, an implementation manner of determining whether a handover request is intercepted includes: when a preset time length passes after the submission time, whether the switching request is intercepted or not is determined by comparing the application identifier detected last time with the target application identifier, or any other suitable implementation manner is determined, which is not limited in the embodiment of the present application.
And 104, if the switching request is intercepted, prompting to carry out permission operation on the target application.
In the embodiment of the application, if the switching request is intercepted, it is indicated that the target application running in the background is prohibited from popping up the interface, that is, the target application is switched to the foreground running, at this time, permission path guidance is given, a user is prompted to perform permission operation on the target application, and corresponding operation is performed in the permission management of the operating system, so that the target application has the permission to be switched to the foreground running.
In summary, according to the embodiment of the present application, the identifier of the application that runs in the foreground after each occurrence of application switching is detected, the switching request submitted for the target application is obtained, whether the switching request is intercepted is determined according to the identifier of the application that is detected last time and the identifier of the target application, and if the switching request is intercepted, the permission operation is prompted to the target application, so that when the target application does not obtain the permission to be switched from the background to the foreground, the condition that the switching request is intercepted is found in real time, the problem that no prompt is performed when the target application is not switched to the foreground is solved, the prompt function for the permission operation is realized, and the influence on the use of the user is reduced.
Referring to fig. 2, a flowchart illustrating steps of a second embodiment of the authority operation method of the present application is shown, which may specifically include the following steps:
step 201, detecting the occurring application switching through a callback interface provided by an input method framework.
In the embodiment of the present application, an Input Method Framework (IMF) includes a software product that provides basic functions required by specifications in order to implement an industry standard of an input method or a software component specification for completing basic tasks of an input method. The input method framework provides some callback interfaces, namely callback functions, for input method applications. One of the callback interfaces may be used to detect an occurrence of an application switch and to obtain an identification of an application running in foreground. For example, in the Android input method framework, a callback function public void onStartInput (EditorInfo attribute) is provided, which starts to execute when the input method runs in the background to detect an application switch that occurs. In the parameter attribute, the attribute. packagename object is the package name of the application running in foreground after switching.
Step 202, acquiring the identifier of the application running in foreground after switching.
In the embodiment of the application, after the callback interface detects the application switching, the identifier of the application running in the foreground after switching is acquired and returned to the input method application.
Step 203, record the identification of the application that was last detected.
In the embodiment of the application, after the input method application acquires the application identifier, only the identifier of the application detected last time is recorded, that is, after a new application identifier is detected each time, the last detected application identifier is covered, and only the last detection result is retained.
Step 204, acquiring a switching request submitted by the target application and the submission time of the switching request.
In the embodiment of the application, when the handover request submitted by the target application is obtained, the time of receiving the handover request is obtained at the same time and is recorded as the submission time.
Step 205, when a preset time length passes after the submission time, comparing whether the identifier of the application detected last time is consistent with the identifier of the target application.
In the embodiment of the application, after the time is submitted and after the time is judged to be over the preset time length, the identification of the application detected last time is extracted from the record, and whether the identification of the application detected last time is consistent with the identification of the target application or not is compared. The target application runs in the background, and the target application can obtain the identification of the target application, so that whether the identifications are consistent or not is compared, that is, whether the application is switched or not can be judged, namely whether the application request is intercepted or not is judged. The preset duration can be set to any applicable time according to actual needs, and the embodiment of the application is not limited to this.
And step 206, if the comparison result is inconsistent, determining that the switching request is intercepted.
In this embodiment of the application, if the comparison result is inconsistent and the identifier of the application including the last detection is different from the identifier of the target application, it is determined that the application running in the foreground is not switched to the target application, that is, the switching request is intercepted.
Step 207, if the switching request is intercepted, providing a setting guidance for releasing the limit authority of the target application.
In the embodiment of the application, the limit authority is that the target application is limited to be switched to the foreground for running from the background, for example, an operating system provided by some manufacturers adds a limit authority for the application running in the background, and the limit authority can prohibit the application running in the background from popping up an interface, namely, switching to the foreground for running. Any applicable restriction authority can be specifically included, and the embodiment of the application is not limited thereto.
In the embodiment of the present application, when the restriction right for the target application is in effect, the user cannot know the reason why the target application cannot be switched to the foreground operation, and even no method for solving the usage problem is known, so that it is necessary to provide a setting guidance for removing the restriction right of the target application to the user when it is determined that the switching request is intercepted. The set guidance includes guidance in a form of graphics and text, or automatic jump to a corresponding setting in the system, or any other applicable guidance form, which is not limited in the embodiment of the present application.
To sum up, according to the embodiments of the present application, an occurrence of application switching is detected through a callback interface provided by an input method framework, an identifier of an application running in a foreground after the switching is obtained, an identifier of a most recently detected application is recorded, a switching request submitted for a target application and a submission time of the switching request are obtained, when a preset time length passes after the submission time, whether the switching request is intercepted is determined by comparing the identifier of the most recently detected application with the identifier of the target application, if the switching request is intercepted, a setting guidance for removing a limit right of the target application is provided, so that when the target application does not obtain a right to be switched from a background to the foreground, a situation that the switching request is intercepted is found in real time, a problem that no prompt is given when the target application is not switched to the foreground is solved, and a user is helped to remove the limit right of a system to the target application, the impact on the user usage is reduced.
It should be noted that, for simplicity of description, the method embodiments are described as a series of motion combinations, but those skilled in the art should understand that the embodiment of the present application is not limited by the described sequence of motion actions, because some steps may be performed in other sequences or simultaneously according to the embodiment of the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are preferred and that the motions described are not necessarily required for the embodiments of the present application.
Referring to fig. 3, a block diagram of a structure of an embodiment of an authority operating apparatus according to the present application is shown, which may specifically include:
an identifier detection module 301, configured to detect an identifier of an application that runs in the foreground after each occurrence of application switching;
a request obtaining module 302, configured to obtain a handover request submitted for a target application;
an interception determining module 303, configured to determine whether the handover request is intercepted according to an identifier of the application detected last time and an identifier of the target application;
an operation prompting module 304, configured to prompt to perform an authority operation on the target application if the switching request is intercepted.
In this embodiment of the application, optionally, the identifier detecting module includes:
the switching detection submodule is used for detecting the generated application switching through a callback interface provided by the input method framework;
and the identifier acquisition submodule is used for acquiring the identifier of the switched foreground running application.
In this embodiment of the application, optionally, the identifier detecting module further includes:
and the identification recording submodule is used for recording the identification of the application which is detected last time.
In this embodiment of the present application, optionally, the identifier of the application includes a package name of the application.
In this embodiment of the application, optionally, the request obtaining module includes:
the time acquisition submodule is used for acquiring the submission time of the switching request;
the interception determination module includes:
the identification comparison submodule is used for comparing whether the identification of the application detected last time is consistent with the identification of the target application or not when a preset time length passes after the submission time;
and the interception determining submodule is used for determining that the switching request is intercepted if the comparison result is inconsistent.
In this embodiment of the application, optionally, the operation prompting module includes:
and the guide providing sub-module is used for providing a setting guide for removing the limit authority of the target application.
In summary, according to the embodiment of the present application, the identifier of the application that runs in the foreground after each occurrence of application switching is detected, the switching request submitted for the target application is obtained, whether the switching request is intercepted is determined according to the identifier of the application that is detected last time and the identifier of the target application, and if the switching request is intercepted, the permission operation is prompted to the target application, so that when the target application does not obtain the permission to be switched from the background to the foreground, the condition that the switching request is intercepted is found in real time, the problem that no prompt is performed when the target application is not switched to the foreground is solved, the prompt function for the permission operation is realized, and the influence on the use of the user is reduced.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 4 is a block diagram illustrating an apparatus 400 for a rights operation according to an example embodiment. For example, the apparatus 400 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 4, the apparatus 400 may include one or more of the following components: processing components 402, memory 404, power components 406, multimedia components 408, audio components 410, input/output (I/O) interfaces 412, sensor components 414, and communication components 416.
The processing component 402 generally controls overall operation of the apparatus 400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing element 402 may include one or more processors 420 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 402 can include one or more modules that facilitate interaction between the processing component 402 and other components. For example, the processing component 402 can include a multimedia module to facilitate interaction between the multimedia component 408 and the processing component 402.
The memory 404 is configured to store various types of data to support operations at the device 400. Examples of such data include instructions for any application or method operating on the device 400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 404 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power supply components 406 provide power to the various components of device 400. The power components 406 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 400.
The multimedia component 408 includes a screen that provides an output interface between the device 400 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 408 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 400 is in an operational mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 410 is configured to output and/or input audio signals. For example, audio component 410 includes a Microphone (MIC) configured to receive external audio signals when apparatus 400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 404 or transmitted via the communication component 416. In some embodiments, audio component 410 also includes a speaker for outputting audio signals.
The I/O interface 412 provides an interface between the processing component 402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 414 includes one or more sensors for providing various aspects of status assessment for the apparatus 400. For example, the sensor component 414 can detect the open/closed state of the device 400, the relative positioning of components, such as a display and keypad of the apparatus 400, the sensor component 414 can also detect a change in the position of the apparatus 400 or a component of the apparatus 400, the presence or absence of user contact with the apparatus 400, orientation or acceleration/deceleration of the apparatus 400, and a change in the temperature of the apparatus 400. The sensor assembly 414 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 416 is configured to facilitate wired or wireless communication between the apparatus 400 and other devices. The apparatus 400 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 416 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 504 comprising instructions, executable by the processor 520 of the apparatus 500 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium in which instructions, when executed by a processor of a device (smart terminal or server), enable the device to perform a method of operations for rights, the method comprising:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching includes:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
Optionally, the detecting an identifier of the application running in the foreground after each occurrence of the application switching further includes:
the identity of the most recently detected application is recorded.
Optionally, the identification of the application comprises a package name of the application.
Optionally, the obtaining the handover request submitted for the target application includes:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The authority operation method, the authority operation device and the authority operation device provided by the application are introduced in detail, specific examples are applied in the description to explain the principle and the implementation mode of the application, and the description of the above embodiments is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A method of rights manipulation, comprising:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
2. The method of claim 1, wherein detecting the identity of the application running in the foreground each time an application switch occurs comprises:
detecting the occurrence of application switching through a callback interface provided by an input method framework;
and acquiring the identifier of the application operated by the foreground after switching.
3. The method of claim 2, wherein detecting the identity of the application running in the foreground each time an application switch occurs further comprises:
the identity of the most recently detected application is recorded.
4. The method of claim 1, wherein the identification of the application comprises a package name of the application.
5. The method of claim 1, wherein obtaining the handover request submitted for the target application comprises:
acquiring the submission time of a switching request;
the determining whether the handover request is intercepted according to the identifier of the application detected last time and the identifier of the target application comprises:
when a preset time length passes after the submission time, comparing whether the identification of the application detected last time is consistent with the identification of the target application or not;
and if the comparison result is inconsistent, determining that the switching request is intercepted.
6. The method of claim 1, wherein prompting for permission to operate on the target application comprises prompting for permission to operate on the target application
And providing a setting guide for removing the limit authority of the target application.
7. An authority operating apparatus, comprising:
the identification detection module is used for detecting the identification of the application running in the foreground after each occurrence of application switching;
the request acquisition module is used for acquiring a switching request submitted by a target application;
an interception determining module, configured to determine whether the handover request is intercepted according to an identifier of the application detected last time and an identifier of the target application;
and the operation prompting module is used for prompting to carry out authority operation on the target application if the switching request is intercepted.
8. The apparatus of claim 7, wherein the identity detection module comprises:
the switching detection submodule is used for detecting the generated application switching through a callback interface provided by the input method framework;
and the identifier acquisition submodule is used for acquiring the identifier of the switched foreground running application.
9. The apparatus of claim 8, wherein the identification detection module further comprises:
and the identification recording submodule is used for recording the identification of the application which is detected last time.
10. An apparatus for privilege operation comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors the one or more programs comprising instructions for:
detecting the identification of the application running in the foreground after each occurrence of application switching;
acquiring a switching request submitted by a target application;
determining whether the switching request is intercepted according to the identification of the application detected last time and the identification of the target application;
and if the switching request is intercepted, prompting to carry out permission operation on the target application.
CN201811012758.1A 2018-08-31 2018-08-31 Authority operation method and device Active CN110928595B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811012758.1A CN110928595B (en) 2018-08-31 2018-08-31 Authority operation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811012758.1A CN110928595B (en) 2018-08-31 2018-08-31 Authority operation method and device

Publications (2)

Publication Number Publication Date
CN110928595A true CN110928595A (en) 2020-03-27
CN110928595B CN110928595B (en) 2024-02-02

Family

ID=69854998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811012758.1A Active CN110928595B (en) 2018-08-31 2018-08-31 Authority operation method and device

Country Status (1)

Country Link
CN (1) CN110928595B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114518924A (en) * 2022-01-29 2022-05-20 苏州达家迎信息技术有限公司 Page display method, device, equipment and storage medium for mobile client

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077335A (en) * 2011-08-24 2013-05-01 株式会社泛泰 Apparatus and method for controlling permissions in mobile terminal
CN103824015A (en) * 2014-02-26 2014-05-28 珠海市君天电子科技有限公司 Application program control method, device and system
CN104376263A (en) * 2014-12-09 2015-02-25 北京奇虎科技有限公司 Application behavior intercepting method and application behavior intercepting device
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management
CN104657213A (en) * 2015-02-13 2015-05-27 深圳酷派技术有限公司 Intersystem application switching method and terminal
CN105868624A (en) * 2016-03-23 2016-08-17 北京小米移动软件有限公司 Application program authority management method and device
CN106933633A (en) * 2017-03-14 2017-07-07 北京奇虎科技有限公司 Right management method, device and mobile terminal
US20180089452A1 (en) * 2016-09-28 2018-03-29 International Business Machines Corporation Application recommendation based on permissions
CN107992360A (en) * 2017-11-30 2018-05-04 努比亚技术有限公司 Using switching handling method, mobile terminal and readable storage medium storing program for executing
CN108347361A (en) * 2018-03-06 2018-07-31 平安普惠企业管理有限公司 Applied program testing method, device, computer equipment and storage medium
CN108427530A (en) * 2017-02-14 2018-08-21 腾讯科技(深圳)有限公司 A kind of information processing method and terminal

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077335A (en) * 2011-08-24 2013-05-01 株式会社泛泰 Apparatus and method for controlling permissions in mobile terminal
CN103824015A (en) * 2014-02-26 2014-05-28 珠海市君天电子科技有限公司 Application program control method, device and system
CN104376263A (en) * 2014-12-09 2015-02-25 北京奇虎科技有限公司 Application behavior intercepting method and application behavior intercepting device
CN104462978A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Method and device for application program authority management
CN104657213A (en) * 2015-02-13 2015-05-27 深圳酷派技术有限公司 Intersystem application switching method and terminal
CN105868624A (en) * 2016-03-23 2016-08-17 北京小米移动软件有限公司 Application program authority management method and device
US20180089452A1 (en) * 2016-09-28 2018-03-29 International Business Machines Corporation Application recommendation based on permissions
CN108427530A (en) * 2017-02-14 2018-08-21 腾讯科技(深圳)有限公司 A kind of information processing method and terminal
CN106933633A (en) * 2017-03-14 2017-07-07 北京奇虎科技有限公司 Right management method, device and mobile terminal
CN107992360A (en) * 2017-11-30 2018-05-04 努比亚技术有限公司 Using switching handling method, mobile terminal and readable storage medium storing program for executing
CN108347361A (en) * 2018-03-06 2018-07-31 平安普惠企业管理有限公司 Applied program testing method, device, computer equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DIMITRIS GENEIATAKIS: "A Permission verification approach for android mobile applications", COMPUTERS & SECURITY, vol. 49 *
张若平;柳培忠;: "基于安卓系统的动态权限泄漏检测系统", 网络安全技术与应用, no. 06 *
徐尉;吴敬征;: "Android权限滥用检测系统", 计算机系统应用, no. 10 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114518924A (en) * 2022-01-29 2022-05-20 苏州达家迎信息技术有限公司 Page display method, device, equipment and storage medium for mobile client
CN114518924B (en) * 2022-01-29 2024-02-02 苏州达家迎信息技术有限公司 Page display method, device and equipment of mobile client and storage medium

Also Published As

Publication number Publication date
CN110928595B (en) 2024-02-02

Similar Documents

Publication Publication Date Title
EP3133528B1 (en) Method and apparatus for fingerprint identification
EP3300407B1 (en) Method and device for processing verification code
US9800666B2 (en) Method and client terminal for remote assistance
EP3226167A1 (en) Payment method and apparatus
US9648152B2 (en) Methods and devices for labeling a number
CN107562349B (en) Method and device for executing processing
EP3171554A1 (en) Method and device for displaying a message
CN109284149B (en) Method and device for starting application program
CN107491681B (en) Fingerprint information processing method and device
CN106354504B (en) Message display method and device
US10558328B2 (en) Display screen unlocking method and apparatus
CN111614990A (en) Method and device for acquiring loading duration and electronic equipment
CN107656616B (en) Input interface display method and device and electronic equipment
CN106940653B (en) Method, apparatus and computer-readable storage medium for controlling application program
US10402562B2 (en) Method and device for encrypting application
EP3255575A1 (en) Application triggering method and device
CN111338715A (en) Page sharing method and device, electronic equipment and storage medium
CN111221593A (en) Dynamic loading method and device
CN110928595A (en) Permission operation method and device
CN107422954B (en) Lock screen prolonging method and device
CN107103231B (en) Method and device for installing and managing application
CN105868338B (en) Application processing method and device
CN113806741A (en) Information processing method and device
CN106919395B (en) Application notification display method and device
CN112333233A (en) Event information reporting method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant