CN111950012A - Application running method, device and equipment and computer readable storage medium - Google Patents

Application running method, device and equipment and computer readable storage medium Download PDF

Info

Publication number
CN111950012A
CN111950012A CN202010849194.8A CN202010849194A CN111950012A CN 111950012 A CN111950012 A CN 111950012A CN 202010849194 A CN202010849194 A CN 202010849194A CN 111950012 A CN111950012 A CN 111950012A
Authority
CN
China
Prior art keywords
application
authority
control software
management
permission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010849194.8A
Other languages
Chinese (zh)
Inventor
朱勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN202010849194.8A priority Critical patent/CN111950012A/en
Publication of CN111950012A publication Critical patent/CN111950012A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • User Interface Of Digital Computer (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses an application running method, which comprises the steps of receiving a control software application starting instruction; outputting each safety application icon according to the management and control software application starting instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state; receiving a target security application starting instruction; responding to the target security application starting instruction, and sharing the authority through the control software application so that the target security application enters an operating state according to the sharing authority; the application operation method can more effectively realize the system application icon hiding function, not only can ensure the system application safety, but also can simplify the system interface and improve the user experience. The application also discloses an application running device, equipment and a computer readable storage medium, which have the beneficial effects.

Description

Application running method, device and equipment and computer readable storage medium
Technical Field
The present application relates to the field of application development technologies, and in particular, to an application running method, and further, to an application running apparatus, a device, and a computer-readable storage medium.
Background
For some operating systems, the system can automatically filter out application programs without default starting interfaces when acquiring desktop icons, so that the default starting interfaces of the applications can be hidden through an application packaging technology, and the system cannot acquire the default starting interfaces, thereby realizing the function of hiding the desktop icons and ensuring the application safety.
However, for other operating systems (such as an Android 10 system), when a desktop icon is obtained, if it is found that an application does not have a default starting interface, a default starting interface is added to the application, and the newly added starting interface points to a detailed interface in system setting of the application, so that the function of the hidden desktop icon is disabled, the safety of the system application cannot be ensured, the system interface is more cumbersome, and the user experience is reduced.
Therefore, a problem to be solved by those skilled in the art is how to more effectively implement the system application icon hiding function to ensure the system application security and simplify the system interface.
Disclosure of Invention
The application operation method can more effectively realize the system application icon hiding function, not only can ensure the system application safety, but also can simplify the system interface and improve the user experience; another object of the present application is to provide an application running apparatus, an apparatus and a computer readable storage medium, all of which have the above advantages.
In a first aspect, the present application provides an application running method, including:
receiving a control software application starting instruction;
outputting each safety application icon according to the management and control software application starting instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state;
receiving a target security application starting instruction;
and responding to the target security application starting instruction, and sharing the authority through the management and control software application so that the target security application enters an operating state according to the sharing authority.
Preferably, the outputting each security application icon according to the management and control software application start instruction includes:
outputting a verification request according to the management and control software application starting instruction;
acquiring verification information corresponding to the verification request;
and verifying the verification information, and outputting each safety application icon when the verification is passed.
Preferably, the responding to the target security application start instruction, and performing permission sharing through a management and control software application, includes:
and intercepting an authority application initiated by the target security application according to the target security application starting instruction, and sending the authority application to the management and control software application so that the management and control software application obtains the authority according to the authority application and carries out authority sharing.
Preferably, the intercepting of the permission application initiated by the target security application according to the target security application start instruction includes:
and intercepting the permission application initiated by the target security application according to the target security application starting instruction by a hook technology.
Preferably, the acquiring of the right and the sharing of the right by the management and control software application according to the right application includes:
the management and control software initiates the authority application to an authority management service center;
receiving the authority fed back by the authority management service center according to the authority application;
the rights are shared through an identifier sharing mechanism.
Preferably, the setting the default start-up interface function to the disabled state includes:
and setting the function of the default starting interface to be in the forbidden state by deleting the default starting interface identifier in the application program corresponding to the security application.
Preferably, the setting the permission declaration function to the disabled state includes:
and setting the authority declaration function to be in the forbidden state by deleting the authority declaration tag in the application program corresponding to the security application.
In a second aspect, the present application further provides an application execution apparatus, including:
the first instruction receiving module is used for receiving a control software application starting instruction;
the icon feedback module is used for outputting each safety application icon according to the management and control software application starting instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state;
the second instruction receiving module is used for receiving a target security application starting instruction;
and the application running module is used for responding to the target security application starting instruction and sharing the authority through the control software application so as to enable the target security application to enter a running state according to the sharing authority.
In a third aspect, the present application further provides an application execution device, where the application execution device includes:
a memory for storing a computer program;
and the processor is used for realizing the steps of any application running method when the computer program is executed.
In a fourth aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of any one of the application running methods described above.
The application running method comprises the steps of receiving a control software application starting instruction; outputting each safety application icon according to the management and control software application starting instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state; receiving a target security application starting instruction; and responding to the target security application starting instruction, and sharing the authority through the management and control software application so that the target security application enters an operating state according to the sharing authority.
Therefore, according to the technical scheme provided by the application, the default starting interface function and the permission declaration function of the security application are set to be in the forbidden state in advance, so that the purpose of hiding the desktop icon is achieved, further, in order to ensure that the security application can normally operate, permission sharing can be performed between the security application and the management and control software application, so that the security application can enter the operating state by using the permission shared by the management and control software application, therefore, desktop icon hiding is achieved on the premise that the security application can normally operate, the security of the system application can be ensured, the system desktop can be simplified, and user experience is improved; in addition, the implementation mode has high applicability and is suitable for various application systems.
The application running device, the equipment and the computer readable storage medium provided by the application have the beneficial effects, and are not described again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flow chart of an application running method provided in the present application;
FIG. 2 is a timing diagram illustrating an application execution method provided herein;
fig. 3 is a schematic structural diagram of an application execution apparatus provided in the present application;
fig. 4 is a schematic structural diagram of an application execution device provided in the present application.
Detailed Description
The application operation method has the core that the application operation method can more effectively realize the system application icon hiding function, not only can ensure the system application safety, but also can simplify the system interface and improve the user experience; another core of the present application is to provide an application running apparatus, an application running device, and a computer-readable storage medium, all having the above beneficial effects.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The application running method provided by the application is applied to a scene that only icons are displayed on an aWork desktop by the security application and icons are not displayed on a system desktop when a management and control software application (such as aWork) is used as a security application unified entry, all or part of steps of the application running method can be executed by application running equipment, and the application running equipment can be specifically a mobile terminal, such as a mobile phone, a tablet computer and the like. At present, for some operating systems, such as an Android 10 system, when a desktop icon is obtained, if it is found that an application does not have a default starting interface, a default starting interface is added to the application, and the newly added starting interface points to a detailed interface in system setting of the application, so that a function of a hidden desktop icon is invalid. Therefore, in order to solve the problem, the application running method is provided, and the application running method can enable the security application icons to be only displayed on the management and control software application desktop, and the management and control software application icons are only displayed on the system desktop, so that the management and control software applications are used as a uniform inlet of the security applications, the security of the system applications can be ensured, the system interface can be simplified, and the user experience is improved.
In the following, the following technical solution is described by taking the application of the management and control software as aWork as an example. Those skilled in the art will appreciate that the governing software application is not limited to aWork.
Referring to fig. 1, fig. 1 is a schematic flow chart of an application running method provided in the present application, where the application running method may include:
s101: receiving a control software application starting instruction;
the step aims to receive a control software application starting instruction, and is used for starting a control software application aWork, wherein the aWork is control software of a user terminal, can uniformly manage security applications, and is provided with a uniform entrance function, and the user terminal can be a mobile phone specifically. The management and control software application starting instruction may be a click instruction of the user on the aWork icon, and is implemented by clicking the aWork icon on a front-end interface (i.e., a system interface) by the user, such as clicking the aWork icon once, clicking the aWork icon multiple times, pressing the aWork icon for a long time, and the like.
S102: outputting each safety application icon according to the control software application starting instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state;
the step aims to realize the output of each safety application icon, namely, each safety application icon is output in response to the management and control software application starting instruction. Specifically, because the aWork is a uniform security entry for each security application, the front-end interface only displays the aWork icon, but not displays the icons of the security applications, and therefore, when the user starts the aWork on the system desktop, the user enters the aWork desktop and displays the icons of the security applications on the aWork desktop.
And the default starting interface function and the authority declaration function of each safety application in the aWork desktop are preset to be in a forbidden state. Because some operating systems (such as an Android 10 system) need to hide the corresponding desktop icon when the security application does not declare any authority, if only the default start interface function of the security application is disabled and the authority declaration function is not disabled, the system will add a default start interface for the security application when acquiring the desktop icon, which results in the failure of the desktop icon hiding function, so that the default start interface function and the authority declaration function are set to be disabled simultaneously in advance, which can effectively ensure that the security application icon is not displayed on the system desktop, and realize the security application icon hiding function.
As a preferred embodiment, the outputting each secure application icon according to the managed software application start instruction may include: outputting a verification request according to a management and control software application starting instruction; acquiring verification information corresponding to the verification request; and verifying the verification information, and outputting each safety application icon when the verification is passed.
The preferred embodiment provides a more specific output method for the security application icons, so as to further improve the application security, that is, after receiving the management and control software application start instruction, before outputting each security application icon, the validity of the management and control software application start instruction is verified.
Specifically, when a management and control software application starting instruction is received, a verification request is output first, specifically, a user is prompted to input verification information such as a user name and a password on a system desktop, further, the system verifies the verification information input by the user, specifically, whether the verification information input by the user is consistent with pre-stored standard information is judged, if the verification information input by the user is consistent with the pre-stored standard information, verification is passed, at this time, each safety application icon is output and displayed on an aWork desktop, otherwise, a verification failure prompt is output, and each safety application icon is rejected to be output. Standard information pre-stored in the system for realizing the validity verification can be obtained by a user when the user registers aWork for the first time. Furthermore, the highest verifiable times can be set, the user is allowed to perform multiple verifications, when the verification times exceed the highest verifiable times, the security application icons are refused to be displayed, and more specifically, the security application icons can be refused to be displayed in a mode of refusing to log in aWork, so that the situation that the security application icons cannot be displayed due to misoperation of the user is effectively avoided. Of course, the specific value of the maximum verifiable frequency does not affect the implementation of the technical scheme, and the technical personnel can set the value according to the actual situation, which is not limited in the present application.
As a preferred embodiment, setting the default start-up interface function to the disabled state may include: and setting the default starting interface function to be in a forbidden state by deleting the default starting interface identifier in the application program corresponding to the security application.
The preferred embodiment provides a specific implementation method for disabling the default starting interface function of the security application, that is, deleting the default starting interface identifier in the application program corresponding to the security application. In the Android system, the default starting interface identifier is specifically an Android. Specifically, for the Android system mechanism, the system determines whether the application program is displayed in the program list by searching for the Android.
As a preferred embodiment, setting the right declaration function to the disabled state may include: and setting the authority declaration function to be in a forbidden state by deleting the authority declaration tag in the application program corresponding to the security application.
The preferred embodiment provides a more specific implementation method for disabling the security application permission declaration function, that is, deleting the permission declaration function tag in the application program corresponding to the security application. In the Android system, the permission declaration functional tag is specifically a uses-permission tag. Specifically, the application program of each secure application in the android system declares each authority through the uses-permission tag, so that all the authority declarations marked by the uses-permission tag can be deleted, so that the secure application does not declare any authority.
S103: receiving a target security application starting instruction;
this step is intended to enable the reception of a target security application start instruction for starting a target security application, i.e. a security application that a user needs to use. Similarly, the target security application start instruction may be a click instruction of the user on the target security application icon, and is implemented by clicking the target security application icon on the aWork desktop by the user, such as clicking the target security application icon once, clicking the target security application icon multiple times, and long-pressing the target security application icon. More specifically, a user clicks an aWork icon of the system desktop to enter the aWork desktop, and the aWork desktop displays each safety application icon for the user to select; further, when the user determines the target security application and clicks an icon of the target security application, the system receives a target security application start instruction.
S104: and responding to a target security application starting instruction, and sharing the authority through the management and control software application so that the target security application enters an operating state according to the sharing authority.
The step aims to realize authority sharing through aWork and ensure normal operation of the safety application. Specifically, since the authority declaration function of each security application in the aWork is set to be in a forbidden state in advance, each security application cannot normally run, and in order to solve the problem, authority sharing can be performed through the aWork, namely, the aWork acquires the authority and shares the authority to the target security application, so that the target security application can enter a normal running state according to the sharing authority, and therefore, the security application icon hiding function can be achieved, and normal running of the security application can be guaranteed.
As a preferred embodiment, the above responding to the target security application start instruction, and performing permission sharing through the management and control software application, may include: and intercepting the permission application initiated by the target security application according to the target security application starting instruction, and sending the permission application to the control software application so that the control software application obtains the permission according to the permission application and carries out permission sharing.
The preferred embodiment provides a more specific permission sharing method, when a user clicks a target security application icon on an aWork desktop, the target security application will respond to a target security application starting instruction to initiate permission application to request for obtaining permission, but for a system, the permission application will be intercepted and forwarded to the aWork, and the aWork applies for permission and shares the obtained permission, thereby realizing the permission sharing function of the aWork.
Certainly, the system may also monitor only the permission application initiated by each security application without performing permission application interception operation, specifically, since the default start interface function and the permission declaration function of each security application have been set to a disabled state, the system will not respond to the permission application initiated by a security application, and further, when the system monitors that a certain security application initiates the permission application, the system directly issues a sharing permission instruction to the aWork, and the aWork performs the permission application according to the sharing permission restriction instruction and shares the acquired permission.
As a preferred embodiment, the intercepting of the permission application initiated by the target security application according to the target security application start instruction may include: and intercepting the authority application initiated by the target security application according to the target security application starting instruction by a Hook technology (Hook technology).
The preferred embodiment provides a more specific method for intercepting the permission application, which is realized based on the Hook technology. The Hook technology can be used for modifying a code execution flow of a system API, is essentially a Windows message interception mechanism, can intercept messages of a single process, can intercept messages of all processes, and can perform custom processing on the intercepted messages.
As a preferred embodiment, the acquiring of the right and the sharing of the right by the management and control software application according to the right application may include: the management and control software initiates an authority application to the authority management service center; receiving the authority fed back by the authority management service center according to the authority application; rights are shared through an Identifier (ID) sharing mechanism.
The preferred embodiment provides a more specific method for realizing the aWork acquisition permission and the sharing permission. The permission obtaining method comprises the following steps that obtaining permission can be achieved based on a permission management service center, specifically, aWork can make permission application to the permission management service center to obtain the permission fed back by the permission management service center; the permission sharing may be implemented based on an ID sharing mechanism (shared User ID system mechanism), and specifically, the same ID may be set for the aWork and the target secure application, so as to implement the permission sharing between the aWork and the target secure application.
Therefore, the application running method provided by the application sets the default starting interface function and the authority declaration function of the security application to be in a forbidden state in advance so as to achieve the purpose of hiding the desktop icon, and further, in order to ensure that the security application can run normally, the authority sharing can be performed between the security application and the management and control software application, so that the security application can enter a running state by using the authority shared by the management and control software application, and therefore, the desktop icon hiding can be performed on the premise that the security application can run normally, the security of the system application can be ensured, the system desktop can be simplified, and the user experience is improved; in addition, the implementation mode has high applicability and is suitable for various application systems.
On the basis of the above embodiments, the present application provides a more specific application running method, and the specific implementation flow thereof is as follows:
firstly, disabling the default starting interface function of the security application:
and modifying the binary content of the security application installation package by applying an encapsulation technology so as to hide a default starting interface of the security application.
Before application encapsulation, the default start interface statement of the security application is:
<intent-filter>
<action android:name=“android.intent.action.MAIN”/>
<category android:name=“android.intent.category.LAUNCHER”/>
</intent-filter>
the default starting interface statement of the modified security application is as follows:
<intent-filter>
<action android:name=“android.intent.action.MAIN”/>
<category android:name=“sangfor.intent.category.HIDE_ICON”/>
<category android:name=“android.intent.category.INFO”/>
</intent-filter>
it can be seen that the above modification deletes the identity of android.
Secondly, forbidding the authority declaration function of the security application:
through application packaging technology, binary content of the security application installation package is modified, a permission statement marked by a uses-permission label in an application program can be deleted through keyword matching in an application packaging script program, and the deleted permission statement is as follows:
<uses-permission android:name=“android.permission.INTERNET”/>
<uses-permission android:name=“android.permission.WRITE_EXTERNAL_STORAGE”/>
<uses-permission android:name=“android.permission.READ_EXTERNAL_STORAGE”/>
thirdly, setting an ID sharing mechanism:
by applying an encapsulation technology, binary content of a security application installation package is modified, so that the aWork and the security application have the same User ID, and for an Android system, only the character string values of shared User Id marks of the two applications need to be equal to each other and application signatures are consistent to start a shared User Id mechanism, so that the following settings can be made in the aWork and each security application corresponding to the aWork:
<android:sharedUserId=“com.sangfor.emm.shared.pro”>
com.sangfor.em.shared.pro is Id information corresponding to the security application, and can be set by technicians in a user-defined manner according to actual requirements.
Fourthly, running safety application:
referring to fig. 2, fig. 2 is a timing diagram of an application running method provided in the present application, and an implementation process of application running includes:
1. a user clicks a security application icon, and system permission is required to be acquired when the security application is used;
2. the system intercepts the authority application through the Hook technology;
3. the system sends an authority application to aWork;
4. transmitting an authority application to an authority management service center by the aWork;
5. the authority management service center feeds back the authority to the aWork;
6. the aWork shares the authority to the security application;
7. the security application operates normally.
For step 2, the following function may be specifically used when the Hook technology is used:
(1) the hook getstandontrolpackagename function: the getprovisioncontrolpackagename function originally returns the name of the system permission control program package (specifically, in the scheme provided by the application, the name of the target application program package), and after being hook, the getprovisioncontrolpackagename function returns the name of the application package of the aWork, so that the permission application of the security application is transferred to the aWork;
(2) hook exectstartactivity function: the exectstartactivity function also aims to intercept the permission application of the security application into aWork.
Therefore, according to the application running method provided by the embodiment of the application, the default starting interface function and the permission declaration function of the security application are set to be in the forbidden state in advance, so that the purpose of hiding the desktop icon is achieved, further, in order to ensure that the security application can run normally, permission sharing can be performed between the security application and the management and control software application, so that the security application can enter the running state by using the permission shared by the management and control software application, and therefore, desktop icon hiding can be performed on the premise that the security application can run normally, the security of the system application can be ensured, the desktop of the system can be simplified, and user experience is improved; in addition, the implementation mode has high applicability and is suitable for various application systems.
In the following, the application execution device provided in the embodiment of the present application is introduced, and the application execution device described below and the application execution method described above may be referred to correspondingly.
Referring to fig. 3, fig. 3 is a schematic structural diagram of an application execution device provided in the present application, where the application execution device may include:
a first instruction receiving module 10, configured to receive a management and control software application starting instruction;
the icon feedback module 20 is configured to output each secure application icon according to the management and control software application start instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state;
a second instruction receiving module 30, configured to receive a target security application starting instruction;
and the application running module 40 is configured to respond to the target security application starting instruction, and perform permission sharing through the management and control software application, so that the target security application enters a running state according to the sharing permission.
The application running device provided by the application sets the default starting interface function and the authority declaration function of the security application to be in a forbidden state in advance so as to achieve the purpose of hiding the desktop icon, and further, in order to ensure that the security application can normally run, authority sharing can be performed between the security application and the management and control software application, so that the security application can enter a running state by using the authority shared by the management and control software application, and therefore, desktop icon hiding is performed on the premise that the security application can normally run, the security of system application can be ensured, the desktop of the system can be simplified, and user experience is improved; in addition, the implementation mode has high applicability and is suitable for various application systems.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application running apparatus provided by the present application, the icon feedback module 20 may include:
the verification request output unit is used for outputting a verification request according to the management and control software application starting instruction;
the verification information acquisition unit is used for acquiring verification information corresponding to the verification request;
and the legal verification unit is used for verifying the verification information and outputting each safety application icon when the verification is passed.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application execution device provided in the present application, the application execution module 40 may include:
the permission application intercepting unit is used for intercepting permission applications initiated by the target security application according to the target security application starting instruction;
and the permission application forwarding unit is used for sending a permission application to the management and control software application so that the management and control software application obtains permission according to the permission application and carries out permission sharing.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application running apparatus provided by the present application, the permission application intercepting unit may be specifically configured to intercept, by means of a Hook technology, a permission application initiated by a target secure application according to a target secure application start instruction.
On the basis of the foregoing embodiment, as a preferred embodiment, in the application running apparatus provided by the present application, the permission application forwarding unit may be specifically configured to send a permission application to a management and control software application, so that the management and control software initiates a permission application to a permission management service center to obtain a permission, and shares the permission through an ID sharing mechanism.
On the basis of the above embodiment, as a preferred embodiment, the application running apparatus provided by the present application may further include a default starting interface function setting module, configured to set the default starting interface function to a disabled state by deleting a default starting interface identifier in an application program corresponding to the security application.
On the basis of the above embodiment, as a preferred embodiment, the application running apparatus provided by the present application may further include a permission declaration function setting module, configured to set the permission declaration function to a disabled state by deleting a permission declaration tag in an application program corresponding to the secure application.
For the introduction of the apparatus provided in the present application, please refer to the above method embodiments, which are not described herein again.
In the following, the application execution device provided in the embodiment of the present application is introduced, and the application execution device described below and the application execution method described above may be referred to correspondingly.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an application execution device provided in the present application, where the application execution device may include:
a memory 1 for storing a computer program;
the processor 2 is configured to implement the steps of any one of the application running methods when executing the computer program stored in the memory 1.
For the introduction of the device provided in the present application, please refer to the above method embodiment, which is not described herein again.
Further, an embodiment of the present application also discloses a computer-readable storage medium for storing a computer program, where the computer program, when executed by a processor, can implement the steps of any one of the application running methods described above.
Wherein the computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
For a detailed description of the computer-readable storage medium provided in the present application, please refer to the above method embodiments, which are not described herein again.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The application running method, device, equipment and computer readable storage medium provided by the application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and these improvements and modifications also fall into the elements of the protection scope of the claims of the present application.

Claims (10)

1. An application running method, comprising:
receiving a control software application starting instruction;
outputting each safety application icon according to the management and control software application starting instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state;
receiving a target security application starting instruction;
and responding to the target security application starting instruction, and sharing the authority through the management and control software application so that the target security application enters an operating state according to the sharing authority.
2. The application running method according to claim 1, wherein the outputting each secure application icon according to the governing software application starting instruction includes:
outputting a verification request according to the management and control software application starting instruction;
acquiring verification information corresponding to the verification request;
and verifying the verification information, and outputting each safety application icon when the verification is passed.
3. The application running method according to claim 1, wherein the performing permission sharing through a management and control software application in response to the target secure application start instruction comprises:
and intercepting an authority application initiated by the target security application according to the target security application starting instruction, and sending the authority application to the management and control software application so that the management and control software application obtains the authority according to the authority application and carries out authority sharing.
4. The application running method according to claim 3, wherein the intercepting of the permission application initiated by the target security application according to the target security application start instruction comprises:
and intercepting the permission application initiated by the target security application according to the target security application starting instruction by a hook technology.
5. The application running method according to claim 3, wherein the managing and controlling software application obtains the right according to the right application and performs the right sharing, including:
the management and control software initiates the authority application to an authority management service center;
receiving the authority fed back by the authority management service center according to the authority application;
the rights are shared through an identifier sharing mechanism.
6. The application running method of any one of claims 1 to 5, wherein setting the default start-up interface function to the disabled state comprises:
and setting the function of the default starting interface to be in the forbidden state by deleting the default starting interface identifier in the application program corresponding to the security application.
7. The application execution method of any one of claims 1 to 5, wherein setting the permission declaration functionality to the disabled state comprises:
and setting the authority declaration function to be in the forbidden state by deleting the authority declaration tag in the application program corresponding to the security application.
8. An application execution apparatus, comprising:
the first instruction receiving module is used for receiving a control software application starting instruction;
the icon feedback module is used for outputting each safety application icon according to the management and control software application starting instruction; the default starting interface function and the authority declaration function of each safety application are both in a forbidden state;
the second instruction receiving module is used for receiving a target security application starting instruction;
and the application running module is used for responding to the target security application starting instruction and sharing the authority through the control software application so as to enable the target security application to enter a running state according to the sharing authority.
9. An application execution apparatus, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the application execution method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by the processor, carries out the steps of the application execution method according to any one of claims 1 to 7.
CN202010849194.8A 2020-08-21 2020-08-21 Application running method, device and equipment and computer readable storage medium Pending CN111950012A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010849194.8A CN111950012A (en) 2020-08-21 2020-08-21 Application running method, device and equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010849194.8A CN111950012A (en) 2020-08-21 2020-08-21 Application running method, device and equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111950012A true CN111950012A (en) 2020-11-17

Family

ID=73359357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010849194.8A Pending CN111950012A (en) 2020-08-21 2020-08-21 Application running method, device and equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111950012A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104376268A (en) * 2014-11-26 2015-02-25 北京奇虎科技有限公司 Application hiding control method and device
US20160098557A1 (en) * 2013-05-07 2016-04-07 Ahnlab, Inc. Method and apparatus for managing application data of portable terminal
CN106095513A (en) * 2016-06-22 2016-11-09 宇龙计算机通信科技(深圳)有限公司 Apply attend to anything else safe starting method and system
CN106874731A (en) * 2017-04-14 2017-06-20 深信服科技股份有限公司 A kind of application layer multi-user method and device based on terminal
CN107220083A (en) * 2017-05-22 2017-09-29 韩皓 Exempt from the method and system of installation and operation application program in a kind of Android system
CN107895116A (en) * 2017-11-29 2018-04-10 山东渔翁信息技术股份有限公司 APP data guard methods, equipment, mobile terminal and computer-readable recording medium
CN108334755A (en) * 2018-03-30 2018-07-27 广东欧珀移动通信有限公司 Private space creation method and device, storage medium, electronic equipment
CN108563932A (en) * 2018-04-10 2018-09-21 Oppo广东移动通信有限公司 Application control method and apparatus, readable storage medium storing program for executing, terminal
CN108958581A (en) * 2018-06-28 2018-12-07 郑州云海信息技术有限公司 A kind of icon display method, system and the associated component at storage management software interface
CN108985069A (en) * 2018-06-29 2018-12-11 深信服科技股份有限公司 A kind of information processing method, device, terminal and computer readable storage medium
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium
CN110554817A (en) * 2019-08-23 2019-12-10 珠海格力电器股份有限公司 desktop icon display control method and device, readable medium and computing equipment
CN110750805A (en) * 2018-07-24 2020-02-04 杭州海康威视系统技术有限公司 Application program access control method and device, electronic equipment and readable storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160098557A1 (en) * 2013-05-07 2016-04-07 Ahnlab, Inc. Method and apparatus for managing application data of portable terminal
CN104376268A (en) * 2014-11-26 2015-02-25 北京奇虎科技有限公司 Application hiding control method and device
CN106095513A (en) * 2016-06-22 2016-11-09 宇龙计算机通信科技(深圳)有限公司 Apply attend to anything else safe starting method and system
CN106874731A (en) * 2017-04-14 2017-06-20 深信服科技股份有限公司 A kind of application layer multi-user method and device based on terminal
CN107220083A (en) * 2017-05-22 2017-09-29 韩皓 Exempt from the method and system of installation and operation application program in a kind of Android system
CN107895116A (en) * 2017-11-29 2018-04-10 山东渔翁信息技术股份有限公司 APP data guard methods, equipment, mobile terminal and computer-readable recording medium
CN108334755A (en) * 2018-03-30 2018-07-27 广东欧珀移动通信有限公司 Private space creation method and device, storage medium, electronic equipment
CN108563932A (en) * 2018-04-10 2018-09-21 Oppo广东移动通信有限公司 Application control method and apparatus, readable storage medium storing program for executing, terminal
CN108958581A (en) * 2018-06-28 2018-12-07 郑州云海信息技术有限公司 A kind of icon display method, system and the associated component at storage management software interface
CN108985069A (en) * 2018-06-29 2018-12-11 深信服科技股份有限公司 A kind of information processing method, device, terminal and computer readable storage medium
CN110750805A (en) * 2018-07-24 2020-02-04 杭州海康威视系统技术有限公司 Application program access control method and device, electronic equipment and readable storage medium
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium
CN110554817A (en) * 2019-08-23 2019-12-10 珠海格力电器股份有限公司 desktop icon display control method and device, readable medium and computing equipment

Similar Documents

Publication Publication Date Title
USRE48669E1 (en) System and method for identifying and [assessing] remediating vulnerabilities on a mobile communications device
US11824859B2 (en) Certificate based profile confirmation
US11539687B2 (en) Message right management method, device and storage medium
US10462118B2 (en) Systems and methods for login and authorization
CN108681662B (en) Method and device for installing program
US10616278B1 (en) Secure virtual meetings
CN104092542B (en) A kind of account login method, Apparatus and system
US20170346805A1 (en) Login method and apparatus, and open platform system
US7493487B2 (en) Portable computing environment
WO2016188256A1 (en) Application access authentication method, system, apparatus and terminal
CN103744686B (en) Control method and the system of installation is applied in intelligent terminal
US20140258128A1 (en) Method for managing fund security and mobile terminal
US20190278613A1 (en) Managing the Customizing of Appliances
CN106155727B (en) Application program updating method and device and terminal
CN108712372B (en) Method and system for accessing WEB third party login by client
CN105207775A (en) Reading method and device for verification information
US11863559B2 (en) Secure remote support authorization
CN110865824A (en) Android permeation method and device for realizing silence installation based on barrier-free service
CN110086827B (en) SQL injection verification method, server and system
CN110990798B (en) Application program permission configuration method and device, electronic equipment and storage medium
US10080139B2 (en) Information sending method and apparatus, terminal device, and system
US11222100B2 (en) Client server system
CN112966257A (en) Authorization method and device for application program
CN110830479B (en) Multi-card-based one-key login method, device, equipment and storage medium
CN112966242A (en) User name and password authentication method, device and equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination