CN112069523A - Android application based permission control method, device and equipment - Google Patents

Android application based permission control method, device and equipment Download PDF

Info

Publication number
CN112069523A
CN112069523A CN202010969404.7A CN202010969404A CN112069523A CN 112069523 A CN112069523 A CN 112069523A CN 202010969404 A CN202010969404 A CN 202010969404A CN 112069523 A CN112069523 A CN 112069523A
Authority
CN
China
Prior art keywords
permission
interceptor
authorization
authority
instance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010969404.7A
Other languages
Chinese (zh)
Inventor
高海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhidemai Technology Co ltd
Original Assignee
Beijing Zhidemai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhidemai Technology Co ltd filed Critical Beijing Zhidemai Technology Co ltd
Priority to CN202010969404.7A priority Critical patent/CN112069523A/en
Publication of CN112069523A publication Critical patent/CN112069523A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses an android application-based permission control method, device and equipment. The invention integrates the authority verification and the authorization operation in the authority interceptor to execute, so that the authority interceptor can effectively monitor the authority related to the current operation of the user and the operation in the called authorization page. The invention decouples the authority control and the service function, can lead developers to be liberated from the complicated code design related to the authority, concentrates on the development of the service function more, and can also improve the maintainability of the code, thereby conveniently carrying out unified modification and upgrade on the authority control function in the subsequent service iteration process.

Description

Android application based permission control method, device and equipment
Technical Field
The invention relates to the field of intelligent terminal application programs, in particular to an android application-based permission control method, device and equipment.
Background
With the rapid development of technologies and services, the functions of the client Application (APP) are increasingly complex, and different user groups are designed in terms of functions, such as tourists and login users, common users and users bound with mailboxes, common users and payment users, and the like. Developers in the specific practice of implementing such functions often need to design a large number of logic decisions and callback nests, which are complex in logic and difficult to maintain. Especially, the current permission verification and authorization design based on Android (Android) APP is difficult to reuse, for example, when similar functions are added or existing functions are added on different pages, developers are often required to reproduce the same complex code logic, on one hand, more redundant designs are included, so that the development cost is increased, and on the other hand, bugs are easy to occur, so that the function is abnormal.
Disclosure of Invention
In view of the foregoing, the present invention aims to provide an authority control method, apparatus and device based on an android application, and accordingly provides a computer readable storage medium and a computer program product, so as to integrate authority determination and authorization operation based on an authority interceptor in a development process, thereby solving the problems of repeated and complicated logic nesting design and difficulty in multiplexing of an authority control function.
The technical scheme adopted by the invention is as follows:
in a first aspect, the present invention provides an authority control method based on an android application, including:
when a user executes specific operation in an android application, starting a pre-constructed permission interceptor;
detecting whether the current operation of the user has the required authority by using the authority interceptor;
if so, triggering the target operation execution by the permission interceptor;
if not, enabling the permission interceptor to call an authorization page;
monitoring, by the permission interceptor, authorization operations of a user on the authorization page;
if the authorization is monitored to be successful, the permission interceptor triggers the target operation to execute;
if the authorization is monitored to fail, the operation flow is ended.
In at least one possible implementation manner, the monitoring, by the permission interceptor, an authorization operation of a user on the authorization page includes:
enabling the permission interceptor to monitor a closing event of the authorization page in real time;
and after the authorization page is closed, the permission interceptor verifies the user permission again.
In at least one possible implementation manner, the permission interceptor comprises a monitoring instance, a permission instance and a target instance;
the monitoring instance is used for monitoring the state of the authorization page;
the permission instance is used for representing parameters corresponding to the required intercepted permission and authorization operation;
the target instance is used for providing target operation executed after the authorization is successful.
In at least one possible implementation manner, the method further includes: the permission interceptor is constructed based on components in the Lifecycle framework and the builder schema.
In a second aspect, the present invention provides an authority control device based on an android application, including:
the permission interceptor starting module is used for starting a pre-constructed permission interceptor when a user executes specific operation in the android application;
the permission verification module is used for detecting whether the current operation of the user has the required permission or not by utilizing the permission interceptor;
the target execution module is used for enabling the permission interceptor to trigger target operation execution when the output of the permission verification module is yes;
the page awakening module is used for enabling the permission interceptor to awaken an authorization page when the output of the permission verifying module is negative;
the secondary verification module is used for monitoring the authorization operation of the user on the authorization page by the permission interceptor;
the target execution module is further used for enabling the permission interceptor to trigger target operation execution when the secondary verification module monitors that authorization is successful;
and the authority control termination module is used for finishing the operation flow when the secondary verification module monitors that the authorization fails.
In at least one possible implementation manner, the secondary verification module includes:
the page closing monitoring unit is used for enabling the permission interceptor to monitor the closing event of the authorization page in real time;
and the permission secondary verification unit is used for verifying the user permission again by the permission interceptor after the authorization page is closed.
In at least one possible implementation manner, the permission interceptor comprises a monitoring instance, a permission instance and a target instance;
the monitoring instance is used for monitoring the state of the authorization page;
the permission instance is used for representing parameters corresponding to the required intercepted permission and authorization operation;
the target instance is used for providing target operation executed after the authorization is successful.
In at least one possible implementation manner, the apparatus further includes:
and the permission interceptor constructing module is used for constructing the permission interceptor based on the components in the Lifecycle framework and the builder mode.
In a third aspect, the present invention provides an android application-based permission control device, including:
one or more processors, memory which may employ a non-volatile storage medium, and one or more computer programs stored in the memory, the one or more computer programs comprising instructions which, when executed by the apparatus, cause the apparatus to perform the method as in the first aspect or any possible implementation of the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when run on a computer, causes the computer to perform the method as described in the first aspect or any possible implementation manner of the first aspect.
In a fifth aspect, the present invention also provides a computer program product for performing the method of the first aspect or any possible implementation manner of the first aspect, when the computer program product is executed by a computer.
In a possible design of the fifth aspect, the relevant program related to the product may be stored in whole or in part on a memory packaged with the processor, or may be stored in part or in whole on a storage medium not packaged with the processor.
The invention integrates multiple rounds of authority verification and authorization operations into the authority interceptor to be executed, so that the authority interceptor can effectively monitor the authority related to the current operation of the user and the operation in the called authorization page. The invention decouples the authority control and the service function, can lead developers to be liberated from the complicated code design related to the authority, concentrates on the development of the service function more, and can also improve the maintainability of the code, thereby conveniently carrying out unified modification and upgrade on the authority control function in the subsequent service iteration process.
Furthermore, in some embodiments of the invention, the permission interceptor is constructed through the builder mode, only streaming operation is needed for programming, complex logic nesting is not involved, the code complexity is reduced, and the code readability is improved.
Further, the invention adopts the basic framework of the Lifecycle to construct the authority interceptor in some embodiments, so that the expansion and the transplantation can be conveniently carried out.
Drawings
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described with reference to the accompanying drawings, in which:
fig. 1 is a flowchart of an embodiment of an android application-based permission control method provided in the present invention;
fig. 2 is a block diagram of an embodiment of an android application-based permission control apparatus provided in the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative only and should not be construed as limiting the invention.
Before the technical scheme of the invention is introduced, it can be stated that, in the existing technology for realizing function permission verification and authorization in android App, whether the operation executed by a user has permission is generally judged by the most basic IF-ELSE logic at an operation call, and then the function of continuously executing the target operation after authorization is realized in the form of Listener callback.
In the existing mode, when the appointed permission is judged and authorized, the code implementation of the current developer is excessively depended on, but the personal abilities and habits of different developers are different, and the problems of logic inconsistency and interaction inconsistency easily occur when different developers implement the same permission judgment and authorization functions. And because the code can not be reused, the authority judgment and the authorization operation are difficult to uniformly change in the subsequent iteration, all function points need to be gradually transformed, unnecessary repeated work is added for developers, resources are wasted, and meanwhile, additional loopholes and abnormal risks are increased.
In view of the above, the present invention aims to provide a scheme capable of handling the authority judgment during user operation and the automatic authorization operation without authority, that is, by constructing a "tool" to integrate and unify the authority judgment and authorization operation, a service developer can quickly implement the authority control of a specific operation without spending much effort on the specific implementation of the authority control operation.
Thus, the present invention provides at least one embodiment of an authority control method based on an android application, as shown in fig. 1, the method may include the following steps:
step S1, when a user executes specific operation in the android application, starting a pre-constructed permission interceptor;
step S2, detecting whether the current operation of the user has the required authority by using the authority interceptor;
if yes, executing step S100 to enable the permission interceptor to trigger target operation execution;
if not, executing step S3 to enable the authority interceptor to call an authorization page;
step S4, the authority interceptor monitors the authorization operation of the user on the authorization page;
if the authorization is successfully monitored, executing the step S100 to enable the permission interceptor to trigger the target operation to be executed;
if the authorization is monitored to fail, step S200 is executed, and the operation flow is ended.
In the actual operation of the embodiment, the preset authority interceptor can be started, and the authority interceptor is used for detecting whether the operation performed by the current user has the required authority, namely judging whether the current operation of the user meets the authority requirement. Then, when the authority meets the requirement, the authority interceptor can automatically execute the target operation; and when the authority does not meet the requirement, the authority interceptor can automatically call the authority authorization page, namely when the user does not have the specified authority, the authority interceptor can call the specified Activity page to authorize according to the authority requirement of the current operation. In this way, the user can perform an authorization operation in the authorization page invoked by the permission interceptor, where the monitoring of the authorization operation of the user on the authorization page by the permission interceptor proposed in step S4 of this embodiment may be regarded as "secondary" verification (secondary is merely illustrative and is not a limitation on the number of times), that is, the authorization operation of the user in the invoked Activity page may be determined again by the permission interceptor. Specifically, in some preferred embodiments, the permission interceptor may monitor the closing event of the authorization page in real time, and after the authorization page is closed (that is, after the user completes the authorization operation on the page, the permission interceptor may verify the permission of the user again.
After the permission interceptor detects that the current user has the permission required by the target operation for the second time, the target operation held by the current user can be automatically called, otherwise, the current operation process can be ended.
The embodiment can realize the functions of automatically detecting the authority, automatically calling the authorization page and automatically executing the target operation after the authorization is successful. The construction mode of the authority interceptor may be to construct a framework of the authority interceptor in advance before a user performs a specific operation requiring a specific authority, and add an authority verification operation instance requiring verification and an operation instance requiring execution after the authority verification passes to the authority interceptor.
Specifically, in at least one possible implementation manner of the present invention, the permission interceptor may be constructed by components in a Lifecycle framework and a builder mode, wherein the permission judgment and authorization may be automatically performed at a specific time by using the components in the Lifecycle framework, and the permission judgment and authorization operations are decoupled from the service function, so that a service developer is liberated from the function code and may concentrate on the service function development. And the application of the builder mode enables a developer to perform programming through streaming operation without complex logic nesting, thereby reducing the complexity of codes and providing the readability of the codes.
More preferably, the permission interceptor may specifically include a listening instance, a permission instance, and a target instance. Wherein the listening instance is configured to listen for an authorization page status; the permission instance is used for representing parameters corresponding to the required intercepted permission and authorization operation; the target instance is used for providing target operation executed after the authorization is successful.
For example, Java objects that may include an ActivityLifecycleCallbacks instance, a rights instance, and a target operations instance in the Lifecycle framework. The activtyfcycleallbacks instance is mainly used to monitor the state of an activty page used for authorization, and when it is monitored that the page is closed, permission judgment can be performed again to continue subsequent operations, for example, the aforementioned secondary verification process may specifically refer to that the permission interceptor holds the activtyfcycleallbacks instance, so that a closing event of the authorization page can be monitored, and the permission complemented by the user can be verified again after the authorization page is closed; the instance of the authority to be intercepted can represent the specific parameters corresponding to the authority and the operation required by the authorized operation; the target operation instance refers to an operation to be executed after the authorization is successful.
In summary, the idea of the present invention is to integrate multiple rounds of rights verification and authorization operations into a rights interceptor for execution, so that the rights interceptor can effectively monitor the rights related to the current operations of the user and the operations in the invoked authorization page. The invention decouples the authority control and the service function, can liberate developers from complex code design related to the authority, concentrates on the development of the service function more, and can improve the maintainability of the code, thereby conveniently and uniformly modifying and upgrading the authority control function in the subsequent service iteration process.
Corresponding to the above embodiments and preferred solutions, the present invention further provides an embodiment of an authority control apparatus based on an android application, as shown in fig. 2, the authority control apparatus specifically includes the following components:
the permission interceptor starting module 1 is used for starting a pre-constructed permission interceptor when a user executes a specific operation in an android application;
the authority verification module 2 is used for detecting whether the current operation of the user has the required authority by using the authority interceptor;
the target execution module 3 is used for enabling the permission interceptor to trigger target operation execution when the output of the permission verification module is yes;
the page awakening module 4 is used for enabling the authority interceptor to awaken an authorization page when the output of the authority verification module is negative;
the secondary verification module 5 is used for monitoring the authorization operation of the user on the authorization page by the permission interceptor;
the target execution module 3 is further configured to enable the permission interceptor to trigger target operation execution when the secondary verification module monitors that authorization is successful;
and the authority control termination module 6 is used for terminating the operation flow when the secondary verification module monitors that the authorization fails.
In at least one possible implementation manner, the secondary verification module includes:
the page closing monitoring unit is used for enabling the permission interceptor to monitor the closing event of the authorization page in real time;
and the permission secondary verification unit is used for verifying the user permission again by the permission interceptor after the authorization page is closed.
In at least one possible implementation manner, the permission interceptor comprises a monitoring instance, a permission instance and a target instance;
the monitoring instance is used for monitoring the state of the authorization page;
the permission instance is used for representing parameters corresponding to the required intercepted permission and authorization operation;
the target instance is used for providing target operation executed after the authorization is successful.
In at least one possible implementation manner, the apparatus further includes:
and the permission interceptor constructing module is used for constructing the permission interceptor based on the components in the Lifecycle framework and the builder mode.
It should be understood that the division of each component in the android application based permission control device shown in fig. 2 above may be only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these components may all be implemented in software invoked by a processing element; or may be implemented entirely in hardware; and part of the components can be realized in the form of calling by the processing element in software, and part of the components can be realized in the form of hardware. For example, a certain module may be a separate processing element, or may be integrated into a certain chip of the electronic device. Other components are implemented similarly. In addition, all or part of the components can be integrated together or can be independently realized. In implementation, each step of the above method or each component above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above components may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), one or more microprocessors (DSPs), one or more Field Programmable Gate Arrays (FPGAs), etc. For another example, these components may be integrated together and implemented in the form of a System-On-a-Chip (SOC).
In view of the foregoing examples and their preferred embodiments, it will be appreciated by those skilled in the art that in practice, the invention may be practiced in a variety of embodiments, and that the invention is illustrated schematically in the following vectors:
(1) an android application-based permission control device may include:
one or more processors, memory, and one or more computer programs, wherein the one or more computer programs are stored in the memory, the one or more computer programs comprising instructions, which when executed by the apparatus, cause the apparatus to perform the steps/functions of the foregoing embodiments or equivalent implementations.
The device may be an electronic device or a circuit device built in the electronic device. The electronic device can be a PC, a server, an intelligent terminal (a mobile phone, a tablet and the like), a special front-end development testing device and the like. The embodiment does not limit the specific form of the android application-based permission control device.
(2) A readable storage medium, on which a computer program or the above-mentioned apparatus is stored, which, when executed, causes the computer to perform the steps/functions of the above-mentioned embodiments or equivalent implementations.
In the several embodiments provided by the present invention, any function, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer readable storage medium. Based on this understanding, some aspects of the present invention may be embodied in the form of software products, which are described below, or portions thereof, which substantially contribute to the art.
(3) A computer program product (which may include the above apparatus) when running on a terminal device, causes the terminal device to execute the method for controlling permission based on an android application of the foregoing embodiment or an equivalent implementation.
From the above description of the embodiments, it is clear to those skilled in the art that all or part of the steps in the above implementation method can be implemented by software plus a necessary general hardware platform. With this understanding, the above-described computer program products may include, but are not limited to, refer to APP; continuing on, the aforementioned device/terminal may be a computer device (e.g., a mobile phone, a PC terminal, a cloud platform, a server cluster, or a network communication device such as a media gateway). Moreover, the hardware structure of the computer device may further specifically include: at least one processor, at least one communication interface, at least one memory, and at least one communication bus; the processor, the communication interface and the memory can all complete mutual communication through the communication bus. The processor may be a central Processing unit CPU, a DSP, a microcontroller, or a digital Signal processor, and may further include a GPU, an embedded Neural Network Processor (NPU), and an Image Signal Processing (ISP), and may further include a specific integrated circuit ASIC, or one or more integrated circuits configured to implement the embodiments of the present invention, and the processor may have a function of operating one or more software programs, and the software programs may be stored in a storage medium such as a memory; and the aforementioned memory/storage media may comprise: non-volatile memories (non-volatile memories) such as non-removable magnetic disks, U-disks, removable hard disks, optical disks, etc., and Read-Only memories (ROM), Random Access Memories (RAM), etc.
In the embodiments of the present invention, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, and means that there may be three relationships, for example, a and/or B, and may mean that a exists alone, a and B exist simultaneously, and B exists alone. Wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" and similar expressions refer to any combination of these items, including any combination of singular or plural items. For example, at least one of a, b, and c may represent: a, b, c, a and b, a and c, b and c or a and b and c, wherein a, b and c can be single or multiple.
Those of skill in the art will appreciate that the various modules, elements, and method steps described in the embodiments disclosed in this specification can be implemented as electronic hardware, combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In addition, the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other. In particular, for embodiments of devices, apparatuses, etc., since they are substantially similar to the method embodiments, reference may be made to some of the descriptions of the method embodiments for their relevant points. The above-described embodiments of devices, apparatuses, etc. are merely illustrative, and modules, units, etc. described as separate components may or may not be physically separate, and may be located in one place or distributed in multiple places, for example, on nodes of a system network. Some or all of the modules and units can be selected according to actual needs to achieve the purpose of the above-mentioned embodiment. Can be understood and carried out by those skilled in the art without inventive effort.
The structure, features and effects of the present invention have been described in detail with reference to the embodiments shown in the drawings, but the above embodiments are merely preferred embodiments of the present invention, and it should be understood that technical features related to the above embodiments and preferred modes thereof can be reasonably combined and configured into various equivalent schemes by those skilled in the art without departing from and changing the design idea and technical effects of the present invention; therefore, the invention is not limited to the embodiments shown in the drawings, and all the modifications and equivalent embodiments that can be made according to the idea of the invention are within the scope of the invention as long as they are not beyond the spirit of the description and the drawings.

Claims (10)

1. An android application-based permission control method is characterized by comprising the following steps:
when a user executes specific operation in an android application, starting a pre-constructed permission interceptor;
detecting whether the current operation of the user has the required authority by using the authority interceptor;
if so, triggering the target operation execution by the permission interceptor;
if not, enabling the permission interceptor to call an authorization page;
monitoring, by the permission interceptor, authorization operations of a user on the authorization page;
if the authorization is monitored to be successful, the permission interceptor triggers the target operation to execute;
if the authorization is monitored to fail, the operation flow is ended.
2. The android application-based permission control method of claim 1, wherein the monitoring, by the permission interceptor, of an authorization operation of a user on the authorization page comprises:
enabling the permission interceptor to monitor a closing event of the authorization page in real time;
and after the authorization page is closed, the permission interceptor verifies the user permission again.
3. The android application-based permission control method of claim 1 or 2, wherein the permission interceptor comprises a listening instance, a permission instance, and a target instance;
the monitoring instance is used for monitoring the state of the authorization page;
the permission instance is used for representing parameters corresponding to the required intercepted permission and authorization operation;
the target instance is used for providing target operation executed after the authorization is successful.
4. The android application-based permission control method of claim 3, further comprising: the permission interceptor is constructed based on components in the Lifecycle framework and the builder schema.
5. An authority control device based on android application is characterized by comprising:
the permission interceptor starting module is used for starting a pre-constructed permission interceptor when a user executes specific operation in the android application;
the permission verification module is used for detecting whether the current operation of the user has the required permission or not by utilizing the permission interceptor;
the target execution module is used for enabling the permission interceptor to trigger target operation execution when the output of the permission verification module is yes;
the page awakening module is used for enabling the permission interceptor to awaken an authorization page when the output of the permission verifying module is negative;
the secondary verification module is used for monitoring the authorization operation of the user on the authorization page by the permission interceptor;
the target execution module is further used for enabling the permission interceptor to trigger target operation execution when the secondary verification module monitors that authorization is successful;
and the authority control termination module is used for finishing the operation flow when the secondary verification module monitors that the authorization fails.
6. The android application-based permission control apparatus of claim 5, wherein the secondary verification module comprises:
the page closing monitoring unit is used for enabling the permission interceptor to monitor the closing event of the authorization page in real time;
and the permission secondary verification unit is used for verifying the user permission again by the permission interceptor after the authorization page is closed.
7. The android application-based permission control apparatus of claim 5 or 6, wherein the permission interceptor comprises a listening instance, a permission instance, and a target instance;
the monitoring instance is used for monitoring the state of the authorization page;
the permission instance is used for representing parameters corresponding to the required intercepted permission and authorization operation;
the target instance is used for providing target operation executed after the authorization is successful.
8. The android application-based permission control apparatus of claim 7, further comprising:
and the permission interceptor constructing module is used for constructing the permission interceptor based on the components in the Lifecycle framework and the builder mode.
9. A computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, and when the computer program runs on a computer, the computer program causes the computer to execute the android application based permission control method according to any one of claims 1 to 4.
10. An android application-based permission control device, comprising:
one or more processors, memory, and one or more computer programs stored in the memory, the one or more computer programs comprising instructions which, when executed by the device, cause the device to perform the android application based permissions control method of any of claims 1-4.
CN202010969404.7A 2020-09-15 2020-09-15 Android application based permission control method, device and equipment Pending CN112069523A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010969404.7A CN112069523A (en) 2020-09-15 2020-09-15 Android application based permission control method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010969404.7A CN112069523A (en) 2020-09-15 2020-09-15 Android application based permission control method, device and equipment

Publications (1)

Publication Number Publication Date
CN112069523A true CN112069523A (en) 2020-12-11

Family

ID=73696818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010969404.7A Pending CN112069523A (en) 2020-09-15 2020-09-15 Android application based permission control method, device and equipment

Country Status (1)

Country Link
CN (1) CN112069523A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113886854A (en) * 2021-10-14 2022-01-04 广州九尾信息科技有限公司 Android platform based permission monitoring and managing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070245032A1 (en) * 2006-02-24 2007-10-18 Parent Approval Llc System and method of a data blocker based on local monitoring of a soliciting website
CN103116716A (en) * 2013-01-25 2013-05-22 复旦大学 Immediate access conferring method aiming at low interference of mobile platform
CN104580077A (en) * 2013-10-15 2015-04-29 镇江雅迅软件有限责任公司 Method for realizing page access control through interceptors
CN107317826A (en) * 2017-08-05 2017-11-03 中山大学 A kind of method that java network system rights managements are realized based on blocker
CN111143737A (en) * 2019-11-21 2020-05-12 深圳壹账通智能科技有限公司 Page jump method and device, computer equipment and storage medium thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070245032A1 (en) * 2006-02-24 2007-10-18 Parent Approval Llc System and method of a data blocker based on local monitoring of a soliciting website
CN103116716A (en) * 2013-01-25 2013-05-22 复旦大学 Immediate access conferring method aiming at low interference of mobile platform
CN104580077A (en) * 2013-10-15 2015-04-29 镇江雅迅软件有限责任公司 Method for realizing page access control through interceptors
CN107317826A (en) * 2017-08-05 2017-11-03 中山大学 A kind of method that java network system rights managements are realized based on blocker
CN111143737A (en) * 2019-11-21 2020-05-12 深圳壹账通智能科技有限公司 Page jump method and device, computer equipment and storage medium thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113886854A (en) * 2021-10-14 2022-01-04 广州九尾信息科技有限公司 Android platform based permission monitoring and managing method and device

Similar Documents

Publication Publication Date Title
AU2018203054B2 (en) System of distributed software quality improvement
KR20190111037A (en) Smart Contract Upgrade Method and System by Consortium Blockchain
US9979638B2 (en) Systems and methods to construct engineering environment supporting API enablement for software defined networking
CN109359732B (en) Chip and data processing method based on chip
CN103595770B (en) Method and device for achieving file downloading through SDK
CN111045933A (en) Regression strategy updating method and device, storage medium and terminal equipment
KR101242325B1 (en) Simulation method, system based on event-oriented for hierarchical DEVS model, recording medium for the same
US20230359455A1 (en) Service orchestration within a distributed pod based system
CN112069523A (en) Android application based permission control method, device and equipment
CN112632527A (en) API (application programming interface) testing method and system for service open platform
JP7015625B2 (en) Step-back mechanism for developing and diagnosing process applications
CN108509773B (en) Source code reinforcing method and device
CN116185869A (en) Software testing method, system, computer equipment and storage medium
Tigane et al. Dynamic GSPNs: formal definition, transformation towards GSPNs and formal verification
KR101989222B1 (en) Method, apparatus and system for detecting structural variations
CN113553068A (en) Method and device for downloading application package and electronic equipment
CN113691485A (en) Micro-service platform access method and related device thereof
CN113297568B (en) Data processing method and system based on sandboxes
CN115408110B (en) Performance evaluation method and system for Kubernetes control plane component
TW201816605A (en) Application upgrading method and device
WO2017196448A1 (en) Custom-built process engine with minimal memory and disk resource consumption
CN104954575B (en) Usage scenario control method and system between a kind of mobile terminal
CN116719560A (en) Task execution method, device, equipment and storage medium
CN116088889A (en) Client software updating method
CN117978423A (en) Access control method, apparatus, device, storage medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination