CN112148524A - Method and terminal for processing application - Google Patents

Method and terminal for processing application Download PDF

Info

Publication number
CN112148524A
CN112148524A CN201910579341.1A CN201910579341A CN112148524A CN 112148524 A CN112148524 A CN 112148524A CN 201910579341 A CN201910579341 A CN 201910579341A CN 112148524 A CN112148524 A CN 112148524A
Authority
CN
China
Prior art keywords
application
terminal
data
file
user group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910579341.1A
Other languages
Chinese (zh)
Inventor
皮素梅
赵云
姜绍宇
宋亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201910579341.1A priority Critical patent/CN112148524A/en
Publication of CN112148524A publication Critical patent/CN112148524A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a terminal for processing application, relates to the technical field of computers, and aims to solve the problem that a terminal of an android P system cannot back up or restore non-system application, wherein the method comprises the following steps: in the process of performing read-write processing on an application by a terminal, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing; the method comprises the steps that after the terminal determines that the domain corresponding to the authority has the authority identification, the data to be processed of the application is operated in the domain, wherein the authority identification is pre-configured in the domain contained in the terminal.

Description

Method and terminal for processing application
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and a terminal for processing an application.
Background
When a machine is changed or a system is upgraded, reading and writing of applications can be realized by backing up and recovering the applications.
In an android O (android O, which is a code number of an android 8.0 version), requirements on system permissions are not very strict, and a domain is customized in a machine changing application data module, a machine changing assistant module or a backup and recovery module of a local computer, and a secure machine changing of non-system applications of a user terminal can be realized by defining some permissions in the domain. The arrival of android P (android P) has strict requirements on system permissions, and corresponding permissions cannot be defined again by using a customized domain, so that data of non-system applications cannot be backed up or restored, and the applications cannot be operated, which also becomes a great obstacle to complete replacement.
In summary, the terminal of the android P system cannot backup or restore the non-system application.
Disclosure of Invention
The invention provides a method and a terminal for processing applications, which are used for solving the problem that the terminal of an android P system in the prior art cannot back up or restore non-system applications.
In a first aspect, a method for processing an application provided in an embodiment of the present invention includes:
in the process of performing read-write processing on an application by a terminal, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing;
and after the terminal determines that the domain corresponding to the authority has the authority identification, the terminal performs the operation on the data to be processed of the application in the domain, wherein the authority identification is pre-configured in the domain contained in the terminal.
According to the method, before the application is subjected to read-write processing, the identifier of the authority for operating the data to be processed of the application is configured in the domain corresponding to the authority in advance, the domain is not a self-defined domain and is a domain contained in the terminal, in the process of performing read-write processing on the application, the authority required by operation is determined firstly, and the identifier with the corresponding authority is determined in the corresponding domain, so that the data to be processed can be subjected to corresponding operation, and when the identifier is applied to android P, backup or recovery of non-system application can be realized.
In one possible implementation, the identification of the permission is determined by stress testing the application.
According to the method, the authority required in the process of backing up or recovering the application is tested for big data by adopting a pressure test method, the required authority is determined by solving the problems encountered in the process of simulating actual operation, and a method for determining the identifier of the pre-configured authority is provided.
In one possible implementation, the method further includes:
and if the operation needing to be executed at present has no authority limit according to the operation sequence, the terminal directly executes the operation.
According to the method, for some operations without permission, the terminal can directly execute corresponding operations without repeating the steps of determining permission and determining the domain, so that the method is more convenient and faster.
In a possible implementation manner, if the read-write processing is backup processing, the operation without permission limitation is to copy an APK (android package) file in the to-be-processed data of the application; or
And if the read-write processing is recovery processing, the operation without permission limitation is to run an APK file in the to-be-processed data of the application.
The method limits the type of the corresponding operation without the permission limitation under the backup processing or the recovery processing, generally does not need the permission to process the application installation package, and can directly execute the corresponding operation by the terminal.
In a possible implementation manner, the operation that needs to be currently executed is to backup application data in the to-be-processed data, and the operation performed by the terminal on the to-be-processed data of the application in the domain includes:
the terminal copies application data in the data to be processed and places the copied application data in an application data folder, wherein the application data folder comprises at least one file, a user group identifier corresponding to the at least one file and an identifier of authority for operating the at least one file, and the user group identifier is the user group identifier of the application before backup; or
The operation that needs to be executed currently is to restore application data in the data to be processed, and the operation performed by the terminal on the data to be processed of the application in the domain includes:
the terminal adds the application data in the data to be processed into the application data of the application after installation;
the terminal determines all files in a folder containing the added application data;
and aiming at any file in the folder, the terminal replaces the user group identification corresponding to the any file with a new user group identification, and takes the identification of the authority corresponding to the any file and used for operating the any file as a new authority identification of the any file, wherein the new user group identification is distributed to the application by the terminal after the application is installed.
The method provides a mode of replacing the user group identification and adding the authority identification to the application data in the data to be processed in the recovery processing process of the application and a processing mode of processing the application data in the backup processing process of the application, and after the authority identification and the user group identification are replaced or added, the corresponding functions can be applied, and the mode is more efficient and has higher accuracy.
In a possible implementation manner, after the terminal replaces the user group identifier corresponding to the arbitrary file with a new user group identifier, the method further includes:
the terminal judges whether the user group identification of the file in the folder containing the added application data is consistent with the new user group identification;
and if the user group identification of at least one file is inconsistent with the new user group identification, the terminal replaces the current user group identifications of all files in the folder with the new user group identification.
According to the method, the user group identification of the file in the folder containing the added application data of the same application is verified after the user group identification is replaced, if the situation that the situation is inconsistent due to the failure of replacement exists, the user group identification is replaced again, and the accuracy rate of the user group identification is improved.
In a second aspect, a terminal for processing an application according to an embodiment of the present invention includes: a processor and a memory, wherein the memory stores program code that, when executed by the processor, causes the processor to perform the following:
in the process of performing read-write processing on an application, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing;
and after determining that the domain corresponding to the authority has the identifier of the authority, performing the operation on the to-be-processed data of the application in the domain, wherein the identifier of the authority is pre-configured in the domain contained in the terminal.
In one possible implementation, the identification of the permission is determined by stress testing the application.
In a possible implementation manner, the terminal further includes:
and if the operation needing to be executed at present has no authority limit according to the operation sequence, directly executing the operation.
In a possible implementation manner, if the read-write processing is backup processing, the operation without permission limitation is to copy an APK file in the to-be-processed data of the application; or
And if the read-write processing is recovery processing, the operation without permission limitation is to run an APK file in the to-be-processed data of the application.
In a possible implementation manner, the operation that needs to be currently executed is to backup application data in the data to be processed, and the processor is specifically configured to:
copying application data in the data to be processed, and placing the copied application data in an application data folder, wherein the application data folder comprises at least one file, a user group identifier corresponding to the at least one file, and an identifier of authority for operating the at least one file, and the user group identifier is the user group identifier of the application before backup; or
The operation that needs to be executed at present is to restore application data in the data to be processed, and the processor is specifically configured to:
adding application data in the data to be processed into the application data of the application after installation;
determining all files in a folder containing the added application data;
and aiming at any file in the folder, replacing the user group identification corresponding to the any file with a new user group identification, and taking the identification of the authority corresponding to the any file and used for operating the any file as the new authority identification of the any file, wherein the new user group identification is allocated to the application by the terminal after the application is installed.
In one possible implementation, the processor is specifically configured to:
judging whether the user group identification of the file in the folder containing the added application data is consistent with the new user group identification;
and if the user group identification of at least one file is inconsistent with the new user group identification, replacing the current user group identifications of all files in the folder with the new user group identification.
In a third aspect, an embodiment of the present invention further provides a terminal for processing an application, where the terminal includes a determining module and an operating module:
the determining module is used for determining the authority corresponding to the operation which needs to be executed currently if the operation which needs to be executed currently has authority limit according to the operation sequence in the process of performing read-write processing on the application, wherein the read-write processing is backup processing or recovery processing;
the first operation module is used for performing the operation on the data to be processed of the application in the domain after determining that the domain corresponding to the authority has the identifier of the authority, wherein the identifier of the authority is pre-configured in the domain contained in the terminal.
In one possible implementation, the identification of the permission is determined by stress testing the application.
In a possible implementation manner, the terminal further includes:
and the second operation module is used for directly executing the operation if the operation needing to be executed at present has no authority limit according to the operation sequence.
In a possible implementation manner, if the read-write processing is backup processing, the operation without permission limitation is to copy an APK file in the to-be-processed data of the application; or
And if the read-write processing is recovery processing, the operation without permission limitation is to run an APK file in the to-be-processed data of the application.
In a possible implementation manner, the operation that needs to be executed currently is to backup application data in the data to be processed, and the first operation module is specifically configured to:
copying application data in the data to be processed, and placing the copied application data in an application data folder, wherein the application data folder comprises at least one file, a user group identifier corresponding to the at least one file, and an identifier of authority for operating the at least one file, and the user group identifier is the user group identifier of the application before backup; or
The operation that needs to be executed currently is to restore application data in the data to be processed, and the first operation module is specifically configured to:
adding application data in the data to be processed into the application data of the application after installation;
determining all files in a folder containing the added application data;
and aiming at any file in the folder, replacing the user group identification corresponding to the any file with a new user group identification, and taking the identification of the authority corresponding to the any file and used for operating the any file as the new authority identification of the any file, wherein the new user group identification is allocated to the application by the terminal after the application is installed.
In a possible implementation manner, the first operation module is specifically configured to:
judging whether the user group identification of the file in the folder containing the added application data is consistent with the new user group identification;
and if the user group identification of at least one file is inconsistent with the new user group identification, replacing the current user group identifications of all files in the folder with the new user group identification.
In a fourth aspect, the present application also provides a computer storage medium having a computer program stored thereon, which when executed by a processor, performs the steps of the method of the first aspect.
In addition, for technical effects brought by any one implementation manner of the second aspect to the third aspect, reference may be made to technical effects brought by different implementation manners of the first aspect, and details are not described here.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic diagram of a method for processing an application according to an embodiment of the present invention;
FIG. 2A is a diagram illustrating an operation display non-system application according to an embodiment of the present invention;
FIG. 2B is a schematic diagram of another operation display non-system application provided by an embodiment of the present invention;
FIG. 3 is a diagram illustrating a multi-level folder according to an embodiment of the present invention;
FIG. 4 is a flowchart of a complete method for processing an application according to an embodiment of the present invention;
fig. 5 is a flowchart of a complete method for correcting a user group identifier according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a first terminal for processing an application according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a second terminal for processing an application according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a third terminal for processing an application according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Some of the words that appear in the text are explained below:
1. the term "and/or" in the embodiments of the present invention describes an association relationship of associated objects, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
2. The term "terminal" in the embodiments of the present invention refers to a computer device that can be used in mobile, that is, a mobile phone, a tablet, and the like.
3. In the embodiment of the present invention, the term "User group identifier" refers to a User Identification (Uid) with different common levels allocated to each program by the Android system, and if mutual invocation is used, only the Uid are the same, so that the shared data has certain security, and data cannot be obtained between each software. And the same application only has one Uid, so the problem of access authority does not exist between Activities (activities) under the application, the Uid is the user group identification, and the Uids of all files under the same application are the same.
4. The term "pressure test", also called strength test and load test, in the embodiment of the present invention is to simulate the software and hardware environment of practical application and the system load of the user in the using process, and run the test software for a long time or with an excessive load to test the performance, reliability, stability, etc. of the system to be tested.
5. The term "script" in the embodiments of the present invention is an extension of a batch file, and is a program for storing plain text, and a general computer script program is a combination of a certain series of operations for controlling a computer to perform operations, in which certain logic branches and the like can be implemented.
6. In the embodiment of the invention, the term "Android P" is a preview of the first developer of google, the "banhai screen" device is adapted, indoor accurate positioning is realized by using WiFi (Wireless Fidelity ) RTT (Render to Texture), the improvement of a message notification bar, the upgrading of multiple cameras API (Application Programming Interface), the version 1.1 of neural network API and the like.
The application scenario described in the embodiment of the present invention is for more clearly illustrating the technical solution of the embodiment of the present invention, and does not form a limitation on the technical solution provided in the embodiment of the present invention, and it can be known by a person skilled in the art that with the occurrence of a new application scenario, the technical solution provided in the embodiment of the present invention is also applicable to similar technical problems. In the description of the present invention, the term "plurality" means two or more unless otherwise specified.
With the improvement of the self-security of the financial software, the payment software, the stock software and the like, various problems occur when a plurality of terminals back up and restore the data of the software when changing the machine, for example, the payment software cannot pay back, the stock software cannot open a certain interface, a mobile phone bank cannot enter, and the like, and the problems can be summarized as functional failure caused by different data permissions and user groups in the process of backing up and restoring the applied data. This causes a great trouble to the user.
Therefore, the method and the terminal for processing the application can completely convert the non-system applications of the two terminals of the user, avoid the installation and login of various software after the user replaces a mobile phone, and support the backup and recovery of the application data of the software of finance, payment and stock tickets.
With respect to the above scenario, the following describes an embodiment of the present invention in further detail with reference to the drawings of the specification.
As shown in fig. 1, a method for processing an application according to an embodiment of the present invention specifically includes the following steps:
step 100: in the process of performing read-write processing on an application by a terminal, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing;
step 101: and after the terminal determines that the domain corresponding to the authority has the authority identification, the terminal performs the operation on the data to be processed of the application in the domain, wherein the authority identification is pre-configured in the domain contained in the terminal.
According to the scheme, before the application is subjected to read-write processing, the identifier of the authority for operating the data to be processed of the application is configured in the domain corresponding to the authority in advance, the domain is not a self-defined domain and is a domain contained in the terminal, in the process of performing read-write processing on the application, the authority required by operation is determined at first, and the identifier with the corresponding authority is determined in the corresponding domain, so that the data to be processed can be subjected to corresponding operation, and when the identifier is applied to android P, backup or recovery of non-system application can be realized.
In the embodiment of the invention, whether the operation which needs to be executed currently has the authority limit or not needs to be judged according to the operation sequence, the authority limit of the operation can be judged once when the operation is judged, and the corresponding operation is executed in one step; or executing one operation to judge whether the operation has the authority limit, and then performing the next operation or judgment.
In the embodiment of the present invention, the identifier of the right preconfigured in the domain included in the terminal is obtained through a stress test, specifically:
the method comprises the steps of testing the authority required by various applications on various platforms and various storage devices during backup or recovery, backing up or recovering the applications step by step, determining the domain of the to-be-processed data of the operable applications corresponding to the authority according to the required authority, and adding the required authority identification in the determined domain.
Wherein, the pre-configured authority identifier includes but is not limited to part or all of the following:
app_data_file:link_file,read,dac_read_search。
for example, by testing dozens of commonly used applications, permissions required when The backup or recovery module operates The to-be-processed data of The application are tested at different terminal models and platforms and different storage locations (for example, a terminal built-in storage, an SD Card (Secure Digital Card), and an OTG (On-The-Go) device), and generally, The permissions can only be added in an instruction field according to security requirements, so that The to-be-processed data of The application can be operated.
The method mentioned in the embodiment of the invention is suitable for non-system applications and is also suitable for system applications, wherein the system applications refer to third-party applications preset in the mobile phone and generally do not need backup or recovery, so that when a user selects backup and recovery of application data, all non-system applications of all display user terminals can be operated. Fig. 2A and fig. 2B are schematic diagrams of an operation display non-system application according to an embodiment of the present invention, where a symbol on the right side of the application name shown in fig. 2A indicates that the application is a system application and does not need to be backed up and restored; the symbol on the right side of the application name shown in fig. 2B indicates that the application is a non-system application, and the operation needs to be determined by authority or the like, so that backup and recovery can be performed.
Optionally, when the application is backed up, the APK file of the application needs to be backed up first, and the operation that needs to be executed at present is to copy the APK file in the data to be processed of the application.
For example, when a user changes the mobile phone, the old mobile phone is the mobile phone a, the new mobile phone is the mobile phone B, and the non-system application on the mobile phone a needs to be converted to the mobile phone B, so that the non-system applications of the two mobile phones can be completely converted through changing the application data, and downloading and logging of various software after the user changes the mobile phone are avoided. In specific implementation, backup processing of the application needs to be performed on the mobile phone a, and recovery processing of the application needs to be performed on the mobile phone B.
When the terminal a is used for performing backup processing on a certain payment type application (application 1), the terminal a can directly copy the APK file of the application, and the APK file is generally stored in a data/app directory in the terminal.
Optionally, after backing up the APK file of the application, the application data of the application needs to be backed up, specifically, the application data is copied, and the copied application data is placed in an application data folder, and in view of saving resources, the application data folder may be compressed into a tar (a compression method) package.
In the embodiment of the invention, the application data folder comprises at least one file, and each file has the authority corresponding to the file for operating the file and the user group identification corresponding to the file.
Wherein the rights corresponding to the file include, but are not limited to, some or all of the following:
r,w,x,rws,rwt,rwS,rwT。
where, r (Read): for a file, the file has the authority to read the content of the file; for a directory, there is a right to browse the directory.
w (Write): for the file, the authority of adding, modifying and deleting the file content is provided; for the directory, the method has the authority of creating, deleting, modifying and moving files in the directory.
x (eXecute, execution): for a file, having the authority to execute the file; indicating to the directory that the user has access to the directory.
For example, there are 2 sub-folders and 1 file under the application data folder 0 of application 1, as shown in fig. 3, folder 01, folder 02 and file 1, respectively; the file folder 01 comprises a file folder 011 and 2 files, namely a file 2 and a file 3, and the file folder 02 comprises 2 files, namely a file 4 and a file 5; the folder 011 further includes 3 files, which are respectively a file 6, a file 7, and a file 8, and it is assumed that each subfolder and file in the folder 0 have corresponding user group identifiers and rights identifiers, and the file and folder in each subfolder also have corresponding user group identifiers and rights identifiers, where the user group identifiers are the same and are allocated to applications by the system before backup.
Optionally, when the application is recovered, the APK file of the application needs to be recovered first, and the operation that needs to be executed currently is the APK file of the running application.
For example, when the application 1 is restored by using the terminal B, the APK file of the application can be directly copied, and the APK file is generally stored in the data/app directory in the terminal.
Before restoring the application 1, the terminal B needs to receive data to be processed of the application 1 transmitted by the terminal a, restore an APK file backed up by the terminal a in the files to be processed, and install the application 1 on the terminal B by running the APK file.
Optionally, the terminal a and the terminal B may transmit the to-be-processed data through WiFi, bluetooth, or the like.
In the embodiment of the invention, the terminal allocates a user group identifier to the application after the application is installed, and at this time, the user group identifiers of all files under the application are also the user group identifiers allocated to the application by the terminal.
For example, if the user group identifier assigned to application 1 by terminal B after application 1 is installed is 156, then the user group identifiers of the files in the folder currently containing application data of the application are both 156.
In the embodiment of the invention, after the terminal installs the application, the application data in the data to be processed needs to be added to the application data of the application on the terminal after the application is installed, wherein the application data in the data to be processed contains data generated in the use process of the application, such as an account number of a user, when the application is chat-type software, the application data in the data to be processed further comprises information of a chat record, and when the application is game-type software, friend information and the like, when the application is game-type software, the application data in the data to be processed further comprises battle achievement and the like of a game; when the application is payment software, the application data in the data to be processed also comprises bill information, friend information and the like, so that the application data in the data to be processed is added into the installed application data, re-registration after changing a machine can be avoided, and installation and login of various kinds of software are avoided.
Optionally, when the application data in the data to be processed is added to the installed application data, for example, 5 files are included in an application data folder containing the application data in the data to be processed, which are respectively file 1 to file 5, the installed application data includes file 4, file 5 and file 6, where file 1 to file 3 do not appear in the installed application data, so that when the application data in the data to be processed is added to the installed application data, only the contents of file 1 to file 3 may be added to the installed application data, or after all files 1 to 5 are added to the installed application data, the folder containing the added application data after the addition includes files 1 to 6.
Optionally, after adding the application data, in order to ensure normal use of the application, the user group identifier and the identifier of the authority of the file in the folder containing the added application data need to be corrected. When the user group and the authority are given according to the file traversal, files with special formats, such as files containing blank spaces or special characters and the like, which are difficult to identify file names, are difficult to correct, and the function of some applications is disabled.
For example, a folder (including files 1 to 6) containing added application data, where the file name of file 2 is "123456", when a code is used to correct a user group and a permission for the file, an error may occur due to a space between "123" and "456", specifically, a name filename of each file under data/data/package name/is obtained, a file to which a user group identifier needs to be replaced and a permission identifier needs to be added is determined by the filename, and when the filename identifies an error, a situation that the user group identifier has an error occurs, which causes a partial function failure of the application.
Optionally, the user group identifier replacement and the permission identifier addition may be realized in batches by taking the whole application data folder as a unit, and specifically, the terminal determines all files in the folder containing the added application data; and aiming at any file in the folder, the terminal replaces the user group identification corresponding to the any file with a new user group identification, and takes the identification of the authority corresponding to the any file and used for operating the any file as a new authority identification of the any file, wherein the new user group identification is distributed to the application by the terminal after the application is installed.
The specific implementation mode is that the package name of the application is used as the file name of the whole application data folder, for example, the package name of the application is reflected as data/data/com.
For example, the results after batch processing are: files such as app _ accs, app _ textores, app _ webview, cache, code _ cache and database are contained in the application data folder, the user group identifications of the files are changed into u0_ a149 in batches, wherein 149 is a user group identification newly distributed by a system after application installation, 22 is a user group identification of application before backup, and the identification of the authority of app _ accs in the application data folder obtained by backup is assumed to be rwxrwx-x 2; the identification of the privilege for app _ textores is rwxrwx-x 2; the identification of the permission of app _ webview is rwxrws-x 7; the identification of the authority of the cache is rwxrws-x 2; the identifier of the authority of the code _ cache is rwxrwx-x 2; the identities of the privileges of databases are rwxrwx-x 8; the new rights for these files are identified as rwxrwx-x 2, rwxrwx-x 7, rwxrwx-x 2, rwxrwx-x 8, respectively.
The method comprises the steps of replacing user group identifications and adding authority identifications for application data folders in a multi-level form by adopting a recursive algorithm, specifically calling a primary program by taking an application data folder as a unit and taking an application package name as the name of the application data folder when the application data folder and the application data folder also contain files, replacing the user group identifications and adding the authority identifications for the sub-folders and the files in batches, calling each sub-folder once again, calling the primary program by taking the sub-folder as the unit and taking the name of the sub-folder, replacing the user group identifications and adding the authority identifications for the files under the sub-folders in batches, and performing batch processing in the same mode when the sub-folders also contain the folders.
As shown in fig. 3, three layers are further divided under the application data folder 0, a program is called when user group identifiers and identifiers of permissions are replaced or added to or replaced for the folders 01, 02 and 1 in the first layer, the name of the file in the program is the name of the folder 0, and the folders 01, 02 and 1 are processed in batch, so that the names of the folders 01, 02 and 1 do not need to be read, the failure of identifier replacement or addition caused by special format names can be avoided, and similarly, corresponding operations are further performed on the folders 011, 2 and 3 under the folder 01, and the name of the file in the called program is the name of the folder 01; performing corresponding operation on the files 4 and 5 in the folder 02, wherein the name of the file in the called program is the name of the folder 02; further, files 6, 7, and 8 in the folder 011 are batch-processed, and a program is called once by the name of the folder 011.
The method can improve the efficiency of recovering the application data and can also improve the authority of the files in the folder containing the application data and the correctness of the user group.
As shown in fig. 4, a complete method for recovering a processing application according to an embodiment of the present invention includes:
step 400, the terminal installs the application by running the APK file in the data to be processed;
step 401, adding application data in data to be processed into application data after application installation by a terminal;
step 402, the terminal determines all subfolders under the folder containing the added application data in the data to be processed;
step 403, the terminal replaces the user group identifiers and adds the identifiers of the permissions to all the subfolders;
step 404, the terminal determines all files of any subfolder;
and 405, replacing the user group identification and adding the authority identification to all the files in the subfolder by the terminal.
Fig. 4 is introduced for an example of an application data folder containing a plurality of subfolders, wherein step 404 and step 405 are performed for any one subfolder, and step 404 and step 405 are performed for all the subfolders determined in step 403.
As shown in fig. 5, a complete method for correcting a user group identifier provided in an embodiment of the present invention includes:
500, the terminal detects a starting event;
step 501, the terminal judges whether data recovery is performed or whether the user group identification of the application has been changed, if so, step 502 is executed, otherwise, the flow is ended;
step 502, the terminal judges whether the application of payment or finance or stock class is contained, if yes, step 503 is executed, otherwise, the flow is ended;
step 503, the terminal judges whether the user group identifications of all files in the applied application data folder are consistent, if yes, the process is ended, otherwise, step 504 is executed;
step 504, the terminal starts changeUid system service;
and step 505, the terminal executes the changce Uid script.
When step 501 is executed, determining whether to restore data includes: the terminal judges whether the application recovery processing is performed or not; the step of judging whether the user group identification of the application is changed is as follows: and the terminal judges whether the user group identification of the file under the application data folder of the recovered application is corrected or not.
For example, the results after batch processing are: the application data folder contains files such as app _ accs, app _ textores, app _ webview, cache, code _ cache and databases, except that the user group identifier of the app _ accs file is u0_ a22, the user group identifiers of other files are u0_ a149, wherein 149 is a user group identifier newly distributed by a system after application installation, and 22 is a user group identifier of an application before backup, so that batch change can be performed on the application data folder by executing a changUid script.
The above correction process adds one more layer of guarantee for native recovery of financial, payment, and stock applications.
Optionally, after the terminal is powered on, the changeUid system service may be started directly after determining that the financial, payment, or stock applications are available, execute the changeUid script, correct the Uid, and no longer execute the determination in step 501, so that time may be saved for the terminal that has recovered data or changed the user group identifier of the application.
Optionally, when the user group identifier is changed, if the user group identifier of at least one file is inconsistent with the new user group identifier, the terminal determines a directory to which the at least one file belongs, and replaces the current user group identifiers of all files in the directory with the new user group identifiers.
For example, as shown in fig. 3, it is assumed that the user group identifier of file 4 is 22, and the user group identifiers of other files or folders in folder 0 shown in the figure are 156, where 156 is the user group identifier newly allocated after the application is installed, so that when the user group identifiers are changed again, the directory to which file 4 belongs can be determined to be the directory of folder 02, and thus the user group identifiers can be changed uniformly for file 4 and file 5 in folder 02; or all files and folders in folder 0 may be changed, or only the user group id of file 4 may be changed when the file name of file 4 does not belong to a special format.
In the embodiment of the present invention, if the terminal recovers the application data, a Flag bit recovery appdata _ Flag may be set (true represents that the application data has been recovered, and false represents that the application data has not been recovered), and after receiving the power-on event, a Flag bit isChangeUid may be set (true represents that the user group identifier has been changed, and false represents that the user group identifier has not been changed).
The above process can be implemented by the following codes:
Figure BDA0002112736640000161
Figure BDA0002112736640000171
based on the same inventive concept, the embodiment of the present invention further provides a terminal for processing an application, and since the terminal is the terminal in the method in the embodiment of the present invention, and the principle of the terminal for solving the problem is similar to the method, the implementation of the terminal may refer to the implementation of the method, and repeated details are not repeated.
As shown in fig. 6, an embodiment of the present invention further provides a terminal for processing an application, where the terminal includes: a processor 610, and a memory 620, wherein the memory 620 stores program code, which when executed by the processor 610, causes the terminal to perform the following:
in the process of performing read-write processing on an application, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing;
and after determining that the domain corresponding to the authority has the identifier of the authority, performing the operation on the to-be-processed data of the application in the domain, wherein the identifier of the authority is pre-configured in the domain contained in the terminal.
Optionally, the identifier of the authority is determined by performing a stress test on the application.
Optionally, the terminal further includes:
and if the operation needing to be executed at present has no authority limit according to the operation sequence, directly executing the operation.
Optionally, if the read-write processing is backup processing, the operation without permission limitation is to copy the APK file in the to-be-processed data of the application; or
And if the read-write processing is recovery processing, the operation without permission limitation is to run an APK file in the to-be-processed data of the application.
Optionally, the operation currently required to be executed is to backup application data in the data to be processed, and the processor 610 is specifically configured to:
copying application data in the data to be processed, and placing the copied application data in an application data folder, wherein the application data folder comprises at least one file, a user group identifier corresponding to the at least one file, and an identifier of authority for operating the at least one file, and the user group identifier is the user group identifier of the application before backup; or
The operation that needs to be executed at present is to restore application data in the data to be processed, and the processor 610 is specifically configured to:
adding application data in the data to be processed into the application data of the application after installation;
determining all files in a folder containing the added application data;
and aiming at any file in the folder, replacing the user group identification corresponding to the any file with a new user group identification, and taking the identification of the authority corresponding to the any file and used for operating the any file as the new authority identification of the any file, wherein the new user group identification is allocated to the application by the terminal after the application is installed.
Optionally, the processor 610 is specifically configured to:
judging whether the user group identification of the file in the folder containing the added application data is consistent with the new user group identification;
and if the user group identification of at least one file is inconsistent with the new user group identification, replacing the current user group identifications of all files in the folder with the new user group identification.
Based on the same inventive concept, the embodiment of the present invention further provides a terminal for processing an application, and since the terminal is the terminal in the method in the embodiment of the present invention, and the principle of the terminal for solving the problem is similar to the method, the implementation of the terminal may refer to the implementation of the method, and repeated details are not repeated.
As shown in fig. 7, an embodiment of the present invention further provides a terminal for processing an application, where the terminal includes: determination module 700 and first operation module 701:
the determination module 700: in the process of performing read-write processing on an application, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing;
the first operation module 701: and after determining that the domain corresponding to the authority has the identifier of the authority, performing the operation on the to-be-processed data of the application in the domain, wherein the identifier of the authority is pre-configured in the domain contained in the terminal.
In one possible implementation, the identification of the permission is determined by stress testing the application.
In a possible implementation manner, the terminal further includes:
a second operation module 702, configured to directly execute the operation if there is no permission limitation on the operation that needs to be executed currently according to the operation order.
In a possible implementation manner, if the read-write processing is backup processing, the operation without permission limitation is to copy an APK file in the to-be-processed data of the application; or
And if the read-write processing is recovery processing, the operation without permission limitation is to run an APK file in the to-be-processed data of the application.
In a possible implementation manner, the operation that needs to be executed currently is to backup application data in the data to be processed, and the first operation module 701 is specifically configured to:
copying application data in the data to be processed, and placing the copied application data in an application data folder, wherein the application data folder comprises at least one file, a user group identifier corresponding to the at least one file, and an identifier of authority for operating the at least one file, and the user group identifier is the user group identifier of the application before backup; or
The operation that needs to be executed currently is to restore application data in the data to be processed, and the first operation module 701 is specifically configured to:
adding application data in the data to be processed into the application data of the application after installation;
determining all files in a folder containing the added application data;
and aiming at any file in the folder, replacing the user group identification corresponding to the any file with a new user group identification, and taking the identification of the authority corresponding to the any file and used for operating the any file as the new authority identification of the any file, wherein the new user group identification is allocated to the application by the terminal after the application is installed.
In a possible implementation manner, the first operation module 701 is specifically configured to:
judging whether the user group identification of the file in the folder containing the added application data is consistent with the new user group identification;
and if the user group identification of at least one file is inconsistent with the new user group identification, replacing the current user group identifications of all files in the folder with the new user group identification.
As shown in fig. 8, a terminal 800 for processing an application according to an embodiment of the present disclosure includes: radio Frequency (RF) circuitry 810, a power supply 820, a processor 830, a memory 840, an input unit 850, a display unit 860, a camera 870, a communication interface 880, and a WiFi module 890. Those skilled in the art will appreciate that the configuration of the terminal shown in fig. 8 is not intended to be limiting, and that the terminal provided by the embodiments of the present application may include more or less components than those shown, or some components may be combined, or a different arrangement of components may be provided.
The following describes the various components of the terminal 800 in detail with reference to fig. 8:
the RF circuitry 810 may be used for receiving and transmitting data during a communication or conversation. Specifically, the RF circuit 810 sends downlink data of the base station to the processor 830 for processing; and in addition, sending the uplink data to be sent to the base station. Generally, the RF circuit 810 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
In addition, the RF circuit 810 may also communicate with networks and other terminals via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The WiFi technology belongs to a short-distance wireless transmission technology, and the terminal 800 may connect to an Access Point (AP) through a WiFi module 890, thereby implementing Access to a data network. The WiFi module 890 can be used for receiving and transmitting data during communication.
The terminal 800 may be physically connected to other terminals through the communication interface 880. In some embodiments, the communication interface 880 is connected to the communication interface of the other terminal through a cable, so as to implement data transmission between the terminal 800 and the other terminal.
In the embodiment of the present application, the terminal 800 can implement a communication service and send information to other contacts, so the terminal 800 needs to have a data transmission function, that is, the terminal 800 needs to include a communication module inside. Although fig. 8 shows communication modules such as the RF circuit 810, the WiFi module 890 and the communication interface 880, it is understood that at least one of the above components or other communication modules (e.g., bluetooth modules) for enabling communication are present in the terminal 800 for data transmission.
For example, when the terminal 800 is a mobile phone, the terminal 800 may include the RF circuit 810 and may further include the WiFi module 890; when the terminal 800 is a computer, the terminal 800 may include the communication interface 880 and may further include the WiFi module 890; when the terminal 800 is a tablet computer, the terminal 800 may include the WiFi module.
The memory 840 may be used to store software programs and modules. The processor 830 executes various functional applications and data processing of the terminal 800 by executing the software programs and modules stored in the memory 840, and after the processor 830 executes the program codes in the memory 840, part or all of the processes in fig. 1 of the embodiments of the present disclosure can be implemented.
In some embodiments, the memory 840 may mainly include a program storage area and a data storage area. The storage program area can store an operating system, various application programs (such as communication application), a face recognition module and the like; the storage data area may store data (such as various multimedia files like pictures, video files, etc., and face information templates) created according to the use of the terminal, etc.
Further, the memory 840 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 850 may be used to receive numeric or character information input by a user and generate key signal inputs related to user settings and function control of the terminal 800.
In some embodiments, input unit 850 may include a touch panel 851 and other input terminals 852.
The touch panel 851, also referred to as a touch screen, can collect touch operations of a user on or near the touch panel 851 (for example, operations of the user on or near the touch panel 851 using any suitable object or accessory such as a finger or a stylus), and drive the corresponding connection device according to a preset program. In some embodiments, the touch panel 851 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 830, and can receive and execute commands sent by the processor 830. In addition, the touch panel 851 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave.
In some embodiments, the other input terminals 852 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 860 may be used to display information input by a user or information provided to a user and various menus of the terminal 800. The display unit 860 is a display system of the terminal 800, and is configured to present an interface and implement human-computer interaction.
Further, the touch panel 851 may cover the display panel 861, and when the touch panel 851 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 830 to determine the type of touch event, and then the processor 830 provides a corresponding visual output on the display panel 861 according to the type of touch event.
Although in fig. 8, the touch panel 851 and the display panel 861 are two separate components to implement the input and output functions of the terminal 800, in some embodiments, the touch panel 851 and the display panel 861 may be integrated to implement the input and output functions of the terminal 800.
The processor 830 is a control center of the terminal 800, connects various components using various interfaces and lines, and performs various functions of the terminal 800 and processes data by operating or executing software programs and/or modules stored in the memory 840 and calling data stored in the memory 840, thereby implementing various services based on the terminal.
In some implementations, the processor 830 may include one or more processors. In some embodiments, the processor 830 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 830.
The camera 870 is configured to implement a shooting function of the terminal 800, and shoot pictures or videos. The camera 870 may also be used to implement a scanning function of the terminal 800, and scan a scanned object (two-dimensional code/barcode).
The terminal 800 also includes a power supply 820 (e.g., a battery) for powering the various components. In some embodiments, the power supply 820 may be logically connected to the processor 830 via a power management system, so as to manage charging, discharging, and power consumption via the power management system.
Although not shown, the terminal 800 may further include at least one sensor, an audio circuit, and the like, which will not be described herein.
Wherein the memory 830 may store the same program code as the memory 620, which when executed by the processor 820, causes the processor 820 to implement all of the functions of the processor 610.
An embodiment of the present invention further provides a computer-readable non-volatile storage medium, which includes program code, and when the program code runs on a computing terminal, the program code is configured to enable the computing terminal to execute the steps of the method for processing an application according to the embodiment of the present invention.
The present application is described above with reference to block diagrams and/or flowchart illustrations of methods, apparatus (systems) and/or computer program products according to embodiments of the application. It will be understood that one block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the subject application may also be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, the present application may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. In the context of this application, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method of processing an application, the method comprising:
in the process of performing read-write processing on an application by a terminal, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing;
and after the terminal determines that the domain corresponding to the authority has the authority identification, the terminal performs the operation on the data to be processed of the application in the domain, wherein the authority identification is pre-configured in the domain contained in the terminal.
2. The method of claim 1, wherein the identification of the privilege is determined by stress testing the application.
3. The method of claim 1, wherein the method further comprises:
and if the operation needing to be executed at present has no authority limit according to the operation sequence, the terminal directly executes the operation.
4. The method of claim 3, wherein if the read-write process is a backup process, the operation without permission restriction is to copy an android installation package (APK) file in the to-be-processed data of the application; or
And if the read-write processing is recovery processing, the operation without permission limitation is to run an APK file in the to-be-processed data of the application.
5. The method of claim 1, wherein the operation currently required to be performed is to backup application data in the to-be-processed data, and the performing, by the terminal, the operation on the to-be-processed data of the application in the domain includes:
the terminal copies application data in the data to be processed and places the copied application data in an application data folder, wherein the application data folder comprises at least one file, a user group identifier corresponding to the at least one file and an identifier of authority for operating the at least one file, and the user group identifier is the user group identifier of the application before backup; or
The operation that needs to be executed currently is to restore application data in the data to be processed, and the operation performed by the terminal on the data to be processed of the application in the domain includes:
the terminal adds the application data in the data to be processed into the application data of the application after installation;
the terminal determines all files in a folder containing the added application data;
and aiming at any file in the folder, the terminal replaces the user group identification corresponding to the any file with a new user group identification, and takes the identification of the authority corresponding to the any file and used for operating the any file as a new authority identification of the any file, wherein the new user group identification is distributed to the application by the terminal after the application is installed.
6. The method as claimed in claim 5, wherein after the terminal replaces the user group identifier corresponding to the arbitrary file with a new user group identifier, the method further comprises:
the terminal judges whether the user group identification of the file in the folder containing the added application data is consistent with the new user group identification;
and if the user group identification of at least one file is inconsistent with the new user group identification, the terminal replaces the current user group identifications of all files in the folder with the new user group identification.
7. A terminal for processing an application, the terminal comprising: a processor, a memory and a camera, wherein the memory stores program code that, when executed by the processor, causes the terminal to perform the following:
in the process of performing read-write processing on an application, if the operation to be executed currently has permission limitation according to an operation sequence, determining the permission corresponding to the operation to be executed currently, wherein the read-write processing is backup processing or recovery processing;
and after determining that the domain corresponding to the authority has the identifier of the authority, performing the operation on the to-be-processed data of the application in the domain, wherein the identifier of the authority is pre-configured in the domain contained in the terminal.
8. The terminal of claim 7, wherein the terminal further comprises:
if the operation to be executed at present has no authority limit according to the operation sequence, the operation is directly executed;
if the read-write processing is backup processing, copying an APK file in the to-be-processed data of the application without permission limitation; or
And if the read-write processing is recovery processing, the operation without permission limitation is to run an APK file in the to-be-processed data of the application.
9. The terminal of claim 7, wherein the operation currently required to be executed is to backup application data in the data to be processed, and the processor is specifically configured to:
copying application data in the data to be processed, and placing the copied application data in an application data folder, wherein the application data folder comprises at least one file, a user group identifier corresponding to the at least one file, and an identifier of authority for operating the at least one file, and the user group identifier is the user group identifier of the application before backup; or
The operation that needs to be executed at present is to restore application data in the data to be processed, and the processor is specifically configured to:
adding application data in the data to be processed into the application data of the application after installation;
determining all files in a folder containing the added application data;
and aiming at any file in the folder, replacing the user group identification corresponding to the any file with a new user group identification, and taking the identification of the authority corresponding to the any file and used for operating the any file as the new authority identification of the any file, wherein the new user group identification is allocated to the application by the terminal after the application is installed.
10. The terminal of claim 9, wherein the processor is further configured to:
judging whether the user group identification of the file in the folder containing the added application data is consistent with the new user group identification;
and if the user group identification of at least one file is inconsistent with the new user group identification, replacing the current user group identifications of all files in the folder with the new user group identification.
CN201910579341.1A 2019-06-28 2019-06-28 Method and terminal for processing application Pending CN112148524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910579341.1A CN112148524A (en) 2019-06-28 2019-06-28 Method and terminal for processing application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910579341.1A CN112148524A (en) 2019-06-28 2019-06-28 Method and terminal for processing application

Publications (1)

Publication Number Publication Date
CN112148524A true CN112148524A (en) 2020-12-29

Family

ID=73891532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910579341.1A Pending CN112148524A (en) 2019-06-28 2019-06-28 Method and terminal for processing application

Country Status (1)

Country Link
CN (1) CN112148524A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324551A (en) * 2013-05-23 2013-09-25 广东欧珀移动通信有限公司 Application data migration method and system
CN105809055A (en) * 2016-02-26 2016-07-27 深圳天珑无线科技有限公司 Access control method and device, and related equipment
WO2018094990A1 (en) * 2016-11-23 2018-05-31 中兴通讯股份有限公司 Method and device for processing information, and computer storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324551A (en) * 2013-05-23 2013-09-25 广东欧珀移动通信有限公司 Application data migration method and system
CN105809055A (en) * 2016-02-26 2016-07-27 深圳天珑无线科技有限公司 Access control method and device, and related equipment
WO2018094990A1 (en) * 2016-11-23 2018-05-31 中兴通讯股份有限公司 Method and device for processing information, and computer storage medium
CN108108173A (en) * 2016-11-23 2018-06-01 中兴通讯股份有限公司 A kind of information processing method and device

Similar Documents

Publication Publication Date Title
CN109491968B (en) File processing method, device, equipment and computer readable storage medium
US10742694B2 (en) Method for migrating data and terminal
EP3975503A1 (en) Esim card replacement method and related device
US20150026330A1 (en) Generating unique identifiers for mobile devices
US20090298468A1 (en) System and method for deleting data in a communication device
CN103164523A (en) Inspection method, device and system of data consistency inspection
US11316693B2 (en) Trusted platform module-based prepaid access token for commercial IoT online services
CN109359091B (en) File management method, device, terminal and computer readable storage medium
US10061594B2 (en) Protecting and verifying contents of files on mobile computing devices
CN109614203B (en) Android application cloud data evidence obtaining and analyzing system and method based on application data simulation
CN110719590B (en) One-key login method, device, equipment and storage medium based on mobile phone number
CN111459524A (en) Software upgrading method, device and system
CN112463199A (en) System upgrading method and terminal
CN111694703A (en) Cache region management method and device and computer equipment
CN102073541B (en) Data access method and mobile terminal
CN115098297B (en) Consistent snapshot generation method and system for cloud primary storage data volume
CN112148524A (en) Method and terminal for processing application
WO2021102849A1 (en) Resource acquisition method and apparatus, and electronic device
CN113810477A (en) File uploading method, device, equipment and storage medium
CN108008970A (en) Application upgrade method and device
CN114138344B (en) System verification method and terminal
US20230297724A1 (en) Hardware identity restoration post-device repair
CN108170437B (en) Application management method and terminal equipment
CN114138344A (en) System checking method and terminal
CN114218191A (en) System function migration method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201229

RJ01 Rejection of invention patent application after publication