CN112464208A - File access method, mobile terminal and computer readable storage medium - Google Patents

File access method, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN112464208A
CN112464208A CN202011344900.XA CN202011344900A CN112464208A CN 112464208 A CN112464208 A CN 112464208A CN 202011344900 A CN202011344900 A CN 202011344900A CN 112464208 A CN112464208 A CN 112464208A
Authority
CN
China
Prior art keywords
application
file
target
access
access method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011344900.XA
Other languages
Chinese (zh)
Other versions
CN112464208B (en
Inventor
杨高科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Weixu Information Technology Service Co ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN202011344900.XA priority Critical patent/CN112464208B/en
Publication of CN112464208A publication Critical patent/CN112464208A/en
Application granted granted Critical
Publication of CN112464208B publication Critical patent/CN112464208B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a file access method, which is applied to a mobile terminal and comprises the following steps: when detecting that the first application initiates an access instruction to a target file in a file directory of the second application, judging whether the first application is a default application of the default application; if the application is the personal application, allowing the first application to acquire the attribute information of the target file through the multimedia database; the multimedia database is controlled to judge whether the access instruction is authorized or not according to the attribute information and the validity information of the first application, and a judgment result is returned to the user space file system; if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file; and allowing the first application to execute preset operation on the target file. The application also provides a mobile terminal and a computer readable storage medium. In this way, the first application serving as the self-identification application can access the target file in the file directory of the second application and perform the preset operation on the target file.

Description

File access method, mobile terminal and computer readable storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a file access method, a mobile terminal, and a computer-readable storage medium.
Background
At present, a user generally has two or more application accounts such as WeChat, QQ and the like. Therefore, a plurality of identical applications need to be created on the mobile terminal, the newly created new application is called an avatar application, and the application existing in the first existing system is called a main application. The creation of the personal application enables a user to install a plurality of same applications on the same equipment, different accounts can be logged in through the same applications, multi-account login is achieved, the user does not need to quit and log in again to change the account, the user does not need to carry about two pieces of equipment, the use of the user is greatly facilitated, and the use experience of the user is improved.
However, with the continuous upgrade of the platform of the mobile terminal system, the control of the authority of the mobile terminal is more and more strict, and the mutual access of different users to the files of the other party is not allowed, so that the individual user cannot access the multimedia database of the owner, and the individual application cannot access the files of the owner user.
Disclosure of Invention
The application mainly aims to provide a file access method, a mobile terminal and a computer readable storage medium, and aims to solve the problem that a personal application cannot access files of a host user.
In order to achieve the above object, the present application provides a file access method, where the file access method is applied to a mobile terminal, and the file access method includes:
when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a default application of a preset application;
if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information;
controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system;
if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application;
and allowing the first application to execute preset operation on the target file.
Optionally, the file access method further includes:
creating a user identity of the first application;
and creating an individuation file directory corresponding to the user identity in the user space file system.
Optionally, the step of determining whether the first application is a separate application of the preset application includes:
and acquiring an application identifier of the first application, and judging whether the first application is the personal application of the preset application or not according to the application identifier of the first application and the user identity identifier.
Optionally, before the step of controlling the multimedia database to determine whether the access instruction is authorized according to the attribute information and the validity information of the first application, the method further includes:
and transmitting the attribute information and the access instruction to the user space file system so as to call the multimedia database to carry out authorization judgment on the access instruction through the user space file system.
Optionally, the file access method further includes:
mounting the separate file directory to the multimedia database;
and when the user identity is a preset user identity and the accessed file is the file in the file directory, the judgment result is that the access is allowed.
Optionally, the target operation is a copy operation, and the step of controlling the user space file system to perform the target operation on the target file includes:
and controlling the user space file system to copy the target file from the file directory to the body-divided file directory according to the attribute information.
Optionally, the file access method further includes:
and if the judgment result is that the access is denied, refusing the user space file system to execute the target operation on the target file, and returning the execution result to the first application.
Optionally, the file access method further includes:
and refusing the first application to execute the preset operation on the target file, and outputting prompt information.
The present application further provides a mobile terminal, the mobile terminal including: a touch screen; a processor; and the memory is connected with the processor and comprises a control instruction, and when the processor reads the control instruction, the mobile terminal is controlled to realize the file access method.
The present application also provides a computer-readable storage medium having one or more programs executed by one or more processors to implement the file access method described above.
According to the file access method, the mobile terminal and the computer readable storage medium, when a first application initiates an access instruction to a target file in a file directory of a second application, whether the first application is a self-identification application of a preset application is judged; if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information; controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system; if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application; and allowing the first application to execute preset operation on the target file, so that when the first application needs to access the target file in the file directory of the second application, as long as the first application is the self-owned application of the preset application and as long as the access instruction is determined to be authorized according to the attribute information of the target file and the legality information of the first application, the user space file system can be controlled to execute the target operation on the target file and allow the first application to execute the preset operation on the target file, and the first application serving as the self-owned application can access the target file in the file directory of the second application and execute the preset operation on the target file.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present application;
FIG. 2 is a schematic diagram of a communication network system of the mobile terminal shown in FIG. 1;
FIG. 3 is a flowchart of a file access method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The various components of the mobile terminal 100 are described in detail below with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
Fig. 3 is a flowchart of an embodiment of a file access method provided by the present application. Once the method of this embodiment is triggered by the user, the process in this embodiment is automatically executed by the mobile terminal 100, where each step may be executed sequentially according to the sequence in the flowchart, or may be executed simultaneously according to a plurality of steps in an actual situation, which is not limited herein. The file access method provided by the application comprises the following steps:
step S310, when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a default application of a preset application;
step S330, if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information;
step S350, controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system;
step S370, if the determination result is that access is allowed, controlling the user space file system to execute a target operation on the target file, and returning an execution result to the first application;
step S390, allowing the first application to perform a preset operation on the target file.
Through the implementation manner, when a first application needs to access a target file in a file directory of a second application, as long as the first application is a split application of the preset application, whether the access instruction is authorized or not can be determined according to attribute information of the target file and legality information of the first application, and when the authorization is determined, the user space file system can be controlled to execute target operation on the target file and allow the first application to execute preset operation on the target file, so that the first application serving as the split application can access the target file in the file directory of the second application and execute preset operation on the target file.
The above steps will be specifically described with reference to specific examples.
In step S310, when it is detected that the first application initiates an access instruction to a target file in a file directory of the second application, it is determined whether the first application is an application of a default application.
In this embodiment, the first application may be a main application in a multi-open application, or may be an individual application. The second application may also be a main application in a multi-open application, or may also be a split application. The preset application may be a master application in a multi-open application. Taking the second application as a main application in the multi-open application as an example, the preset application may be the second application, or may be another main application except the second application. The multi-open application may refer to an application that performs multi-opening of an application (i.e., one application is divided into two or more so that different accounts can be logged in). For example, the first application, the second application, and the preset application may be applications such as WeChat, QQ, microblog, and games.
In this embodiment, the file access method includes:
step S3101, creating a user identity of the first application;
step S3102, an avatar file directory corresponding to the user id is created in the user space file system.
In this embodiment, in a multi-open application framework, a user space file system and a file directory of a primary user application (for example, the second application) are defaulted, a user identity identifier (UserID) of the first application may be created in the user space file system, and an individual file directory corresponding to the user identity identifier (UserID) may be created in the user space file system, and is used to store files and data of the first application.
In this embodiment, in the mobile terminal 100, there is a specific rule for storing and naming the file, that is, there is a corresponding relationship between the user identity user id and the application file directory. In order to distinguish between the first application and the second application, the first application and the second application may have different user identities UserID.
For example, a file directory/storage/organized/0 with a name of 0 is set as default under/storage/organized, and the file directory may be a file directory of the second application. And 0 is the user identity of the second application, that is, the UserID of the second application is 0. When creating the first application, the mobile terminal 100 may create a corresponding user identity UserID for the first application according to a preset rule, for example, create the first application "999", that is, the UserID of the first application is 999. In this embodiment, if the first application UserID is "999", according to the rule specific to the mobile terminal 100, an individual file directory/storage/organized/999 with a name of "999" is created under/storage/organized/correspondingly for storing the file and data of the first application. In general, the first application cannot access the target file in the file directory/storage/organized/0 of the second application. The second application can not access the target file under the body-divided file catalog/storage/organized/999 of the first application.
In this embodiment, the step of determining whether the first application is a separate application of the preset application includes:
step S3103, acquiring the application identifier of the first application, and determining whether the first application is the self-owned application of the preset application according to the application identifier of the first application and the user identity identifier.
Specifically, since the split application and the main application are the same application program, and the application identifier of the split application is the same as the application identifier of the main application, the application identifier of the first application may be obtained, and whether the first application is the split application of the preset application is determined according to the application identifier of the first application and the user identity identifier, so as to improve the accuracy of the determination.
In step S330, if the first application is a separate application of the preset application, allowing the first application to obtain attribute information of the target file through a multimedia database, where the attribute information includes storage path information and size information.
In this embodiment, the target file may be a data file such as a picture, a video, an audio, and text information. The attribute information may include storage path information, size information, and the like. And the storage path information and the size information are stored in the multimedia database by default. The UserID of the multimedia database may also be "0". If the application identifications of the first application and the preset application are the same and the first application UserID is '999', the first application is the split application of the preset application. When the first application is determined to be the self-identification application of the preset application, the first application can acquire the attribute information of the target file through the multimedia database.
In step S350, the multimedia database is controlled to determine whether the access instruction is authorized according to the attribute information and the validity information of the first application, and return a determination result to the user space file system.
In this embodiment, before the step of controlling the multimedia database to determine whether the access instruction is authorized according to the attribute information and the validity information of the first application, the method further includes:
step S3501, transmitting the attribute information and the access instruction to the user space file system, so as to call the multimedia database through the user space file system to perform authorization judgment on the access instruction.
Specifically, after the first application obtains the attribute information of the target file through a multimedia database, the first application may transmit the attribute information and the access instruction to the user space file system, so as to call the multimedia database through the user space file system to perform authorization determination on the access instruction, so as to determine whether the access instruction is authorized, and the multimedia database may return a determination result to the user space file system. Authorization information may be stored in the multimedia database in advance, for example, a plurality of preset avatar applications may be added to an authorization white list in advance.
In this embodiment, the file access method further includes:
step S3502, mount the said separate file directory to the said multimedia database;
step S3503, when the user id is a preset user id and the accessed file is a file in the file directory, the determination result is that access is allowed.
In this embodiment, the database of the multimedia database is determined according to the user identity of the multimedia database, so as to mount the avatar file directory on the multimedia database, thereby managing the avatar file directory, for example, scanning the avatar files in the avatar file directory. And mounting the body-divided file directory on the multimedia database, so that the content in the body-divided file directory of the first application is changed into the content under the multimedia database, namely the body-divided file directory and the multimedia database are changed into the same storage area, and although two file systems are formed after mapping and management of the user space file system, the internal data of the two file systems are still the same, one file is changed, and the other file is also changed. In this way, the first application and the second application can both acquire the file attribute information of the other party through the multimedia database, so that the first application and the second application can access the file of the other party through the multimedia database in the subsequent process, and the use experience of a user is improved.
In this embodiment, when the user id is the preset user id and the accessed file is a file in the file directory, the determination result is that access is allowed. For example, when the user id is a preset user id "999" and the accessed file is a file under/storage/organized/0, the determination result is that access is allowed.
In step S370, if the determination result is that access is allowed, the user space file system is controlled to execute a target operation on the target file, and an execution result is returned to the first application.
In this embodiment, the step of controlling the user space file system to execute the target operation on the target file includes:
step 3701, controlling the user space file system to copy the target file from the file directory to the body file directory according to the attribute information.
In this embodiment, the target operation may be a copy operation, and when the determination result is that access is allowed, that is, the first application is allowed to access the target file in the file directory of the second application, the user space file system may perform a copy operation on the target file, so as to copy the target file from the file directory of the second application to the avatar file directory of the first application, thereby ensuring that the first application may perform a preset operation on the target file copied to the avatar file directory in a subsequent step, and improving user experience.
It is to be understood that, in other embodiments, when the second application needs to access an avatar file under an avatar file directory of the first application and the first application is an avatar application of the preset application, the second application may obtain attribute information of the avatar file under the avatar file directory by using the multimedia database, and when the user space file system calls the multimedia database to perform an authorization judgment on the access instruction to determine that the second application is allowed to access the avatar file under the avatar file directory of the first application, the user space file system may perform a copy operation on the avatar file to copy the avatar file from under the avatar file directory of the first application to a file directory of the second application, so as to ensure that the second application may perform a specific operation on the avatar file copied to under the file directory in a subsequent step, the user experience is improved.
In step S390, the first application is allowed to perform a preset operation on the target file.
In this embodiment, when the execution result is returned to the first application, the first application may perform a preset operation on the target file. The preset operation may be a read-write operation, such as a sharing operation.
In this embodiment, if the determination result is that access is denied, the user space file system denies execution of the target operation on the target file, and returns an execution result to the first application. And meanwhile, the first application is refused to execute the preset operation on the target file, and prompt information is output to prompt a user that the user does not have the right to execute the preset operation on the target file. The prompt message can be a voice message, a text message and the like. For example, if the user id is not "999" or the accessed file is not a file under/storage/organized/0, the user space file system refuses to perform copy operation on the target file, thereby ensuring the security of the file.
In this embodiment, the first application is an individual WeChat, the preset operation is a sharing operation, for example, the user identity of the individual WeChat is "999", the user identity of the owner user is "0", when the user wants to share a photo in a circle of friends through the first application (individual WeChat), the photo is a target file stored in/storage/projected/0 and shot by a camera of the mobile terminal, and the storage path information and size information of the photo are stored in the multimedia database.
Specifically, when it is detected that the split-body WeChat initiates an access instruction to a photo under/storage/organized/0 and it is determined that the split-body WeChat is applied as a split body, the split-body WeChat may obtain path information and size information of the photo through a multimedia database, the split-body WeChat may transmit the path information and size information of the photo and the access instruction to a user space file system, so as to call the multimedia database through the user space file system to perform authorization judgment on the access instruction, if the user identity is "999" and the accessed file is a file under/storage/organized/0, that is, the judgment result is access-allowed, the user space file system performs a copy operation on the photo, that is, the photo is copied from/storage/organized/0 to/organized/999, and returning the copy success result to the body-separated WeChat, so that the body-separated WeChat can perform sharing operation on the photo. And if the judgment result is that the access is denied, the user space file system cannot perform copy operation on the photo, and returns a copy failure result to the body-based WeChat, so that the body-based WeChat cannot perform sharing operation on the photo, and prompt information is output to prompt the user that the user does not have the right to perform sharing operation on the target file.
Through the embodiment, when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a default application of a preset application; if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information; controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system; if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application; and allowing the first application to execute preset operation on the target file, so that when the first application needs to access the target file in the file directory of the second application, as long as the first application is the self-owned application of the preset application, whether the access instruction is authorized or not can be determined according to the attribute information of the target file and the legality information of the first application, and when the authorization is determined, the user space file system can be controlled to execute the target operation on the target file and allow the first application to execute the preset operation on the target file, so that the first application serving as the self-owned application can access the target file in the file directory of the second application and execute the preset operation on the target file.
Fig. 4 is a schematic structural component diagram of a mobile terminal 100 according to an embodiment of the present application, where the mobile terminal 100 includes: a touch panel 1071; a processor 110; the memory 109 is connected to the processor 110, the memory 109 contains a control instruction, and when the processor 110 reads the control instruction, the mobile terminal 100 is controlled to implement the following steps:
when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a default application of a preset application;
if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information;
controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system;
if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application;
and allowing the first application to execute preset operation on the target file.
Optionally, the file access method further includes:
creating a user identity of the first application;
and creating an individuation file directory corresponding to the user identity in the user space file system.
Optionally, the step of determining whether the first application is a separate application of the preset application includes:
and acquiring an application identifier of the first application, and judging whether the first application is the personal application of the preset application or not according to the application identifier of the first application and the user identity identifier.
Optionally, before the step of controlling the multimedia database to determine whether the access instruction is authorized according to the attribute information and the validity information of the first application, the method further includes:
and transmitting the attribute information and the access instruction to the user space file system so as to call the multimedia database to carry out authorization judgment on the access instruction through the user space file system.
Optionally, the method further comprises:
mounting the separate file directory to the multimedia database;
and when the user identity is a preset user identity and the accessed file is the file in the file directory, the judgment result is that the access is allowed.
Optionally, the target operation is a copy operation, and the step of controlling the user space file system to perform the target operation on the target file includes:
and controlling the user space file system to copy the target file from the file directory to the body-divided file directory according to the attribute information.
Optionally, the method further comprises:
and if the judgment result is that the access is denied, refusing the user space file system to execute the target operation on the target file, and returning the execution result to the first application.
Optionally, the method further comprises:
and refusing the first application to execute the preset operation on the target file, and outputting prompt information.
Through the mobile terminal 100, when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a default application of a preset application; if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information; controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system; if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application; and allowing the first application to execute preset operation on the target file, so that when the first application needs to access the target file in the file directory of the second application, as long as the first application is the self-owned application of the preset application, whether the access instruction is authorized or not can be determined according to the attribute information of the target file and the legality information of the first application, and when the authorization is determined, the user space file system can be controlled to execute the target operation on the target file and allow the first application to execute the preset operation on the target file, so that the first application serving as the self-owned application can access the target file in the file directory of the second application and execute the preset operation on the target file.
Embodiments of the present application also provide a computer-readable storage medium having one or more programs, where the one or more programs are executed by one or more processors to implement the following steps:
when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a default application of a preset application;
if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information;
controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system;
if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application;
and allowing the first application to execute preset operation on the target file.
Optionally, the file access method further includes:
creating a user identity of the first application;
and creating an individuation file directory corresponding to the user identity in the user space file system.
Optionally, the step of determining whether the first application is a separate application of the preset application includes:
and acquiring an application identifier of the first application, and judging whether the first application is the personal application of the preset application or not according to the application identifier of the first application and the user identity identifier.
Optionally, before the step of controlling the multimedia database to determine whether the access instruction is authorized according to the attribute information and the validity information of the first application, the method further includes:
and transmitting the attribute information and the access instruction to the user space file system so as to call the multimedia database to carry out authorization judgment on the access instruction through the user space file system.
Optionally, the method further comprises:
mounting the separate file directory to the multimedia database;
and when the user identity is a preset user identity and the accessed file is the file in the file directory, the judgment result is that the access is allowed.
Optionally, the target operation is a copy operation, and the step of controlling the user space file system to perform the target operation on the target file includes:
and controlling the user space file system to copy the target file from the file directory to the body-divided file directory according to the attribute information.
Optionally, the method further comprises:
and if the judgment result is that the access is denied, refusing the user space file system to execute the target operation on the target file, and returning the execution result to the first application.
Optionally, the method further comprises:
and refusing the first application to execute the preset operation on the target file, and outputting prompt information.
Through the computer readable storage medium, when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a separate application of a preset application; if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information; controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system; if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application; and allowing the first application to execute preset operation on the target file, so that when the first application needs to access the target file in the file directory of the second application, as long as the first application is the self-owned application of the preset application and as long as the access instruction is determined to be authorized according to the attribute information of the target file and the legality information of the first application, the user space file system can be controlled to execute the target operation on the target file and allow the first application to execute the preset operation on the target file, and the first application serving as the self application can access and operate the target file in the file directory of the second application.
The embodiment of the application also provides a computer readable storage medium. The computer-readable storage medium herein stores one or more programs. Among other things, computer-readable storage media may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
The corresponding technical features in the above embodiments may be used with each other without causing contradiction in the schemes or without being implementable.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A file access method is applied to a mobile terminal, and is characterized by comprising the following steps:
when detecting that a first application initiates an access instruction to a target file in a file directory of a second application, judging whether the first application is a default application of a preset application;
if the first application is the personal application of the preset application, allowing the first application to acquire the attribute information of the target file through a multimedia database, wherein the attribute information comprises storage path information and size information;
controlling the multimedia database to judge whether the access instruction is authorized according to the attribute information and the validity information of the first application, and returning a judgment result to a user space file system;
if the judgment result is that the access is allowed, controlling the user space file system to execute target operation on the target file, and returning an execution result to the first application;
and allowing the first application to execute preset operation on the target file.
2. The file access method of claim 1, wherein the file access method further comprises:
creating a user identity of the first application;
and creating an individuation file directory corresponding to the user identity in the user space file system.
3. The file access method according to claim 2, wherein the step of determining whether the first application is a separate application of the predetermined application comprises:
and acquiring an application identifier of the first application, and judging whether the first application is the personal application of the preset application or not according to the application identifier of the first application and the user identity identifier.
4. The file access method according to claim 1, wherein before the step of controlling the multimedia database to determine whether the access command is authorized according to the attribute information and the validity information of the first application, the method further comprises:
and transmitting the attribute information and the access instruction to the user space file system so as to call the multimedia database to carry out authorization judgment on the access instruction through the user space file system.
5. The file access method of claim 1, wherein the file access method further comprises:
mounting the separate file directory to the multimedia database;
and when the user identity is a preset user identity and the accessed file is the file in the file directory, the judgment result is that the access is allowed.
6. The file access method of claim 1, wherein the target operation is a copy operation, and wherein the step of controlling the user space file system to perform the target operation on the target file comprises:
and controlling the user space file system to copy the target file from the file directory to the body-divided file directory according to the attribute information.
7. The file access method of claim 1, wherein the file access method further comprises:
and if the judgment result is that the access is denied, refusing the user space file system to execute the target operation on the target file, and returning the execution result to the first application.
8. The file access method of claim 7, wherein the file access method further comprises:
and refusing the first application to execute the preset operation on the target file, and outputting prompt information.
9. A mobile terminal, characterized in that the mobile terminal comprises:
a touch screen;
a processor; and
a memory connected to the processor, the memory containing control instructions, when the processor reads the control instructions, the memory controlling the mobile terminal to implement the file access method according to any one of claims 1 to 8.
10. A computer-readable storage medium having one or more programs thereon, the one or more programs being executable by one or more processors to perform the file access method of any one of claims 1-8.
CN202011344900.XA 2020-11-25 2020-11-25 File access method, mobile terminal and computer readable storage medium Active CN112464208B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011344900.XA CN112464208B (en) 2020-11-25 2020-11-25 File access method, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011344900.XA CN112464208B (en) 2020-11-25 2020-11-25 File access method, mobile terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112464208A true CN112464208A (en) 2021-03-09
CN112464208B CN112464208B (en) 2023-05-12

Family

ID=74807964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011344900.XA Active CN112464208B (en) 2020-11-25 2020-11-25 File access method, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112464208B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938890A (en) * 2021-09-15 2022-01-14 青岛海信移动通信技术股份有限公司 Data sharing method and terminal equipment
CN116049131A (en) * 2022-06-10 2023-05-02 荣耀终端有限公司 File management method, system, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106970978A (en) * 2017-03-28 2017-07-21 联想(北京)有限公司 Data sharing method and device
WO2018094809A1 (en) * 2016-11-24 2018-05-31 宇龙计算机通信科技(深圳)有限公司 Resource sharing method and apparatus
CN108196899A (en) * 2017-12-07 2018-06-22 青岛海信移动通信技术股份有限公司 A kind of method and device of the establishment of multi-user
CN111159734A (en) * 2019-12-20 2020-05-15 青岛海信移动通信技术股份有限公司 Communication terminal and multi-application data inter-access processing method
CN111427709A (en) * 2020-03-30 2020-07-17 努比亚技术有限公司 Application program body-separating control method and device and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018094809A1 (en) * 2016-11-24 2018-05-31 宇龙计算机通信科技(深圳)有限公司 Resource sharing method and apparatus
CN106970978A (en) * 2017-03-28 2017-07-21 联想(北京)有限公司 Data sharing method and device
CN108196899A (en) * 2017-12-07 2018-06-22 青岛海信移动通信技术股份有限公司 A kind of method and device of the establishment of multi-user
CN111159734A (en) * 2019-12-20 2020-05-15 青岛海信移动通信技术股份有限公司 Communication terminal and multi-application data inter-access processing method
CN111427709A (en) * 2020-03-30 2020-07-17 努比亚技术有限公司 Application program body-separating control method and device and computer readable storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113938890A (en) * 2021-09-15 2022-01-14 青岛海信移动通信技术股份有限公司 Data sharing method and terminal equipment
CN113938890B (en) * 2021-09-15 2024-04-30 青岛海信移动通信技术有限公司 Data sharing method and terminal equipment
CN116049131A (en) * 2022-06-10 2023-05-02 荣耀终端有限公司 File management method, system, electronic equipment and storage medium
CN116049131B (en) * 2022-06-10 2023-10-13 荣耀终端有限公司 File management method, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112464208B (en) 2023-05-12

Similar Documents

Publication Publication Date Title
CN112004173B (en) Bluetooth headset switching method, mobile terminal and computer readable storage medium
CN107038245B (en) Page switching method, mobile terminal and storage medium
CN109151169B (en) Camera authority management method, mobile terminal and computer readable storage medium
CN109040441B (en) Application body-separating display method, mobile terminal and computer readable storage medium
CN107329865B (en) Method for opening adb function of debugging bridge, mobile terminal and computer readable medium
CN107862217B (en) Position information acquisition method, mobile terminal and computer storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN110187808B (en) Dynamic wallpaper setting method and device and computer-readable storage medium
CN109472157B (en) Application data storage method, mobile terminal and computer storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN108536383B (en) Game control method, game control equipment and computer readable storage medium
CN113194197A (en) Interaction method, terminal and storage medium
CN112464208B (en) File access method, mobile terminal and computer readable storage medium
CN109725819B (en) Interface display method and device, double-screen double-system terminal and readable storage medium
CN111427709A (en) Application program body-separating control method and device and computer readable storage medium
CN114025215A (en) File processing method, mobile terminal and storage medium
CN107194217B (en) User data access control method, apparatus and computer-readable storage medium
CN112770279A (en) Network sharing method, mobile terminal and computer readable storage medium
CN112423211A (en) Multi-audio transmission control method, equipment and computer readable storage medium
CN112076466A (en) Game data control method, mobile terminal and computer-readable storage medium
CN109462829B (en) Call transfer method, device and computer readable storage medium
CN108900696B (en) Data processing method, terminal and computer readable storage medium
CN109409081B (en) Permission setting method, mobile terminal and computer storage medium
CN109033773B (en) Dual-screen terminal operation authority management method, terminal and computer readable storage medium
CN108183833B (en) Response processing method and device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230425

Address after: Building 1601, Building 3, Sunshine Yuehai Garden Phase 2, No. 3818 Baishi Road, Yuegui Community, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 518000

Applicant after: Shenzhen Weixu Information Technology Service Co.,Ltd.

Address before: 1801, building 2, Chongwen Park, Nanshan Zhiyuan, No. 3370, Liuxian Avenue, Fuguang community, Taoyuan Street, Nanshan District, Shenzhen, Guangdong 518000

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant