CN113835928A - Application backup and recovery method, device, storage medium, and program product - Google Patents

Application backup and recovery method, device, storage medium, and program product Download PDF

Info

Publication number
CN113835928A
CN113835928A CN202111119776.1A CN202111119776A CN113835928A CN 113835928 A CN113835928 A CN 113835928A CN 202111119776 A CN202111119776 A CN 202111119776A CN 113835928 A CN113835928 A CN 113835928A
Authority
CN
China
Prior art keywords
target application
application
authority
configuration information
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111119776.1A
Other languages
Chinese (zh)
Inventor
荆楠楠
王旭光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN202111119776.1A priority Critical patent/CN113835928A/en
Publication of CN113835928A publication Critical patent/CN113835928A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore

Abstract

The application relates to the technical field of intelligent terminals, and provides an application backup and recovery method, device, storage medium and program product, which are used for solving the problem that a target application cannot run after a new device is replaced. During backup, right configuration data of the target application is acquired by calling backup recovery service, then right configuration information of the target application, a program package of the target application and application data of the target application are packaged into a backup data package, and then the backup data package is sent to the replaced terminal. And during recovery, decompressing the backup data packet, firstly installing the target application, then decompressing the data of the target application to a specified position, reading the authority configuration file, configuring the operation authority of the target application based on the authority configuration information, and ensuring that the target application can run on a new android terminal. In summary, according to the embodiment of the application, after the new terminal is replaced, the permission of the target application is compatible with the system of the new terminal, and the target application can be guaranteed to run on the new terminal.

Description

Application backup and recovery method, device, storage medium, and program product
Technical Field
The present application relates to the field of intelligent terminal technology, and in particular, to a method, device, storage medium, and program product for backup and restore of an application.
Background
With the development and the update of Android terminal equipment, more and more use configurations and data of users are stored in the equipment. When a new terminal device is replaced, the current one-key switch function provided by each large mobile phone manufacturer or other third-party platforms only performs installation of the application itself and copying of application data for the application switch, which causes the situation that the application with the configured permission needs to be reconfigured after the user switches the switch, and the operation is complex, even the phenomenon that the function cannot be used due to the fact that the stored application permission state is not matched with the system permission state of the current device and the error is reported occurs.
Therefore, how to make the old application compatible with the new device can make the normal operation of the old application and the new device become a problem of concern in the industry.
Disclosure of Invention
An object of the present application is to provide a method, device, storage medium, and program product for backing up and restoring an application, so as to solve the problem that a target application cannot be run after a new device is replaced.
In a first aspect, the present application provides an application backup method, applied to a first terminal, the method including:
acquiring authority configuration information of a target application;
packing the authority configuration information of the target application, the program package of the target application and the application data of the application into a backup data package;
and sending the backup data packet to a second terminal.
In some embodiments, the obtaining the permission configuration information of the target application includes:
sending an acquisition request of the authority configuration information to an authority backup service aiming at the target application so that the authority backup service calls an authority management service in a system of the first terminal to acquire the authority configuration information;
and receiving the authority configuration information returned by the authority backup service.
In some embodiments, before packaging the permission configuration information of the target application, the package of the target application, and the application data of the application into a backup data package, the method further comprises:
analyzing the authority configuration information;
and storing the authority configuration information as an authority configuration extensible markup language (xm l) file.
In some embodiments, sending the backup data packet to the second terminal includes:
and sending the data to the second terminal in a wireless network or memory card copy mode.
In a second aspect, the present application further provides an application recovery method, applied to a second terminal, where the method includes:
receiving a backup data packet of a target application, wherein the backup data packet comprises authority configuration information of the target application, a program packet of the target application and application data of the application;
installing the target application based on a program package in the backup data package;
storing the application data to a designated location associated with the target application;
and configuring the operation authority of the target application based on the authority configuration information.
In some embodiments, the permission configuration information is stored in a permission configuration extensible markup language xml file, and the configuring the operation permission of the target application based on the permission configuration information includes:
reading the permission configuration extensible markup language (xml) file to acquire permission configuration information of the target application;
sending the authority configuration information of the target application to an authority backup service;
and calling an interface of the authority management service in the second terminal, and granting the operation authority when the target application runs.
In some embodiments, the rights configuration information includes:
a set of runtime permissions applied by the target application;
the granting condition of the target application runtime permission;
and the permission flag is set when the target application permission is granted.
In a third aspect, the present application further provides a terminal device, including:
a display for displaying a user interface of a target application;
a memory for storing executable instructions of the processor;
a processor for executing the executable instructions to implement any of the methods as provided in the first and/or second aspects of the present application.
In a fourth aspect, an embodiment of the present application further provides a computer-readable storage medium, where instructions, when executed by a processor of a terminal device, enable the terminal device to perform any one of the methods as provided in the first aspect and/or the second aspect of the present application.
In a fifth aspect, an embodiment of the present application provides a computer program product comprising a computer program that, when executed by a processor, implements any of the methods as provided in the first and/or second aspects of the present application.
The technical scheme provided by the embodiment of the application at least has the following beneficial effects:
according to the application backup and recovery method, when a user uses a target application after replacing new equipment, application collapse caused by abnormal application permission is avoided, the application permission after replacing the Android equipment is better compatible, the application backup and recovery method is provided for the user, user experience is improved, operation convenience and system stability of the function of replacing the Android equipment by one key are improved, and compatibility of old applications to new Android terminals is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application. On the basis of the common knowledge in the field, the above preferred conditions can be combined randomly to obtain the preferred embodiments of the application.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 2 is a schematic diagram of a software architecture of a terminal device according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of an application backup method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of an application recovery method according to an embodiment of the present application;
fig. 5 is a flowchart illustrating a backup process of a target application in a first terminal according to an embodiment of the present disclosure;
fig. 6 is a flowchart illustrating a recovery process of a target application in a second terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. The embodiments described are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Also, in the description of the embodiments of the present application, "/" indicates or means, for example, a/B may indicate a or B; "and/or" in the text is only an association relationship describing an associated object, and means that three relationships may exist, for example, a and/or B may mean: three cases of a alone, a and B both, and B alone exist, and in addition, "a plurality" means two or more than two in the description of the embodiments of the present application.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first," "second," or "second" may explicitly or implicitly include one or more of that feature, and in the description of embodiments of the application, "a plurality" means two or more unless otherwise indicated.
The method for managing application authority provided by the present application will be described with reference to the following embodiments.
The method and the device mainly solve the problem that the target application cannot run after the new device is replaced. The inventive concept of the present application can be summarized as follows: when the function of the one-key switch is executed, the backup and recovery process of the authority configuration condition of the target application is added on the basis of the original backup and recovery process. During backup, right configuration data of the target application is acquired by calling backup recovery service, then right configuration information of the target application, a program package of the target application and application data of the target application are packaged into a backup data package, and then the backup data package is sent to the replaced terminal. And during recovery, decompressing the backup data packet, firstly installing the target application, then decompressing the data of the target application to a specified position, reading the authority configuration file, configuring the operation authority of the target application based on the authority configuration information, and ensuring that the target application can run on a new android terminal. In summary, according to the embodiment of the present application, when the target application is used after the new terminal is replaced, the permission configuration of the target application of the old terminal and the permission configuration of the backed-up target application in the new terminal can be kept consistent through the backup and recovery process of the permission configuration of the target application, so as to solve the problem of abnormal operation of the backed-up application. The application backup and recovery method is provided for the user, the user experience is improved, the operation of one-key-change function is simplified, the system stability is improved, and the compatibility of the old application to the new android terminal is improved.
After the main inventive concepts of the embodiments of the present application are introduced, some simple descriptions are provided below for application scenarios to which the technical solutions of the embodiments of the present application can be applied, and it should be noted that the application scenarios described below are only used for describing the embodiments of the present application and are not limited. In specific implementation, the technical scheme provided by the embodiment of the application can be flexibly applied according to actual needs.
First, fig. 1 shows a schematic configuration diagram of a terminal device 100.
The following specifically describes the embodiment by taking the terminal device 100 as an example. It should be understood that the terminal device 100 shown in fig. 1 is only an example, and the terminal device 100 may have more or less components than those shown in fig. 1, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
A block diagram of a hardware configuration of a terminal device 100 according to an exemplary embodiment is exemplarily shown in fig. 1. As shown in fig. 1, the terminal device 100 includes: a Radio Frequency (RF) circuit 110, a memory 120, a display unit 130, a camera 140, a sensor 150, an audio circuit 160, a Wireless Fidelity (Wi-Fi) module 170, a processor 180, a bluetooth module 181, and a power supply 190.
The RF circuit 110 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink data of a base station and then send the downlink data to the processor 180 for processing; the uplink data may be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
The memory 120 may be used to store software programs and data. The processor 180 performs various functions of the terminal device 100 and data processing by executing software programs or data stored in the memory 120. The memory 120 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. The memory 120 stores an operating system that enables the terminal device 100 to operate. The memory 120 may store an operating system and various application programs, and may also store program codes for performing the methods described in the embodiments of the present application.
The display unit 130 may be used to receive input numeric or character information, generate signal input related to user settings and function control of the terminal device 100, and particularly, the display unit 130 may include a touch screen 131 disposed on the front surface of the terminal device 100, and may collect touch operations of the user thereon or nearby, such as clicking a button for allowing authorization, clicking a button for rejecting authorization, dragging a scroll box, and the like.
The display unit 130 may also be used to display a Graphical User Interface (GUI) of information input by or provided to the user and various menus of the terminal apparatus 100. Specifically, the display unit 130 may include a display screen 132 disposed on the front surface of the terminal device 100. The display screen 132 may be configured in the form of a liquid crystal display, a light emitting diode, or the like. The display unit 130 may be used to display a user interface of a target application, a data backup process, and the like in the present application.
The touch screen 131 may cover the display screen 132, or the touch screen 131 and the display screen 132 may be integrated to implement the input and output functions of the terminal device 100, and after the integration, the touch screen may be referred to as a touch display screen for short. In the present application, the display unit 130 may display the application programs and the corresponding operation steps.
The camera 140 may be used to capture still images or video. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing elements convert the light signals into electrical signals which are then passed to the processor 180 for conversion into digital image signals.
The terminal device 100 may further comprise at least one sensor 150, such as an acceleration sensor 151, a distance sensor 152, a fingerprint sensor 153, a temperature sensor 154. The terminal device 100 may also be configured with other sensors such as a gyroscope, barometer, hygrometer, thermometer, infrared sensor, light sensor, motion sensor, and the like.
The audio circuitry 160, speaker 161, microphone 162 may provide an audio interface between the user and the terminal device 100. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161. The terminal device 100 may also be provided with a volume button for adjusting the volume of the sound signal. On the other hand, the microphone 162 converts the collected sound signal into an electrical signal, converts the electrical signal into audio data after being received by the audio circuit 160, and outputs the audio data to the RF circuit 110 to be transmitted to, for example, another terminal device, or outputs the audio data to the memory 120 for further processing. In this application, the microphone 162 may capture the voice of the user.
Wi-Fi belongs to a short-distance wireless transmission technology, and the terminal device 100 can help a user to send and receive e-mails, browse webpages, access streaming media and the like through the Wi-Fi module 170, and provides wireless broadband internet access for the user.
The processor 180 is a control center of the terminal device 100, connects various parts of the entire terminal device using various interfaces and lines, and performs various functions of the terminal device 100 and processes data by running or executing software programs stored in the memory 120 and calling data stored in the memory 120. In some embodiments, processor 180 may include one or more processing units; the processor 180 may also integrate an application processor, which mainly handles operating systems, user interfaces, applications, etc., and a baseband processor, which mainly handles wireless communications. It will be appreciated that the baseband processor described above may not be integrated into the processor 180. In the present application, the processor 180 may run an operating system, an application program, a user interface display, and a touch response, and the processing method described in the embodiments of the present application. Further, the processor 180 is coupled with the display unit 130.
And the bluetooth module 181 is configured to perform information interaction with other bluetooth devices having a bluetooth module through a bluetooth protocol. For example, the terminal device 100 may establish a bluetooth connection with a wearable terminal device (e.g., a smart watch) also equipped with a bluetooth module through the bluetooth module 181, so as to perform data interaction.
The terminal device 100 also includes a power supply 190 (such as a battery) for powering the various components. The power supply may be logically connected to the processor 180 through a power management system to manage charging, discharging, power consumption, etc. through the power management system. The terminal device 100 may further be configured with a power button for powering on and off the terminal device, and locking the screen.
Fig. 2 is a block diagram of a software configuration of the terminal device 100 according to the embodiment of the present application.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system may be divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer, from top to bottom, respectively.
The application layer may include a series of application packages.
As shown in fig. 2, the application package may include applications such as camera, gallery, calendar, phone call, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 2, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, dialed and answered calls, browsing history and bookmarks, phone books, short messages, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including an authorization prompt box may include a view displaying text and a view displaying pictures.
The phone manager is used to provide the communication function of the terminal device 100. Such as management of call status (including on, off, etc.).
The resource manager provides various resources, such as localized strings, icons, pictures, layout files, video files, etc., to the application.
The notification manager allows the application to display notification information (e.g., message digest of short message, message content) in the floating window, can be used to convey notification-type messages, and can automatically disappear after a short dwell without user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, text information is prompted in the status bar, a prompt tone is given, the terminal device vibrates, an indicator light flickers, and the like.
The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. And executing java files of the application program layer and the application program framework layer into a binary file by the virtual machine. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), Media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
A 2D (an animation mode) graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The terminal device 100 in the embodiment of the present application may be a mobile phone, a tablet computer, a wearable device, a television, and other terminal devices that can be equipped with an android system.
Based on the above description, the application backup method provided in the embodiment of the present application is applied to the first terminal, and the overall flowchart is shown in fig. 3, and may be implemented as the following steps:
in step 301, rights configuration information of the target application is acquired.
In one embodiment, for a target application, an acquisition request of permission configuration information is sent to a permission backup service, so that the permission backup service invokes a permission management service in a system of a first terminal to acquire the permission configuration information, and then the permission backup service receives the permission configuration information returned by the permission backup service.
It should be noted that, before packaging the permission configuration information of the target application, the program package of the target application, and the application data of the application into a backup data package, in order to facilitate transmission and management of the permission configuration information, the obtained permission configuration information may be analyzed in the present application, and then the permission configuration information is stored as an permission configuration extensible markup language xml file.
Then, in step 302, the permission configuration information of the target application, the program package of the target application and the application data of the application are packaged into a backup data package.
In step 303, the backup data package is sent to the second terminal. The data can be sent to the second terminal in a wireless network or in a memory card copy mode.
Correspondingly, the application recovery method provided in the embodiment of the present application is applied to a second terminal, and receives a backup data packet of a first terminal, and as shown in fig. 4, the overall process may be implemented as:
in step 401, a backup data package of the target application is received, where the backup data package includes permission configuration information of the target application, a program package of the target application, and application data of the target application. In step 402, the target application is installed based on the packages in the backup data package.
In step 403, the application data is stored to the designated location associated with the target application. For example, the designated positions are: data/data/target application package name/, i.e. storing application data to data/data/target application package name/.
In step 404, the operating rights of the target application are configured based on the rights configuration information.
In one embodiment, configuring the operation authority of the target application based on the authority configuration information includes: reading an authority configuration extensible markup language (xml) file, acquiring authority configuration information of a target application, and then sending the authority configuration information of the target application to an authority backup service; and calling an interface of the authority management service in the second terminal, and granting the operation authority when the target application runs. At this time, the structure and configuration of the permission of each version of the Android system in operation are different, and special processing needs to be performed according to the permission difference of the Android systems of different versions before and after backup. The authority configuration information comprises a set of operation authorities applied by the target application, and all operation authorities required by the target application when normally operating all functions, such as authorities required by WeChat normal operation for storing, calling a camera, positioning and the like, wherein the authorities form and are integrated as a part of the authority configuration information; the granting condition of the target application operation authority, that is, the state of the target application operation authority, for example, the state that the wechat allows positioning but does not allow to call the camera, and the state that the camera is allowed to be positioned and not allowed to be called is the state that the wechat is currently in, and these states constitute the granting condition of the target application operation authority; the permission flag during the grant of the target application permission refers to the attribute of the target application permission, for example, the permission of the WeChat to call the camera, the condition of how the camera normally operates and the condition of realizing the normal operation all belong to the attribute of the target application permission.
In summary, the first terminal and the second terminal may respectively follow the backup recovery application, and the backup process for the target application on the first terminal may be implemented as follows in fig. 5:
in step 501, the backup recovery application obtains an installation package of the target application and application data thereof.
In step 502, the backup recovery application invokes a rights backup service (backup service) to obtain rights configuration information when the target application runs.
In step 503A, the permission backup service responds to the request from the backup recovery application, invokes the permission management service, and queries the configuration information of the permission applied by the target application during running, including the set of permissions, the grant condition of the permission during running and the permission flag s when the permission of the target application is granted.
In step 503B, the rights management service returns the rights configuration information of the target application to the rights backup service.
In step 504, the rights backup service organizes the queried rights configuration information into data of a particular format and returns it to the backup recovery application.
In step 505, the backup recovery application parses the returned data and then saves the data as a rights configuration xml file.
In step 506, the permission configuration information of the target application, the program package of the target application, and the application data of the application are packaged to obtain a backup data package. And then transferred to the second terminal by way of wifi or memory card copy.
In some embodiments, if the second terminal receives the backup data package from the first terminal, the process of backing up the runtime permission of the restore target application in the second terminal may be implemented as shown in fig. 6:
in step 601, the backup recovery application divides the backup data package into an installation package apk of the target application, target application data, and an authority configuration xml file.
In step 602, based on the installation package apk of the target application, the application installation interface of the system is called, and the target application is installed.
In step 603, the target application data is decompressed to a specified location associated with the installed target application, for example: data/data/application B packet name/.
In step 604, the backup recovery application reads the rights configuration xml file, obtains the package name of the target application and the rights configuration data of the target application backup, and transmits the package name and the rights configuration data to the rights backup service.
In some embodiments, the backup recovery application reads and disassembles the permission configuration xml file, since the permission configuration xml file includes all permission configuration information of an application, such as a positioning permission of a WeChat and a camera invoking permission, it needs to be disassembled to obtain permission configuration data of each permission backed up by the target application, and each permission configuration data is packaged into a specific data structure, such as a configuration positioning permission, and the required data type is an array or a structure, so that the specific data structure depends on the requirements of a permission interface, and the permission interface realizes authorization of the target application.
In step 605, the rights backup service parses the received rights configuration data of the target application when the first terminal runs, and invokes a corresponding interface of the rights management service.
The authority backup service analyzes the matching degree of the authority of the second terminal system and the authority configuration data for obtaining the backup of the target application, namely, the permission configuration data is adapted to the second terminal, for example, in the old version of android system, the positioning can be realized only by a permission which is commonly called as GPS, but the positioning in the new version Android system is divided into network positioning and satellite positioning, the two positioning authorities need to be configured at the same time to achieve the purpose and effect of using the positioning authority of the old version Android system, the positioning authority is compatibly adjusted based on the new version Android system, therefore, the present application packages the authority configuration data of the target application backup into a specific data structure compatible with the authority architecture of the second terminal system, and finally sends the authority configuration data to the authority backup service, and performs the operation of step 605 and later.
In step 606, the rights management service configures the operating rights of the target application based on the rights configuration information. The method comprises the steps of collecting the authority, the authorization situation of the runtime authority and the authority flag flags when the target application authority is authorized.
The steps really realize the management of the application permission after the new terminal is replaced, and the permission configuration information of the target application is backed up simultaneously when the function of the key switch is backed up, so that an application backup and recovery method is provided for a user, the user experience is improved, the operation convenience and the system stability of the function of the key switch are improved, and the compatibility of the old application to the new android terminal is improved.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
The embodiments provided in the present application are only a few examples of the general concept of the present application, and do not limit the scope of the present application. Any other embodiments extended according to the scheme of the present application without inventive efforts will be within the scope of protection of the present application for a person skilled in the art.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. An application backup method, applied to a first terminal, the method comprising:
acquiring authority configuration information of a target application;
packing the authority configuration information of the target application, the program package of the target application and the application data of the application into a backup data package;
and sending the backup data packet to a second terminal.
2. The method of claim 1, wherein the obtaining the permission configuration information of the target application comprises:
sending an acquisition request of the authority configuration information to an authority backup service aiming at the target application so that the authority backup service calls an authority management service in a system of the first terminal to acquire the authority configuration information;
and receiving the authority configuration information returned by the authority backup service.
3. The method of claim 2, wherein before packaging the permission configuration information of the target application, the package of the target application, and the application data of the application into a backup data package, the method further comprises:
analyzing the authority configuration information;
and storing the authority configuration information as an authority configuration extensible markup language xml file.
4. The method of claim 1, wherein sending the backup data package to the second terminal comprises:
and sending the data to the second terminal in a wireless network or memory card copying mode.
5. An application recovery method, applied to a second terminal, the method comprising:
receiving a backup data packet of a target application, wherein the backup data packet comprises authority configuration information of the target application, a program packet of the target application and application data of the application;
installing the target application based on a program package in the backup data package;
storing the application data to a designated location associated with the target application;
and configuring the operation authority of the target application based on the authority configuration information.
6. The method of claim 5, wherein the permission configuration information is stored in a permission configuration extensible markup language xml file, and wherein the configuring the operation permission of the target application based on the permission configuration information comprises:
reading the permission configuration xml file to obtain permission configuration information of the target application;
sending the authority configuration information of the target application to an authority backup service;
and calling an interface of the authority management service in the second terminal, and granting the operation authority when the target application runs.
7. The method according to claim 5 or 6, wherein the right configuration information comprises:
a set of runtime permissions applied by the target application;
the granting condition of the target application runtime permission;
and the permission flag is set when the target application permission is granted.
8. A terminal device, comprising:
a display for displaying a user interface of a target application;
a memory for storing executable instructions of the processor;
a processor for executing the executable instructions to implement the method of any one of claims 1-7.
9. A computer-readable storage medium, wherein instructions in the computer-readable storage medium, when executed by a processor of a terminal device, enable the terminal device to perform the method of any one of claims 1-7.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the method of any of claims 1-7 when executed by a processor.
CN202111119776.1A 2021-09-24 2021-09-24 Application backup and recovery method, device, storage medium, and program product Pending CN113835928A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111119776.1A CN113835928A (en) 2021-09-24 2021-09-24 Application backup and recovery method, device, storage medium, and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111119776.1A CN113835928A (en) 2021-09-24 2021-09-24 Application backup and recovery method, device, storage medium, and program product

Publications (1)

Publication Number Publication Date
CN113835928A true CN113835928A (en) 2021-12-24

Family

ID=78969641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111119776.1A Pending CN113835928A (en) 2021-09-24 2021-09-24 Application backup and recovery method, device, storage medium, and program product

Country Status (1)

Country Link
CN (1) CN113835928A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115080161A (en) * 2021-12-25 2022-09-20 荣耀终端有限公司 Prompting method for terminal, terminal and storage medium
CN117130826A (en) * 2023-02-28 2023-11-28 荣耀终端有限公司 Data backup method, electronic equipment, data backup system and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103176864A (en) * 2013-03-11 2013-06-26 广东欧珀移动通信有限公司 Backup method, backup device and mobile terminal based on Android system
CN103514397A (en) * 2013-09-29 2014-01-15 西安酷派软件科技有限公司 Server, terminal and authority management and permission method
US20140038573A1 (en) * 2012-08-03 2014-02-06 Research In Motion Limited Managing Of Application Access To Centrally Stored Place-Related Data On A Mobile Device
US20140359085A1 (en) * 2013-05-28 2014-12-04 Dropbox, Inc. Access permissions for shared content
US20160139998A1 (en) * 2014-11-18 2016-05-19 Globally Tele-Connected, Llc System, Method and Computer Program Product for Contact Information Backup and Recovery
CN105786606A (en) * 2016-03-03 2016-07-20 深圳市创想天空科技股份有限公司 Data transferring method and system for intelligent terminals
WO2017166791A1 (en) * 2016-04-01 2017-10-05 乐视控股(北京)有限公司 Application backup method and apparatus
JP2018081384A (en) * 2016-11-14 2018-05-24 キヤノン株式会社 Information processing device and authority management method and program
CN112214752A (en) * 2020-10-20 2021-01-12 腾讯科技(深圳)有限公司 Dynamic control method, device and equipment of application permission and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140038573A1 (en) * 2012-08-03 2014-02-06 Research In Motion Limited Managing Of Application Access To Centrally Stored Place-Related Data On A Mobile Device
CN103176864A (en) * 2013-03-11 2013-06-26 广东欧珀移动通信有限公司 Backup method, backup device and mobile terminal based on Android system
US20140359085A1 (en) * 2013-05-28 2014-12-04 Dropbox, Inc. Access permissions for shared content
CN103514397A (en) * 2013-09-29 2014-01-15 西安酷派软件科技有限公司 Server, terminal and authority management and permission method
US20160139998A1 (en) * 2014-11-18 2016-05-19 Globally Tele-Connected, Llc System, Method and Computer Program Product for Contact Information Backup and Recovery
CN105786606A (en) * 2016-03-03 2016-07-20 深圳市创想天空科技股份有限公司 Data transferring method and system for intelligent terminals
WO2017166791A1 (en) * 2016-04-01 2017-10-05 乐视控股(北京)有限公司 Application backup method and apparatus
JP2018081384A (en) * 2016-11-14 2018-05-24 キヤノン株式会社 Information processing device and authority management method and program
CN112214752A (en) * 2020-10-20 2021-01-12 腾讯科技(深圳)有限公司 Dynamic control method, device and equipment of application permission and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"数据备份系统中基于角色访问控制模型的研究", 《微机发展》 *
JOSEPH F. LENNERT 等: "The Automated Backup Solution— Safeguarding the Communications Network Infrastructure", 《DOI: 10.1002/BLTJ.20026》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115080161A (en) * 2021-12-25 2022-09-20 荣耀终端有限公司 Prompting method for terminal, terminal and storage medium
CN117130826A (en) * 2023-02-28 2023-11-28 荣耀终端有限公司 Data backup method, electronic equipment, data backup system and storage medium

Similar Documents

Publication Publication Date Title
CN113032766B (en) Application authority management method and device
CN110865837B (en) Method and terminal for system upgrade
CN113835928A (en) Application backup and recovery method, device, storage medium, and program product
CN113535207A (en) Vehicle, vehicle-mounted software updating method thereof and mobile terminal
CN113835569A (en) Terminal device, quick start method for internal function of application and storage medium
CN113835571A (en) Terminal device, information display method and storage medium
CN113709026B (en) Method, device, storage medium and program product for processing instant communication message
CN113836540A (en) Method, apparatus, storage medium, and program product for managing application rights
CN111158735B (en) Hot patch file processing method and communication terminal
CN112825072B (en) Communication terminal and data sharing method
CN114675786A (en) Large-capacity storage mounting method, device, terminal and medium
CN111159734A (en) Communication terminal and multi-application data inter-access processing method
CN113496039A (en) Authority management method and terminal
CN113642010B (en) Method for acquiring data of extended storage device and mobile terminal
CN114154180A (en) Data sharing method and terminal equipment
CN114356352A (en) Management method of application data under multiple users and terminal equipment
CN114528125A (en) Method for reserving application data and terminal equipment
CN113835889A (en) Method for acquiring input event and related device
CN112764832A (en) Application program installing and uninstalling method and communication terminal
CN114595203A (en) File synchronization method based on dual systems, terminal device and storage medium
CN115168689A (en) Terminal device, search content display method and storage medium
CN113938890A (en) Data sharing method and terminal equipment
CN113642010A (en) Method for acquiring data of extended storage device and mobile terminal
CN115146293A (en) File encryption and decryption method, equipment and medium
CN113536387A (en) Terminal and method for detecting integrity of kernel data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination