CN114692093B - Application program installation method and electronic equipment - Google Patents
Application program installation method and electronic equipment Download PDFInfo
- Publication number
- CN114692093B CN114692093B CN202210587571.4A CN202210587571A CN114692093B CN 114692093 B CN114692093 B CN 114692093B CN 202210587571 A CN202210587571 A CN 202210587571A CN 114692093 B CN114692093 B CN 114692093B
- Authority
- CN
- China
- Prior art keywords
- electronic device
- request
- application program
- mobile phone
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 95
- 238000009434 installation Methods 0.000 claims abstract description 329
- 238000012360 testing method Methods 0.000 claims abstract description 305
- 230000004044 response Effects 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims description 53
- 238000004590 computer program Methods 0.000 claims description 11
- 238000003860 storage Methods 0.000 claims description 10
- 238000002360 preparation method Methods 0.000 claims 1
- 238000004519 manufacturing process Methods 0.000 abstract description 14
- 230000006870 function Effects 0.000 description 48
- 238000012545 processing Methods 0.000 description 30
- 239000010410 layer Substances 0.000 description 27
- 230000003993 interaction Effects 0.000 description 15
- 238000010586 diagram Methods 0.000 description 13
- 238000007726 management method Methods 0.000 description 11
- 238000011900 installation process Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 7
- 238000012217 deletion Methods 0.000 description 5
- 230000037430 deletion Effects 0.000 description 5
- 238000010923 batch production Methods 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000009877 rendering Methods 0.000 description 3
- 238000013528 artificial neural network Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 235000019800 disodium phosphate Nutrition 0.000 description 2
- 230000001537 neural effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 239000012792 core layer Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011990 functional testing Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3664—Environments for testing or debugging software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/24—Arrangements for testing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Quality & Reliability (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
Abstract
The application provides an application program installation method and electronic equipment, relates to the technical field of electronics, and aims to improve installation efficiency and test efficiency when application programs are installed on electronic equipment such as a mobile phone and meet the requirement of batch test of a production line. The method comprises the following steps: the method comprises the steps that first electronic equipment receives first operation of a user; in response to the first operation, the first electronic device sends a first request to at least one second electronic device; the first request is used for requesting the second electronic equipment to set a first identifier, and the first identifier is used for indicating that the second electronic equipment has the installation authority of the first application program; the first application program is used for testing an operating system of the second electronic equipment; the first electronic device sends a second request to the second electronic device, wherein the second request is used for requesting the second electronic device to install the first application program.
Description
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an application installation method and an electronic device.
Background
Currently, before a mobile phone leaves a factory, an operating system of the mobile phone needs to be tested to determine whether each function of the operating system of the mobile phone is normal.
Usually, an Application Package (APK) corresponding to a test application can be installed in a mobile phone, and each function of an operating system of the mobile phone can be tested through the APK. The APK for the mobile phone installation test can be installed in the following three ways: 1. the tester can use the mobile phone to brush the root package, so as to obtain the root authority, and after the root authority is obtained, the mobile phone can install the test APK. 2. The tester can also use the mobile phone to download the authorized test APK from the application store and install the test APK. 3. The tester can also open the developer option of the mobile phone, and after the Universal Serial Bus (USB) debug authority is manually set, the mobile phone can obtain and install the installation authority of the test APK.
However, the three installation manners of the test APK all require the user to operate the mobile phone to obtain the installation permission of the test APK. Therefore, the installation efficiency and the test efficiency of the APK test are low, and the requirement of batch test of a production line is difficult to meet.
Disclosure of Invention
The embodiment of the application program installation method and the electronic equipment are used for improving installation efficiency and test efficiency when the application program is installed on the electronic equipment such as a mobile phone and the like and meeting the requirement of batch test of a production line.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical solutions:
in a first aspect, an embodiment of the present application provides an application installation method, which is applied to an application installation system, where the application installation system may include a first electronic device and at least one second electronic device connected to the first electronic device, and the method may include: the method comprises the steps that first electronic equipment receives first operation of a user, wherein the first operation is used for triggering the first electronic equipment to send a first request to second electronic equipment, the first request is used for requesting the second electronic equipment to set a first identifier, and the first identifier is used for indicating that the first electronic equipment has installation permission of a first application program; the first application program is used for testing an operating system of the second electronic equipment; in response to the first operation, the first electronic device sends a first request to the second electronic device; the second electronic equipment receives the first request and sets a first identifier according to the first request; the first electronic equipment sends a second request to the second electronic equipment, wherein the second request is used for requesting the second electronic equipment to install the first application program; and the second electronic equipment receives the second request, and installs the first application program under the condition that the second electronic equipment comprises the first identifier corresponding to the first application program.
In some possible implementations, the application installation method may be used to install a test application (i.e., a first application) on the second electronic device before the second electronic device leaves a factory, so as to test various functions such as an operating system of the second electronic device.
Based on the method of the first aspect, a request for setting the installation permission of the first application program is sent to at least one second electronic device (e.g., a mobile phone) by a first electronic device (e.g., a laptop), so that the at least one second electronic device can set the installation permission of the corresponding first application program according to the request sent by the first electronic device, that is, in the scheme of the application, different second electronic devices set the corresponding installation permission according to the request sent by the first electronic device, so that the installation permission of the first application program can be acquired without the user performing respective operations on each second electronic device, the operations of the user on different second electronic devices in the installation process of the first application program can be reduced, and the efficiency of installing the first application program on each second electronic device can be improved. Because the first application program is used for testing the operating system of the second electronic device, the scheme of the application can improve the efficiency of installing the first application program on the second electronic device, and therefore the testing efficiency of testing the second electronic device can be improved.
And because the installation permission of the application program can be obtained without the operation of a tester on the second electronic equipment when the first application program is installed, the first application program can be simultaneously installed on a plurality of second electronic equipment (such as mobile phones), and the requirements of production line batch production and test can be met.
In addition, according to the scheme of the application, the installation permission of the first application program is set through the second electronic device according to the request of the first electronic device, so that the second electronic device can install the first application program according to the installation permission, and therefore the first application program does not need to be prefabricated in an operating system of the second electronic device (such as a mobile phone), the settings such as factory leaving and the like can be restored through the second electronic device, the first application program in the second electronic device and data corresponding to the first application program are deleted, the use space of the second electronic device can be improved, and data leakage is avoided.
With reference to the first aspect, in another possible implementation manner, the sending, by the first electronic device, the first request to the second electronic device may include: the first electronic equipment encrypts the first request through a first secret key; the first electronic device sends the encrypted first request to the second electronic device.
Based on the possible implementation manner, the first electronic device sends the encrypted first request to the second electronic device, so that the security of the first request can be improved, and the second electronic device can decrypt the encrypted first request, so as to verify whether the first request is valid.
With reference to the first aspect, in another possible implementation manner, the setting, by the second electronic device, the first identifier according to the first request may include: the second electronic equipment decrypts the encrypted first request through a second key, wherein the second key corresponds to the first key; and under the condition that the second electronic equipment successfully decrypts through the second secret key, the second electronic equipment sets the first identifier according to the first request.
Based on this possible implementation, whether the first request is valid can be verified by the second electronic device decrypting the encrypted first request using the corresponding key.
With reference to the first aspect, in another possible implementation manner, the application program installation method may further include: the second electronic equipment receives a second operation of the user, wherein the second operation is used for triggering the second electronic equipment to delete the first application program; and responding to the second operation, and deleting the first application program and the data corresponding to the first application program by the second electronic equipment.
Based on the possible implementation manner, because the first application program is not an application program that is pre-manufactured in the operating system of the second electronic device, the first application program may delete the first application program and the data corresponding to the first application program in the second electronic device by performing settings, such as factory restoration, on the second electronic device, so that the usage space of the second electronic device can be increased, and leakage of the data can be avoided.
With reference to the first aspect, in another possible implementation manner, the second operation is an operation that a user triggers the second electronic device to restore factory settings, and the application installation method may further include: the second electronic device deletes the first identifier.
Based on the possible implementation manner, when the second electronic device is restored to the factory setting, the second electronic device can delete the installation permission corresponding to the first application program, so that the use space of the second electronic device can be further improved, and data leakage is avoided.
With reference to the first aspect, in another possible implementation manner, the first electronic device may be a computer, and the second electronic device may be a mobile phone.
Based on the possible implementation mode, the request for setting the installation permission of the first application program can be sent to the mobile phone through the computer, so that the mobile phone can set the installation permission of the corresponding first application program according to the request sent by the computer, the installation permission of the first application program can be obtained without the user operating on the mobile phone, the operation of the user in the installation process of the first application program can be reduced, and the installation efficiency of the first application program can be improved.
With reference to the first aspect, in another possible implementation manner, the first application may be a man-machine interaction function test system MMI system.
Based on the possible implementation manner, the second electronic device can set the installation permission of the corresponding MMI system according to the request sent by the first electronic device, so that the second electronic device can install the MMI system and test the operating system of the second electronic device.
In a second aspect, an embodiment of the present application provides an application installation method, applied to a first electronic device, where the first electronic device is connected to at least one second electronic device, where the application installation method may include: the method comprises the steps that first electronic equipment receives first operation of a user; in response to the first operation, the first electronic device sends a first request to the second electronic device; the first request is used for requesting the second electronic equipment to set a first identifier, and the first identifier is used for indicating that the second electronic equipment has installation authority of the first application program; the first application program is used for testing an operating system of the second electronic equipment; the first electronic device sends a second request to the second electronic device, wherein the second request is used for requesting the second electronic device to install the first application program.
Based on the method of the second aspect, a request for setting the installation permission of the first application program is sent to at least one second electronic device (e.g., a mobile phone) by a first electronic device (e.g., a laptop), so that the second electronic device can set the installation permission of the corresponding first application program according to the request sent by the first electronic device, that is, the scheme of the application is that the second electronic device sets the corresponding installation permission according to the request sent by the first electronic device, so that the installation permission of the first application program can be acquired without the user operating the second electronic device, the operation of the user on the second electronic device in the installation process of the first application program can be reduced, and the installation efficiency of installing the first application program on the second electronic device can be improved. Because the first application program is used for testing the operating system of the second electronic device, the efficiency of installing the first application program on the second electronic device can be improved by the scheme of the application, and therefore the testing efficiency of testing the second electronic device can be improved. And because the first electronic equipment can send the first request to a plurality of second electronic equipment simultaneously to can make first application program install on a plurality of second electronic equipment simultaneously, can satisfy the demand of producing line batch production and test promptly.
In addition, according to the scheme of the application, the installation authority of the first application program is set through the second electronic device according to the request of the first electronic device, so that the second electronic device can install the first application program according to the installation authority, and therefore the first application program does not need to be prefabricated in an operating system of the second electronic device (such as a mobile phone), the second electronic device can be set to be factory-ready through restoration, the first application program in the second electronic device and data corresponding to the first application program are deleted, the use space of the second electronic device can be improved, and data leakage is avoided.
With reference to the second aspect, in another possible implementation manner, the sending, by the first electronic device, the second request to the second electronic device may include: the first electronic equipment encrypts the first request through a first secret key; the first electronic device sends the encrypted first request to the second electronic device.
Based on the possible implementation manner, the first electronic device sends the encrypted first request to the second electronic device, so that the security of the first request can be improved, and the second electronic device can decrypt the encrypted first request, thereby verifying whether the first request is valid.
With reference to the second aspect, in another possible implementation manner, the first electronic device may be a computer, and the second electronic device may be a mobile phone.
Based on the possible implementation mode, the request for setting the installation permission of the first application program can be sent to the mobile phone through the computer, so that the mobile phone can set the installation permission of the corresponding first application program according to the request sent by the computer, the installation permission of the first application program can be obtained without the operation of a user on the mobile phone, the operation of the user in the installation process of the first application program can be reduced, and the installation efficiency of the first application program can be improved.
With reference to the second aspect, in another possible implementation manner, the first application program may be a man-machine interaction function test system MMI system.
Based on the possible implementation manner, the second electronic device can set the installation permission of the corresponding man-machine interaction function test system MMI system according to the request sent by the first electronic device, so that the second electronic device can install the man-machine interaction function test system MMI system and test the operating system of the second electronic device.
In a third aspect, an embodiment of the present application provides an application installation method, applied to a second electronic device, where the second electronic device is connected to a first electronic device, where the application installation method may include: the method comprises the steps that a first request sent by first electronic equipment is received by second electronic equipment, the first request is used for requesting the second electronic equipment to set a first identifier, and the first identifier is used for indicating that the second electronic equipment has installation permission of a first application program; the first application program is used for testing an operating system of the second electronic equipment; the second electronic equipment receives the first request and sets a first identifier according to the first request; the second electronic equipment receives a second request sent by the first electronic equipment, wherein the second request is used for requesting the second electronic equipment to install the first application program; and under the condition that the second electronic equipment comprises the first identifier corresponding to the first application program, the second electronic equipment installs the first application program.
Based on the method of the third aspect, the first electronic device sends the request for setting the installation permission of the first application program to the second electronic device, so that the second electronic device can set the installation permission of the corresponding first application program according to the request sent by the first electronic device, that is, the scheme of the application is that the second electronic device sets the corresponding installation permission according to the request sent by the first electronic device, so that the installation permission of the first application program can be acquired without the user operating on the second electronic device, the user operation in the installation process of the first application program on the second electronic device can be reduced, and the efficiency of installing the first application program on the second electronic device can be improved. Because the first application program is used for testing the operating system of the second electronic device, the scheme of the application can improve the efficiency of installing the first application program on the second electronic device, and therefore the testing efficiency of testing the second electronic device can be improved.
According to the scheme, the installation permission of the first application program is set through the second electronic equipment according to the request of the first electronic equipment, so that the first application program can be installed through the second electronic equipment according to the installation permission, the first application program does not need to be prefabricated in an operating system of the second electronic equipment (such as a mobile phone), the settings such as factory leaving and the like can be restored through the second electronic equipment, the first application program in the second electronic equipment and data corresponding to the first application program are deleted, the use space of the second electronic equipment can be improved, and data leakage is avoided.
With reference to the third aspect, in another possible implementation manner, the first request may be a request after the first electronic device encrypts the request by using a first key, and the setting, by the second electronic device, the first identifier according to the first request may include: the second electronic equipment decrypts the encrypted first request through a second key, wherein the second key corresponds to the first key; and under the condition that the second electronic equipment successfully decrypts through the second secret key, the second electronic equipment sets the first identifier according to the first request.
Based on this possible implementation, whether the first request is valid can be verified by the second electronic device decrypting the encrypted first request using the corresponding key.
With reference to the third aspect, in another possible implementation manner, the application program installation method may further include: the second electronic equipment receives a second operation of the user, wherein the second operation is used for triggering the second electronic equipment to delete the first application program; and responding to the second operation, and deleting the first application program and the data corresponding to the first application program by the second electronic equipment.
Based on the possible implementation manner, because the first application program is not an application program pre-manufactured in the operating system of the second electronic device, the first application program may delete the first application program and the data corresponding to the first application program in the second electronic device by performing settings, such as factory restoration, on the second electronic device, so that the use space of the second electronic device may be increased, and leakage of the data may be avoided.
With reference to the third aspect, in another possible implementation manner, the second operation is an operation that a user triggers the second electronic device to restore factory settings, and the application installation method may further include: the second electronic device deletes the first identifier.
Based on the possible implementation manner, when the second electronic device is restored to the factory setting, the second electronic device can delete the installation permission corresponding to the first application program, so that the use space of the second electronic device can be further improved, and data leakage is avoided.
With reference to the third aspect, in another possible implementation manner, the first electronic device may be a computer, and the second electronic device may be a mobile phone.
Based on the possible implementation mode, the request for setting the installation permission of the first application program can be sent to the mobile phone through the computer, so that the mobile phone can set the installation permission of the corresponding first application program according to the request sent by the computer, the installation permission of the first application program can be obtained without the user operating on the mobile phone, the operation of the user in the installation process of the first application program can be reduced, and the installation efficiency of the first application program can be improved.
With reference to the third aspect, in another possible implementation manner, the second electronic device may include an instruction transceiver module and an instruction verification module; the decrypting, by the second electronic device, the encrypted first request by the second key may include: the instruction receiving and sending module receives an encrypted first request sent by first electronic equipment; the instruction transceiving module sends the encrypted first request to the instruction verification module; the instruction verification module receives the encrypted first request and decrypts the encrypted first request according to the second key; the setting, by the second electronic device, the first identifier according to the first request may include: and under the condition that the instruction verification module successfully decrypts through the second secret key, the instruction verification module sets a first identifier according to the first request.
Based on this possible implementation, whether the first request is valid can be verified by the second electronic device decrypting the encrypted first request using the corresponding key.
With reference to the third aspect, in another possible implementation manner, the second electronic device may further include an installation authority obtaining module; the receiving, by the second electronic device, the second request sent by the first electronic device may include: the instruction transceiving module receives a second request sent by the first electronic equipment; the second electronic device installs the first application program, and the method comprises the following steps: the instruction receiving and sending module sends a second request to the installation authority obtaining module; and the installation permission obtaining module installs the first application program under the condition that the instruction verification module comprises the first identifier corresponding to the first application program according to the second request.
Based on the possible implementation manner, when the second electronic device needs to install the first application program, the second electronic device may determine whether the installation permission (i.e., the first identifier) corresponding to the first application program is included, and when the second electronic device includes the installation permission corresponding to the first application program, the second electronic device may install the first application program, that is, when the second electronic device installs the first application program, the installation permission of the first application program may be acquired without a user operating the second electronic device, and operations of the user during installation of the first application program may be reduced, so that the installation efficiency of the first application program may be improved.
With reference to the third aspect, in another possible implementation manner, the first application program may be a man-machine interaction function test system MMI system.
Based on the possible implementation manner, the second electronic device can set the installation permission of the corresponding man-machine interaction function test system MMI system according to the request sent by the first electronic device, so that the second electronic device can install the man-machine interaction function test system MMI system and test the operating system of the second electronic device.
In a fourth aspect, an embodiment of the present application provides an application installation apparatus, which can be applied to a first electronic device, for implementing the method in the second aspect. The functions of the application program installation device can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions, for example, a receiving module and a transmitting module, etc.
The receiving module may be configured to receive a first operation of a user.
A sending module, which can be used for responding to the first operation, and sending a first request to the second electronic equipment by the first electronic equipment; the first request is used for requesting the second electronic equipment to set a first identifier, and the first identifier is used for indicating that the second electronic equipment has the installation authority of the first application program; the first application program is used for testing an operating system of the second electronic device.
The sending module may be further configured to send a second request to the second electronic device, where the second request is used to request the second electronic device to install the first application.
With reference to the fourth aspect, in another possible implementation manner, the application installation apparatus may further include an encryption module.
An encryption module may be configured to encrypt the first request with a first key.
The sending module may be further configured to send the encrypted first request to the second electronic device.
With reference to the fourth aspect, in another possible implementation manner, the first electronic device may be a computer, and the second electronic device may be a mobile phone.
In a fifth aspect, an embodiment of the present application provides an application installation apparatus, which can be applied to a second electronic device, for implementing the method in the third aspect. The functions of the application program installation device can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions, for example, a receiving module, a setting module, an installing module, and the like.
The receiving module can be used for the second electronic equipment to receive a first request sent by the first electronic equipment, wherein the first request is used for requesting the second electronic equipment to set a first identifier, and the first identifier is used for indicating that the second electronic equipment has installation permission of a first application program; the first application program is used for testing an operating system of the second electronic device.
The setting module may be configured to set the first identifier according to the first request.
The receiving module may be further configured to receive a second request sent by the first electronic device, where the second request is used to request the second electronic device to install the first application program.
The installation module may be configured to install the first application program by the second electronic device when the second electronic device includes the first identifier corresponding to the first application program.
With reference to the fifth aspect, in another possible implementation manner, the application installation apparatus may further include a decryption module.
The decryption module may be configured to decrypt the first request with a second key, the second key corresponding to the first key.
The setting module may be further configured to set the first identifier according to the first request when the second electronic device succeeds in decryption by the second key.
With reference to the fifth aspect, in another possible implementation manner, the receiving module may be further configured to receive a second operation of the user, where the second operation is used to trigger the second electronic device to delete the first application.
The application program installation device can further comprise a deletion module.
The deleting module can be further used for responding to the second operation, and the second electronic equipment deletes the first application program and the data corresponding to the first application program.
With reference to the fifth aspect, in another possible implementation manner, the deleting module may be further configured to delete the first identifier.
With reference to the fifth aspect, in another possible implementation manner, the first electronic device may be a computer, and the second electronic device may be a mobile phone.
A sixth aspect provides an application installation apparatus having a function of implementing the method of the second or third aspect. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In a seventh aspect, an application installation apparatus is provided, including: a processor and a memory; the memory is configured to store computer executable instructions, and when the application installation apparatus is running, the processor executes the computer executable instructions stored in the memory to cause the application installation apparatus to perform the application installation method according to any one of the second aspect or the third aspect.
In an eighth aspect, there is provided an application installation apparatus including: a processor; the processor is configured to be coupled with the memory, and after reading the instruction in the memory, execute the application program installation method according to any one of the second aspect or the third aspect.
In a ninth aspect, embodiments of the present application provide a computer-readable storage medium having computer program instructions stored thereon. When executed by an electronic device, cause the electronic device to implement an application installation method as described in the second aspect or any one of its possible implementations; alternatively, the computer program instructions, when executed by the electronic device, cause the electronic device to implement the application installation method as described in the third aspect or any one of the possible implementations of the third aspect.
In a tenth aspect, an embodiment of the present application provides a computer program product, which includes computer readable code, when the computer readable code is executed in an electronic device, causing the electronic device to implement the application program installation method according to the second aspect or any one of the possible implementation manners of the second aspect; or, when the computer readable code is run in an electronic device, causing the electronic device to implement the application installation method as described in the third aspect or any of its possible implementations.
In an eleventh aspect, there is provided an apparatus (which may be a system-on-a-chip, for example) comprising a processor configured to enable a first device to implement the functionality referred to in the first aspect above. When the device is a chip system, the device may be composed of a chip, or may include a chip and other discrete devices.
In a twelfth aspect, an embodiment of the present application provides an application installation system, where the application installation system may include: the electronic device comprises a first electronic device and at least one second electronic device connected with the first electronic device; the first electronic device may be configured to execute the application installation method according to any one of the second aspect or possible implementations of the second aspect, and the second electronic device may be configured to execute the application installation method according to any one of the third aspect or possible implementations of the third aspect.
It should be understood that, the beneficial effects of the fourth to twelfth aspects may be referred to the related descriptions of the first, second and third aspects, and will not be described herein again.
Drawings
Fig. 1 is a schematic diagram of an application installation system provided in an embodiment of the present application;
fig. 2 is a first hardware structure diagram of an electronic device according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a software structure of an electronic device according to an embodiment of the present application;
fig. 5 is a first flowchart illustrating an application installation method according to an embodiment of the present application;
fig. 6 is a second flowchart illustrating an application installation method according to an embodiment of the present application;
fig. 7 is a schematic display interface diagram of an electronic device according to an embodiment of the present application;
fig. 8 is a schematic flowchart of deleting an application according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a test flow provided by an embodiment of the present application;
fig. 10 is a schematic flowchart third of an application installation method according to an embodiment of the present application;
fig. 11 is a first schematic structural diagram of an application installation apparatus according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of an application installation apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless otherwise specified.
At present, electronic equipment, such as a mobile phone, needs to be subjected to various functional tests before being shipped out of a factory. For example, a man-machine interaction test is performed on the operating system of the mobile phone to determine whether each function of the operating system of the mobile phone is normal. Under the condition that all functions of the operating system of the mobile phone are normal, the mobile phone can be used as a commercial version mobile phone. That is, the end user takes the cell phone to a commercial version of the cell phone.
A test application, for example, a test application called a test application, may be installed in the mobile phone, and various functions of the operating system of the mobile phone may be tested by the test application. And installing the test application program in the mobile phone, namely installing an APK (which may be called a test APK) corresponding to the test application program in the mobile phone. After the test APK is installed in the mobile phone, various functions of the operating system of the mobile phone can be tested through the test APK. That is, after the test APK is installed on the mobile phone, the mobile phone may run the test APK, and the installed test APK is run by the mobile phone, that is, the mobile phone runs the corresponding test application.
Typically the test APK can be installed in three ways: 1. the tester can use the mobile phone to brush the root bag so as to obtain the root authority, and after the root authority is obtained, the mobile phone obtains the installation authority of the test APK, so that the mobile phone can install the test APK. 2. The tester can also download the authorized test APK from the application store through the mobile phone and install the test APK, that is, the test APK downloaded from the application store includes the installation permission corresponding to the test APK. 3. The tester can manually set the USB debug authority by opening the developer option of the mobile phone, and then the mobile phone can acquire and install the installation authority of the test APK. After the test APK is installed in the operating system of the mobile phone, a tester can manually test each function of the operating system of the mobile phone through the test APK, and the mobile phone can also automatically test through the prefabricated test APK. Manual testing can result in a long time consuming test and a high labor cost for manual testing. Automatic testing may result in some functions not being tested, so automatic testing is usually used as a main mode, and manual testing is used for supplementary testing.
However, the three installation manners of the test APK all require the user to operate the mobile phone to obtain the installation permission of the test APK. This results in inefficient installation of the test APK.
And because when the test APK is installed on the mobile phone, the user is required to operate, the test APK can not be installed on a plurality of mobile phones at the same time, namely, the existing installation mode of the test APK can not meet the requirement of mass production of production lines.
In the related art, the test APK may be pre-manufactured in the operating system of the commercial version of the mobile phone, and various functions of the operating system of the mobile phone may be tested through the pre-manufactured test APK. The testing APK is pre-manufactured, namely the testing APK is pre-manufactured in an operating system of the mobile phone, namely the testing APK is an APK carried in the operating system of the mobile phone, and the APK carried in the operating system cannot delete the testing APK by restoring factory settings of the mobile phone.
The related technology is to prefabricate a test APK in an operating system of a mobile phone, namely the test APK is an APK carried by the operating system, although the related technology can acquire the installation permission of the test APK without the operation of a user on the mobile phone, the user cannot delete the preset test APK when using the mobile phone. This results in a reduction in the space used by the handset.
And because the test APK can not be deleted, the test data of the mobile phone during testing can not be deleted, and the use space of the mobile phone is further reduced. And when the user uses the mobile phone, the test data is easy to be leaked, so that the safety of the test data of the mobile phone is low.
In view of the above problems, an embodiment of the present application provides an application installation method, which is applied to an application installation system, where the application installation system may include a first electronic device and at least one second electronic device connected to the first electronic device, and the method may send a request for setting an installation permission (i.e., an installation permission of an APK corresponding to an application) of an application (e.g., a test application) to the at least one second electronic device (e.g., a mobile phone) through the first electronic device (e.g., a notebook computer), so that the at least one second electronic device may set the installation permission of the corresponding application according to the request sent by the first electronic device, that is, according to the solution of the present application, the second electronic device sets the installation permission of the corresponding application according to the request sent by the first electronic device, so that the installation permission of the application may be obtained without a user operating on the second electronic device, and operations of the user during installation of the test application on the second electronic device may be reduced, thereby improving efficiency of installing the test application on the second electronic device. Because the test application program is used for testing the operating system of the second electronic device, the efficiency of installing the test application program on the second electronic device can be improved by the scheme of the application, and therefore the test efficiency of testing the second electronic device can be improved.
After the second electronic device sets the installation permission corresponding to the application program, when the second electronic device (e.g., a mobile phone) receives an application program installation request (i.e., a request for installing an APK corresponding to the application program) sent by the first electronic device (e.g., a laptop), the second electronic device may determine whether the second electronic device includes a permission identifier corresponding to the application program (i.e., the installation permission of the application program), and if the second electronic device includes the permission identifier of the application program, the second electronic device may install the application program (i.e., install the APK corresponding to the application program).
That is to say, according to the scheme of the application, when a second electronic device (such as a mobile phone) needs to install an application, whether the second electronic device includes an authority identifier corresponding to the application (that is, an installation authority of the application) can be determined by the second electronic device, so that the installation authority of the application can be acquired without operation of a tester, and the efficiency of installing the application on the second electronic device can be further improved.
And because the installation permission of the application program can be obtained without the operation of a tester on the second electronic equipment (such as a mobile phone) when the application program is installed (namely, the APK corresponding to the application program is installed), the application program can be simultaneously installed on a plurality of second electronic equipment (such as mobile phones), and the requirements of batch production and test of a production line can be met.
In addition, according to the scheme of the application, the installation authority of the first application program (such as a test application program) is set through the second electronic device (such as a mobile phone) according to the request of the first electronic device (such as a notebook computer), so that the second electronic device can install the first application program according to the installation authority, the first application program does not need to be prefabricated in an operating system of the second electronic device (such as a mobile phone), the settings of factory leaving and the like can be restored on the second electronic device, the first application program in the second electronic device and data corresponding to the first application program are deleted, the use space of the second electronic device can be improved, and data leakage is avoided.
The following describes an application installation method provided in an embodiment of the present application.
For example, the first electronic device is a notebook computer and the second electronic device is a mobile phone. As shown in fig. 1, the application installation system includes a notebook computer 01 and two cellular phones 02. The application installation system may also be referred to as a test system, that is, the test system may be used to test an operating system of the mobile phone. It should be noted that the application installation system may include at least one mobile phone 02, and in this embodiment, two mobile phones 02 are taken as an example for schematic illustration.
The connection between the notebook computer 01 and the mobile phone 02 can be established, for example, the connection between the notebook computer 01 and the mobile phone 02 can be established in a USB manner, that is, the notebook computer 01 and the mobile phone 02 can perform USB communication.
After the connection between the notebook computer 01 and the mobile phone 02 can be established, the notebook computer can send a request for setting the installation permission of the test application (i.e., the installation permission of the APK corresponding to the test application) to the mobile phone 02. After the mobile phone 02 receives the request for setting the installation permission of the APK corresponding to the test application program sent by the notebook computer 01, the mobile phone 02 may set and store the installation permission of the APK corresponding to the test application program in the mobile phone 02.
After the installation permission of the APK corresponding to the test application is set and stored in the mobile phone 02, the notebook computer 01 may send an APK request corresponding to the installation of the test application to the mobile phone 02 to request the mobile phone 02 to install the APK corresponding to the test application.
After the mobile phone 02 receives an APK request sent by the notebook computer 01 and corresponding to the test application program, the mobile phone 02 may determine whether the mobile phone 02 includes an authority identifier corresponding to the APK corresponding to the test application program (i.e., an installation authority of the test APK).
Under the condition that the mobile phone 02 includes the authority identifier corresponding to the APK corresponding to the test application program, the mobile phone 02 may install the test APK, that is, the mobile phone 02 may install the test application program. Under the condition that the mobile phone 02 includes the authority identifier corresponding to the APK corresponding to the untested application program, the mobile phone 02 may not install the test APK, that is, the mobile phone 02 may not install the test application program.
That is to say, the notebook computer 01 may send a request for setting the installation permission of the test application (i.e., the installation permission of the APK corresponding to the application) to the mobile phone 02, so that the mobile phone 02 may set the installation permission of the test application according to the request sent by the notebook computer 01, and thus the installation permission of the test application may be obtained without the user operating on the mobile phone 02, the user operation during the installation of the test application may be reduced, and the installation efficiency of the application may be improved.
And because the installation permission of the APK corresponding to the test application program can be obtained without the operation of a tester when the test application program is installed, namely the APK corresponding to the test application program is installed, the APK corresponding to the test application program can be installed on a plurality of mobile phones at the same time. The APK corresponding to the test application program does not need to be prefabricated in the operating system of the mobile phone 02, so that factory settings of the mobile phone 02 can be restored, and the APK corresponding to the test application program in the second electronic device and the test data corresponding to the test application program are deleted, so that the use space of the second electronic device can be increased, and the leakage of the test data can be avoided.
After the mobile phone 02 successfully installs the APK corresponding to the test application, the notebook computer 01 can test each function of the operating system of the mobile phone 02 through the test application corresponding to the test APK. The notebook computer 01 may also display a test result of testing each function of the operating system of the mobile phone 02.
In some examples, the first electronic device may be an electronic device such as a laptop, a tablet, a handheld computer, a PC, a Personal Digital Assistant (PDA), and the like. The embodiment of the present application does not limit the specific form of the electronic device. In the embodiment of the present application, a first electronic device is taken as a notebook computer for example to perform schematic description.
In some examples, the second electronic device may be an electronic device such as a mobile phone, a tablet computer, a handheld computer, a personal computer PC, a cellular phone, a PDA, a wearable device, or the like. In the embodiment of the present application, a second electronic device is taken as a mobile phone for example to perform schematic description.
By way of example, taking the first electronic device as a notebook computer as an example, fig. 2 shows a schematic structural diagram of the first electronic device provided in the embodiment of the present application.
As shown in fig. 2, the notebook computer may include: the portable electronic device comprises a processor 210, a fan 211, an external memory interface 220, an internal memory 221, a USB interface 230, a charging management module 240, a power management module 241, a battery 242, a display 250, an antenna, a wireless communication module 260, an audio module 270, a speaker (i.e., a loudspeaker) 270A, a microphone 270C, an earphone interface 270B, a touch pad 280, a keyboard 290, a camera 291 and the like.
The devices (such as the processor 210, the fan 211, the external memory interface 220, the internal memory 221, the usb interface 230, the charging management module 240, the power management module 241, the battery 242, the antenna, the wireless communication module 260, the audio module 270, the touch pad 280, the speaker 270A, the microphone 270C, the earphone interface 270B, the keyboard 290, the camera 291, and the like) other than the display 250 can be disposed on the base of the notebook computer. The camera 291 may also be disposed on a frame of the display screen 250 of the notebook computer.
It is to be understood that the illustrated structure of the present embodiment does not constitute a specific limitation to the notebook computer. In other embodiments, a notebook computer may include more or fewer components than shown, or some components may be combined, some components may be separated, or a different arrangement of components may be used. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The controller may be the neural center and command center of a laptop computer. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in processor 210 for storing instructions and data. In some embodiments, the memory in the processor 210 is a cache memory. The memory may hold instructions or data that have just been used or recycled by processor 210. If the processor 210 needs to reuse the instruction or data, it may be called directly from memory. Avoiding repeated accesses reduces the latency of the processor 210, thereby increasing the efficiency of the system.
In some embodiments, processor 210 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
It should be understood that the interface connection relationship between the modules in this embodiment is only schematically illustrated, and does not limit the structure of the notebook computer. In other embodiments, the notebook computer may also adopt different interface connection manners or a combination of multiple interface connection manners in the above embodiments.
The notebook computer can implement the display function through the GPU, the display screen 250, and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 250 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 210 may include one or more GPUs that execute program instructions to generate or alter display information. The display screen 250 is used to display images, video, and the like.
The external memory interface 220 may be used to connect an external memory card, such as a Micro SD card, to extend the storage capability of the notebook computer. Internal memory 221 may be used to store computer-executable program code, which includes instructions. The processor 210 executes various functional applications of the notebook computer and data processing by executing instructions stored in the internal memory 221. For example, in the present embodiment, the processor 210 may execute instructions stored in the internal memory 221, and the internal memory 221 may include a program storage area and a data storage area.
Of course, it should be understood that fig. 2 is only an exemplary illustration of the electronic device in the form of a notebook computer. If the electronic device is in the form of a handheld computer, a PDA, a personal computer, or other devices, the structure of the electronic device may include fewer structures than those shown in fig. 2, or may include more structures than those shown in fig. 2, and is not limited herein.
By way of example, taking a second electronic device as a mobile phone as an example, fig. 3 shows a schematic structural diagram of a second electronic device provided in an embodiment of the present application.
As shown in fig. 3, the electronic device may include a processor 310, an external memory interface 320, an internal memory 321, a usb interface 330, a charging management module 340, a power management module 341, a battery 342, an antenna 1, an antenna 2, a mobile communication module 350, a wireless communication module 360, an audio module 370, a speaker 370A, a receiver 370B, a microphone 370C, an earphone interface 370D, a sensor module 380, keys 390, a motor 391, an indicator 392, a camera 393, a display 394, and a SIM card interface 395. The sensor module 380 may include a pressure sensor 380A, a gyroscope sensor 380B, an air pressure sensor 380C, a magnetic sensor 380D, an acceleration sensor 380E, a distance sensor 380F, a proximity light sensor 380G, a fingerprint sensor 380H, a temperature sensor 380J, a touch sensor 380K, an ambient light sensor 380L, a bone conduction sensor 380M, and the like.
It is to be understood that the illustrated structure of the present embodiment does not constitute a specific limitation to the electronic device. In other embodiments, an electronic device may include more or fewer components than illustrated, or combine certain components, or split certain components, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The controller may be a neural center and a command center of the electronic device. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 310 for storing instructions and data. In some embodiments, the memory in the processor 310 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 310. If the processor 310 needs to reuse the instruction or data, it can be called directly from memory. Avoiding repeated accesses reduces the latency of the processor 310, thereby increasing the efficiency of the system.
In some embodiments, processor 310 may include one or more interfaces. The interface can include an integrated circuit I2C interface, an integrated circuit built-in audio I2S interface, a Pulse Code Modulation (PCM) interface, a Universal Asynchronous Receiver Transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, a Universal Serial Bus (USB) interface and/or the like.
The electronic device implements display functions via the GPU, the display 394, and the application processor, among other things. The GPU is an image processing microprocessor coupled to a display 394 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 310 may include one or more GPUs that execute program instructions to generate or alter display information.
Of course, it should be understood that the above fig. 3 is only an exemplary illustration of the electronic device in the form of a mobile phone. If the electronic device is in the form of a tablet computer, a handheld computer, a PC, a PDA, a wearable device (e.g., a smart watch, a smart bracelet), or other devices, the structure of the electronic device may include fewer structures than those shown in fig. 3, or may include more structures than those shown in fig. 3, and is not limited herein.
The software systems of the first electronic device and the second electronic device may adopt a layered architecture, an event-driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. The embodiment of the application takes an Android system with a layered architecture as an example, and exemplarily illustrates a software structure of an electronic device.
Fig. 4 is a block diagram of a software structure of an electronic device according to an embodiment of the present application.
The layered architecture divides the software into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, an application layer, an application framework layer, an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages. As shown in fig. 4, the application package may include camera, gallery, calendar, phone, map, navigation, WLAN, bluetooth, music, video, short message, etc. applications.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 4, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The phone manager is used to provide communication functions of the electronic device. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
The Android Runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application layer and the application framework layer as binary files. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), two-dimensional graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide a fusion of the two-dimensional and three-dimensional layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The two-dimensional graphics engine is a two-dimensional drawing engine.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
It will be appreciated that, in general, the implementation of the functionality of the first electronic device and the second electronic device requires the cooperation of software modules in addition to the support of the above-mentioned hardware.
For example, the first electronic device is taken as a notebook computer and the second electronic device is taken as a mobile phone. As shown in fig. 5, in order to implement the function of sending a request for setting the installation permission of an application (e.g., a test application) (i.e., the installation permission of an APK corresponding to the test application) to the mobile phone 02, the notebook computer 01 not only needs to support hardware such as a processor and a memory, but also needs to cooperate with software modules, such as an instruction transceiver module 03 and an encryption service module 04, where the software and the hardware can be connected through a hardware connection layer.
The mobile phone 02 not only needs the support of hardware such as a processor and a memory, but also needs software modules such as an instruction transceiver module 05, an instruction verification module 06, an authentication server module 07 and an installation authority acquisition module 08 to realize the function of receiving a request for setting the installation authority (i.e. the installation authority of an APK corresponding to a test application) of the application (e.g. the test application) sent by the notebook computer 01, and setting an authority identifier corresponding to the application (i.e. the installation authority of the application) in the mobile phone 02, where the software and the hardware can be connected by a hardware connection layer.
Taking the first electronic device as a notebook computer and the second electronic device as a mobile phone, and taking the application program as an application program (which may be referred to as a test application program) for testing the mobile phone, the application program installation method provided by the embodiment of the present application will be described with reference to fig. 1 and 5.
Before installing a test application (i.e., an APK corresponding to the test application) on the mobile phone 02, an authority identifier corresponding to the test application (i.e., an installation authority corresponding to the test application) needs to be set on the mobile phone 02. The permission identifier may indicate that the mobile phone 02 has permission to install the test application, that is, the mobile phone 02 has permission to install the APK corresponding to the test application.
As shown in fig. 5, the process of setting the installation authority corresponding to the test application (i.e. the installation authority of the APK corresponding to the test application) on the mobile phone 02 may include:
the instruction transceiver module 03 on the notebook computer 01 may receive a request for setting an authority identifier corresponding to the test application program to the mobile phone 02. The instruction transceiver module 03 may be an AT (authentication) instruction port authentication module on the notebook computer 01, that is, the instruction transceiver module 03 may send an instruction to the mobile phone 02, where the sent instruction may be an AT instruction. The instruction transceiver module 03 may also receive an instruction sent by the mobile phone 02, where the received instruction may also be an AT instruction.
Before the instruction transceiver module 03 receives a request for setting the authority identifier corresponding to the test application program sent to the mobile phone 02, the instruction transceiver module 03 may obtain the public key in the encryption service module 04 on the notebook computer 01. The public key in the encryption service module 04 may correspond to the private key in the signature verification server module 07 in the mobile phone 02, that is, the data encrypted by using the public key may be decrypted by using the corresponding private key.
After the instruction transceiver module 03 obtains the public key, the request for setting the permission identifier corresponding to the test application program may be encrypted by using the public key, so as to generate the encrypted request for setting the permission identifier corresponding to the test application program.
After the instruction transceiver module 03 generates the encrypted request for setting the permission identifier corresponding to the test application, the encrypted request for setting the permission identifier corresponding to the test application may be sent to the instruction transceiver module 05 in the mobile phone 02. The command transceiver module 05 may serve as an atcmd service in the mobile phone 02, that is, the command transceiver module 05 may send a command to the notebook computer 01, where the sent command may be an AT command. The instruction transceiver module 05 may also receive an instruction sent by the notebook computer 01, where the received instruction may be an AT instruction.
After the instruction transceiver module 05 receives the encrypted request for setting the permission identifier corresponding to the test application, the encrypted request for setting the permission identifier corresponding to the test application may be sent to the instruction verification module 06 in the cell phone 02. The command verification module 06 may be a hildell hild server in a mobile phone. When the instruction verifying module 06 is a production hild server in the mobile phone, the instruction transceiver module 05 may send a request for setting an encrypted permission identifier corresponding to the test application to the production hild client, and the production hild client sends the encrypted request for setting the permission identifier corresponding to the test application to the production hild server.
After the instruction verifying module 06 receives the encrypted request for setting the authority identifier corresponding to the test application, the instruction verifying module 06 may verify whether the encrypted request for setting the authority identifier corresponding to the test application is legal. That is, the instruction verification module 06 may obtain a private key in the signature verification server module 07 of the mobile phone 02, and decrypt the encrypted request for setting the authority identifier corresponding to the test application program with the private key.
In the case that the decryption is successful, that is, the encrypted request for setting the permission identifier corresponding to the test application is verified to be legal, the instruction verification module 06 may set the permission identifier corresponding to the test application, that is, set the installation permission corresponding to the test application. After instruction verification module 06 sets the authority identification of the test application pair, instruction verification module 06 may save the identification.
Since the permission identifier is not a self-contained identifier in the operating system of the mobile phone 02, but is set according to a request sent by the notebook computer 01 for setting the permission identifier corresponding to the test application program, when the mobile phone 02 is restored to factory settings, the permission identifier corresponding to the test application program is deleted by the mobile phone 02, which may also be called a failure after the permission identifier is restarted.
After the instruction verification module 06 sets the permission identifier corresponding to the test application, a setting success message may be sent to the notebook computer 01 to indicate that the setting of the installation permission corresponding to the test application is successful, that is, the mobile phone 02 sets the installation permission of the APK corresponding to the test application successfully. For example, the instruction verification module 06 may transmit a setting success message to the instruction transceiver module 05. After the instruction transceiver module 05 receives the setting success message, the setting success message may be transmitted to the instruction transceiver module 03.
In case of a decryption failure, that is, an illegal request for setting the permission identifier corresponding to the test application after the verification of the encryption is failed, the instruction verification module 06 may send a setting failure message to the instruction transceiver module 05, where the setting failure message is used to indicate that the setting of the installation permission corresponding to the test application is failed, that is, the setting of the installation permission of the APK corresponding to the test application by the mobile phone 02 is failed. After receiving the setting failure message, the instruction transceiver module 05 in the mobile phone 02 may send a setting failure message to the instruction transceiver module 03 in the notebook computer 01.
After the permission identifier corresponding to the test application (i.e., the permission identifier of the APK corresponding to the test application) is set in the mobile phone 02, that is, the instruction transceiver module 03 on the notebook computer 01 receives the setting success message sent by the instruction transceiver module 05 on the mobile phone 02, and the notebook computer 01 may send the installation test application (i.e., the APK corresponding to the installation test application) request to the installation permission obtaining module 08 on the mobile phone 02.
For example, the instruction transceiver module 03 on the notebook computer 01 may send a request for installing a test application to the instruction transceiver module 05 on the mobile phone 02. The installation test application request may be an android debug bridge (adb) instruction.
After the instruction transceiver module 05 in the mobile phone 02 receives the request for installing the test application, the instruction transceiver module 05 may send the request for installing the test application to the installation authority acquiring module 08 on the mobile phone 02.
After the installation permission obtaining module 08 receives the request for installing the test application, the permission identifier in the instruction verification module 06 may be obtained, that is, the installation permission obtaining module 08 may determine whether the permission identifier corresponding to the test application is included in the instruction verification module 06.
When the installation permission acquiring module 08 acquires the permission identifier in the instruction verifying module 06 (that is, the instruction verifying module 06 includes the permission identifier corresponding to the test application), the installation permission acquiring module 08 acquires the installation permission of the APK corresponding to the test application, so that the mobile phone 02 may install the APK corresponding to the test application, that is, the mobile phone 02 may install the test application.
When the installation permission obtaining module 08 cannot obtain the permission identifier in the instruction verification module 06 (that is, the instruction verification module 06 does not include the permission identifier corresponding to the test application), that is, the installation permission obtaining module 08 does not obtain the installation permission of the APK corresponding to the test application, so that the mobile phone 02 may not install the APK corresponding to the test application, that is, the mobile phone 02 may not install the test application.
It should be noted that, when the system of the notebook computer 01 is an Android system, the instruction transceiver module 03 and the encryption service module 04 in the notebook computer 01 may be located in an application framework layer in the Android system. That is, the command transceiver module 03 and the encryption service module 04 in the notebook computer 01 may be modules of an application framework layer. When the system of the mobile phone 02 is an Android system, the instruction transceiver module 05, the instruction verification module 06, the signature verification server module 07, and the installation authority acquisition module 08 in the mobile phone 02 may be located in an application framework layer in the Android system. That is, the instruction transceiver module 05, the instruction verification module 06, the signature verification server module 07, and the installation authority acquisition module 08 in the mobile phone 02 may be modules of an application framework layer. For example, as shown in fig. 4, the instruction transceiver module 05, the instruction verification module 06, the signature verification server module 07, and the installation authority acquisition module 08 in the mobile phone 02 may be located in an application framework layer in the Android system of the mobile phone.
The following describes an application installation method provided in an embodiment of the present application.
The following describes in detail an application installation method provided in an embodiment of the present application with reference to fig. 6. As shown in fig. 6, taking the first electronic device as a notebook computer, the second electronic device as a mobile phone, and the application program as a test application program for example to schematically illustrate, the application program installation method provided in the embodiment of the present application may include the following steps S601 to S619.
S601, the notebook computer is connected with the mobile phone.
Before the mobile phone leaves a factory, the operating system of the mobile phone needs to be tested, for example, a man-machine interaction test is performed to determine whether each function of the operating system of the mobile phone is normal.
When the mobile phone is tested, the mobile phone can be connected with a testing device, such as a notebook computer, so that whether each function of an operating system of the mobile phone is normal or not can be judged through the notebook computer. When the mobile phone is tested through the notebook computer, the notebook computer can also display the tested items and the test results of the tested items, so that the user can conveniently check the test items.
The notebook computer and the mobile phone can be connected in a wired mode, for example, the connection can be established in a USB mode, and the notebook computer and the mobile phone can be communicated in a USB mode. The wireless connection can be established between the notebook computer and the mobile phone. This is not limited in the embodiments of the present application.
The notebook computer may be connected to one mobile phone, and may also be connected to a plurality of mobile phones, which is not limited in this application.
S602, the notebook computer receives a first operation of a user, wherein the first operation is used for triggering the notebook computer to send a permission identifier setting request to the mobile phone.
After the connection between the notebook computer and the mobile phone is established, the user may operate the notebook computer (for example, referred to as a first operation), so as to trigger the notebook computer to send a request for setting an authority identifier corresponding to the test application program to the mobile phone, for example, referred to as a request for setting the authority identifier, which may be referred to as a first request in this embodiment of the present application.
The permission identifier setting request may be used to instruct the mobile phone to set a permission identifier of a corresponding application program, for example, to set a permission identifier of an application program (which may be referred to as a test application program) for testing an operating system of the mobile phone. The authority identifier may be an installation authority of the corresponding application program, that is, an installation authority of an APK of the application program. For example, the authority identifier may represent an installation authority of an application program for testing a mobile phone, that is, the authority identifier may also identify an installation authority of an APK corresponding to the test application program.
The test application may be a Man Machine Interface (MMI) test system, and the APK (which may be referred to as a test APK) corresponding to the test application is an application installation package corresponding to the MMI system. After the MMI system is installed on the mobile phone, the notebook computer can test functions of Bluetooth, gravity induction (various sensors), interfaces, mobile phone software and hardware version information, keys, a touch screen and the like of the mobile phone through the MMI system on the mobile phone, can also test functions related to vision, such as mobile phone backlight, camera shooting and the like, and can test voice effects of a mobile phone microphone, a mobile phone receiver and a mobile phone loudspeaker related to audio.
In some examples, the set permission identification request may include an identification of a corresponding application program, which may be indicative of the application program. That is, the permission identifier setting request may include an identifier of an application (e.g., a test application) for which installation permission needs to be set, so that the mobile phone may set the permission identifier corresponding to the application (i.e., the installation permission corresponding to the application) according to the identifier of the application.
In some examples, after the notebook computer establishes a connection with the mobile phone, the notebook computer may display an interface for testing the mobile phone, where the interface may include setting an authority identifier control. The permission identifier setting control can be used for triggering the notebook computer to send a permission identifier setting request to the mobile phone. That is to say, the notebook computer receives the first operation of the user, and may receive, for the notebook computer, a triggering operation, such as a click operation, performed by the user on the set permission identifier control.
For example, taking the example that the notebook computer 01 establishes a connection with two mobile phones 02, namely, the mobile phone 1 and the mobile phone 2, as shown in fig. 7, the notebook computer 01 may display an interface for testing the mobile phones 02, where the interface may include the identifiers of the mobile phones 02 connected with the notebook computer 01, namely, the mobile phone 1 and the mobile phone 2. The interface can also display a setting authority identification control corresponding to the mobile phone 02 connected with the notebook computer 01, namely a setting authority identification control 601 corresponding to the mobile phone 1 and a setting authority identification control 602 corresponding to the mobile phone 2. When a user needs to test the mobile phone 1, that is, when a test application program needs to be installed on the mobile phone 1, the user may trigger the permission identifier setting control 601, so that the notebook computer 01 may send a permission identifier setting request to the mobile phone 1. When a user needs to test the mobile phone 2, that is, when a test application program needs to be installed on the mobile phone 2, the user can trigger the permission identifier setting control 602, so that the notebook computer 01 can send a permission identifier setting request to the mobile phone 2.
It should be noted that, after the connection between the notebook computer and the mobile phone is established, the notebook computer may send a request for setting the permission identifier to the mobile phone when receiving the first operation of the user. The notebook computer can also automatically send a permission setting identifier request to the mobile phone after establishing connection with the mobile phone. This is not limited in the examples of the present application. In the embodiment of the application, a description is given by taking an example that a notebook computer can send a request for setting an authority identifier to a mobile phone when receiving a first operation of a user.
S603, responding to the first operation, and generating a permission setting identifier request by the notebook computer.
After the notebook computer receives the first operation of the user, in response, the notebook computer may generate a request for setting the permission identifier according to the first operation. The permission identifier setting request can be an AT instruction or other types of instructions. This is not limited in the examples of the present application.
For example, as shown in fig. 5, after the notebook computer 01 receives a first operation of a user, the notebook computer 01 generates a request for setting the permission identifier, and may generate the request for setting the permission identifier for the notebook computer 01, for example, the instruction transceiver module 03 of the notebook computer 01, according to the first operation.
In some examples, when the display interface of the notebook computer includes the setting permission identifier control, the notebook computer receives a trigger operation (i.e., a first operation) performed by a user on the setting permission identifier control, for example, when the user performs a click operation, and in response, the notebook computer may generate a setting permission identifier request (i.e., a first request) according to the first operation.
In some examples, after the notebook computer generates the setting permission identifier request, the notebook computer may further encrypt the generated setting permission identifier request.
For example, as shown in fig. 5, after the notebook computer 01 receives the first operation of the user, the instruction transceiver module 03 of the notebook computer 01, such as the notebook computer 01, may generate a request for setting the permission identifier. After the instruction transceiver module 03 of the notebook computer 01 generates the request for setting the authority identifier, the instruction transceiver module 03 of the notebook computer 01 may obtain a public key (which may be referred to as a first secret key in this embodiment) in the cryptographic service module 04 (e.g., a dongle module) in the notebook computer 01. After the instruction transceiver module 03 of the notebook computer 01 obtains the public key, the instruction transceiver module 03 of the notebook computer 01 may encrypt the generated permission identifier setting request by using the public key.
It should be noted that the public key in the encryption service module 04 in the notebook computer 01 may correspond to the private key in the mobile phone 02, that is, the setting permission identification request encrypted by the public key may be decrypted by using the corresponding private key in the mobile phone 02, so as to obtain the decrypted setting permission identification request.
S604, the notebook computer sends a permission identification setting request to the mobile phone.
After the notebook computer generates the permission identifier setting request, the notebook computer can send the permission identifier setting request to the mobile phone, so that the mobile phone can set the permission identifier of the corresponding application program according to the permission identifier setting request, namely, set the installation permission of the corresponding application program, namely, set the installation permission of the APK corresponding to the corresponding application program.
For example, as shown in fig. 5, after the instruction transceiver module 03 of the notebook computer 01 generates the permission identifier setting request, the instruction transceiver module 03 of the notebook computer 01 may send the permission identifier setting request to the mobile phone 02, for example, the instruction transceiver module 05 in the mobile phone 02.
In some examples, the permission identifier setting request sent by the notebook computer to the mobile phone may also be an encrypted permission identifier setting request. For example, the notebook computer may add the request for setting the permission identifier through a public key in the notebook computer, and the notebook computer sends the request for setting the permission identifier encrypted by the public key to the mobile phone.
S605, the mobile phone receives the request for setting the authority identifier.
After the mobile phone receives the permission identifier setting request, the mobile phone may set a permission identifier of the corresponding application program according to the permission identifier setting request, that is, set an installation permission of the corresponding application program, that is, set an installation permission of the APK corresponding to the corresponding application program.
For example, as shown in fig. 5, when the mobile phone receives the permission identifier setting request, the command transceiver module 05 in the mobile phone 02 may receive the permission identifier setting request sent by the command transceiver module 03 in the notebook computer 01.
In some examples, the setting authority identification request received by the mobile phone may be a request after encryption. After the mobile phone receives the encrypted permission identifier setting request, the mobile phone may decrypt the encrypted permission identifier setting request, so as to determine whether the encrypted permission identifier setting request is legal (i.e., whether the encrypted permission identifier setting request is a valid permission identifier setting request).
S606, the mobile phone determines whether the permission identification setting request is legal or not.
After the mobile phone receives the permission identifier setting request sent by the notebook computer, the mobile phone can determine whether the permission identifier setting request is legal or not, so that whether the permission identifier setting request sent by the notebook computer is a valid permission identifier setting request or not can be determined.
Under the condition that the mobile phone determines that the permission identifier setting request is illegal, the mobile phone may send a permission identifier setting failure result to the notebook computer, that is, the mobile phone may continue to execute the next step S607. Under the condition that the mobile phone determines that the request for setting the authority identifier is legal, the mobile phone can set the authority identifier, that is, the mobile phone can continue to execute the next step S609.
In some examples, in a case that the setting authority identifier request sent by the notebook computer is an encrypted setting authority identifier request, the determining, by the mobile phone, whether the setting authority identifier request is legal may include: the mobile phone decrypts the encrypted permission identifier setting request, and under the condition that the encrypted permission identifier setting request is successfully decrypted, the mobile phone can determine that the permission identifier setting request sent by the notebook computer is legal, namely, the mobile phone can determine that the permission identifier setting request sent by the notebook computer is an effective request. Under the condition that the encrypted permission identifier request is not decrypted successfully, the mobile phone can determine that the permission identifier request sent by the notebook computer is illegal, namely, the mobile phone can determine that the permission identifier request sent by the notebook computer is not an effective request.
For example, as shown in fig. 5, after the instruction transceiver module 05 of the mobile phone 02 receives the setting permission identification request, such as the encrypted setting permission identification request, sent by the instruction transceiver module 03 of the notebook computer 01, the instruction transceiver module 05 may send the encrypted setting permission identification request to the instruction verification module 06, so that the instruction verification module 06 may determine whether the encrypted setting permission identification request is legal.
After the instruction verification module 06 receives the encrypted permission identifier setting request sent by the instruction transceiver module 05, the instruction verification module 06 may obtain a corresponding private key (which may be referred to as a second key in this embodiment) through the signature verification server module 07 in the mobile phone 02. After the instruction verification module 06 obtains the private key, the instruction verification module 06 may decrypt the encrypted permission identifier request by using the obtained private key, thereby determining whether the encrypted permission identifier request is legal.
Under the condition that the instruction verification module 06 fails to decrypt the encrypted permission identifier setting request through the acquired private key, the instruction verification module 06 may determine that the encrypted permission identifier setting request sent by the notebook computer is illegal, that is, the encrypted permission identifier setting request is not a valid request, so that the instruction verification module 06 may not set the permission identifier of the corresponding application program.
Under the condition that the instruction verification module 06 successfully decrypts the encrypted permission identifier setting request through the acquired private key, that is, the encrypted permission identifier setting request is a valid request, the instruction verification module 06 can determine that the encrypted permission identifier setting request sent by the notebook computer 01 is legal, so that the instruction verification module 06 can set the permission identifier.
S607, the mobile phone sends a setting failure message to the notebook computer.
Under the condition that the mobile phone determines that the authority identifier is illegal, the mobile phone can send an authority identifier setting failure message to the notebook computer. The permission identifier failure setting message is used for indicating that the mobile phone has failed to set the permission identifier, that is, the mobile phone has failed to set the installation permission of the corresponding application program (such as the test application program), that is, the permission identifier failure setting message indicates that the mobile phone has failed to acquire the installation permission of the APK corresponding to the test application program.
For example, as shown in fig. 5, in a case that the instruction verification module 06 of the mobile phone 02 determines that the request for setting the permission identifier is not legal, the instruction verification module 06 may send a setting failure message to the instruction transceiver module 05 in the mobile phone 02, where the setting failure message is used to indicate that the mobile phone 02 fails to set the installation permission corresponding to the test application. After the instruction transceiver module 05 receives the setting failure message, the setting failure message may be transmitted to the instruction transceiver module 03 in the notebook computer 01.
S608, the notebook computer receives the setting failure message.
After the notebook computer receives the setting failure message sent by the mobile phone, the notebook computer can display the setting failure message, so that a user or a tester can know that the installation permission of the application program corresponding to the mobile phone fails, namely, the mobile phone fails to acquire the installation permission of the APK of the corresponding application program.
For example, as shown in fig. 5, the notebook computer may receive the setting permission failure message, where the instruction transceiver module 03 in the notebook computer 01 receives the setting permission failure message sent by the instruction transceiver module 05 in the mobile phone 02.
And S609, setting the authority identifier by the mobile phone.
Under the condition that the mobile phone determines that the permission identifier setting request is legal, the mobile phone sets a permission identifier of an application program corresponding to the permission identifier setting request, which may be referred to as a first identifier in the embodiment of the application.
After the mobile phone sets the permission identifier, that is, the mobile phone obtains the installation permission of the corresponding application program, that is, the mobile phone obtains the installation permission of the APK corresponding to the application program. The permission identifier may be a flag bit, and a value of the flag bit may indicate that the mobile phone acquires the installation permission of the corresponding application program, that is, the mobile phone acquires the installation permission of the APK corresponding to the application program.
After the mobile phone sets the authority identifier of the corresponding application program, the mobile phone can store the authority identifier, so that when the mobile phone installs the APK of the corresponding application program, the mobile phone can be determined to have the authority to install the APK of the corresponding application program through the authority identifier. In some examples, after the mobile phone sets the permission identifier, the mobile phone may store the permission identifier in a log, where the log may include an identifier of the application program and the permission identifier corresponding to the identifier of the application program.
It can be understood that the mobile phone may further store an authority identifier corresponding to an identifier of another application program, that is, the mobile phone further has an installation authority corresponding to an APK of the other application program.
S610, the mobile phone sends a setting success message to the notebook computer.
After the mobile phone sets the corresponding application program permission identifier, the mobile phone may further send a message that the permission identifier is successfully set to the notebook computer, which may be referred to as a first message in this embodiment of the application.
The permission identifier setting success message is used to indicate that the mobile phone successfully sets the permission identifier of the corresponding application program, that is, the mobile phone successfully sets the installation permission of the corresponding application program (such as a test application program), that is, the permission identifier setting failure message indicates that the mobile phone successfully obtains the installation permission of the APK corresponding to the test application program.
For example, as shown in fig. 5, in a case that the instruction verifying module 06 of the mobile phone 02 determines that the permission setting identifier request is legal, the instruction verifying module 06 may set and store the permission identifier of the application program corresponding to the permission setting identifier request, so that when the APK of the corresponding application program is installed in the mobile phone 02, it may be determined that the mobile phone has the permission to install the corresponding application program through the permission identifier.
The instruction verifying module 06 may also send a setting success message to the instruction transceiver module 05 in the mobile phone 02, for indicating that setting the authority identifier of the application program corresponding to the request for setting the authority identifier is successful. After the instruction transceiver module 05 receives the setting success message, the setting success message may be transmitted to the instruction transceiver module 03 in the notebook computer 01.
S611, the notebook computer receives the setting success message.
After the notebook computer receives the setting success message sent by the mobile phone, the notebook computer can display the setting success message, so that a user or a tester can know that the mobile phone successfully acquires the installation authority of the corresponding application program, namely the mobile phone successfully acquires the installation authority of the APK of the corresponding application program.
The method comprises the steps that a request for setting the installation permission (namely the installation permission of the APK corresponding to the application program) of the application program (such as a test application program) is sent to the mobile phone through the notebook computer, so that the mobile phone can set the installation permission (namely the permission identification request) of the corresponding application program according to the request sent by the notebook computer, namely, the mobile phone sets the corresponding installation permission according to the request sent by the notebook computer, so that the installation permission of the application program can be obtained without the operation of a user on the mobile phone, the operation of the user in the installation process of the application program can be reduced, and the installation efficiency of the application program can be improved.
And S612, the notebook computer sends an application program installation request to the mobile phone.
After the notebook computer receives the setting success message sent by the mobile phone, the mobile phone obtains the installation permission of the corresponding application program. The notebook computer may send an application installation request (which may be referred to as a second request in this embodiment) to the mobile phone, where the application may be an application for testing the mobile phone.
In some examples, the application installation request may include an identification of an application that the mobile phone needs to install, so that the mobile phone may determine whether to include an authority identification corresponding to the identification of the application according to the identification.
In some examples, the application installation request may further include an APK corresponding to the application, for example, the application installation request may include an APK corresponding to the application that tests the mobile phone.
In some examples, after the notebook computer receives the setting success message sent by the mobile phone, the user or the tester may trigger the notebook computer to send the application program installation request to the mobile phone, that is, when the notebook computer receives the trigger operation of the user, the notebook computer may send the application program installation request to the mobile phone.
After the notebook computer receives the setting success message sent by the mobile phone, the notebook computer can also automatically trigger the application program installation request to be sent to the mobile phone.
For example, as shown in fig. 5, after the instruction transceiver module 03 in the notebook computer 01 receives the setting success message sent by the instruction transceiver module 05 in the mobile phone 02, the instruction transceiver module 03 in the notebook computer 01 may send an application installation request to the instruction transceiver module 05 in the mobile phone 02, so as to request the mobile phone 02 to install a corresponding application, such as an APK of an application for testing the mobile phone 02.
S613, the mobile phone receives an application program installation request.
For example, as shown in fig. 5, the mobile phone may receive the application installation request, and the instruction transceiver module 05 in the mobile phone 02 may receive the application installation request sent by the instruction transceiver module 03 in the notebook computer 01.
S614, the mobile phone determines whether the authority identification corresponding to the application program installation request is included.
After the mobile phone receives the installation request sent by the notebook computer, the mobile phone can determine whether the mobile phone includes the authority identifier corresponding to the application program installation request. That is, when the application installation request includes an identifier of an application that needs to be installed, the mobile phone may determine whether the mobile phone includes an authority identifier corresponding to the identifier of the application.
For example, as shown in fig. 5, after the instruction transceiver module 05 in the mobile phone 02 receives the application installation request sent by the instruction transceiver module 03 in the notebook computer 01, the instruction transceiver module 05 may send the application installation request to the installation authority acquiring module 08 in the mobile phone 02.
After the installation permission obtaining module 08 receives the application installation request sent by the instruction transceiver module 05, the installation permission obtaining module 08 may determine whether the instruction verification module 06 includes the permission identifier corresponding to the application included in the application installation request.
In a case where the installation permission acquisition module 08 determines that the instruction verification module 06 includes the permission identifier corresponding to the application included in the application installation request, the installation permission acquisition module 08 may determine that the mobile phone 02 has the installation permission of the application corresponding to the application installation request, that is, the installation permission of the APK of the application corresponding to the application installation request.
In a case where the installation permission acquisition module 08 determines that the instruction verification module 06 includes the permission identifier corresponding to the application that is not included in the application installation request, the installation permission acquisition module 08 may determine that the mobile phone 02 does not have the installation permission of the application corresponding to the application installation request, that is, does not have the installation permission of the APK of the application corresponding to the application installation request.
In the case that the mobile phone does not include the authority identifier corresponding to the application program installation request, the mobile phone may send an installation failure message to the notebook computer, that is, the mobile phone may continue to execute the following S615. In the case that the mobile phone includes the authority identifier corresponding to the application program installation request, the mobile phone may install the corresponding application program, that is, the mobile phone may install the APK of the corresponding application program, that is, the mobile phone may continue to execute the following S617.
S615, the mobile phone sends an installation failure message to the notebook computer.
And under the condition that the mobile phone does not comprise the authority identifier corresponding to the application program installation request, the mobile phone can send an installation failure message to the notebook computer for indicating that the mobile phone fails to install the corresponding application program.
For example, as shown in fig. 5, in a case where the installation authority acquiring module 08 in the mobile phone 02 determines the authority identifier corresponding to the application program that is not included in the instruction verifying module 06 in the mobile phone 02, the installation authority acquiring module 08 may determine that the mobile phone 02 does not have the installation authority of the APK corresponding to the application program that is included in the application program installation request. The installation right acquiring module 08 may send an installation failure message to the instruction transceiver module 05 in the mobile phone 02. After receiving the installation failure message, the instruction transceiver module 05 may send an installation failure message to the instruction transceiver module 03 in the notebook computer 01.
And S616, the notebook computer receives the installation failure message.
After the notebook computer receives the installation failure message sent by the mobile phone, the notebook computer can display the installation failure message, so that a user or a tester can know that the application program APK corresponding to the mobile phone is installed and fails.
And S617, installing a corresponding application program by the mobile phone.
When the mobile phone includes the authority identifier corresponding to the application program installation request, the mobile phone may install the corresponding application program, for example, install an installation package of the corresponding application program. In some examples, the application installation request sent by the notebook computer received by the mobile phone may include an installation package of the corresponding application, and the mobile phone may obtain the installation package of the corresponding application through the application installation request sent by the notebook computer. In other examples, the mobile phone may also obtain an installation package of the application from a cloud server or other devices, which is not limited in this embodiment of the present application.
For example, as shown in fig. 5, in the case that the installation authority acquiring module 08 in the mobile phone 02 determines the authority identifier corresponding to the application included in the instruction verifying module 06 in the mobile phone 02, the installation authority acquiring module 08 may determine that the mobile phone 02 has the installation authority of the APK corresponding to the application included in the application installation request. The installation authority acquiring module 08 may install an APK of a corresponding application program.
And S618, the mobile phone sends an installation success message to the notebook computer.
Under the condition that the mobile phone finishes installing the corresponding application program, the mobile phone can send an installation success message to the notebook computer for indicating that the mobile phone successfully installs the corresponding application program.
For example, as shown in fig. 5, when the installation authority acquiring module 08 in the mobile phone 02 completes installation of the APK of the corresponding application program, the installation authority acquiring module 08 may send an installation success message to the instruction transceiver module 05 in the mobile phone 02. After receiving the installation failure message, the instruction transceiver module 05 may send an installation success message to the instruction transceiver module 03 in the notebook computer 01.
S619, the notebook computer receives the installation success message.
After the notebook computer receives the installation success message sent by the mobile phone, the notebook computer can display the installation success message, so that a user or a tester can know that the application program APK corresponding to the mobile phone is installed successfully.
After the notebook computer receives the installation success message sent by the mobile phone, the user or the tester can use the notebook computer to test the mobile phone through the application program installed on the mobile phone, such as the test application program APK.
According to the scheme, the request for setting the installation permission (namely the installation permission of the APK corresponding to the application program) of the application program (such as the test application program) is sent to the at least one mobile phone through the notebook computer, so that the at least one mobile phone can set the installation permission of the corresponding application program according to the request sent by the notebook computer, namely, the mobile phone sets the installation permission of the corresponding application program according to the request sent by the notebook computer, the installation permission of the application program can be acquired without the operation of a user on the mobile phone, the operation of the user in the installation process of the application program can be reduced, and the installation efficiency of the application program can be improved.
After the installation permission corresponding to the application program is set by the mobile phone, when the mobile phone receives an application program installation request (i.e., an APK request corresponding to the application program) sent by the notebook computer, the mobile phone can determine whether the mobile phone includes a permission identifier corresponding to the application program (i.e., the installation permission of the application program), and when the mobile phone includes the permission identifier of the application program, the mobile phone can install the application program (i.e., the APK corresponding to the application program). That is to say, according to the scheme of the application, when the application needs to be installed on the mobile phone, whether the permission identifier corresponding to the application (i.e., the installation permission of the application) is included in the mobile phone can be determined through the mobile phone, so that the installation permission of the application can be acquired without the operation of a tester, and the efficiency of installing the application on the mobile phone can be further improved.
And because the installation authority of the application program can be obtained without the operation of a tester when the application program is installed (namely, the APK corresponding to the application program is installed), the application program can be installed on a plurality of mobile phones at the same time, and the requirement of production line batch production can be met.
In addition, according to the scheme of the application, the installation authority of the first application program (such as a test application program) is set through the mobile phone according to the request of the notebook computer, so that the first application program can be installed on the mobile phone according to the installation authority, the first application program does not need to be prefabricated in an operating system of the mobile phone, the first application program in the mobile phone and data corresponding to the first application program can be deleted by resetting the mobile phone to leave a factory, and the like, the use space of the mobile phone can be increased, and data leakage can be avoided.
For example, continuing to schematically illustrate the example of the test application by using the first electronic device as a notebook computer, the second electronic device as a mobile phone, and the application as an example, the application deleting process provided in this embodiment of the present application is schematically illustrated. As shown in fig. 8, the application deletion process provided in the embodiment of the present application may include the following S701 to S702.
S701, the mobile phone receives an operation that a user triggers and deletes a test application program.
After the mobile phone installs the test application program, a user or a tester can test the mobile phone through the test application program installed on the mobile phone, for example, test an operating system of the mobile phone. After the test is finished, the test application program receives the installation request of the notebook computer through the mobile phone, so that the test APK can be installed on the mobile phone. That is, the test APK does not need to be pre-manufactured in the operating system of the mobile phone, so that the mobile phone can delete the installed test application program.
In some examples, a user may trigger a factory reset control in the mobile phone, so as to trigger the factory reset of the mobile phone, that is, when the factory reset of the mobile phone is performed, an application program on the mobile phone, other than an application program of the operating system itself, such as a test application program installed on the mobile phone, can be deleted. That is to say, when the mobile phone receives an operation of the factory resetting control, such as a trigger operation, by the user, the mobile phone may delete the installed test application.
In other examples, the user may also delete the test application installed on the mobile phone in other manners, for example, the user triggers a deletion control corresponding to the test application, so that the mobile phone can be triggered to delete the test application.
S702, responding to the operation, the mobile phone deletes the test application program and the test data corresponding to the test application program.
When the mobile phone receives an operation for triggering deletion of the test application program by a user, such as a trigger operation, the mobile phone may delete the installed test application program.
When the mobile phone deletes the test application program, the mobile phone can delete the test data corresponding to the test application program together, so that the test APK in the mobile phone and the test data corresponding to the test APK can be prevented from being leaked, and the use space of the mobile phone can be increased.
In some examples, when the user triggers an operation of deleting the test application program and triggers a factory reset control in the mobile phone for the user, the mobile phone may further delete the authority identifier corresponding to the test application program in the mobile phone.
It should be noted that, before the mobile phone leaves the factory, in addition to performing human-computer interaction, the mobile phone also needs to write customization information (CW) and check customization information (MC). The customized information can be basic information of the mobile phone, such as information of a complete machine bar code of the mobile phone. And writing the customized information, namely writing the basic information of the mobile phone into an operating system of the mobile phone. And checking the customized information, namely checking whether the customized information of the mobile phone is written into the operating system of the mobile phone. For example, taking a pre-manufactured test APK as an MMI system as an example, as shown in fig. 9 (a), before the mobile phone leaves the factory, the existing test flow of the mobile phone may be to write the customized information, that is, to write the basic information of the mobile phone into the operating system of the mobile phone. And then, performing man-machine interaction test (such as MMI test) through the MMI system to determine whether each function of the operating system of the mobile phone is normal, such as manual test by using the MMI system. And finally, checking the customized information, namely checking whether the customized information of the mobile phone is written into an operating system of the mobile phone.
After the scheme in the present application is adopted, as shown in (b) in fig. 9, before the mobile phone leaves the factory, the test flow of the mobile phone may be to write the customized information, that is, to write the basic information of the mobile phone into the operating system of the mobile phone. Then, the mobile phone can automatically perform a man-machine interaction test (for example, referred to as an MMI automatic test) through the MMI system to determine whether each function of the operating system of the mobile phone is normal. Before the man-machine interaction test is automatically performed through the MMI system, the mobile phone needs to write the authority identifier, namely the installation authority corresponding to the APK corresponding to the MMI system, and after the authority identifier is written in the mobile phone, the mobile phone can install the APK corresponding to the MMI system, namely the MMI system is installed in advance. And then, manually testing the items which cannot be automatically tested by the installed MMI system. And finally, checking the customized information, namely checking whether the customized information of the mobile phone is written into an operating system of the mobile phone.
For ease of understanding, the application installation method provided in the embodiment of the present application is described below with reference to fig. 10. As shown in fig. 10, the application installation method may include the following S901-S912.
S901, the first electronic device and the second electronic device are connected.
The application program installation method provided by the embodiment of the application program installation method can be applied to an application program installation system and can also be called as a test system. The test system may include a first electronic device and at least one second electronic device connected to the first electronic device. The test system may be used for testing an operating system of the second electronic device, such as human-computer interaction testing of the operating system of the second electronic device.
The first electronic device may be an electronic device such as a notebook computer, a tablet computer, a handheld computer, a PC, or a PDA. The specific type of the first electronic device is not limited in the embodiment of the present application. In the embodiment of the present application, a first electronic device is taken as a notebook computer for example to perform schematic description.
The second electronic device may be a mobile phone, a tablet computer, a handheld computer, a personal computer PC, a cellular phone, a PDA, a wearable device, or other electronic device. In the embodiment of the present application, a second electronic device is taken as an example to be schematically described.
The first electronic device and the second electronic device may establish a connection, such as a USB connection, or may establish a wireless connection, such as a bluetooth connection. This is not limited in the embodiments of the present application. In the embodiment of the present application, a connection established between a first electronic device and a second electronic device is taken as an example of a USB connection for schematic description.
S902, the first electronic equipment receives a first operation of a user.
After the first electronic device establishes a connection with the second electronic device, a user may perform an operation (for example, referred to as a first operation) on the first electronic device, thereby triggering the first electronic device to send a request for setting an authority identifier corresponding to an application program, for example, referred to as a request for setting the authority identifier (which may be referred to as a first request in this embodiment of the present application), to the second electronic device. And the permission identifier setting request can be used for instructing the second electronic equipment to set the permission identifier of the corresponding application program. The authority identifier may be an installation authority of the corresponding application, that is, an installation authority of an APK of the application.
The application program may be an application program for testing an operating system of the second electronic device, such as a test application program. For example, the test application may be an MMI system, and the APK (which may be referred to as a test APK) corresponding to the test application is an application installation package corresponding to the MMI system.
In some examples, after the first electronic device establishes a connection with the second electronic device, the first electronic device may display an interface for testing the second electronic device, which may include setting a permission identification control. The permission identifier setting control can be used for triggering the first electronic device to send a permission identifier setting request to the mobile phone. That is to say, the first electronic device receives a first operation of the user, and may receive, for the first electronic device, a trigger operation, such as a click operation, performed by the user on the setting permission identifier control.
After the first electronic device establishes a connection with the second electronic device, the first electronic device may send a permission identifier setting request to the first electronic device when receiving a first operation of the permission identifier setting control by a user. The first electronic device may also automatically send a request for setting the permission identifier to the second electronic device after establishing a connection with the second electronic device.
In this embodiment of the application, reference may be made to the above S601 when the first electronic device receives the first operation of the user, and details of this embodiment of the application are not described herein again.
And S903, responding to the first operation, and generating a first request by the first electronic device.
When the first electronic device receives a first operation of the user, the first electronic device may generate a first request in response. The first request, which may also be referred to as a set rights identification request. The first request can be used for requesting the second electronic device to set a first identifier corresponding to the first application program. The first identifier may be used to indicate installation rights of the first application. That is, the first request may be used to request the second electronic device to set the installation permission corresponding to the first application program, that is, the first request may be used to request the second electronic device to set the installation permission of the APK corresponding to the first application program. That is, the first operation is used to trigger the first electronic device to send a first request to the second electronic device, where the first request is used to request the second electronic device to set a first identifier, and the first identifier is used to indicate that the installation authority of the first application program is possessed. The first application may be used to test an operating system of the second electronic device.
In some examples, the first request may include an identification of the corresponding application (e.g., test application), which may be indicative of the application. I.e. the first request, may include an identifier of an application (e.g. a test application) that requires the second electronic device to set the installation authority, so that the second electronic device may set the authority identifier corresponding to the application (i.e. the installation authority corresponding to the application) according to the identifier of the application.
In some examples, after the first electronic device generates the first request, the first electronic device may also encrypt the first request. For example, the first electronic device may encrypt the first request with the first key. The first key may be a public key in the first electronic device. The public key in the first electronic device may correspond to the private key in the second electronic device.
In this embodiment of the application, reference may be made to the above S602 for the first electronic device to generate the first request, which is not described herein again.
S904, the first electronic device sends a first request to the second electronic device.
After the first electronic device generates the first request, the first electronic device may send the first request to the second electronic device. The first request may be a request after encryption.
And S905, the second electronic equipment sets a first identifier according to the first request.
After the second electronic device receives the first request, the second electronic device may set the first identifier according to the first request. That is, the second electronic device may set the installation authority of the corresponding application program according to the first request.
When the first request includes the identifier of the first application program, the second electronic device may set a first identifier corresponding to the first application program according to the first request. After the second electronic device sets the first identifier corresponding to the first application program, the second electronic device may store a corresponding relationship between the identifier of the first application program and the first identifier, so that whether the second electronic device includes the corresponding first identifier can be determined according to the identifier of the first application program. That is, the second electronic device may determine whether the second electronic device has the right to install the first application program according to the identifier of the first application program.
In some examples, when the first request is a request after encryption, the second electronic device sets the first identifier according to the first request, which may include: the second electronic device decrypts the first request through a second key, which corresponds to the first key. The second key is the private key comprised by the second electronic device. The second electronic device includes a private key opposite the public key included in the first electronic device. And the second electronic equipment can set the first identifier according to the first request under the condition that the second electronic equipment successfully decrypts through the second key.
In this embodiment of the present application, the second electronic device sets the first identifier according to the first request, which may refer to S606-S609 above, and details of this embodiment are not described herein again.
S906, the second electronic equipment sends the first message to the first electronic equipment.
After the second electronic device sets the first identifier according to the first request, the second electronic device may transmit a first message to the first electronic device. The first message may be the setup success message described above. That is, the first message, may be used to indicate that the second electronic device successfully sets the first identifier corresponding to the first application, that is, the second electronic device successfully sets the installation permission corresponding to the first application.
In this embodiment of the present application, reference may be made to S606-S610 for sending the first message to the first electronic device by the second electronic device, which is not described herein again.
And S907, the first electronic device sends a second request to the second electronic device according to the first message.
After the first electronic device receives the first message, that is, after the first electronic device receives the message that the second electronic device successfully sets the installation permission corresponding to the first application program, the first electronic device may send a second request to the second electronic device according to the first message. The second request may be for the second electronic device to install the first application.
The second request may include an identifier of an application that the second electronic device needs to install, such as an identifier of the first application, so that the second electronic device may determine whether to include the permission identifier corresponding to the identifier of the application according to the identifier. The second request may further include an APK of an application that the second electronic device needs to install, such as the APK of the first application.
In this embodiment of the present application, the first electronic device sends the second request to the second electronic device according to the first message, which may refer to S612 above, and this embodiment of the present application is not described herein again.
And S908, the second electronic device determines whether the second electronic device includes the authority identifier of the application program corresponding to the second request according to the second request.
After the second electronic device receives the second request, the second electronic device may determine whether the second electronic device includes the permission identifier of the application program corresponding to the second request.
In a case where the second electronic device determines that the second electronic device does not include the authority identification of the application corresponding to the second request, the second electronic device may determine that the second electronic device does not have the authority to install the application corresponding to the second request, and may continue to execute S909 described below.
In a case that the second electronic device determines that the second electronic device includes the authority identifier of the application program corresponding to the second request, the second electronic device may determine that the second electronic device has the authority to install the application program corresponding to the second request, and may continue to perform S910 described below.
For example, when the second request includes an identification of the first application, i.e., the second request is for requesting the second electronic device to install the first application. When the second electronic device receives the second request, the second electronic device may determine whether the second electronic device includes the authority identifier corresponding to the first application, that is, the first identifier. In case that the second electronic device includes the first identifier, the second electronic device may determine that it has a right to install the first application, so that the second electronic device may install the first application.
In a case where the second electronic device does not include the first identifier, the second electronic device may determine that the second electronic device does not have the authority to install the first application, and thus the second electronic device may not install the first application.
In this embodiment of the application, the second electronic device determines whether the second electronic device includes the authority identifier of the application corresponding to the second request, which may refer to S614 described above, and this embodiment of the application is not described herein again.
And S909, the second electronic equipment does not install the first application program.
In a case that the second electronic device determines that the second electronic device does not include the authority identifier of the application program corresponding to the second request, the second electronic device may determine that the second electronic device cannot install the first application program without having the authority to install the application program corresponding to the second request.
S910, the second electronic device installs the first application program.
In a case that the second electronic device determines that the second electronic device includes the authority identifier of the application program corresponding to the second request, the second electronic device may determine that the second electronic device has the authority to install the application program corresponding to the second request, and the second electronic device may install the first application program.
And S911, the second electronic equipment receives a second operation of the user, wherein the second operation is used for triggering the second electronic equipment to delete the first application program.
After the second electronic device installs the first application program, such as a test application program, the second electronic device may test an operating system of the second electronic device through the first application program.
After the second electronic device can test the operating system of the second electronic device through the first application program, the user can trigger the second electronic device to delete the first application program. For example, the user may trigger a factory reset control in the second electronic device, thereby triggering the second electronic device to reset factory settings. That is, the second operation may be a trigger operation on a factory reset control included in the second electronic device.
In this embodiment of the present application, reference may be made to the above S701 when the second electronic device receives the second operation of the user, and details of this embodiment of the present application are not described herein again.
S912, responding to the second operation, and deleting the first application program and the data corresponding to the first application program by the second electronic equipment.
When the second electronic device receives an operation (i.e., a second operation) that the user triggers the second electronic device to delete the first application program, the second electronic device may delete the first application program and data corresponding to the first application program in response.
The second operation is a trigger operation on a factory-setting-restoration control included in the second electronic device, the second electronic device may delete the first application program and data corresponding to the first application program, and the second electronic device may also delete an authority identifier corresponding to the first application program, that is, the first identifier.
In this embodiment of the application, the second electronic device deletes the first application and the data corresponding to the first application, which may refer to S702 described above, and this embodiment of the application is not described herein again.
By adopting the scheme of the application, the first electronic device can send the request (namely the first request) for setting the installation permission of the application program to the at least one second electronic device, so that the at least one second electronic device can set the installation permission of the corresponding application program according to the request sent by the first electronic device, namely, the scheme of the application is that the second electronic device sets the installation permission of the corresponding application program according to the request sent by the first electronic device, so that the installation permission of the application program can be acquired without the operation of a user on the second electronic device, the operation of the user in the installation process of the application program on the second electronic device can be reduced, and the efficiency of installing the application program on the second electronic device can be improved. Because the first application program is used for testing the operating system of the second electronic device, the efficiency of installing the first application program on the second electronic device can be improved by the scheme of the application, and therefore the testing efficiency of testing the second electronic device can be improved.
After the second electronic device sets the installation authority corresponding to the application program, when the second electronic device receives an application program installation request (i.e., a second request) sent by the first electronic device, the second electronic device may determine whether the second electronic device includes an authority identifier corresponding to the application program, and if the second electronic device includes the authority identifier of the application program, the second electronic device may install the application program. That is to say, according to the scheme of the application, when the second electronic device needs to install the application program, whether the second electronic device includes the permission identifier corresponding to the application program (i.e., the installation permission of the application program) can be determined by the second electronic device, so that the installation permission of the application program can be acquired without the operation of a tester, and the efficiency of installing the application program on the second electronic device can be further improved.
And because the installation authority of the application program can be obtained without the operation of a tester on the second electronic equipment when the application program is installed, the application program can be simultaneously installed on a plurality of second electronic equipment, and the requirements of mass production and test of a production line can be met.
In addition, according to the scheme of the application, the installation authority of the first application program is set through the second electronic device according to the request of the first electronic device, so that the second electronic device can install the first application program according to the installation authority, therefore, the first application program does not need to be prefabricated in an operating system of the second electronic device, the first application program in the second electronic device and data corresponding to the first application program can be deleted through the settings of factory restoration and the like of the second electronic device, the use space of the second electronic device can be improved, and data leakage is avoided.
Corresponding to the method in the foregoing embodiment, an application installation device is also provided in the embodiment of the present application. The application installation device can be applied to the first electronic equipment and used for realizing the method in the embodiment. The functions of the application program installation device can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
For example, fig. 11 shows a schematic structural diagram of an application installation apparatus 10, and as shown in fig. 11, the application installation apparatus 10 may include: a receiving module 1001 and a transmitting module 1002, etc.
The receiving module 1001 may be configured to receive a first operation of a user.
A sending module 1002, which may be configured to, in response to a first operation, send a first request to a second electronic device by a first electronic device; the first request is used for requesting the second electronic equipment to set a first identifier, and the first identifier is used for indicating that the second electronic equipment has the installation authority of the first application program; the first application program is used for testing an operating system of the second electronic device.
The sending module 1001 may further be configured to send a second request to the second electronic device, where the second request is used to request the second electronic device to install the first application.
In another possible implementation manner, the application installation apparatus 10 may further include an encryption module 1003.
The encryption module 1003 may be configured to encrypt the first request with the first key.
The sending module 1002 may be further configured to send the encrypted first request to the second electronic device.
In another possible implementation manner, the first electronic device may be a computer, and the second electronic device may be a mobile phone.
The embodiment of the application further provides an application program installation device. The application installation device can be applied to a second electronic device for realizing the method in the foregoing embodiment. The functions of the application program installation device can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
For example, fig. 12 shows a schematic structural diagram of an application installation apparatus 11, and as shown in fig. 12, the application installation apparatus 11 may include: a receiving module 1101, a setting module 1102, an installation module 1103, and the like.
The receiving module 1101 may be configured to receive, by a second electronic device, a first request sent by a first electronic device, where the first request is used to request the second electronic device to set a first identifier, and the first identifier is used to indicate that the second electronic device has an installation permission of a first application; the first application program is used for testing an operating system of the second electronic device.
The setting module 1102 may be configured to set the first identifier according to the first request.
The receiving module 1101 may be further configured to receive a second request sent by the first electronic device, where the second request is used to request the second electronic device to install the first application.
The installation module 1103 may be configured to, when the second electronic device includes the first identifier corresponding to the first application, install the first application by the second electronic device.
In another possible implementation manner, the application installation device 11 may further include a decryption module 1104.
The decryption module 1104 may be configured to decrypt the encrypted first request with a second key, where the second key corresponds to the first key.
The setting module 1102 may be further configured to set the first identifier according to the first request when the second electronic device succeeds in decryption by using the second key.
In another possible implementation manner, the receiving module 1101 may be further configured to receive a second operation of the user, where the second operation is used to trigger the second electronic device to delete the first application.
The application installation apparatus 11 may further include a deletion module 1105.
The deleting module 1105 may further be configured to, in response to the second operation, delete the first application and the data corresponding to the first application by the second electronic device.
In another possible implementation manner, the deleting module 1105 may also be configured to delete the first identifier.
In another possible implementation manner, the first electronic device may be a computer, and the second electronic device may be a mobile phone.
It should be understood that the division of units or modules (hereinafter referred to as units) in the above apparatus is only a division of logical functions, and may be wholly or partially integrated into one physical entity or physically separated in actual implementation. And the units in the device can be realized in the form of software called by the processing element; or may be implemented entirely in hardware; part of the units can also be implemented in the form of software invoked by a processing element and part of the units can be implemented in the form of hardware.
For example, each unit may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory in the form of a program, and a function of the unit may be called and executed by a processing element of the apparatus. In addition, all or part of the units can be integrated together or can be independently realized. The processing element described herein, which may also be referred to as a processor, may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each unit above may be implemented by an integrated logic circuit of hardware in a processor element or in a form called by software through the processor element.
In one example, the units in the above apparatus may be one or more integrated circuits configured to implement the above method, such as: one or more ASICs, or one or more DSPs, or one or more FPGAs, or a combination of at least two of these integrated circuit forms.
As another example, when a unit in a device may be implemented in the form of a processing element scheduler, the processing element may be a general purpose processor, such as a CPU or other processor capable of invoking programs. As another example, these units may be integrated together, implemented in the form of a system on chip SOC.
In one implementation, the means for implementing the respective corresponding steps of the above method by the above apparatus may be implemented in the form of a processing element scheduler. For example, the apparatus may comprise a processing element and a memory element, the processing element invoking a program stored by the memory element to perform the method described in the above method embodiments. The memory elements may be memory elements on the same chip as the processing elements, i.e. on-chip memory elements.
In another implementation, the program for performing the above method may be in a memory element on a different chip than the processing element, i.e. an off-chip memory element. At this time, the processing element calls or loads a program from the off-chip storage element onto the on-chip storage element to call and execute the method described in the above method embodiment.
For example, the embodiments of the present application may also provide an apparatus, such as: an electronic device may include: a processor, a memory for storing instructions executable by the processor. The processor is configured to execute the above instructions, so that the electronic device implements the application installation method according to the foregoing embodiment. The memory may be located within the electronic device or external to the electronic device. And the processor includes one or more.
In yet another implementation, the unit of the apparatus for implementing the steps of the method may be configured as one or more processing elements, and these processing elements may be disposed on the electronic device corresponding to the foregoing, where the processing elements may be integrated circuits, for example: one or more ASICs, or one or more DSPs, or one or more FPGAs, or a combination of these types of integrated circuits. These integrated circuits may be integrated together to form a chip.
For example, the embodiment of the present application also provides a chip, and the chip can be applied to the electronic device. The chip includes one or more interface circuits and one or more processors; the interface circuit and the processor are interconnected through a line; the processor receives and executes computer instructions from the memory of the electronic device through the interface circuitry to implement the methods described in the above method embodiments.
Embodiments of the present application also provide a computer-readable storage medium having computer program instructions stored thereon. The computer program instructions, when executed by the electronic device, cause the electronic device to implement the application installation method as described above.
Embodiments of the present application further provide a computer program product, which includes computer instructions executed by the electronic device as described above, and when the computer instructions are executed in the electronic device, the electronic device is enabled to implement the application installation method as described above. Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the modules or units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another device, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, that is, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in the form of software products, such as: and (5) programming.
The software product is stored in a program product, such as a computer readable storage medium, and includes several instructions for causing a device (which may be a single chip, a chip, or the like) or a processor (processor) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
For example, embodiments of the present application may also provide a computer-readable storage medium having stored thereon computer program instructions. The computer program instructions, when executed by the electronic device, cause the electronic device to implement the application installation method as described in the aforementioned method embodiments.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (13)
1. An application installation method applied to a first electronic device, wherein the first electronic device is connected with at least one second electronic device, the method comprising:
the first electronic equipment receives a first operation of a user;
in response to the first operation, the first electronic device sending a first request to the at least one second electronic device; the first request is used for requesting the second electronic equipment to set a first identifier on the second electronic equipment, and the first identifier is used for indicating that the second electronic equipment has installation authority of a first application program; the first application program is used for testing an operating system of the second electronic equipment;
and the first electronic equipment sends a second request to the second electronic equipment, wherein the second request is used for requesting the second electronic equipment to install the first application program according to the first identifier on the second electronic equipment.
2. The method of claim 1, wherein sending, by the first electronic device, a first request to the second electronic device comprises:
the first electronic equipment encrypts the first request through a first secret key;
the first electronic device sends the encrypted first request to the second electronic device.
3. The method of claim 1 or 2, wherein the first electronic device is a computer and the second electronic device is a mobile phone.
4. An application program installation method applied to a second electronic device, the second electronic device being connected to a first electronic device, the method comprising:
the second electronic equipment receives a first request sent by the first electronic equipment, wherein the first request is used for requesting the second electronic equipment to set a first identifier on the second electronic equipment, and the first identifier is used for indicating that the second electronic equipment has installation permission of a first application program; the first application program is used for testing an operating system of the second electronic equipment;
the second electronic equipment sets the first identification according to the first request;
the second electronic equipment receives a second request sent by the first electronic equipment, wherein the second request is used for requesting the second electronic equipment to install the first application program;
and under the condition that the second electronic equipment comprises the first identifier corresponding to the first application program, the second electronic equipment installs the first application program.
5. The method of claim 4, wherein the first request is a request after the first electronic device is encrypted by a first key, and wherein the second electronic device sets the first identifier according to the first request, and wherein the method comprises:
the second electronic device decrypts the encrypted first request through a second key, wherein the second key corresponds to the first key;
and under the condition that the second electronic equipment is successfully decrypted through the second secret key, the second electronic equipment sets the first identifier according to the first request.
6. The method according to claim 4 or 5, further comprising:
the second electronic equipment receives a second operation of the user, wherein the second operation is used for triggering the second electronic equipment to delete the first application program;
and responding to the second operation, and deleting the first application program and the data corresponding to the first application program by the second electronic equipment.
7. The method according to claim 6, wherein the second operation is an operation in which a user triggers the second electronic device to restore factory settings, and the method further comprises:
and the second electronic equipment deletes the first identifier.
8. The method of claim 4 or 5, wherein the first electronic device is a computer and the second electronic device is a mobile phone.
9. The method of claim 5, wherein the second electronic device comprises an instruction transceiver module and an instruction verification module;
the second electronic device decrypts the encrypted first request by using a second key, and includes:
the instruction transceiving module receives the encrypted first request sent by the first electronic device;
the instruction transceiver module sends the encrypted first request to the instruction verification module;
the instruction verification module receives the first request after encryption and decrypts the first request after encryption according to the second secret key;
the second electronic device sets the first identifier according to the first request, and the setting comprises the following steps:
and under the condition that the instruction verification module successfully decrypts through the second secret key, the instruction verification module sets the first identifier according to the first request.
10. The method of claim 9, wherein the second electronic device further comprises an installation authority acquisition module;
the second electronic device receives a second request sent by the first electronic device, and the second request comprises:
the instruction transceiving module receives the second request sent by the first electronic equipment;
the second electronic device installs the first application program, including:
the instruction transceiving module sends the second request to the installation permission acquisition module;
and the installation permission obtaining module installs the first application program under the condition that the instruction verification module comprises the first identifier corresponding to the first application program according to the second request.
11. An application installation system, comprising: the system comprises a first electronic device and at least one second electronic device connected with the first electronic device; the first electronic device is configured to perform the method of any of claims 1-3, and the second electronic device is configured to perform the method of any of claims 4-10.
12. An electronic device, comprising a processor, a memory for storing processor-executable instructions; the processor is configured to, when executing the instructions, cause the electronic device to implement the method of any of claims 1-3; alternatively, the processor is configured to execute the instructions to cause the electronic device to implement the method of any of claims 4 to 10.
13. A computer readable storage medium having stored thereon computer program instructions; it is characterized in that the preparation method is characterized in that,
the computer program instructions, when executed by an electronic device, cause the electronic device to implement the method of any of claims 1 to 3; alternatively, the computer program instructions, when executed by an electronic device, cause the electronic device to implement the method of any of claims 4 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210587571.4A CN114692093B (en) | 2022-05-27 | 2022-05-27 | Application program installation method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210587571.4A CN114692093B (en) | 2022-05-27 | 2022-05-27 | Application program installation method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114692093A CN114692093A (en) | 2022-07-01 |
CN114692093B true CN114692093B (en) | 2022-10-25 |
Family
ID=82144484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210587571.4A Active CN114692093B (en) | 2022-05-27 | 2022-05-27 | Application program installation method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114692093B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681662A (en) * | 2018-05-17 | 2018-10-19 | 阿里巴巴集团控股有限公司 | A kind of method and device of installation procedure |
CN109388532A (en) * | 2018-09-26 | 2019-02-26 | Oppo广东移动通信有限公司 | Test method, device, electronic equipment and computer-readable storage medium |
CN112486547A (en) * | 2021-02-03 | 2021-03-12 | 苏州达家迎信息技术有限公司 | Application program updating method and device under multi-tenant scene and electronic equipment |
CN113468606A (en) * | 2020-03-30 | 2021-10-01 | 华为技术有限公司 | Application program access method and electronic equipment |
CN113569288A (en) * | 2021-07-28 | 2021-10-29 | 维沃移动通信(杭州)有限公司 | Authority management method and device and electronic equipment |
CN113885896A (en) * | 2021-09-29 | 2022-01-04 | 平安银行股份有限公司 | Application software package installation method and device, computer equipment and storage medium |
WO2022022422A1 (en) * | 2020-07-31 | 2022-02-03 | 华为技术有限公司 | Permission management method and terminal device |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104657187A (en) * | 2015-03-24 | 2015-05-27 | 联想(北京)有限公司 | Application installation processing method, application installation processing device and electronic equipment |
CN106155727B (en) * | 2015-04-17 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Application program updating method and device and terminal |
KR102610058B1 (en) * | 2017-01-10 | 2023-12-06 | 삼성전자주식회사 | Device and Computer Readable Medium for Detecting Privilege Escalation of Process |
CN108347361B (en) * | 2018-03-06 | 2020-08-04 | 平安普惠企业管理有限公司 | Application program testing method and device, computer equipment and storage medium |
CN109344634B (en) * | 2018-09-28 | 2021-04-13 | 东软集团股份有限公司 | Permission granting method and device for application, terminal and computer readable storage medium |
CN109783129A (en) * | 2018-12-15 | 2019-05-21 | 深圳壹账通智能科技有限公司 | Applied program processing method, device, computer equipment and storage medium |
CN113821767A (en) * | 2020-06-18 | 2021-12-21 | 华为技术有限公司 | Application program authority management method and device and electronic equipment |
CN112115049B (en) * | 2020-08-27 | 2023-06-02 | 北京奇艺世纪科技有限公司 | Application program testing method, device, equipment and computer readable storage medium |
CN112016080A (en) * | 2020-08-28 | 2020-12-01 | 维沃移动通信(杭州)有限公司 | Application authority management method and device and electronic equipment |
CN114510248A (en) * | 2020-11-16 | 2022-05-17 | 深圳Tcl新技术有限公司 | Application program installation method and device, storage medium and terminal equipment |
CN112748934A (en) * | 2020-12-31 | 2021-05-04 | 西安万像电子科技有限公司 | Application deployment method, device and system |
CN113076258B (en) * | 2021-04-21 | 2023-09-19 | 中国移动通信集团陕西有限公司 | Method, device and equipment for applying permission and readable storage medium |
-
2022
- 2022-05-27 CN CN202210587571.4A patent/CN114692093B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108681662A (en) * | 2018-05-17 | 2018-10-19 | 阿里巴巴集团控股有限公司 | A kind of method and device of installation procedure |
CN109388532A (en) * | 2018-09-26 | 2019-02-26 | Oppo广东移动通信有限公司 | Test method, device, electronic equipment and computer-readable storage medium |
CN113468606A (en) * | 2020-03-30 | 2021-10-01 | 华为技术有限公司 | Application program access method and electronic equipment |
WO2022022422A1 (en) * | 2020-07-31 | 2022-02-03 | 华为技术有限公司 | Permission management method and terminal device |
CN112486547A (en) * | 2021-02-03 | 2021-03-12 | 苏州达家迎信息技术有限公司 | Application program updating method and device under multi-tenant scene and electronic equipment |
CN113569288A (en) * | 2021-07-28 | 2021-10-29 | 维沃移动通信(杭州)有限公司 | Authority management method and device and electronic equipment |
CN113885896A (en) * | 2021-09-29 | 2022-01-04 | 平安银行股份有限公司 | Application software package installation method and device, computer equipment and storage medium |
Non-Patent Citations (3)
Title |
---|
Android平台的应用软件安全评估平台的设计与研究;刘璐;《中国优秀硕士学位论文全文数据库 信息科技辑》;20160715(第7期);I138-28 * |
Android应用程序权限检测机制的研究;闫梅;《中国优秀硕士学位论文全文数据库 信息科技辑》;20140215(第2期);I138-63 * |
Information flows as a permission mechanism;Feng Shen 等;《ASE"14: Proceedings of the 29th ACM/IEEEInternational conference on Automated software engineering》;20140915;515-526 * |
Also Published As
Publication number | Publication date |
---|---|
CN114692093A (en) | 2022-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110569130B (en) | Cross-process communication method, device and equipment | |
WO2022135215A1 (en) | Method and apparatus for repairing abnormal power-on | |
WO2023051355A1 (en) | Permission check method and electronic device | |
CN114531676A (en) | Key processing method, device and terminal equipment | |
CN114096946B (en) | Method and device for managing applications | |
CN110602689B (en) | Method and device for safely operating equipment | |
CN114692093B (en) | Application program installation method and electronic equipment | |
CN113468606A (en) | Application program access method and electronic equipment | |
CN116049799B (en) | System authority management method, system and electronic equipment | |
US20230136200A1 (en) | Organization-based Template Publishing and Discovery | |
CN113938890B (en) | Data sharing method and terminal equipment | |
CN113918447B (en) | Application testing method and electronic equipment | |
CN116700552A (en) | Application connection method and terminal equipment | |
CN117667115A (en) | Application program installation method and electronic device | |
CN115562732A (en) | Starting method, electronic equipment and computer storage medium | |
CN117131519B (en) | Information protection method and equipment | |
CN114138343A (en) | Terminal and terminal starting method | |
CN117131533A (en) | Method for opening file and electronic equipment | |
CN114205099B (en) | Webpage authentication method, electronic equipment and system | |
CN111737680A (en) | Application program authorization method and device and computer equipment | |
CN116702100B (en) | Authority management method and electronic equipment | |
EP4459448A1 (en) | Application handoff method and terminal device | |
CN113850633B (en) | Information pushing method and device | |
CN116049812B (en) | Method for accessing hardware resources and electronic equipment | |
CN115017927B (en) | Card simulation method, electronic device, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230914 Address after: 201306 building C, No. 888, Huanhu West 2nd Road, Lingang New District, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai Patentee after: Shanghai Glory Smart Technology Development Co.,Ltd. Address before: Unit 3401, unit a, building 6, Shenye Zhongcheng, No. 8089, Hongli West Road, Donghai community, Xiangmihu street, Futian District, Shenzhen, Guangdong 518040 Patentee before: Honor Device Co.,Ltd. |
|
TR01 | Transfer of patent right |