WO2018113596A1 - 应用程序审核操作权限处理方法、装置和存储介质 - Google Patents

应用程序审核操作权限处理方法、装置和存储介质 Download PDF

Info

Publication number
WO2018113596A1
WO2018113596A1 PCT/CN2017/116446 CN2017116446W WO2018113596A1 WO 2018113596 A1 WO2018113596 A1 WO 2018113596A1 CN 2017116446 W CN2017116446 W CN 2017116446W WO 2018113596 A1 WO2018113596 A1 WO 2018113596A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
package
account
auditor
developer
Prior art date
Application number
PCT/CN2017/116446
Other languages
English (en)
French (fr)
Inventor
郑文晓
陈伟健
龙妍
汪聪
潘璐璐
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018113596A1 publication Critical patent/WO2018113596A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Definitions

  • the present application relates to the field of computer technology, and in particular, to the field of application auditing, and in particular, to an application auditing operation authority processing method, apparatus, and storage medium.
  • the application After the application is developed and tested by the developer, it will be submitted by the developer to the application publishing platform for publishing the application, and will be reviewed by the reviewer of the application publishing platform. After the approval, the application will be Published on the application publishing platform for general users to download and use.
  • the application provides a method for processing application audit operation rights, including:
  • the application also provides an application review operation authority processing method, including:
  • Transmitting the operation instruction to a server such that the server authorizes an operation specified by the operation instruction according to a temporary login credential associated with the auditor account; the temporary login credential is corresponding to the application After the developer account is authorized, it is generated according to the rights of the developer account for the application.
  • the application also provides an application auditing operation authority processing device, which comprises:
  • a developer authorization module for obtaining an authorization instruction for the corresponding application triggered by the developer account
  • a temporary login credential generating module configured to generate a temporary login credential according to the authorization of the developer account for the application in response to the authorization instruction;
  • a reviewer account rights management module configured to associate the temporary login credentials with an auditor account
  • An audit operation management module configured to receive an operation instruction triggered by the application running on a terminal logged in by the auditor account; and the operation according to the temporary login credential associated with the auditor account The operation specified by the instruction is authorized.
  • Login module used to log in to the auditing program according to the auditor account
  • An operation instruction acquisition module configured to acquire, by using the verification program, an operation instruction triggered by a locally running application
  • the application also provides a non-transitory computer readable storage medium storing computer readable instructions that cause at least one processor to perform the method as described above.
  • FIG. 1 is an application environment diagram of an application review operation authority processing method in an example
  • FIG. 2 is a schematic diagram showing the internal structure of a server in an example
  • FIG. 3 is a schematic diagram showing the internal structure of a terminal in an example
  • FIG. 4 is a schematic flow chart of an application review operation authority processing method in an example
  • FIG. 5 is a flow chart showing the steps of providing an application to a terminal logged in by an auditor account in an example
  • FIG. 6 is a flow chart showing the steps of testing an application in an example
  • FIG. 7 is a flow chart showing the steps of sending an application developed by a development organization to a terminal corresponding to a reviewer account in an example
  • FIG. 8 is a schematic diagram showing the relationship between an operating system, an auditing program, a sub-application view layer unit, and a sub-application logical layer unit in an example;
  • FIG. 9 is a schematic flowchart of an application review operation authority processing method in an example.
  • FIG. 10 is a structural block diagram of an application audit operation authority processing apparatus in an example
  • FIG. 11 is a structural block diagram of an application audit operation authority processing apparatus in another example.
  • FIG. 13 is a structural block diagram of an application audit operation authority processing apparatus in still another example.
  • FIG. 1 is an application environment diagram of an application review operation authority processing method in an example.
  • the application auditing operation authority processing method is applied to an application auditing system.
  • the application review system includes a first terminal 110, a server 120, and a second terminal 130.
  • the first terminal 110 and the second terminal 130 are respectively connected to the server 120 through a network.
  • the first terminal 110 is used by a developer running a development program on the first terminal 110, and the development program logs in to the server 120 through the developer account.
  • the server 120 is used to provide functions for compiling, reviewing authority processing, and publishing applications.
  • the second terminal 130 runs an auditing program, and the auditing program logs in to the server 120 through the auditor account, and the auditing program runs the application, and the auditor performs various operations on the application to perform the auditing work.
  • FIG. 2 is a schematic diagram showing the internal structure of a server in an example.
  • the server includes a processor, a non-volatile storage medium, an internal memory, and a network interface connected by a system bus.
  • the non-volatile storage medium of the server stores an operating system, a database, and an application audit operation authority processing device.
  • the database can be used to store account numbers and corresponding login credentials.
  • the application auditing operation authority processing device is configured to implement a method for processing an application auditing authority for a server.
  • the server's processor is used to provide computing and control capabilities that support the operation of the entire server.
  • the internal memory of the server provides an environment for the operation of the application auditing operation authority processing device in the non-volatile storage medium, and the internal memory can store computer readable instructions, when the computer readable instructions are executed by the processor, Make The processor executes an application audit operation permission processing method.
  • the server's network interface is used to communicate over the network, such as obtaining authorization commands and receiving operational commands.
  • the server can be implemented with a stand-alone server or a server cluster consisting of multiple servers. It will be understood by those skilled in the art that the structure shown in FIG. 2 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the server to which the solution of the present application is applied.
  • the specific server may include a ratio. More or fewer components are shown in the figures, or some components are combined, or have different component arrangements.
  • FIG. 3 is a schematic diagram showing the internal structure of a terminal that can serve as the first terminal 110 and the second terminal 130 in one example.
  • the terminal includes a processor connected through a system bus, a non-volatile storage medium, an internal memory, a network interface, a display screen, and an input device.
  • the non-volatile storage medium of the terminal stores an operating system, and further stores an application audit operation authority processing device, and the application audit operation authority processing device is configured to implement an application audit operation authority processing method.
  • the processor of the terminal is used to provide computing and control capabilities to support the operation of the entire terminal.
  • the internal memory in the terminal provides an environment for the operation of the application auditing operation authority processing device in the non-volatile storage medium.
  • the internal memory can store computer readable instructions that, when executed by the processor, cause the processor to perform an application review operation authority processing method.
  • the network interface of the terminal is used for network communication with the server, such as sending an authorization command or an operation instruction.
  • the display screen of the terminal may be a liquid crystal display or an electronic ink display screen, and the input device of the terminal may be a touch layer covered on the display screen, or a button, a trackball or a touchpad provided on the terminal housing, or may be an external connection. Keyboard, trackpad or mouse.
  • the terminal may be a personal computer or a mobile terminal, and the mobile terminal includes at least one of a mobile phone, a tablet computer, a personal digital assistant, or a wearable device. A person skilled in the art can understand that the structure shown in FIG.
  • FIG. 3 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the terminal to which the solution of the present application is applied.
  • the specific terminal may include a ratio. More or fewer parts shown in Figure 3, or Some components are combined or have different component arrangements.
  • the reviewer needs to review the various functions of the application. Some functions need to be logged in before they can be used. Then the developer needs to provide his own account and password, which is developed by the reviewer. The account and password provided by the user are logged into the application for review. There is a security risk because developers are required to actively expose their account and password to the reviewer. Based on this, the application provides an application review operation authority processing method, device and storage medium.
  • FIG. 4 is a schematic flowchart of an application review operation authority processing method in an example. This example is illustrated by the method applied to the server 120 of FIG. 1 described above. Referring to FIG. 4, the application auditing operation authority processing method specifically includes the following steps:
  • the developer account is the account whose privilege role is the developer.
  • the developer account belongs to the developer of the application.
  • An application is an application that needs to be reviewed before it is released.
  • An authorization directive for an application is an instruction that authorizes the permissions required to audit the application.
  • An authorization command triggered by a developer account indicates that the authorization command is triggered by the developer.
  • the first terminal acquires the developer account used for logging in, and obtains the identifier of the application, so as to send an authorization instruction carrying the identifier of the application and the developer account to the server, and the authorization instruction is received by the server.
  • the server determines, according to the developer account carried by the authorization instruction, that the authorization instruction is triggered by the developer account; and determines, according to the identifier of the application carried by the authorization instruction, the application for the authorization instruction.
  • the developer account has a corresponding relationship with the application.
  • the server can provide an audit submission page for the application in which the barcode including the authorization link is displayed.
  • the review submission page can be in the form of a web page.
  • the barcode is a graphic of the recoverable character obtained by encoding the character according to a preset rule, and the barcode may include a barcode and a 2-dimensional bar code.
  • a barcode is a graphical identifier that is used to express a set of information by arranging a plurality of black bars and spaces of unequal widths according to certain coding rules.
  • a common bar code is a parallel line pattern in which black bars (abbreviated as bars) and white bars (abbreviated as empty) having a large difference in reflectance are arranged.
  • the two-dimensional barcode is abbreviated as a two-dimensional code, which is a bar code for recording data symbol information of black and white graphics distributed in a two-dimensional direction of a plane by a certain geometric pattern.
  • the permission of the developer account for the application refers to the permission of the developer account to operate the application, such as accessing a specified webpage, obtaining specified data, enabling a specified function, or turning off a specified function.
  • the temporary login credentials are distinguished from the login permissions of the developer account itself, and are temporary login credentials that are generated in conjunction with the review of the application. The temporary login credentials may be valid for a fixed period of validity, or may be disabled after completion of the review of the application.
  • the server responds after receiving the authorization instruction, determines the developer account corresponding to the authorization instruction, and the application program that is targeted, and queries the developer account for the right of the application, thereby generating a query for the query. Permission to authorize temporary login credentials.
  • the server can also set the validity period of the fixed effective duration for temporary login credentials. The validity period can be expressed by the expiration time point of the temporary login credentials, or by the effective time and effective duration of the temporary login credentials.
  • the server may associate the generated temporary login credentials with one or more than one reviewer account.
  • the server can also assign an auditor account to the application from the set of auditor accounts and associate the generated temporary login credentials with the reviewer account.
  • the association between the temporary login credentials and the auditor account indicates that the auditor account has the rights to the temporary login credentials.
  • the server can also send temporary login credentials to the terminal corresponding to the auditor account.
  • the auditor account is the account whose privilege role is the reviewer.
  • the second terminal can directly run an application on its operating system, and the application logs in to the server through the auditor account, and the temporary login credential associated with the auditor account is used as the credential of the application login.
  • the application generates a corresponding operation instruction after detecting the operation, and sends the operation instruction to the server.
  • the application may send an operation instruction carrying the auditor account and the associated temporary login credentials to the server, and after receiving the operation instruction, the server extracts the auditor account and the temporary login from the operation instruction.
  • the credential compares the extracted temporary login credential with the temporary login credential associated with the auditor account on the server, and when the two match, step S410 is performed.
  • the second terminal can run an auditing program on its operating system that logs into the server through the auditor account, which provides the environment provisioning program to run.
  • the application shares the temporary login credentials for the auditor. Further, the application generates a corresponding operation instruction after detecting the operation, and sends the operation instruction to the server through the audit program.
  • the auditing program is a computer program for auditing applications.
  • the server determines the auditor account that triggers the operation instruction, thereby querying the temporary login credentials associated with the reviewer account. If the temporary login credentials associated with the reviewer account are not queried, the operation specified by the operation instruction is denied. If the temporary login credentials associated with the auditor account are queried, and the temporary login credentials have the operation authority specified by the operation instruction, the operation specified by the operation instruction is authorized. If the temporary login credentials associated with the auditor account are queried, and the temporary login credentials do not have the operational authority specified by the operation instruction, the operation specified by the operation instruction is denied.
  • the above application audit operation authority processing method obtains temporary login credentials for the corresponding application through the authorization of the developer account, and associates the temporary login credentials with the auditor account. In this way, after the auditor logs in with the auditor account, the action required for the audit can be triggered in the application, and the operation will be authorized by the temporary login credentials associated with the auditor account, thereby completing the review of the application. Since the temporary login credentials are temporarily assigned during the audit and are associated with the auditor account, and their permissions are for the application, and the password corresponding to the developer account does not need to be exposed to the reviewer, the security is significantly improved.
  • the aforementioned application auditing operation authority processing method further includes the step of providing an application to the terminal logged in with the auditor account, the step being before step S408.
  • the step of providing an application to a terminal logged in with an auditor account specifically includes the following steps:
  • the source code corresponds to the application and is used to generate the application.
  • Source code is computer code written by a developer, usually written in a high-level computer language.
  • the source code can include the application's logic code, page structure code, or page style code.
  • step S502 includes: receiving source code sent by the first terminal after the source code is completed by the development program running on the first terminal.
  • the first terminal can generate a development project through a development program running thereon, in which various codes required for developing the application are edited to constitute source code.
  • the development program can provide an upload trigger control.
  • the first terminal detects the operation of the upload trigger control by the development program, the code in the development project is uploaded to the server as source code, and is received by the server.
  • compilation refers to the process of converting a high-level computer language into object code that can be executed
  • a compiler is a program that converts a high-level computer language into object code that can be executed.
  • a compiler can be run on the server, and the server compiles the tested code through the compiler to obtain a package.
  • the package can be in the form of an installation package or in the form of a code file.
  • the server may detect whether there is malicious code in the source code after receiving the source code, and issue a malicious code message if the malicious code is detected; if the malicious code is not detected, perform step S504.
  • the malicious code can be specifically obtained by keyword matching and/or code logic checking.
  • S506 Send the package to the terminal that is logged in by the auditor account, so that the terminal that logs in with the auditor account obtains the corresponding application according to the package after receiving the package.
  • step S502 and step S504 may be performed before step S402, and S506 may be performed after step S406.
  • the server sends the package to the second terminal that is logged in with the auditor account, receives the package by the second terminal, and obtains the corresponding application according to the package.
  • the second terminal obtains a corresponding application according to the package, specifically decompresses the package, obtains an installation startup program, and runs the installation startup program to install the application to an operating system running on the second terminal.
  • the second terminal obtains the corresponding application according to the package, and specifically decompresses the package through the auditing program running on the second terminal to obtain the sub-application configuration.
  • the second terminal runs the application in the sub-application running environment provided by the auditing program through the auditing program and according to the sub-application configuration file.
  • the application is a sub-application of the auditor.
  • the package is compiled after the source code is uploaded, which avoids the situation where the developer adds malicious code to the application when compiling directly. Moreover, developers can submit source code directly through the development process, improving the efficiency of the application from the development phase to the review phase.
  • the aforementioned application auditing operation authority processing method further includes the step of testing the application.
  • the step of testing the application specifically includes the following steps:
  • the download address may include a server address, a storage path of the application on the server, and an identification of the application.
  • the download address can also include only the storage path of the application on the server and the identity of the application.
  • the download address can be expressed as a URL (Uniform Resource Locator).
  • the barcode for obtaining the download address is generated, and specifically, the download address is directly encoded to obtain a barcode. Generating a barcode for obtaining a download address, or encoding the intermediate data for obtaining the download address to obtain a barcode.
  • the intermediate data may be, for example, a developer account corresponding to the application or an identifier of the application.
  • the intermediate data can be in the form of a URL.
  • the server returns the barcode to the first terminal, and the first terminal passes the development program.
  • the barcode is displayed.
  • the mobile terminal can collect the barcode displayed by the development program running on the first terminal, download the package according to the download address, parse the package to obtain an application, and the mobile terminal can test the application.
  • test instructions are instructions for testing an application that can be triggered by the user or by executing an automated test case.
  • the mobile terminal can also perform statistical analysis on the response of the application to the test command to obtain a test report.
  • the application program can be tested only by collecting the barcode through the mobile terminal, and the operation is simple, and the application test efficiency is improved.
  • the aforementioned application auditing operation authority processing method further includes the step of transmitting the application developed by the development organization to the terminal corresponding to the auditor account.
  • the step of sending the application developed by the development organization to the terminal corresponding to the auditor account specifically includes the following steps:
  • the development organization identifier is a string that uniquely identifies the corresponding development organization.
  • a development organization is an organization that includes multiple developers and multiple developers collaborate to develop applications, a development organization such as a company or a research and development department.
  • a plurality of developer accounts corresponding to the same development organization identifier, indicating multiple developers belonging to the same development organization.
  • each developer can log in to the server through the development program and its own developer account, and upload the source code through the development program respectively, and the source code is compiled by the server.
  • the server may also directly receive the packages uploaded by the plurality of developer accounts corresponding to the same development organization identifier.
  • the developer account with administrator rights is an account having management for the development work in the corresponding development organization, which may be one of the plurality of developer accounts corresponding to the same development organization identifier in step S702. It may also be a developer account that is different from the plurality of developer accounts corresponding to the same development organization identifier in step S702.
  • the first terminal may log in to the server by using a developer account corresponding to the development organization identifier and having administrator rights, and the server may provide an audit submission page to the first terminal and displayed by the first terminal, where the audit submission page includes A list of packages generated by multiple developer accounts of the same development organization ID.
  • the first terminal detects the selection operation of the list in the review page, and triggers a selection instruction corresponding to one or more packages in the list according to the selection operation, and sends the selection instruction to the server.
  • the server selects the package specified by the selection instruction as the selected package.
  • S708 Send the selected package to the terminal corresponding to the auditor account, so that the terminal corresponding to the auditor account parses the received package, and obtains the corresponding application.
  • the second terminal parses the received package, obtains a corresponding application, specifically decompresses the package, obtains an installation startup program, and runs the installation startup program to install the application to the second terminal. On the system.
  • the second terminal parses the received package to obtain a corresponding application, and specifically decompresses the package by using an auditing program run on the second terminal to obtain a sub-application configuration file; the second terminal passes the audit.
  • the program and the configuration file according to the sub-application Run the application in the sub-application runtime environment provided by the auditor.
  • the application is a sub-application of the auditor.
  • each developer can use their own developer account to develop the same or different applications and submit them to the reviewer via a developer account with administrator privileges. Auditing ensures the security of submitting applications for review when multiple people are developing.
  • the guarantee S408 includes: receiving an operation instruction sent by an audit program running on an operating system of the terminal logged in by the auditor account, the operation instruction being triggered by the application and sent by the audit program, and the application running in the audit program The sub-application provided in the runtime environment.
  • the auditing program is a program for auditing the application, and logs in to the server through the auditor account.
  • the sub-application runtime environment is an environment suitable for sub-applications to run.
  • the application runs on the sub-application runtime environment provided by the auditor, which is the parent application of the sub-application.
  • the auditing program can also simulate the hardware environment of different types of terminals to provide a sub-application runtime environment in the hardware environment. Once the application has been approved and published, it can be run in the parent application of the non-audit program.
  • an operating system is run on the second terminal, and an auditing program is run on the operating system.
  • the auditing program provides a sub-application running environment, and creates a sub-application logical layer unit and a corresponding sub-application for implementing the sub-application. View layer unit.
  • the sub-application logic layer unit can be used to execute the logic code in the package; the sub-application view layer unit is used to execute the page structure code in the package, and can also execute the page style code in the package.
  • the operating system is a computer program that manages and controls the hardware and software resources of the terminal. It is the most basic system software that runs directly on the bare metal of the terminal. The application needs to run under the support of the operating system.
  • the operating system can be a Windows (Windows) operating system or a Linux operating system or Mac OS (Apple Desktop Operating System)
  • the desktop operating system such as iOS (Apple mobile terminal operating system) or Android (Android) operating system, can also be a mobile operating system.
  • a parent application is an application that hosts a child application, providing an environment for the implementation of the child application.
  • the parent application is a native application.
  • Native applications are applications that run directly on the operating system.
  • the parent application can be a social application, a dedicated application that specifically supports the sub-application, a file management application, a mail application, or a game application.
  • Social applications include instant messaging applications, SNS (Social Network Service) applications, or live applications.
  • a sub-application is an application that can be implemented in the environment provided by the parent application.
  • the sub-application may specifically be a social application, a file management application, a mail application, or a game application.
  • the sub-application logic layer unit and the corresponding sub-application view layer unit are used to implement the sub-application instance.
  • a sub-application can be implemented by a sub-application logic layer unit and at least one sub-application view layer unit.
  • the sub-application view layer unit and the sub-application page may have a one-to-one correspondence.
  • the sub-application view layer unit is used to organize the view of the sub-application and render it.
  • the sub-application logic layer unit is used to process the data processing logic of the sub-application and the corresponding sub-application page.
  • the unit may be a process or a thread, a sub-application view layer unit such as a sub-application view layer thread, and a sub-application logic layer unit such as a sub-application logic layer thread.
  • the sub-application logic layer unit can run in a virtual machine.
  • the sub-application view layer unit and the sub-application logic layer unit can communicate through the parent application native unit, the parent application native unit is the interface between the parent application and the child application, and the parent application native unit can be the parent application itself. Thread or process.
  • the logic code of each sub-application page can be registered by the sub-application logic layer unit at startup.
  • the second terminal can render the page through the sub-application view layer unit and according to the initial page data of the corresponding sub-application page, and feed back the initial rendering to the sub-application logic layer unit. Complete the notification.
  • the second terminal acquires the page update data, and sends the page update data to the sub-application view layer unit.
  • the second terminal re-renders the updated portion of the page through the sub-application view layer unit and according to the page update data.
  • the sub-application view layer unit can preload the common resource at startup, so after receiving the initial page data of the page, the page is rendered according to the common resources required for rendering the page and the initial page data of the page, and The sub-application logic layer unit feeds back the initial rendering completion notification.
  • the common resource refers to resources shared by different sub-application pages, such as a rendering engine, a common page structure code, or a common style data.
  • the page update data is data used to update the page.
  • the terminal can automatically generate page update data through the sub-application logic layer unit and according to the auto-execution code defined in the logic code of the page.
  • the terminal may also respond to the event according to the logic code of the page after receiving the event sent by the sub-application view layer unit by the sub-application logic layer unit to generate corresponding page update data.
  • the updated part is the part of the page that needs to be changed, it can be the part that changes compared to the page rendered according to the initial page data, or it can be the part that changes compared to the previous rendered page.
  • the terminal may re-render through the sub-application view layer unit and based on the page rendered according to the initial page data, or may re-render based on the previously rendered page.
  • the pages of the sub-application can be rendered based on the common page data provided by the parent application and the initial page data of the page.
  • the common component is a component provided by the parent application that can be shared by different sub-applications, has a visual form, and is a component of the sub-application page.
  • Common components can be uniquely identified by corresponding common components. Different sub-applications share common components, which can be called the same common component at the same time or at different times. Common components can also be shared by parent and child applications.
  • the auditing program is run on the operating system, and the auditing program provides the sub-application running environment for the application, and the application runs as the sub-application of the auditing program in the running environment of the application. This saves the time spent installing the application, improving the efficiency of the sub-application, both during and after the release.
  • FIG. 9 is a schematic flowchart of a method for processing an application audit operation authority in another example. This example is exemplified by the method applied to the second terminal 130 in FIG. 1 described above.
  • the application audit operation authority processing method includes the following steps:
  • S902 Log in to the auditing program according to the auditor account.
  • the second terminal can log in to the server according to the auditor account through the auditing process.
  • the auditing program is a computer program for auditing applications.
  • the second terminal can also log in to the server through the application and according to the auditor account.
  • the second terminal can directly run an application on its operating system, and the application logs in to the server through the auditor account, and the temporary login credential associated with the auditor account is used as the credential of the application login.
  • the application generates a corresponding operation instruction after detecting the operation, and sends the operation instruction to the server.
  • the application may send an operation instruction carrying the auditor account and the associated temporary login credentials to the server, and after receiving the operation instruction, the server extracts the auditor account and the temporary login from the operation instruction.
  • the credential compares the extracted temporary login credential with the temporary login credential associated with the auditor account on the server, and when the two match, step S410 is performed.
  • the second terminal can run an auditing program on its operating system that logs into the server through the auditor account, which provides the environment provisioning program to run.
  • the application share the auditing program temporarily Login credentials. Further, the application generates a corresponding operation instruction after detecting the operation, and sends the operation instruction to the server through the audit program.
  • S906 Send an operation instruction to the server, so that the server authorizes an operation specified by the operation instruction according to the temporary login credential associated with the auditor account; the temporary login credential is authorized by the developer account corresponding to the application, according to the development The account number is generated for the permissions of the application.
  • the server determines the auditor account that triggers the operation instruction, thereby querying the temporary login credentials associated with the reviewer account. If the temporary login credentials associated with the reviewer account are not queried, the operation specified by the operation instruction is denied. If the temporary login credentials associated with the auditor account are queried, and the temporary login credentials have the operation authority specified by the operation instruction, the operation specified by the operation instruction is authorized. If the temporary login credentials associated with the auditor account are queried, and the temporary login credentials do not have the operational authority specified by the operation instruction, the operation specified by the operation instruction is denied.
  • the steps performed by the server in this example can refer to the above-mentioned application auditing operation authority processing method applicable to each instance of the server.
  • the above application audit operation authority processing method obtains temporary login credentials for the corresponding application through the authorization of the developer account, and associates the temporary login credentials with the auditor account. In this way, after the auditor logs in with the auditor account, the action required for the audit can be triggered in the application, and the operation will be authorized by the temporary login credentials associated with the auditor account, thereby completing the review of the application. Since the temporary login credentials are temporarily assigned during the audit and are associated with the auditor account, and their permissions are for the application, and the password corresponding to the developer account does not need to be exposed to the reviewer, the security is significantly improved.
  • the application auditing operation authority processing method further includes: acquiring a package on the server, the package is compiled by the source code uploaded to the server by the developer account; and parsing the package, and obtaining the corresponding s application.
  • the server receives the source code uploaded by the development program registered by the developer account when testing the application; compiling the source code to obtain the package; and sending the package to the terminal registered with the auditor account, so that the reviewer After the terminal that the account is logged in receives the package, the corresponding application is obtained according to the package.
  • the source code corresponds to the application and is used to generate the application.
  • Source code is computer code written by a developer, usually written in a high-level computer language.
  • the source code can include the application's logic code, page structure code, or page style code.
  • the package is compiled after the source code is uploaded, which avoids the situation where the developer adds malicious code to the application when compiling directly. Moreover, developers can submit source code directly through the development process, improving the efficiency of the application from the development phase to the review phase.
  • step S904 includes: running the application in the sub-application running environment provided by the auditing program; and obtaining the operating instruction triggered by the application.
  • an auditing program is run on the operating system, and the auditing program provides a sub-application running environment for the application, and the application runs as a sub-application of the auditing program in the running environment of the application. This saves the time spent installing the application, improving the efficiency of the sub-application, both during and after the release.
  • FIG. 10 is a block diagram showing the structure of an application auditing operation authority processing apparatus 1000 in an example.
  • the application auditing operation authority processing apparatus 1000 includes:
  • the developer authorization module 1010 is configured to obtain an authorization instruction for the corresponding application triggered by the developer account.
  • the temporary login credential generating module 1020 is configured to generate temporary login credentials according to the authority of the developer account for the application in response to the authorization instruction.
  • the auditor account rights management module 1030 is configured to associate the temporary login credentials with the reviewer account.
  • the audit operation management module 1040 is configured to receive an operation instruction triggered by an application running on the terminal logged in by the auditor account, and authorize the operation specified by the operation instruction according to the temporary login credentials associated with the auditor account.
  • FIG. 11 is a block diagram showing the structure of an application audit operation authority processing apparatus 1000 in another example.
  • the application auditing operation authority processing apparatus 1000 further includes a compiling module 1050 and a package management module 1060.
  • the compiling module 1050 is configured to receive the source code uploaded by the development program registered by the developer account, and compile the source code to obtain the package.
  • the package management module 1060 is configured to send the package to the terminal that is logged in with the auditor account, so that the terminal logged in with the auditor account obtains the corresponding application according to the package after receiving the package.
  • the compilation module 1050 is further configured to receive source code uploaded by a development program logged in with a developer account.
  • the application auditing operation authority processing apparatus 1000 further includes a download address recording module 1070 and a barcode management module 1080.
  • the download address record module 1070 is configured to record a download address for downloading the package.
  • the barcode management module 1080 is configured to generate a barcode for obtaining a download address, return the barcode to a development program registered by the developer account, and display, so that the mobile terminal collects the barcode and obtains the download address, and downloads the package according to the download address. And parsing the package to get the application and testing.
  • the package management module 1060 is configured to obtain a package generated separately by a plurality of developer accounts corresponding to the same development organization identifier; the acquisition is triggered by a developer account corresponding to the development organization identifier and having administrator rights.
  • Package selection instruction select the package from the generated package according to the package selection instruction; send the selected package to The terminal corresponding to the auditor account enables the terminal corresponding to the auditor account to parse the received package and obtain the corresponding application.
  • the audit operation management module 1040 is further configured to receive an operation instruction sent by an audit program running on an operating system of the terminal logged in by the auditor account, the operation instruction is triggered by the application and sent by the audit program, and the application runs. In the sub-application runtime environment provided by the auditing program.
  • the application audit operation authority processing device 1000 obtains temporary login credentials for the corresponding application by the authorization of the developer account, and associates the temporary login credentials with the auditor account. In this way, after the auditor logs in with the auditor account, the action required for the audit can be triggered in the application, and the operation will be authorized by the temporary login credentials associated with the auditor account, thereby completing the review of the application. Since the temporary login credentials are temporarily assigned during the audit and are associated with the auditor account, and their permissions are for the application, and the password corresponding to the developer account does not need to be exposed to the reviewer, the security is significantly improved.
  • FIG. 12 is a block diagram showing the structure of the application auditing operation authority processing apparatus 1200 in another example.
  • the application auditing operation authority processing apparatus 1200 includes:
  • the login module 1210 is configured to log in to the auditing program according to the auditor account number
  • An operation instruction obtaining module 1220 configured to obtain, by using an auditing program, an operation instruction triggered by a locally running application
  • the operation refers to a sending module 1230, configured to send an operation instruction to the server, so that the server authorizes the operation specified by the operation instruction according to the temporary login credential associated with the auditor account; the temporary login credential is in the developer account corresponding to the application. After authorization, it is generated according to the permissions of the developer account for the application.
  • FIG. 13 is a block diagram showing the structure of the application auditing operation authority processing apparatus 1200 in still another example.
  • the application auditing operation authority processing apparatus 1200 further includes an application program.
  • the sequence obtaining module 1240 is configured to obtain a package on the server; the package is compiled by source code uploaded to the server by the developer account; and the package is parsed to obtain a corresponding application.
  • the auditing program runs on the operating system; the operating instruction obtaining module 1220 is further configured to run the application in the sub-application running environment provided by the auditing program; and obtain the operating instruction triggered by the application.
  • the application auditing authority processing device 1200 obtains the temporary login credentials for the corresponding application by the authorization of the developer account, and associates the temporary login credentials with the auditor account. In this way, after the auditor logs in with the auditor account, the action required for the audit can be triggered in the application, and the operation will be authorized by the temporary login credentials associated with the auditor account, thereby completing the review of the application. Since the temporary login credentials are temporarily assigned during the audit and are associated with the auditor account, and their permissions are for the application, and the password corresponding to the developer account does not need to be exposed to the reviewer, the security is significantly improved.
  • the storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

一种应用程序审核操作权限处理方法和装置,包括:获取通过开发者账号触发的针对相应应用程序的授权指令(S402);响应于授权指令,根据开发者账号针对应用程序的权限生成临时登录凭据(S404);将临时登录凭据与审核者账号关联(S406);接收在以审核者账号登录的终端上运行的应用程序所触发的操作指令(S408);根据与审核者账号关联的临时登录凭据,对操作指令所指定的操作进行授权(S410)。

Description

应用程序审核操作权限处理方法、装置和存储介质
本申请要求于2016年12月22日提交中国专利局、申请号为201611199805.9、发明名称为“应用程序审核操作权限处理方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,特别是涉及应用程序审核领域,特别是涉及一种应用程序审核操作权限处理方法、装置和存储介质。
背景
应用程序一般经过开发者开发并完成测试后,会被开发者提交到用于发布应用程序的应用程序发布平台,由应用程序发布平台的审核者进行审核,在审核通过后,应用程序才会在应用程序发布平台上发布,供普通用户下载使用。
技术内容
本申请提供了一种应用程序审核操作权限处理方法,包括:
获取通过开发者账号触发的针对相应应用程序的授权指令;
响应于所述授权指令,根据所述开发者账号针对所述应用程序的权限生成临时登录凭据;
将所述临时登录凭据与审核者账号关联;
接收在以所述审核者账号登录的终端上运行的所述应用程序所触发的操作指令;
根据与所述审核者账号关联的所述临时登录凭据,对所述操作指令所指定的操作进行授权。
本申请还提供了一种应用程序审核操作权限处理方法,包括:
根据审核者账号登录审核程序;
通过所述审核程序获取本地运行的应用程序所触发的操作指令;
将所述操作指令发送至服务器,使得所述服务器根据与所述审核者账号关联的临时登录凭据对所述操作指令所指定的操作进行授权;所述临时登录凭据在由与所述应用程序相应的开发者账号进行授权后,根据所述开发者账号针对所述应用程序的权限生成。
本申请还提供了一种应用程序审核操作权限处理装置,其特征在于,包括:
开发者授权模块,用于获取通过开发者账号触发的针对相应应用程序的授权指令;
临时登录凭据生成模块,用于响应于所述授权指令,根据所述开发者账号针对所述应用程序的权限生成临时登录凭据;
审核者账号权限管理模块,用于将所述临时登录凭据与审核者账号关联;
审核操作管理模块,用于接收在以所述审核者账号登录的终端上运行的所述应用程序所触发的操作指令;根据与所述审核者账号关联的所述临时登录凭据,对所述操作指令所指定的操作进行授权。
本申请还提供了一种应用程序审核操作权限处理装置,包括:
登录模块,用于根据审核者账号登录审核程序;
操作指令获取模块,用于通过所述审核程序获取本地运行的应用程序所触发的操作指令;
操作指发送模块,用于将所述操作指令发送至服务器,使得所述服务器根据与所述审核者账号关联的临时登录凭据对所述操作指令所指定的操作进行授权;所述临时登录凭据在由与所述应用程序相应的开发者账号进行授权后,根据所述开发者账号针对所述应用程序的权限生成。
本申请还提供了一种非易失性计算机可读存储介质,存储有计算机可读指令,可以使至少一个处理器执行如上所述的方法。
附图简要说明
图1为一个实例中应用程序审核操作权限处理方法的应用环境图;
图2为一个实例中服务器的内部结构示意图;
图3为一个实例中终端的内部结构示意图;
图4为一个实例中应用程序审核操作权限处理方法的流程示意图;
图5为一个实例中向以审核者账号登录的终端提供应用程序的步骤的流程示意图;
图6为一个实例中对应用程序进行测试的步骤的流程示意图;
图7为一个实例中将开发组织所开发的应用程序发送到与审核者账号对应的终端的步骤的流程示意图;
图8为一个实例中操作系统、审核程序、子应用程序视图层单元和子应用程序逻辑层单元的关系示意图;
图9为一个实例中应用程序审核操作权限处理方法的流程示意图;
图10为一个实例中应用程序审核操作权限处理装置的结构框图;
图11为另一个实例中应用程序审核操作权限处理装置的结构框图;
图12为再一个实例中应用程序审核操作权限处理装置的结构框图;
图13为又一个实例中应用程序审核操作权限处理装置的结构框图。
实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
图1为一个实例中应用程序审核操作权限处理方法的应用环境图。参照图1,该应用程序审核操作权限处理方法应用于一种应用程序审核系统。该应用程序审核系统包括第一终端110、服务器120和第二终端130。其中,第一终端110和第二终端130分别与服务器120通过网络连接。第一终端110由开发者使用,该第一终端110上运行开发程序,开发程序通过开发者账号登录到服务器120。服务器120用于提供编译、审核权限处理和发布应用程序的功能。第二终端130上运行审核程序,该审核程序通过审核者账号登录到服务器120,该审核程序运行应用程序,并由审核者对该应用程序执行各种操作,以进行审核工作。
图2为一个实例中服务器的内部结构示意图。参照图2,该服务器包括通过系统总线连接的处理器、非易失性存储介质、内存储器和网络接口。其中,该服务器的非易失性存储介质存储有操作系统、数据库和应用程序审核操作权限处理装置。数据库可用于存储账号及相应的登录凭据。该应用程序审核操作权限处理装置用于实现一种适用于服务器的应用程序审核操作权限处理方法。该服务器的处理器用于提供计算和控制能力,支撑整个服务器的运行。该服务器的内存储器为非易失性存储介质中的应用程序审核操作权限处理装置的运行提供环境,该内存储器中可储存有计算机可读指令,该计算机可读指令被处理器执行时,可使 得处理器执行一种应用程序审核操作权限处理方法。该服务器的网络接口用于据以通过网络进行通信,比如获取授权指令以及接收操作指令等。服务器可以用独立的服务器或者是多个服务器组成的服务器集群来实现。本领域技术人员可以理解,图2中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的服务器的限定,具体的服务器可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
图3为一个实例中可作为第一终端110和第二终端130的终端的内部结构示意图。参照图3,该终端包括通过系统总线连接的处理器、非易失性存储介质、内存储器、网络接口、显示屏和输入装置。其中,终端的非易失性存储介质存储有操作系统,还存储有一种应用程序审核操作权限处理装置,该应用程序审核操作权限处理装置用于实现一种应用程序审核操作权限处理方法。终端的处理器用于提供计算和控制能力,支撑整个终端的运行。终端中的内存储器为非易失性存储介质中的应用程序审核操作权限处理装置的运行提供环境。该内存储器中可存储有计算机可读指令,该计算机可读指令被处理器执行时,可使得处理器执行一种应用程序审核操作权限处理方法。终端的网络接口用于与服务器进行网络通信,如发送授权指令或操作指令等。终端的显示屏可以是液晶显示屏或者电子墨水显示屏,终端的输入装置可以是显示屏上覆盖的触摸层,也可以是终端外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。该终端可以是个人计算机或者移动终端,移动终端包括手机、平板电脑、个人数字助理或者穿戴式设备等中的至少一种。本领域技术人员可以理解,图3中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的终端的限定,具体的终端可以包括比图3中所示更多或更少的部件,或 者组合某些部件,或者具有不同的部件布置。
在一些实例中,在审核应用程序的过程中,需要审核者审核应用程序的各种功能,某些功能需要登录后才能使用,那么就需要开发者提供自己的账号和密码,由审核者利用开发者提供的账号和密码登录该应用程序后进行审核。由于需要开发者主动向审核者暴露自己的账号和密码,存在安全风险。基于此,本申请提供了一种应用程序审核操作权限处理方法、装置和存储介质。
图4为一个实例中应用程序审核操作权限处理方法的流程示意图。本实例以该方法应用于上述图1中的服务器120来举例说明。参照图4,该应用程序审核操作权限处理方法具体包括如下步骤:
S402,获取通过开发者账号触发的针对相应应用程序的授权指令。
其中,开发者账号是权限角色为开发者的账号。开发者账号属于应用程序的开发者。应用程序是需要在其发布前对其进行审核的应用程序。针对应用程序的授权指令,是表示对审核应用程序所需的权限进行授权的指令。通过开发者账号触发的授权指令,表示该授权指令由开发者触发。
具体地,第一终端获取登录所用的开发者账号,并获取应用程序的标识,从而向服务器发送携带有应用程序的标识以及开发者账号的授权指令,由服务器接收该授权指令。服务器在接收到该授权指令后,根据该授权指令所携带的开发者账号确定该授权指令通过开发者账号触发;并根据该授权指令所携带的应用程序的标识确定该授权指令所针对的应用程序;且该开发者账号和该应用程序具有对应关系。
在一个实例中,服务器可提供针对应用程序的审核提交页面,在该审核提交页面中展示包括授权链接的条码。审核提交页面可以是网页形式。第一终端采集到该条码并从中解析出授权链接后,通过开发者账号 访问该授权链接,接收与该授权链接和该开发者账号对应的授权页面并展示。第一终端在检测到针对该授权页面的授权操作后,向服务器发送授权指令。
其中,条码(bar code)是将字符按照预设规则编码得到的可还原出字符的图形,条码可以包括条形码和二维条码(2-dimensional bar code)。条形码是将宽度不等的多个黑条和空白,按照一定的编码规则排列,用以表达一组信息的图形标识符。常见的条形码是由反射率相差很大的黑条(简称条)和白条(简称空)排成的平行线图案。二维条码简称二维码,是指用某种特定的几何图形按一定规律在平面二维方向分布的黑白相间的图形记录数据符号信息的条码。
S404,响应于授权指令,根据开发者账号针对应用程序的权限生成临时登录凭据。
其中,开发者账号针对应用程序的权限,是指开发者账号所具有的对该应用程序进行操作的权限,如访问指定网页、获取指定数据、开启指定功能或者关闭指定功能等。临时登录凭据与开发者账号自身的登录权限相区别,是为配合对应用程序的审核而临时产生的登录凭据。该临时登录凭据可限定在固定的有效期内有效,也可以限定在完成对应用程序的审核后失效。
具体地,服务器在接收到授权指令后作出响应,确定该授权指令所对应的开发者账号以及所针对的应用程序,查询该开发者账号针对该应用程序的权限,从而生成用于对该查询到的权限进行授权的临时登录凭据。服务器还可以为临时登录凭据设置固定有效时长的有效期。有效期可以用临时登录凭据的失效时间点表示,也可以用临时登录凭据的生效时间和有效时长表示。
S406,将临时登录凭据与审核者账号关联。
具体地,服务器可将生成的临时登录凭据与一个或多于一个的审核者账号相关联。在一个实例中,服务器还可以从审核者账号集合中为应用程序分配审核者账号,并将生成的临时登录凭据与该审核者账号关联。其中,临时登录凭据与审核者账号的关联,表示该审核者账号享有该临时登录凭据所具有的权限。服务器还可以将临时登录凭据发送至与审核者账号对应的终端。其中,审核者账号是权限角色为审核者的账号。
S408,接收在以审核者账号登录的终端上运行的应用程序所触发的操作指令。
具体地,第二终端可直接在其操作系统上运行应用程序,该应用程序通过审核者账号登录服务器,该审核者账号所关联的临时登录凭据作为应用程序登录的凭据。应用程序在检测到操作后生成相应的操作指令,并将该操作指令发送至服务器。
在一个实例中,应用程序具体可向服务器发送携带有审核者账号及其所关联的临时登录凭据的操作指令,服务器在接收到该操作指令后,从该操作指令中提取审核者账号和临时登录凭据,将提取的临时登录凭据与服务器上与审核者账号关联的临时登录凭据比较,当两者一致时执行步骤S410。
在一个实例中,第二终端可在其操作系统上运行审核程序,该审核程序通过审核者账号登录到服务器,该审核程序提供环境供应用程序运行。审核者账号与临时登录凭据关联后,应用程序共享审核程序的临时登录凭据。进而,应用程序在检测到操作后生成相应的操作指令,并通过审核程序将操作指令发送至服务器。其中,审核程序是用于审核应用程序的计算机程序。
S410,根据与审核者账号关联的临时登录凭据,对操作指令所指定的操作进行授权。
具体地,服务器在接收到操作指令后,确定触发该操作指令的审核者账号,从而查询该审核者账号所关联的临时登录凭据。若未查询到该审核者账号所关联的临时登录凭据,则拒绝对操作指令所指定的操作进行授权。若查询到该审核者账号所关联的临时登录凭据,且临时登录凭据具有操作指令所指定的操作权限,则对操作指令所指定的操作进行授权。若查询到该审核者账号所关联的临时登录凭据,且临时登录凭据不具有操作指令所指定的操作权限,则拒绝对操作指令所指定的操作进行授权。
上述应用程序审核操作权限处理方法,通过开发者账号的授权,得到针对相应应用程序的临时登录凭据,并将临时登录凭据与审核者账号关联。这样审核者在凭借审核者账号登录后,就可以在应用程序中触发审核所需的操作,该操作将由与审核者账号关联的临时登录凭据进行授权,从而完成对应用程序的审核工作。由于临时登录凭据是在审核时临时分配,且与审核者账号关联发生作用,且其权限针对应用程序,且不需要向审核者暴露开发者账号对应的密码,显著提高了安全性。
在一个实例中,前述应用程序审核操作权限处理方法还包括向以审核者账号登录的终端提供应用程序的步骤,该步骤在步骤S408之前。参照图5,向以审核者账号登录的终端提供应用程序的步骤具体包括如下步骤:
S502,接收以开发者账号登录的开发程序所上传的源代码。
其中,源代码对应于应用程序,用于生成应用程序。源代码是由开发者编写的计算机代码,一般通过高级计算机语言编写。源代码可包括应用程序的逻辑代码、页面结构代码或者页面样式代码等。
在一个实例中,步骤S502包括:接收第一终端通过第一终端上运行的开发程序编辑完成源代码后发送的源代码。
具体地,第一终端可通过其上运行的开发程序生成开发项目,在该开发项目中编辑开发应用程序所需的各种代码,构成源代码。开发程序可提供上传触发控件,第一终端通过开发程序检测到对该上传触发控件的操作时,将开发项目中的代码作为源代码上传至服务器,由服务器接收。
S504,将源代码进行编译得到程序包。
其中,编译是指将高级计算机语言转换成可被执行的目标代码的过程,编译器则是将高级计算机语言转换成可被执行的目标代码的程序。服务器上可运行编译器,服务器通过该编译器对被测代码进行编译得到程序包。程序包可以是安装包的形式,也可以是代码文件的形式。
在一个实例中,服务器具体可在接收到源代码后,检测源代码中是否存在恶意代码;若检测到恶意代码则发出恶意代码消息;若未检测到恶意代码则执行步骤S504。其中恶意代码具体可通过关键词匹配和/或代码逻辑检查得到。
S506,将程序包发送至以审核者账号登录的终端,使得以审核者账号登录的终端在接收到的程序包后,根据程序包得到相应的应用程序。
其中,步骤S502和步骤S504可在步骤S402之前执行,S506可在步骤S406之后执行。具体地,服务器将程序包发送至以审核者账号登录的第二终端,由第二终端接收该程序包,并根据程序包得到相应的应用程序。
在一个实例中,第二终端根据程序包得到相应的应用程序,具体可将程序包解压缩,得到安装启动程序,运行该安装启动程序以将应用程序安装到第二终端上运行的操作系统上。
在一个实例中,第二终端根据程序包得到相应的应用程序,具体可通过第二终端上运行的审核程序将程序包解压缩,得到子应用程序配置 文件;第二终端通过审核程序并根据该子应用程序配置文件,在审核程序提供的子应用程序运行环境中运行应用程序。本实例中,应用程序为审核程序的子应用程序。
本实例中,在源代码上传后进行编译得到程序包,可避免开发者直接编译时在应用程序中添加恶意代码的情形。而且,开发者可直接通过开发程序来提交源代码,提高了应用程序从开发阶段到审核阶段的效率。
在一个实例中,在步骤S506之前,前述应用程序审核操作权限处理方法还包括对应用程序进行测试的步骤。参照图6,对应用程序进行测试的步骤具体包括如下步骤:
S602,记录用于下载程序包的下载地址。
具体地,下载地址可以包括服务器地址、应用程序在服务器上的存储路径以及应用程序的标识。下载地址也可以仅包括应用程序在服务器上的存储路径以及应用程序的标识。下载地址可以表示为URL(Uniform Resource Locator,统一资源定位符)。
S604,生成用于获取下载地址的条码。
生成用于获取下载地址的条码,具体可以是直接将下载地址进行编码得到条码。生成用于获取下载地址的条码,也可以是将用于据以获得该下载地址的中间数据进行编码得到条码。中间数据比如可以是应用程序对应的开发者账号,或者是应用程序的标识。中间数据可以是URL形式。
S606,将条码返回至以开发者账号登录的开发程序并展示,使得移动终端采集条码并据以获取下载地址,根据下载地址下载程序包,以及解析程序包得到应用程序并测试。
具体地,服务器将条码返回至第一终端,第一终端则通过开发程序 显示该条码。移动终端可以采集由第一终端上运行的开发程序所显示的条码,根据下载地址下载该程序包,解析该程序包得到应用程序,从而由移动终端对该应用程序进行测试。
进一步地,移动终端对运行的应用程序进行测试,具体可获取针对应用程序的测试指令,由应用程序对测试指令进行响应。测试指令是用于测试应用程序的指令,可由用户触发,也可以通过执行自动化测试用例触发。移动终端还可以将应用程序对测试指令的响应进行统计分析,得到测试报告。
本实例中,当需要测试时,将开发程序上传的源代码编译为程序包后,通过条码传递下载地址,使得移动终端可以高效地下载程序包并获得相应的应用程序,进而对该应用程序进行测试。对于移动终端的用户来说,仅需要通过移动终端采集条码就可以进行应用程序的测试,操作简便,提高了应用程序测试效率。
在一个实例中,前述应用程序审核操作权限处理方法还包括将开发组织所开发的应用程序发送到与审核者账号对应的终端的步骤。参照图7,将开发组织所开发的应用程序发送到与审核者账号对应的终端的步骤具体包括如下步骤:
S702,获取通过对应于相同开发组织标识的多个开发者账号分别生成的程序包。
其中,开发组织标识是唯一标识相应的开发组织的字符串。开发组织是包括多个开发者且多个开发者协作开发应用程序的组织,一个开发组织如一个公司或者一个研发部门。对应于相同开发组织标识的多个开发者账号,表示隶属于相同开发组织的多个开发者。
具体地,每个开发者可分别通过开发程序并以自身的开发者账号登录到服务器,并分别通过开发程序上传源代码,由服务器将源代码编译 为程序包。在一个实例中,服务器也可以直接接收对应于相同开发组织标识的多个开发者账号分别上传的程序包。
S704,获取通过对应于开发组织标识且具有管理员权限的开发者账号触发的程序包选择指令。
其中,具有管理员权限的开发者账号是具有对相应开发组织内的开发工作进行管理的账号,其可以是步骤S702中对应于相同开发组织标识的多个开发者账号中的一个开发者账号,也可以是不同于步骤S702中对应于相同开发组织标识的多个开发者账号的开发者账号。
具体地,第一终端可通过对应于开发组织标识且具有管理员权限的开发者账号登录服务器,服务器可向第一终端提供审核提交页面并由第一终端显示,该审核提交页面包括通过对应于相同开发组织标识的多个开发者账号分别生成的程序包所构成的列表。第一终端检测针审核提交页面中列表的选择操作,进而根据选择操作触发对应于列表中一个或多于一个程序包的选择指令,将该选择指令发送至服务器。
S706,根据程序包选择指令从生成的程序包中选中程序包。
具体地,服务器在获取到选择指令后,将该选择指令所指定的程序包作为选中的程序包。
S708,将选中的程序包发送至与审核者账号对应的终端,使得与审核者账号对应的终端解析接收到的程序包,得到相应的应用程序。
具体地,第二终端解析接收到的程序包,得到相应的应用程序,具体可将程序包解压缩,得到安装启动程序,运行该安装启动程序以将应用程序安装到第二终端上运行的操作系统上。
在一个实例中,第二终端解析接收到的程序包,得到相应的应用程序,具体可通过第二终端上运行的审核程序将程序包解压缩,得到子应用程序配置文件;第二终端通过审核程序并根据该子应用程序配置文 件,在审核程序提供的子应用程序运行环境中运行应用程序。本实例中,应用程序为审核程序的子应用程序。
本实例中,在包括多个开发者的开发组织内,每个开发者均可以使用自身的开发者账号来开发相同或者不同的应用程序,并通过具有管理员权限的开发者账号提交到审核者进行审核,保证了多人开发时将应用程序提交审核的安全性。
在一个实例中,保证S408包括:接收在以审核者账号登录的终端的操作系统上运行的审核程序发送的操作指令,操作指令由应用程序触发并通过审核程序发送,应用程序运行于由审核程序所提供的子应用程序运行环境中。
其中,审核程序是用于对应用程序进行审核的程序,通过审核者账号登录到服务器。子应用程序运行环境是适于子应用程序运行的环境。应用程序运行于由审核程序所提供的子应用程序运行环境,该审核程序为该子应用程序的母应用程序。审核程序还可以模拟不同型号终端的硬件环境,从而在该硬件环境中提供子应用程序运行环境。应用程序在审核通过并发布后,可运行于非审核程序的母应用程序中。
参照图8,第二终端上运行操作系统,并在操作系统上运行审核程序,审核程序提供子应用程序运行环境,创建用于实现子应用程序的子应用程序逻辑层单元和相应的子应用程序视图层单元。子应用程序逻辑层单元可用于执行程序包中的逻辑代码;子应用程序视图层单元用于执行程序包中的页面结构代码,还可以执行程序包中的页面样式代码。
操作系统(Operating System,简称OS)是管理和控制终端硬件与软件资源的计算机程序,是直接运行在终端裸机上的最基本的系统软件,应用程序需要在操作系统的支持下运行。操作系统可以是视窗(Windows)操作系统或Linux操作系统或者Mac OS(苹果桌面操作系 统)等桌面操作系统,也可以是iOS(苹果移动终端操作系统)或者安卓(Android)操作系统等移动操作系统。
母应用程序是承载子应用程序的应用程序,为子应用程序的实现提供环境。母应用程序是原生应用程序。原生应用程序是可直接运行于操作系统的应用程序。母应用程序可以是社交应用程序、专门支持子应用程序的专用应用程序、文件管理应用程序、邮件应用程序或者游戏应用程序等。社交应用程序包括即时通信应用、SNS(Social Network Service,社交网站)应用或者直播应用等。子应用程序则是可在母应用程序提供的环境中实现的应用程序。子应用程序具体可以是社交应用程序、文件管理应用程序、邮件应用程序或者游戏应用程序等。
子应用程序逻辑层单元和相应的子应用程序视图层单元用于实现子应用程序实例。一个子应用程序可由一个子应用程序逻辑层单元以及至少一个子应用程序视图层单元实现。子应用程序视图层单元和子应用程序页面可以是一一对应关系。
子应用程序视图层单元用于组织子应用程序的视图并渲染。子应用程序逻辑层单元用于处理子应用程序及相应的子应用程序页面的数据处理逻辑。单元具体可以是进程或者线程,子应用程序视图层单元如子应用程序视图层线程,子应用程序逻辑层单元如子应用程序逻辑层线程。子应用程序逻辑层单元可运行于虚拟机中。子应用程序视图层单元和子应用程序逻辑层单元可通过母应用程序原生单元中转通信,母应用程序原生单元是母应用程序与子应用程序通信的接口,母应用程序原生单元可以是母应用程序自身的线程或进程。各子应用程序页面的逻辑代码,可由子应用程序逻辑层单元在启动时进行注册。
第二终端可通过子应用程序视图层单元并根据相应子应用程序页面的初始页面数据渲染页面,并向子应用程序逻辑层单元反馈初始渲染 完成通知。第二终端通过子应用程序逻辑层单元接收到初始渲染完成通知后,获取页面更新数据,将页面更新数据发送至子应用程序视图层单元。第二终端通过子应用程序视图层单元并根据页面更新数据重渲染页面中更新的部分。
在一个实例中,子应用程序视图层单元可在启动时预加载公共资源,从而在接收到页面的初始页面数据后,根据渲染页面所需的公共资源和页面的初始页面数据渲染页面,并向子应用程序逻辑层单元反馈初始渲染完成通知。其中,公共资源是指生成不同的子应用程序页面所共用的资源,如渲染引擎、公共的页面结构代码或者公共的样式数据。
页面更新数据是用于将页面进行更新渲染的数据。终端可通过子应用程序逻辑层单元并根据页面的逻辑代码中定义的自动执行代码,自动生成页面更新数据。终端也可以通过子应用程序逻辑层单元在接收到子应用程序视图层单元发送的事件后,根据页面的逻辑代码对该事件进行响应以生成相应的页面更新数据。
更新的部分是页面中需要变化的部分,可以是相较于根据初始页面数据渲染得到的页面变化的部分,也可以是相较于前一次渲染的页面变化的部分。具体地,终端可通过子应用程序视图层单元并基于根据初始页面数据渲染得到的页面进行重渲染,也可以基于前一次渲染的页面进行重渲染。
在一个实例中,子应用程序的页面可根据由母应用程序提供的公共组件和页面的初始页面数据进行渲染。其中,公共组件是母应用程序所提供的可供不同的子应用程序共用的组件,具有视觉形态,是子应用程序页面的组成单元。公共组件可通过相应的公共组件标识唯一标识。不同的子应用程序共用公共组件,具体可以是同时或者在不同时刻调用相同的公共组件。公共组件还可由母应用程序和子应用程序所共用。
上述实例中,操作系统上运行审核程序,审核程序为应用程序提供子应用程序运行环境,应用程序作为审核程序的子应用程序运行于该应用程序运行环境。这样节省了安装应用程序的时间消耗,无论在审核时还是发布后的使用中,都可以提高子应用程序的使用效率。
图9为另一个实例中应用程序审核操作权限处理方法的流程示意图。本实例以该方法应用于上述图1中的第二终端130来举例说明。参照图9,该应用程序审核操作权限处理方法包括如下步骤:
S902,根据审核者账号登录审核程序。
具体地,第二终端可通过审核程序并根据审核者账号登录到服务器。其中,审核程序是用于审核应用程序的计算机程序。第二终端也可以通过应用程序并根据审核者账号登录到服务器。
S904,通过审核程序获取本地运行的应用程序所触发的操作指令。
具体地,第二终端可直接在其操作系统上运行应用程序,该应用程序通过审核者账号登录服务器,该审核者账号所关联的临时登录凭据作为应用程序登录的凭据。应用程序在检测到操作后生成相应的操作指令,并将该操作指令发送至服务器。
在一个实例中,应用程序具体可向服务器发送携带有审核者账号及其所关联的临时登录凭据的操作指令,服务器在接收到该操作指令后,从该操作指令中提取审核者账号和临时登录凭据,将提取的临时登录凭据与服务器上与审核者账号关联的临时登录凭据比较,当两者一致时执行步骤S410。
在一个实例中,第二终端可在其操作系统上运行审核程序,该审核程序通过审核者账号登录到服务器,该审核程序提供环境供应用程序运行。审核者账号与临时登录凭据关联后,应用程序共享审核程序的临时 登录凭据。进而,应用程序在检测到操作后生成相应的操作指令,并通过审核程序将操作指令发送至服务器。
S906,将操作指令发送至服务器,使得服务器根据与审核者账号关联的临时登录凭据对操作指令所指定的操作进行授权;临时登录凭据在由与应用程序相应的开发者账号进行授权后,根据开发者账号针对应用程序的权限生成。
具体地,服务器在接收到操作指令后,确定触发该操作指令的审核者账号,从而查询该审核者账号所关联的临时登录凭据。若未查询到该审核者账号所关联的临时登录凭据,则拒绝对操作指令所指定的操作进行授权。若查询到该审核者账号所关联的临时登录凭据,且临时登录凭据具有操作指令所指定的操作权限,则对操作指令所指定的操作进行授权。若查询到该审核者账号所关联的临时登录凭据,且临时登录凭据不具有操作指令所指定的操作权限,则拒绝对操作指令所指定的操作进行授权。本实例中服务器所执行的步骤可以参照上述适用于服务器的各个实例的应用程序审核操作权限处理方法。
上述应用程序审核操作权限处理方法,通过开发者账号的授权,得到针对相应应用程序的临时登录凭据,并将临时登录凭据与审核者账号关联。这样审核者在凭借审核者账号登录后,就可以在应用程序中触发审核所需的操作,该操作将由与审核者账号关联的临时登录凭据进行授权,从而完成对应用程序的审核工作。由于临时登录凭据是在审核时临时分配,且与审核者账号关联发生作用,且其权限针对应用程序,且不需要向审核者暴露开发者账号对应的密码,显著提高了安全性。
在一个实例中,步骤S904之前,该应用程序审核操作权限处理方法还包括:获取服务器上的程序包,程序包由通过开发者账号上传至服务器的源代码进行编译获得;解析程序包,得到相应的应用程序。
具体地,服务器接收以开发者账号登录的开发程序在测试应用程序时所上传的源代码;将源代码进行编译得到程序包;将程序包发送至以审核者账号登录的终端,使得以审核者账号登录的终端在接收到的程序包后,根据程序包得到相应的应用程序。
其中,源代码对应于应用程序,用于生成应用程序。源代码是由开发者编写的计算机代码,一般通过高级计算机语言编写。源代码可包括应用程序的逻辑代码、页面结构代码或者页面样式代码等。
本实例中,在源代码上传后进行编译得到程序包,可避免开发者直接编译时在应用程序中添加恶意代码的情形。而且,开发者可直接通过开发程序来提交源代码,提高了应用程序从开发阶段到审核阶段的效率。
在一个实例中,审核程序运行于操作系统上;步骤S904包括:在审核程序所提供的子应用程序运行环境中运行应用程序;获取应用程序所触发的操作指令。
本实例中,操作系统上运行审核程序,审核程序为应用程序提供子应用程序运行环境,应用程序作为审核程序的子应用程序运行于该应用程序运行环境。这样节省了安装应用程序的时间消耗,无论在审核时还是发布后的使用中,都可以提高子应用程序的使用效率。
图10为一个实例中应用程序审核操作权限处理装置1000的结构框图。参照图10,应用程序审核操作权限处理装置1000包括:
开发者授权模块1010,用于获取通过开发者账号触发的针对相应应用程序的授权指令。
临时登录凭据生成模块1020,用于响应于授权指令,根据开发者账号针对应用程序的权限生成临时登录凭据。
审核者账号权限管理模块1030,用于将临时登录凭据与审核者账号关联。
审核操作管理模块1040,用于接收在以审核者账号登录的终端上运行的应用程序所触发的操作指令;根据与审核者账号关联的临时登录凭据,对操作指令所指定的操作进行授权。
图11为另一个实例中应用程序审核操作权限处理装置1000的结构框图。参照图11,应用程序审核操作权限处理装置1000还包括:编译模块1050和程序包管理模块1060。
编译模块1050,用于接收以开发者账号登录的开发程序所上传的源代码;将源代码进行编译得到程序包。
程序包管理模块1060,用于将程序包发送至以审核者账号登录的终端,使得以审核者账号登录的终端在接收到的程序包后,根据程序包得到相应的应用程序。
在一个实例中,编译模块1050还用于接收以开发者账号登录的开发程序所上传的源代码。应用程序审核操作权限处理装置1000还包括:下载地址记录模块1070和条码管理模块1080。
下载地址记录模块1070,用于记录用于下载程序包的下载地址。
条码管理模块1080,用于生成用于获取下载地址的条码;将条码返回至以开发者账号登录的开发程序并展示,使得移动终端采集条码并据以获取下载地址,根据下载地址下载程序包,以及解析程序包得到应用程序并测试。
在一个实例中,程序包管理模块1060用于获取通过对应于相同开发组织标识的多个开发者账号分别生成的程序包;获取通过对应于开发组织标识且具有管理员权限的开发者账号触发的程序包选择指令;根据程序包选择指令从生成的程序包中选中程序包;将选中的程序包发送至 与审核者账号对应的终端,使得与审核者账号对应的终端解析接收到的程序包,得到相应的应用程序。
在一个实例中,审核操作管理模块1040还用于接收在以审核者账号登录的终端的操作系统上运行的审核程序发送的操作指令,操作指令由应用程序触发并通过审核程序发送,应用程序运行于由审核程序所提供的子应用程序运行环境中。
上述应用程序审核操作权限处理装置1000,通过开发者账号的授权,得到针对相应应用程序的临时登录凭据,并将临时登录凭据与审核者账号关联。这样审核者在凭借审核者账号登录后,就可以在应用程序中触发审核所需的操作,该操作将由与审核者账号关联的临时登录凭据进行授权,从而完成对应用程序的审核工作。由于临时登录凭据是在审核时临时分配,且与审核者账号关联发生作用,且其权限针对应用程序,且不需要向审核者暴露开发者账号对应的密码,显著提高了安全性。
图12为另一个实例中应用程序审核操作权限处理装置1200的结构框图。参照图12,应用程序审核操作权限处理装置1200包括:
登录模块1210,用于根据审核者账号登录审核程序;
操作指令获取模块1220,用于通过审核程序获取本地运行的应用程序所触发的操作指令;
操作指发送模块1230,用于将操作指令发送至服务器,使得服务器根据与审核者账号关联的临时登录凭据对操作指令所指定的操作进行授权;临时登录凭据在由与应用程序相应的开发者账号进行授权后,根据开发者账号针对应用程序的权限生成。
图13为再一个实例中应用程序审核操作权限处理装置1200的结构框图。参照图13,应用程序审核操作权限处理装置1200还包括应用程 序获取模块1240,用于获取服务器上的程序包;程序包由通过开发者账号上传至服务器的源代码进行编译获得;解析程序包,得到相应的应用程序。
在一个实例中,审核程序运行于操作系统上;操作指令获取模块1220还用于在审核程序所提供的子应用程序运行环境中运行应用程序;获取应用程序所触发的操作指令。
上述应用程序审核操作权限处理装置1200,通过开发者账号的授权,得到针对相应应用程序的临时登录凭据,并将临时登录凭据与审核者账号关联。这样审核者在凭借审核者账号登录后,就可以在应用程序中触发审核所需的操作,该操作将由与审核者账号关联的临时登录凭据进行授权,从而完成对应用程序的审核工作。由于临时登录凭据是在审核时临时分配,且与审核者账号关联发生作用,且其权限针对应用程序,且不需要向审核者暴露开发者账号对应的密码,显著提高了安全性。
本领域普通技术人员可以理解实现上述实例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,该计算机程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实例的流程。其中,前述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random Access Memory,RAM)等。
以上实例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上实例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对 于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。

Claims (25)

  1. 一种应用程序审核操作权限处理方法,包括:
    获取通过开发者账号触发的针对相应应用程序的授权指令;
    响应于所述授权指令,根据所述开发者账号针对所述应用程序的权限生成临时登录凭据;
    将所述临时登录凭据与审核者账号关联;
    接收在以所述审核者账号登录的终端上运行的所述应用程序所触发的操作指令;
    根据与所述审核者账号关联的所述临时登录凭据,对所述操作指令所指定的操作进行授权。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    接收以开发者账号登录的开发程序所上传的源代码;
    将所述源代码进行编译得到程序包;
    将所述程序包发送至以审核者账号登录的终端,使得所述以审核者账号登录的终端在接收到的所述程序包后,根据所述程序包得到相应的应用程序。
  3. 根据权利要求2所述的方法,其中,所述将所述程序包发送至以审核者账号登录的终端之前,所述方法还包括:
    记录用于下载所述程序包的下载地址;
    生成用于获取所述下载地址的条码;
    将所述条码返回至以开发者账号登录的开发程序并展示,使得移动终端采集所述条码并据以获取所述下载地址,根据所述下载地址下载所述程序包,以及解析所述程序包得到应用程序并测试。
  4. 根据权利要求1所述的方法,其中,所述方法还包括:
    获取通过对应于相同开发组织标识的多个开发者账号分别生成的程序包;
    获取通过对应于所述开发组织标识且具有管理员权限的开发者账号触发的程序包选择指令;
    根据所述程序包选择指令从所述生成的程序包中选中程序包;
    将选中的程序包发送至与审核者账号对应的终端,使得所述与审核者账号对应的终端解析接收到的程序包,得到相应的应用程序。
  5. 根据权利要求1所述的方法,其中,所述接收在以所述审核者账号登录的终端上运行的所述应用程序所触发的操作指令包括:
    接收在以所述审核者账号登录的终端的操作系统上运行的审核程序发送的操作指令,所述操作指令由所述应用程序触发并通过所述审核程序发送,所述应用程序运行于由所述审核程序所提供的子应用程序运行环境中。
  6. 一种应用程序审核操作权限处理方法,包括:
    根据审核者账号登录审核程序;
    通过所述审核程序获取本地运行的应用程序所触发的操作指令;
    将所述操作指令发送至服务器,使得所述服务器根据与所述审核者账号关联的临时登录凭据对所述操作指令所指定的操作进行授权;所述临时登录凭据在由与所述应用程序相应的开发者账号进行授权后,根据所述开发者账号针对所述应用程序的权限生成。
  7. 根据权利要求6所述的方法,其中,所述通过所述审核程序获取本地运行的应用程序所触发的操作指令的步骤之前,所述方法还包括:
    获取所述服务器上的程序包;所述程序包由通过开发者账号上传至 所述服务器的源代码进行编译获得;
    解析所述程序包,得到相应的应用程序。
  8. 根据权利要求6所述的方法,其中,所述审核程序运行于操作系统上;所述通过所述审核程序获取本地运行的应用程序所触发的操作指令包括:
    在所述审核程序所提供的子应用程序运行环境中运行应用程序;
    获取所述应用程序所触发的操作指令。
  9. 一种应用程序审核操作权限处理方法,应用于服务器,所述服务器包括:处理器和存储器,所述处理器执行所述存储器中存储的机器可读存储指令,可以使所述处理器执行以下操作:
    获取通过开发者账号触发的针对相应应用程序的授权指令;
    响应于所述授权指令,根据所述开发者账号针对所述应用程序的权限生成临时登录凭据;
    将所述临时登录凭据与审核者账号关联;
    接收在以所述审核者账号登录的终端上运行的所述应用程序所触发的操作指令;
    根据与所述审核者账号关联的所述临时登录凭据,对所述操作指令所指定的操作进行授权。
  10. 根据权利要求9所述的方法,其中,所述计算机可读指令可以使所述处理器执行以下操作:
    接收以开发者账号登录的开发程序所上传的源代码;
    将所述源代码进行编译得到程序包;
    将所述程序包发送至以审核者账号登录的终端,使得所述以审核者账号登录的终端在接收到的所述程序包后,根据所述程序包得到相应的 应用程序。
  11. 根据权利要求10所述的方法,其中,所述将所述程序包发送至以审核者账号登录的终端之前,所述计算机可读指令可以使所述处理器执行以下操作:
    记录用于下载所述程序包的下载地址;
    生成用于获取所述下载地址的条码;
    将所述条码返回至以开发者账号登录的开发程序并展示,使得移动终端采集所述条码并据以获取所述下载地址,根据所述下载地址下载所述程序包,以及解析所述程序包得到应用程序并测试。
  12. 根据权利要求9所述的方法,其中,所述计算机可读指令可以使所述处理器执行以下操作:
    获取通过对应于相同开发组织标识的多个开发者账号分别生成的程序包;
    获取通过对应于所述开发组织标识且具有管理员权限的开发者账号触发的程序包选择指令;
    根据所述程序包选择指令从所述生成的程序包中选中程序包;
    将选中的程序包发送至与审核者账号对应的终端,使得所述与审核者账号对应的终端解析接收到的程序包,得到相应的应用程序。
  13. 根据权利要求9所述的方法,其中,所述计算机可读指令可以使所述处理器执行以下操作:
    接收在以所述审核者账号登录的终端的操作系统上运行的审核程序发送的操作指令,所述操作指令由所述应用程序触发并通过所述审核程序发送,所述应用程序运行于由所述审核程序所提供的子应用程序运行环境中。
  14. 一种应用程序审核操作权限处理方法,应用于终端,所述终端包括:处理器和存储器,所述处理器执行所述存储器中存储的机器可读存储指令,可以使所述处理器执行以下操作:
    根据审核者账号登录审核程序;
    通过所述审核程序获取本地运行的应用程序所触发的操作指令;
    将所述操作指令发送至服务器,使得所述服务器根据与所述审核者账号关联的临时登录凭据对所述操作指令所指定的操作进行授权;所述临时登录凭据在由与所述应用程序相应的开发者账号进行授权后,根据所述开发者账号针对所述应用程序的权限生成。
  15. 根据权利要求14所述的方法,其中,所述通过所述审核程序获取本地运行的应用程序所触发的操作指令的步骤之前,所述计算机可读指令可以使所述处理器执行以下操作:
    获取所述服务器上的程序包;所述程序包由通过开发者账号上传至所述服务器的源代码进行编译获得;
    解析所述程序包,得到相应的应用程序。
  16. 根据权利要求14所述的方法,其中,所述审核程序运行于操作系统上;所述计算机可读指令可以使所述处理器执行以下操作:
    在所述审核程序所提供的子应用程序运行环境中运行应用程序;
    获取所述应用程序所触发的操作指令。
  17. 一种应用程序审核操作权限处理装置,其中,所述装置包括:
    一个或一个以上存储器;
    一个或一个以上处理器;
    所述一个或一个以上存储器存储有一个或者一个以上指令模块,经 配置由所述一个或者一个以上处理器执行;其中,
    所述一个或者一个以上指令模块包括:
    开发者授权模块,用于获取通过开发者账号触发的针对相应应用程序的授权指令;
    临时登录凭据生成模块,用于响应于所述授权指令,根据所述开发者账号针对所述应用程序的权限生成临时登录凭据;
    审核者账号权限管理模块,用于将所述临时登录凭据与审核者账号关联;
    审核操作管理模块,用于接收在以所述审核者账号登录的终端上运行的所述应用程序所触发的操作指令;根据与所述审核者账号关联的所述临时登录凭据,对所述操作指令所指定的操作进行授权。
  18. 根据权利要求17所述的装置,其中,所述一个或者一个以上指令模块还包括:
    编译模块,用于接收以开发者账号登录的开发程序所上传的源代码;将所述源代码进行编译得到程序包;
    程序包管理模块,用于将所述程序包发送至以审核者账号登录的终端,使得所述以审核者账号登录的终端在接收到的所述程序包后,根据所述程序包得到相应的应用程序。
  19. 根据权利要求18所述的装置,其中,所述一个或者一个以上指令模块还包括:
    下载地址记录模块,用于记录用于下载所述程序包的下载地址;
    条码管理模块,用于生成用于获取所述下载地址的条码;将所述条码返回至以开发者账号登录的开发程序并展示,使得移动终端采集所述条码并据以获取所述下载地址,根据所述下载地址下载所述程序包,以及解析所述程序包得到应用程序并测试。
  20. 根据权利要求17所述的装置,其中,所述一个或者一个以上指令模块还包括:
    程序包管理模块,用于获取通过对应于相同开发组织标识的多个开发者账号分别生成的程序包;获取通过对应于所述开发组织标识且具有管理员权限的开发者账号触发的程序包选择指令;根据所述程序包选择指令从所述生成的程序包中选中程序包;将选中的程序包发送至与审核者账号对应的终端,使得所述与审核者账号对应的终端解析接收到的程序包,得到相应的应用程序。
  21. 根据权利要求17所述的装置,其中,所述审核操作管理模块还用于接收在以所述审核者账号登录的终端的操作系统上运行的审核程序发送的操作指令,所述操作指令由所述应用程序触发并通过所述审核程序发送,所述应用程序运行于由所述审核程序所提供的子应用程序运行环境中。
  22. 一种应用程序审核操作权限处理装置,其中,所述装置包括:
    一个或一个以上存储器;
    一个或一个以上处理器;
    所述一个或一个以上存储器存储有一个或者一个以上指令模块,经配置由所述一个或者一个以上处理器执行;其中,
    所述一个或者一个以上指令模块包括:
    登录模块,用于根据审核者账号登录审核程序;
    操作指令获取模块,用于通过所述审核程序获取本地运行的应用程序所触发的操作指令;
    操作指发送模块,用于将所述操作指令发送至服务器,使得所述服务器根据与所述审核者账号关联的临时登录凭据对所述操作指令所指 定的操作进行授权;所述临时登录凭据在由与所述应用程序相应的开发者账号进行授权后,根据所述开发者账号针对所述应用程序的权限生成。
  23. 根据权利要求22所述的装置,其中,所述一个或者一个以上指令模块还包括:
    应用程序获取模块,用于获取所述服务器上的程序包;所述程序包由通过开发者账号上传至所述服务器的源代码进行编译获得;解析所述程序包,得到相应的应用程序。
  24. 根据权利要求22所述的装置,其中,所述审核程序运行于操作系统上;所述操作指令获取模块还用于在所述审核程序所提供的子应用程序运行环境中运行应用程序;获取所述应用程序所触发的操作指令。
  25. 一种非易失性计算机可读存储介质,存储有计算机可读指令,可以使至少一个处理器执行如权利要求1至16任一项所述的方法。
PCT/CN2017/116446 2016-12-22 2017-12-15 应用程序审核操作权限处理方法、装置和存储介质 WO2018113596A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611199805.9 2016-12-22
CN201611199805.9A CN106709288B (zh) 2016-12-22 2016-12-22 应用程序审核操作权限处理方法和装置

Publications (1)

Publication Number Publication Date
WO2018113596A1 true WO2018113596A1 (zh) 2018-06-28

Family

ID=58902987

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/116446 WO2018113596A1 (zh) 2016-12-22 2017-12-15 应用程序审核操作权限处理方法、装置和存储介质

Country Status (2)

Country Link
CN (1) CN106709288B (zh)
WO (1) WO2018113596A1 (zh)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309592A (zh) * 2020-01-14 2020-06-19 浙江省北大信息技术高等研究院 一种权限检查方法、装置、存储介质及终端
CN111752587A (zh) * 2020-06-28 2020-10-09 北京百度网讯科技有限公司 小程序的批量处理方法、装置、电子设备以及可读存储介质
CN111787030A (zh) * 2020-07-31 2020-10-16 腾讯科技(深圳)有限公司 网络安全巡检方法、装置、设备及存储介质
CN112001691A (zh) * 2020-07-01 2020-11-27 北京车行一六八信息技术有限公司 页面审核方法、装置、计算机设备和存储介质
CN112468654A (zh) * 2020-12-13 2021-03-09 胡振刚 电子设备使用限制处理方法和装置
CN112947945A (zh) * 2021-02-01 2021-06-11 南方电网数字电网研究院有限公司 一种多类型应用发布方法、装置、计算机设备和存储介质
CN113283730A (zh) * 2021-05-17 2021-08-20 鲁班(北京)电子商务科技有限公司 一种通用的审批流程应用方法及装置
US12014170B2 (en) 2020-06-28 2024-06-18 Beijing Baidu Netcom Science And Technology Co., Ltd. Mini program batch processing method and apparatus, electronic device, and readable storage medium

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709288B (zh) * 2016-12-22 2018-07-24 腾讯科技(深圳)有限公司 应用程序审核操作权限处理方法和装置
CN109101225B (zh) * 2017-06-20 2021-08-06 腾讯科技(深圳)有限公司 组件构造方法及装置、组件库架构及计算机可读存储介质
CN108363912B (zh) * 2018-02-28 2021-04-13 苏州国芯科技股份有限公司 一种程序代码的密保方法及装置
CN108768928B (zh) * 2018-04-04 2021-04-13 厦门集微科技有限公司 一种信息获取方法、终端及服务器
CN108965105B (zh) * 2018-06-11 2021-02-26 山东华软金盾软件股份有限公司 一种审计tim聊天内容的方法
CN109033769B (zh) * 2018-06-29 2022-06-10 蔚来(安徽)控股有限公司 基于交互、服务器、车机的车辆出厂检测方法及其装置
CN109165156B (zh) * 2018-07-10 2021-10-29 万达百汇科技(深圳)有限公司 一种条码测试方法、装置及终端设备
CN110210207A (zh) * 2019-05-30 2019-09-06 中国联合网络通信集团有限公司 授权方法及设备
CN110333868B (zh) * 2019-06-12 2023-12-19 创新先进技术有限公司 用于生成子应用的安装包的方法和系统
CN110457890A (zh) * 2019-07-15 2019-11-15 中国平安人寿保险股份有限公司 基于多系统的权限管理方法及装置、电子设备及存储介质
JP7423954B2 (ja) * 2019-09-20 2024-01-30 富士フイルムビジネスイノベーション株式会社 情報処理装置、情報処理システム及びプログラム
WO2022160081A1 (zh) * 2021-01-26 2022-08-04 苏州思萃人工智能研究所有限公司 手机应用程序授权控制方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957899A (zh) * 2010-09-17 2011-01-26 百度在线网络技术(北京)有限公司 一种在线应用平台及其控制方法
CN102035653A (zh) * 2010-11-30 2011-04-27 中国联合网络通信集团有限公司 软件审核阶段的可控分发方法及系统
US20120072905A1 (en) * 2009-05-29 2012-03-22 Oracle America, Inc. Java store
CN102710753A (zh) * 2012-05-15 2012-10-03 华为技术有限公司 一种互联网应用的发布方法、装置及系统
CN104754030A (zh) * 2015-02-12 2015-07-01 腾讯科技(深圳)有限公司 用户信息获取方法及装置
US20150271200A1 (en) * 2014-03-20 2015-09-24 Microsoft Corporation Techniques to provide network security through just-in-time provisioned accounts
CN106709288A (zh) * 2016-12-22 2017-05-24 腾讯科技(深圳)有限公司 应用程序审核操作权限处理方法和装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562621B (zh) * 2009-05-25 2013-05-22 阿里巴巴集团控股有限公司 一种用户授权的方法、系统和装置
CN103179176B (zh) * 2011-12-26 2016-01-20 中国移动通信集团公司 在云/集群环境下web应用的调用方法、装置和系统
CN105376203B (zh) * 2014-08-26 2019-11-05 阿里巴巴集团控股有限公司 交互信息的处理方法、装置及系统
CN104618369A (zh) * 2015-01-27 2015-05-13 广州市戴为智能科技有限公司 一种基于OAuth的物联网设备唯一授权方法、装置及系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120072905A1 (en) * 2009-05-29 2012-03-22 Oracle America, Inc. Java store
CN101957899A (zh) * 2010-09-17 2011-01-26 百度在线网络技术(北京)有限公司 一种在线应用平台及其控制方法
CN102035653A (zh) * 2010-11-30 2011-04-27 中国联合网络通信集团有限公司 软件审核阶段的可控分发方法及系统
CN102710753A (zh) * 2012-05-15 2012-10-03 华为技术有限公司 一种互联网应用的发布方法、装置及系统
US20150271200A1 (en) * 2014-03-20 2015-09-24 Microsoft Corporation Techniques to provide network security through just-in-time provisioned accounts
CN104754030A (zh) * 2015-02-12 2015-07-01 腾讯科技(深圳)有限公司 用户信息获取方法及装置
CN106709288A (zh) * 2016-12-22 2017-05-24 腾讯科技(深圳)有限公司 应用程序审核操作权限处理方法和装置

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111309592B (zh) * 2020-01-14 2023-09-19 杭州未名信科科技有限公司 一种权限检查方法、装置、存储介质及终端
CN111309592A (zh) * 2020-01-14 2020-06-19 浙江省北大信息技术高等研究院 一种权限检查方法、装置、存储介质及终端
CN111752587A (zh) * 2020-06-28 2020-10-09 北京百度网讯科技有限公司 小程序的批量处理方法、装置、电子设备以及可读存储介质
US12014170B2 (en) 2020-06-28 2024-06-18 Beijing Baidu Netcom Science And Technology Co., Ltd. Mini program batch processing method and apparatus, electronic device, and readable storage medium
CN111752587B (zh) * 2020-06-28 2024-05-10 北京百度网讯科技有限公司 小程序的批量处理方法、装置、电子设备以及可读存储介质
CN112001691A (zh) * 2020-07-01 2020-11-27 北京车行一六八信息技术有限公司 页面审核方法、装置、计算机设备和存储介质
CN111787030B (zh) * 2020-07-31 2024-01-05 腾讯科技(深圳)有限公司 网络安全巡检方法、装置、设备及存储介质
CN111787030A (zh) * 2020-07-31 2020-10-16 腾讯科技(深圳)有限公司 网络安全巡检方法、装置、设备及存储介质
CN112468654A (zh) * 2020-12-13 2021-03-09 胡振刚 电子设备使用限制处理方法和装置
CN112468654B (zh) * 2020-12-13 2022-03-08 胡振刚 电子设备使用限制处理方法和装置
CN112947945B (zh) * 2021-02-01 2023-10-20 南方电网数字平台科技(广东)有限公司 一种多类型应用发布方法、装置、计算机设备和存储介质
CN112947945A (zh) * 2021-02-01 2021-06-11 南方电网数字电网研究院有限公司 一种多类型应用发布方法、装置、计算机设备和存储介质
CN113283730A (zh) * 2021-05-17 2021-08-20 鲁班(北京)电子商务科技有限公司 一种通用的审批流程应用方法及装置

Also Published As

Publication number Publication date
CN106709288A (zh) 2017-05-24
CN106709288B (zh) 2018-07-24

Similar Documents

Publication Publication Date Title
WO2018113596A1 (zh) 应用程序审核操作权限处理方法、装置和存储介质
US11216256B2 (en) Determining based on static compiler analysis that execution of compiler code would result in unacceptable program behavior
CN105940654B (zh) 特权静态被托管的web应用
US10069832B2 (en) Ephemeral applications
US11068583B2 (en) Management of login information affected by a data breach
US11281763B2 (en) Integrated development environment information sharing for authentication provisioning
US9934310B2 (en) Determining repeat website users via browser uniqueness tracking
CN111695156A (zh) 业务平台的访问方法、装置、设备及存储介质
US10698797B2 (en) Mobile application program testing method, server, terminal, and storage medium
US9330198B1 (en) Mapping stored client data to requested data using metadata
US11461470B2 (en) System and method for providing an application programming interface (API) based on performance and security
US20220334959A1 (en) Method and apparatus for generating software test reports
US20210073676A1 (en) Model improvement support system
US11748238B2 (en) Model-based biased random system test through rest API
US20160261715A1 (en) System and method for securing a web server
US11928051B2 (en) Test space sampling for model-based biased random system test through rest API
CN112015715A (zh) 工业互联网数据管理服务测试方法及系统
CN111625465B (zh) 程序生成方法、装置、系统和电子设备
CN114296793A (zh) 混淆代码的反混淆方法、装置、可读介质及电子设备
CN115203671A (zh) 账户登录方法、装置、设备及存储介质
Sanderson Programming Google App Engine with Java: Build & Run Scalable Java Applications on Google's Infrastructure
US11949667B2 (en) Masking composite payloads using policy graphs
US20240095029A1 (en) Catalog for managing modular code
US20240095337A1 (en) Security compliance for modular code
Popovici et al. Report Companion: Data driven reporting in radiology

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17884807

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17884807

Country of ref document: EP

Kind code of ref document: A1