Permission monitoring processing method and device, computer equipment and medium
A processing method and permission technology, applied in the computer field, can solve problems such as a large amount of labor costs, low audit efficiency, and undetectable upgrade codes, and achieve the effect of strengthening control rights
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] figure 1 It is a flow chart of a rights monitoring and processing method provided in Embodiment 1 of the present invention. This embodiment is applicable to the situation of managing the rights of third-party SDKs accessed inside the application program. This method can be executed by a rights monitoring and processing device. The device can be implemented in the form of software and / or hardware, and generally can be integrated into the application program in the form of SDK, plug-in or program code. Such as figure 1 As shown, the method includes:
[0043] Step S101, when it is detected that the target third-party SDK embedded in the application program calls the target permission interface, intercept the call.
[0044] The application program can be various programming languages that users can use, and a collection of programs written in various programming languages to meet the application requirements of users. For example, it can include general-purpose applic...
Embodiment 2
[0062] figure 2 It is a flow chart of another permission monitoring processing method provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments, such as figure 2 As shown, the method includes:
[0063] Step S201, when it is detected that the target third-party SDK embedded in the application program calls the target permission interface, intercept the call.
[0064] image 3 It is a system architecture diagram of an application program provided by Embodiment 2 of the present invention. Such as image 3 As shown, the system architecture of the application program may include an application layer, a system layer, and a privacy control layer. The application layer can include application business codes and third-party SDKs. Wherein, the application business code can be understood as other code modules except the third-party SDK, and the third-party SDK can be understood as the third-party SDK that needs ...
Embodiment 3
[0087] Figure 4 It is a flow chart of another permission monitoring processing method provided by Embodiment 3 of the present invention. This embodiment is optimized on the basis of the above embodiments, as shown in Figure 4 As shown, the method includes:
[0088] Step S301, when it is detected that the target third-party SDK calls the target permission interface, intercept the call, and jump to execute the permission monitoring and processing interface.
[0089] The permission monitoring and processing interface may be an interface for performing permission monitoring and processing on the target third-party SDK when the target third-party SDK calls the target permission interface, and is used to monitor the legitimacy of the call.
[0090] In this embodiment, the target third-party SDK can be a compiled language SDK or a high-level interpreted language SDK. For SDKs of different programming languages, different interception and jump methods can be adopted to intercept ca...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com