[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2019033310A1 - Data processing method for function invoking, and mobile terminal - Google Patents

Data processing method for function invoking, and mobile terminal Download PDF

Info

Publication number
WO2019033310A1
WO2019033310A1 PCT/CN2017/097700 CN2017097700W WO2019033310A1 WO 2019033310 A1 WO2019033310 A1 WO 2019033310A1 CN 2017097700 W CN2017097700 W CN 2017097700W WO 2019033310 A1 WO2019033310 A1 WO 2019033310A1
Authority
WO
WIPO (PCT)
Prior art keywords
function
call request
application
operating system
intermediate layer
Prior art date
Application number
PCT/CN2017/097700
Other languages
French (fr)
Chinese (zh)
Inventor
史新新
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to PCT/CN2017/097700 priority Critical patent/WO2019033310A1/en
Publication of WO2019033310A1 publication Critical patent/WO2019033310A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Definitions

  • the present invention relates to a mobile terminal, and in particular, to a data processing method for function calling and a mobile terminal.
  • An electronic terminal can be understood as a terminal having a processor and a memory, and the processor reads the code in the memory and can perform a corresponding function.
  • the application program in order to implement the part of the function, can guide the user to implement the part of the function by exiting the application after exiting the application, and the application itself does not actually implement the part of the function.
  • the diversity of its functions has been greatly limited.
  • the present invention provides a data processing method for function calling and a mobile terminal to solve the technical problem that the functional diversity of the application is limited.
  • a data processing method for a function call is provided, which is applied to a mobile terminal, wherein the mobile terminal is provided with a first application, an intermediate layer and an operating system, and the method includes:
  • the intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system;
  • the intermediate layer sends the second call request to the operating system, so that the operating system performs the function indicated by the function information after the intermediate identifier verification is passed.
  • the first call request further includes a first program identifier for indicating the first application;
  • the intermediate layer, before generating the second call request according to the first call request further includes: The first program identifier verifies that the first application is an application in a preset application set.
  • the function includes at least one of the following:
  • the first call request and the second call request further include a second program identifier for indicating the other application.
  • the function includes at least one of the following:
  • the function includes: deleting or adding the unlocking information of the operating system.
  • the first call request and the second call request further include the unlocking information.
  • the intermediate identifier includes an identity identification number UID preset by the operating system and a corresponding signature.
  • the method before the sending, by the intermediate layer, the second call request to the operating system, the method further includes:
  • the middle layer sequentially includes the second call request in the first queue
  • the intermediate layer sequentially sends the second call request to the operating system according to the first queue.
  • a mobile terminal comprising a processor, a memory, and a code stored in the memory; the processor executing code to perform the first aspect and the first aspect A possible design of the described method.
  • a mobile terminal including:
  • a receiving module configured to receive a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application;
  • a generating module configured to generate a second calling request according to the first calling request, where the second calling request includes the function information and an intermediate identifier preset by the operating system;
  • a sending module configured to send the second call request to the operating system, so that the operating system verifies the function indicated by the function information after the intermediate identifier passes.
  • the data processing method of the function call provided by the present invention and the mobile terminal receive, by the intermediate layer, a first call request sent by the first application, where the first call request includes function information, and the function information is used by the function information.
  • a function of instructing the first application to invoke and the intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and a preset An intermediate identifier; because the intermediate layer has an intermediate identifier preset by the operating system, and has the right to request the operating system to invoke the corresponding function, so by sending the second call request to the operating system through the intermediate layer, the The operating system verifies that the intermediate identifier passes the function indicated by the function information, completes the calling of the corresponding function, and enriches the diversity of the application function.
  • FIG. 1 is a schematic diagram of an application scenario of the present invention
  • FIG. 2 is a schematic flow chart 1 of a data processing method for a function call according to the present invention
  • FIG. 3 is a schematic structural view 1 of a mobile terminal according to the present invention.
  • FIG. 4 is a second schematic diagram of a flow of a data processing method of a function call according to the present invention.
  • FIG. 5 is a schematic signaling diagram of a data processing method called by a function according to the present invention.
  • FIG. 6 is a second schematic structural diagram of a mobile terminal according to the present invention.
  • FIG. 7 is a schematic structural view 3 of a mobile terminal according to the present invention.
  • FIG. 8 is a schematic structural diagram 4 of a mobile terminal according to the present invention.
  • FIG. 1 is a schematic diagram of an application scenario of the present invention.
  • a mobile terminal including a processor, capable of executing an application, an intermediate layer, and an operating system, where:
  • the operating system of the mobile terminal can be understood as an operating system designed for mobile terminals based on the embedded operating system, in addition to the functions of the embedded operating system (such as process management, file system, network protocol).
  • the functions of the embedded operating system such as process management, file system, network protocol.
  • Operating environment wireless communication core functions for mobile communication services, and upper-layer applications.
  • the middle layer can be understood as a program that provides services for functional interaction between the operating system and the application.
  • An application can be understood as a program developed on the basis of an operating system and written for a certain application purpose of the user.
  • FIG. 2 is a schematic flowchart 1 of a data processing method for a function call according to the present invention
  • FIG. 3 is a schematic structural diagram 1 of a mobile terminal according to the present invention.
  • the method is applied to a mobile terminal 100.
  • the mobile terminal 100 is provided with a first application 101, an intermediate layer 102, and an operating system 103.
  • the method includes:
  • the intermediate layer 102 receives the first call request sent by the first application 101.
  • the first call request can be understood as a request for invoking a corresponding function, which is initiated by the first application 101, can be generated when the first application 101 interacts with the user, or can be automatically generated for the runtime.
  • the first call request includes function information, which is used to indicate a function called by the first application 101, and the function information may be any information used to represent the called function.
  • the first application 101 can be understood as an application that issues a first call request.
  • the intermediate layer 102 generates a second call request according to the first call request.
  • the second call request may be understood as a request for being recognized by the operating system 103 to complete a function call, and may include the function information and an intermediate identifier preset by the operating system 103.
  • the intermediate identifier may be any pre-set identifier, which may be understood as an identifier that proves that the originator of the request has the right to request the function indicated by the function information.
  • the intermediate layer 102 sends the second call request to the operating system 103, so that the operating system 103 performs the function indicated by the function information after the intermediate identifier verification is passed.
  • the data processing method of the function call receives the first call request sent by the first application by the intermediate layer, where the first call request is used to indicate that the first application is called The function information of the function, and the middle layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system; An intermediate identifier preset by the operating system, having the right to request the operating system to invoke the corresponding function, so that the second calling request is sent to the operating system by the intermediate layer, so that the operating system can be made After verifying that the intermediate identifier passes the function indicated by the function information, the calling of the corresponding function is completed, which enriches the diversity of the application function.
  • FIG. 4 is a schematic flowchart 2 of a data processing method for a function call according to the present invention. referring to FIG. 4, the method includes:
  • S21 The intermediate layer receives a first call request sent by the first application.
  • the first call request can be understood as a request for invoking a corresponding function, which is initiated by the first application, can be generated when the first application interacts with the user, or can be automatically generated for the runtime.
  • the first call request includes function information, the function information is used to indicate a function invoked by the first application, and the function information may be any information used to represent the called function.
  • the first call request further includes a first program identifier for indicating the first application, and by using the first program identifier, the middle layer may determine whether the application that sends the request is the first application, That is, it is determined according to the identifier whether it is an application of a preset application set. It can also be understood that the initiator of the first call request has the identifier of the call requesting the middle layer to provide the service to implement the function indicated by the function information.
  • the method may further include: the application sends the first request to the middle layer, and the middle layer records, according to the first request, the application that sends the first request as the first application in the preset application.
  • the first program identifier may include the identification data and/or the verification data corresponding to the first application, and specifically, may include only the identification data, may include only the verification data, and may also include the identification data and the verification. data.
  • the identification data and the verification data in the first program identifier may be data pre-allocated to the first application, and store the identification data and the verification data at the time of allocation, and the intermediate layer may compare the identification data in the first program identifier with The verification data and the pre-stored identification data and verification data are used to determine whether the corresponding application is the first application, that is, whether the application is an application that can provide a corresponding middle layer service.
  • the first application can be understood as the application that issues the first call request.
  • the function may be any function that only the operating system has the execution permission.
  • the function may include at least one of: disabling one or more other applications; installing one or more other applications; and: uninstalling one or more other applications.
  • Specific implementations can include the following: disabling the functionality of one or more other applications; installing the functionality of one or more other applications; uninstalling the functionality of one or more other applications; disabling and installing one The functionality of one or more other applications; the ability to disable and uninstall one or more other applications; the ability to install and uninstall one or more other applications, and the ability to disable, install, and uninstall one or more other applications The function.
  • the disabling, installing, and uninstalling of the application can only be implemented by the operating system. Therefore, the disabling, installing, and uninstalling of the application can be implemented only through the port of the operating system.
  • An application can directly disable, install, and uninstall applications through the middle tier. It effectively extends the functional diversity of the application.
  • the first call request may further include a second program identifier for indicating the other applications.
  • the function may further include at least one of: turning the Wifi on or off; turning the mobile network on or off; and: turning Bluetooth on or off.
  • Specific implementations may include the following: turning on or off Wifi; turning the mobile network on or off; turning Bluetooth on or off; turning Wifi and mobile networks on or off; turning Wifi and Bluetooth on or off; Or turn off the mobile network and Bluetooth features; and have the ability to turn Wifi, mobile network and Bluetooth on or off.
  • the opening or closing of the Wifi, the mobile network, and the Bluetooth can only be implemented by the operating system, so the Wifi, the mobile network, and the Bluetooth can be turned on and off only through the port of the operating system.
  • the first application can directly open and close WiFi, mobile network and Bluetooth through the middle layer. It effectively extends the functional diversity of the application.
  • the function may further include: deleting or adding the unlocking information of the operating system.
  • the first call request may further include the unlocking information. It effectively extends the functional diversity of the application.
  • the change of the unlocking information of the operating system can also be understood as including the function of deleting and adding the unlocking information.
  • the preset executable functions may also be different, that is, in the preset application set, the preset function data may also be carried, and the preset function data is used to represent the preset program.
  • An executable function corresponding to each application in the collection which may be a plurality of executable functions or a single executable function.
  • the preset application set, the corresponding preset function data of each application, the pre-stored identification data, and the verification data may all be pre-recorded in the memory of the mobile terminal for the data retrieved by the processor. Specifically, it can be understood as data used by the middle layer for retrieval.
  • the intermediate layer verifies, according to the first program identifier, that the first application is an application in a preset application set.
  • S23 The intermediate layer generates a second call request according to the first call request.
  • the second call request may be understood as a request for being recognized by the operating system to complete a function call, and may include the function information and an intermediate identifier preset by the operating system.
  • the intermediate identifier may be any pre-set identifier, which may be understood as an identifier that proves that the originator of the request has the right to request the function indicated by the function information.
  • the intermediate identifier may include an identity identification number UID preset by the operating system and a corresponding signature. The identification number UID and the corresponding signature may be predetermined by the operating system.
  • the preset executable functions may also be different for different first applications.
  • the method may further include:
  • the function indicated by the function information is not the executable function, or the application in the first application non-preset application set is determined. Then you can feedback the information that the function call failed.
  • both the first application and the indicated function can be verified.
  • the differentiated settings of the functions for different applications are further improved, so that the function implementation of the embodiment is more targeted, and the diversity of application function implementation is further improved.
  • S24 The middle layer sequentially includes the second call request in the first queue.
  • the intermediate layer sends the second call request to the operating system, so that the operating system performs the function indicated by the function information after the preset identifier is verified.
  • the intermediate layer may sequentially send the second call request to the operating system according to the first queue.
  • the first queue can be understood as a queue that can list the second call request and send the second call request to the operating system in turn.
  • the middle layer may correspond to more than one first application
  • the corresponding function may be related, for example, a first call request issued by one first application indicates that Bluetooth is turned on, and another first application The first call request sent indicates that the Bluetooth is turned off, and then the second call request is sent in turn, so that the operating system sequentially implements different functions to avoid conflicts or running errors.
  • the operating system may first pass the verification of the intermediate identifier, and then perform the work.
  • the data processing method of the function call receives the first call request sent by the first application by the intermediate layer, where the first call request includes function information, and the function information is used to indicate the a function invoked by the first application, and the intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system;
  • the middle layer has an intermediate identifier preset by the operating system, and has the right to request the operating system to invoke the corresponding function, so that the second call request is sent to the operating system by the intermediate layer, so that the operating system can be verified.
  • FIG. 5 is a schematic diagram of signaling of a data processing method of a function call according to the present invention. referring to FIG. 5, the method includes:
  • S31 The first application generates a first call request.
  • S32 The first application sends a first call request to the middle layer.
  • the middle layer verifies the first application as an application in the preset application set according to the first program identifier.
  • S34 The middle layer generates a second call request according to the first call request.
  • S35 The middle layer sequentially includes the second call request in the first queue.
  • S36 The middle layer sends a second call request to the operating system.
  • S38 The operating system performs the function indicated by the function information.
  • the data processing method of the function call receives the first call request sent by the first application by the intermediate layer, where the first call request includes function information, and the function information is used to indicate the a function invoked by the first application, and the intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system;
  • the middle layer has an intermediate identifier preset by the operating system, and has the right to request the operating system to invoke the corresponding function, so that the second call request is sent to the operating system by the intermediate layer, so that the operating system can be verified.
  • FIG. 6 is a schematic structural diagram 2 of a mobile terminal according to the present invention. referring to FIG. 6, the terminal may also be understood as an intermediate layer, including:
  • the receiving module 401 is configured to receive a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application.
  • the generating module 402 is configured to generate a second calling request according to the first calling request, where the second calling request includes the function information and an intermediate identifier preset by the operating system.
  • the sending module 403 is configured to send the second call request to the operating system, so that the operating system performs the function indicated by the function information after the intermediate identifier is verified.
  • FIG. 7 is a schematic structural diagram 3 of a mobile terminal according to the present invention. referring to FIG. 7, the terminal may also be understood as an intermediate layer, including:
  • the receiving module 501 is configured to receive a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application.
  • the generating module 503 is configured to generate a second calling request according to the first calling request, where the second calling request includes the function information and an intermediate identifier preset by the operating system.
  • the sending module 505 is configured to send the second call request to the operating system, so that the operating system performs the function indicated by the function information after the intermediate identifier is verified.
  • the first call request further includes a first program identifier for indicating the first application
  • the terminal further includes: a verification module 502, configured to verify, according to the first program identifier,
  • the first application is an application in the preset application collection.
  • the function comprises at least one of: disabling one or more other applications; installing one or more other applications; and: uninstalling one or more other applications.
  • the first call request and the second call request further include a second program identifier for indicating the other application.
  • the function includes at least one of: turning Wifi on or off; turning the mobile network on or off; and: turning Bluetooth on or off.
  • the function includes: deleting or adding the unlocking information of the operating system.
  • the first call request and the second call request further include the unlocking information.
  • the intermediate identifier includes an identity identification number UID preset by the operating system and a corresponding signature.
  • the terminal further includes: a queue module 504, configured to sequentially include the second call request in the first queue.
  • the sending module 505 is further configured to: according to the first queue, send the second call request to the operating system in sequence.
  • the terminal may further include: a first determining module, configured to determine an executable function preset by the first application that sends the first calling request; and: a second determining module, configured to determine, by the function information The function is the executable function.
  • the mobile terminal receives the first call request sent by the first application by using the intermediate layer, where the first call request includes function information, where the function information is used to indicate the first application
  • the called function and the intermediate layer generate a second call request according to the first call request, the second call request includes the function information and an intermediate identifier preset by the operating system; a pre-set intermediate identifier having a right to request an operating system to invoke a corresponding function, so that the second call request is sent to the operating system by the intermediate layer, so that the operating system can verify that the intermediate identifier passes
  • the calling of the corresponding function is completed, which enriches the diversity of the application function.
  • FIG. 8 is a schematic structural diagram 4 of a mobile terminal according to the present invention.
  • the mobile terminal 60 includes: a processor 61 and a memory 62; wherein:
  • the memory 62 is configured to store a computer program, and the memory may also be a flash memory.
  • the processor 61 is configured to execute execution instructions of the memory storage to implement the steps in the methods of the first embodiment, the second embodiment, and the third embodiment. For details, refer to the related description in the foregoing method embodiments.
  • the memory 62 can be either stand-alone or integrated with the processor 61.
  • the mobile terminal 60 may further include:
  • a bus 63 is provided for connecting the memory 62 and the processor 61.
  • the embodiment provides a readable storage medium.
  • the readable storage medium stores execution instructions.
  • the sending device performs the method provided by the various embodiments described above.
  • the application also provides a program product comprising an execution instruction stored in a readable storage medium.
  • At least one processor of the terminal can read the execution instructions from a readable storage medium, and the at least one processor executes the execution instructions such that the transmitting device implements the methods provided by the various embodiments described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

Provided are a data processing method for function invoking, and a mobile terminal. The method is applied to a mobile terminal, and the mobile terminal is provided with a first application program, an intermediate layer and an operating system therein. The method comprises: the intermediate layer receiving a first invoking request sent by the first application program, wherein the first invoking request comprises function information, and the function information is used for indicating a function invoked by the first application program; the intermediate layer generating, according to the first invoking request, a second invoking request, wherein the second invoking request comprises the function information, and an intermediate identifier pre-set by the operating system; and the intermediate layer sending the second invoking request to the operating system, so that the operating system executes, after the intermediate identifier passes the verification, the function indicated by the function information. According to the present invention, the invoking of a corresponding function is completed, and the diversity of functions of an application program is enriched.

Description

功能调用的数据处理方法与移动终端Data processing method for function call and mobile terminal 技术领域Technical field
本发明涉及移动终端,尤其涉及一种功能调用的数据处理方法与移动终端。The present invention relates to a mobile terminal, and in particular, to a data processing method for function calling and a mobile terminal.
背景技术Background technique
电子终端,可以理解为具有处理器和存储器的终端,处理器读取存储器中的代码,可以执行相应的功能。An electronic terminal can be understood as a terminal having a processor and a memory, and the processor reads the code in the memory and can perform a corresponding function.
然而,其中的部分功能仅操作系统具有执行的权限,在操作系统上开发的应用程序并不具有执行该部分功能的权限,故而,应用程序无法实现该部分功能。However, some of these functions only have the operating system's permission to execute. The application developed on the operating system does not have the right to execute the part of the function. Therefore, the application cannot implement the part of the function.
现有的相关技术中,为了实现该部分功能,应用程序能够通过输出指引信息指引用户在退出应用程序后,通过其他方式实现该部分功能,该方式下,应用程序本身实际依旧未实现该部分功能,其功能的多样性受到了极大的限制。In the related related art, in order to implement the part of the function, the application program can guide the user to implement the part of the function by exiting the application after exiting the application, and the application itself does not actually implement the part of the function. The diversity of its functions has been greatly limited.
发明内容Summary of the invention
本发明提供了一种功能调用的数据处理方法与移动终端,以解决应用程序的功能多样性受到限制的技术问题。The present invention provides a data processing method for function calling and a mobile terminal to solve the technical problem that the functional diversity of the application is limited.
根据本发明的第一方面,提供了一种功能调用的数据处理方法,应用于移动终端,所述移动终端中设置有第一应用程序、中间层与操作系统,所述方法包括:According to a first aspect of the present invention, a data processing method for a function call is provided, which is applied to a mobile terminal, wherein the mobile terminal is provided with a first application, an intermediate layer and an operating system, and the method includes:
所述中间层接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能;Receiving, by the intermediate layer, a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application;
所述中间层根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;The intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system;
所述中间层向所述操作系统发送所述第二调用请求,以使得所述操作系统在所述中间标识验证通过后执行所述功能信息指示的功能。The intermediate layer sends the second call request to the operating system, so that the operating system performs the function indicated by the function information after the intermediate identifier verification is passed.
可选的,所述第一调用请求还包括用于表示所述第一应用程序的第一程序标识;所述中间层根据所述第一调用请求,生成第二调用请求之前,还包括:根据所述第一程序标识验证所述第一应用程序为预设应用程序集合中的应用程序。 Optionally, the first call request further includes a first program identifier for indicating the first application; the intermediate layer, before generating the second call request according to the first call request, further includes: The first program identifier verifies that the first application is an application in a preset application set.
可选的,所述功能包括以下至少之一:Optionally, the function includes at least one of the following:
禁用一个或多个其他应用程序;Disable one or more other applications;
安装一个或多个其他应用程序;Install one or more other applications;
卸载一个或多个其他应用程序。Uninstall one or more other applications.
可选的,所述第一调用请求和所述第二调用请求还包括用于指示所述其他应用程序的第二程序标识。Optionally, the first call request and the second call request further include a second program identifier for indicating the other application.
可选的,所述功能包括以下至少之一:Optionally, the function includes at least one of the following:
打开或关闭Wifi;Turn Wifi on or off;
打开或关闭移动网络;Turn mobile network on or off;
打开或关闭蓝牙。Turn Bluetooth on or off.
可选的,所述功能包括:所述操作系统的解锁信息的删除或添加。Optionally, the function includes: deleting or adding the unlocking information of the operating system.
可选的,所述第一调用请求和所述第二调用请求还包括所述解锁信息。Optionally, the first call request and the second call request further include the unlocking information.
可选的,所述中间标识包括所述操作系统预先设置的身份识别号码UID与对应的签名。Optionally, the intermediate identifier includes an identity identification number UID preset by the operating system and a corresponding signature.
可选的,所述中间层向所述操作系统发送所述第二调用请求之前,还包括:Optionally, before the sending, by the intermediate layer, the second call request to the operating system, the method further includes:
所述中间层将所述第二调用请求依次列入第一队列;The middle layer sequentially includes the second call request in the first queue;
所述中间层向所述操作系统发送所述第二调用请求,包括:Sending, by the intermediate layer, the second call request to the operating system, including:
所述中间层根据所述第一队列,依次向所述操作系统发送所述第二调用请求。The intermediate layer sequentially sends the second call request to the operating system according to the first queue.
根据本发明的第二方面,提供了一种移动终端,所述移动终端包括处理器、存储器,所述存储器中存储有代码;所述处理器执行代码,以执行第一方面及第一方面各种可能的设计所述的方法。According to a second aspect of the present invention, a mobile terminal is provided, the mobile terminal comprising a processor, a memory, and a code stored in the memory; the processor executing code to perform the first aspect and the first aspect A possible design of the described method.
根据本发明的第三方面,提供了一种移动终端,包括:According to a third aspect of the present invention, a mobile terminal is provided, including:
接收模块,用于接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能;a receiving module, configured to receive a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application;
生成模块,用于根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;a generating module, configured to generate a second calling request according to the first calling request, where the second calling request includes the function information and an intermediate identifier preset by the operating system;
发送模块,用于向所述操作系统发送所述第二调用请求,以使得所述操作系统验证所述中间标识通过后执行所述功能信息指示的功能。And a sending module, configured to send the second call request to the operating system, so that the operating system verifies the function indicated by the function information after the intermediate identifier passes.
本发明提供的功能调用的数据处理方法与移动终端,通过所述中间层接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用 于指示所述第一应用程序调用的功能,以及所述中间层根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;由于中间层具有操作系统预先设置的中间标识,其具有向操作系统请求调用相应功能的权限,所以,通过所述中间层向所述操作系统发送所述第二调用请求,可以使得所述操作系统验证所述中间标识通过后执行所述功能信息指示的功能,完成了相应功能的调用,丰富了应用程序功能的多样性。The data processing method of the function call provided by the present invention and the mobile terminal receive, by the intermediate layer, a first call request sent by the first application, where the first call request includes function information, and the function information is used by the function information. a function of instructing the first application to invoke, and the intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and a preset An intermediate identifier; because the intermediate layer has an intermediate identifier preset by the operating system, and has the right to request the operating system to invoke the corresponding function, so by sending the second call request to the operating system through the intermediate layer, the The operating system verifies that the intermediate identifier passes the function indicated by the function information, completes the calling of the corresponding function, and enriches the diversity of the application function.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description of the drawings used in the embodiments or the prior art description will be briefly described below. Obviously, the drawings in the following description It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any inventive labor.
图1是本发明应用场景的示意图;1 is a schematic diagram of an application scenario of the present invention;
图2是本发明一功能调用的数据处理方法的流程示意图一;2 is a schematic flow chart 1 of a data processing method for a function call according to the present invention;
图3是本发明一移动终端的结构示意图一;3 is a schematic structural view 1 of a mobile terminal according to the present invention;
图4是本发明一功能调用的数据处理方法的流程示意图二;4 is a second schematic diagram of a flow of a data processing method of a function call according to the present invention;
图5是本发明一功能调用的数据处理方法的信令示意图;5 is a schematic signaling diagram of a data processing method called by a function according to the present invention;
图6是本发明一移动终端的结构示意图二;6 is a second schematic structural diagram of a mobile terminal according to the present invention;
图7是本发明一移动终端的结构示意图三;7 is a schematic structural view 3 of a mobile terminal according to the present invention;
图8是本发明一移动终端的结构示意图四。FIG. 8 is a schematic structural diagram 4 of a mobile terminal according to the present invention.
具体实施方式Detailed ways
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described in conjunction with the drawings in the embodiments of the present invention. It is a partial embodiment of the invention, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
图1是本发明应用场景的示意图;提供了一种移动终端,包括处理器,可执行应用程序、中间层和操作系统的功能,其中:1 is a schematic diagram of an application scenario of the present invention; and a mobile terminal, including a processor, capable of executing an application, an intermediate layer, and an operating system, where:
移动终端的操作系统,可以理解为在嵌入式操作系统基础之上发展而来的专为移动终端设计的操作系统,除了具备嵌入式操作系统的功能(如进程管理、文件系统、网络协议 栈等)外,还可有针对电池供电系统的电源管理部分、与用户交互的输入/输出部分、对上层应用提供调用接口的嵌入式图形用户界面服务、针对多媒体应用提供底层编解码服务、Java运行环境、针对移动通信服务的无线通信核心功能及上层应用等。The operating system of the mobile terminal can be understood as an operating system designed for mobile terminals based on the embedded operating system, in addition to the functions of the embedded operating system (such as process management, file system, network protocol). In addition to the stack, there may be a power management part for the battery-powered system, an input/output part that interacts with the user, an embedded graphical user interface service that provides a call interface to the upper-layer application, and an underlying codec service for the multimedia application, Java. Operating environment, wireless communication core functions for mobile communication services, and upper-layer applications.
中间层,可以理解为:为操作系统与应用程序之间的功能交互提供服务的程序。The middle layer can be understood as a program that provides services for functional interaction between the operating system and the application.
应用程序,可以理解为在操作系统基础上开发的,为针对使用者的某种应用目的所编写的程序。An application can be understood as a program developed on the basis of an operating system and written for a certain application purpose of the user.
实施例1Example 1
图2是本发明一功能调用的数据处理方法的流程示意图一;图3是本发明一移动终端的结构示意图一。2 is a schematic flowchart 1 of a data processing method for a function call according to the present invention; and FIG. 3 is a schematic structural diagram 1 of a mobile terminal according to the present invention.
请参考图2,并结合图3,所述方法应用于移动终端100,所述移动终端100中设置有第一应用程序101、中间层102与操作系统103,所述方法,包括:Referring to FIG. 2, and in conjunction with FIG. 3, the method is applied to a mobile terminal 100. The mobile terminal 100 is provided with a first application 101, an intermediate layer 102, and an operating system 103. The method includes:
S11:所述中间层102接收所述第一应用程序101发送的第一调用请求。S11: The intermediate layer 102 receives the first call request sent by the first application 101.
第一调用请求,可以理解为用于调用执行相应功能的请求,其由第一应用程序101发起,可以为第一应用程序101在与用户交互时产生的,也可以为运行时自动产生。所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序101调用的功能,功能信息可以为用于表征所调用的功能的任意信息。第一应用程序101,可以理解为发出第一调用请求的应用程序。The first call request can be understood as a request for invoking a corresponding function, which is initiated by the first application 101, can be generated when the first application 101 interacts with the user, or can be automatically generated for the runtime. The first call request includes function information, which is used to indicate a function called by the first application 101, and the function information may be any information used to represent the called function. The first application 101 can be understood as an application that issues a first call request.
S12:所述中间层102根据所述第一调用请求,生成第二调用请求。S12: The intermediate layer 102 generates a second call request according to the first call request.
所述第二调用请求,可以理解为用于被操作系统103识别从而完成功能调用的请求,可以包括所述功能信息以及所述操作系统103预先设置的中间标识。中间标识,可以为任意的预先设置的标识,具体可以理解为证明该请求的发起者具有请求调用功能信息所指示功能的权限的标识。The second call request may be understood as a request for being recognized by the operating system 103 to complete a function call, and may include the function information and an intermediate identifier preset by the operating system 103. The intermediate identifier may be any pre-set identifier, which may be understood as an identifier that proves that the originator of the request has the right to request the function indicated by the function information.
S13:所述中间层102向所述操作系统103发送所述第二调用请求,以使得所述操作系统103在所述中间标识验证通过后执行所述功能信息指示的功能。S13: The intermediate layer 102 sends the second call request to the operating system 103, so that the operating system 103 performs the function indicated by the function information after the intermediate identifier verification is passed.
本实施例提供的功能调用的数据处理方法,通过所述中间层接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括用于指示所述第一应用程序所调用的功能的功能信息,以及所述中间层根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;由于中间层具有操作系统预先设置的中间标识,其具有向操作系统请求调用相应功能的权限,所以,通过所述中间层向所述操作系统发送所述第二调用请求,可以使得所述操作系统 验证所述中间标识通过后执行所述功能信息指示的功能,完成了相应功能的调用,丰富了应用程序功能的多样性。The data processing method of the function call provided by the embodiment receives the first call request sent by the first application by the intermediate layer, where the first call request is used to indicate that the first application is called The function information of the function, and the middle layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system; An intermediate identifier preset by the operating system, having the right to request the operating system to invoke the corresponding function, so that the second calling request is sent to the operating system by the intermediate layer, so that the operating system can be made After verifying that the intermediate identifier passes the function indicated by the function information, the calling of the corresponding function is completed, which enriches the diversity of the application function.
实施例2Example 2
图4是本发明一功能调用的数据处理方法的流程示意图二;请参考图4,所述方法,包括:4 is a schematic flowchart 2 of a data processing method for a function call according to the present invention; referring to FIG. 4, the method includes:
S21:所述中间层接收所述第一应用程序发送的第一调用请求。S21: The intermediate layer receives a first call request sent by the first application.
第一调用请求,可以理解为用于调用执行相应功能的请求,其由第一应用程序发起,可以为第一应用程序在与用户交互时产生的,也可以为运行时自动产生。所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能,功能信息可以为用于表征所调用的功能的任意信息。The first call request can be understood as a request for invoking a corresponding function, which is initiated by the first application, can be generated when the first application interacts with the user, or can be automatically generated for the runtime. The first call request includes function information, the function information is used to indicate a function invoked by the first application, and the function information may be any information used to represent the called function.
其中一种实施方式中,第一调用请求还包括用于表示所述第一应用程序的第一程序标识,通过第一程序标识,中间层可以判断发送请求的应用程序是否为第一应用程序,即根据标识判断是否为预设应用程序集合的应用程序。也可以理解为:证明第一调用请求的发起者具有请求中间层提供服务,以实现功能信息所指示功能的调用的标识。In one embodiment, the first call request further includes a first program identifier for indicating the first application, and by using the first program identifier, the middle layer may determine whether the application that sends the request is the first application, That is, it is determined according to the identifier whether it is an application of a preset application set. It can also be understood that the initiator of the first call request has the identifier of the call requesting the middle layer to provide the service to implement the function indicated by the function information.
在步骤S21之前,还可以包括:应用程序向所述中间层发送第一请求,所述中间层根据所述第一请求,将发送第一请求的应用程序作为第一应用程序记录于预设应用程序集合。其中一种实施方式中,第一程序标识可以包括第一应用程序对应的识别数据和/或验证数据,具体的,可以仅包括识别数据,可以仅包括验证数据,也可以同时包括识别数据与验证数据。第一程序标识中的识别数据和验证数据可以为预先分配给第一应用程序的数据,并在分配时对识别数据和验证数据进行存储,中间层可以比对第一程序标识中的识别数据和验证数据与预先存储的识别数据和验证数据,以确定对应的应用程序是否为第一应用程序,即判断应用程序是否为可以提供相应中间层服务的应用程序。Before the step S21, the method may further include: the application sends the first request to the middle layer, and the middle layer records, according to the first request, the application that sends the first request as the first application in the preset application. Program collection. In one embodiment, the first program identifier may include the identification data and/or the verification data corresponding to the first application, and specifically, may include only the identification data, may include only the verification data, and may also include the identification data and the verification. data. The identification data and the verification data in the first program identifier may be data pre-allocated to the first application, and store the identification data and the verification data at the time of allocation, and the intermediate layer may compare the identification data in the first program identifier with The verification data and the pre-stored identification data and verification data are used to determine whether the corresponding application is the first application, that is, whether the application is an application that can provide a corresponding middle layer service.
第一应用程序,可以理解为发出第一调用请求的应用程序。The first application can be understood as the application that issues the first call request.
所述功能,可以为任意仅操作系统具有执行权限的功能。The function may be any function that only the operating system has the execution permission.
其中一种实施方式中,所述功能可以包括以下至少之一:禁用一个或多个其他应用程序;安装一个或多个其他应用程序;以及:卸载一个或多个其他应用程序。In one embodiment, the function may include at least one of: disabling one or more other applications; installing one or more other applications; and: uninstalling one or more other applications.
其具体实施方式可以包括以下:禁用一个或多个其他应用程序的功能;安装一个或多个其他应用程序的功能;卸载一个或多个其他应用程序的功能;禁用和安装一个 或多个其他应用程序的功能;禁用和卸载一个或多个其他应用程序的功能;安装和卸载一个或多个其他应用程序的功能,以及同时具有禁用、安装和卸载一个或多个其他应用程序的功能。Specific implementations can include the following: disabling the functionality of one or more other applications; installing the functionality of one or more other applications; uninstalling the functionality of one or more other applications; disabling and installing one The functionality of one or more other applications; the ability to disable and uninstall one or more other applications; the ability to install and uninstall one or more other applications, and the ability to disable, install, and uninstall one or more other applications The function.
现有的相关技术中,对应用程序的禁用、安装和卸载,仅可以通过操作系统实现,所以,仅能通过操作系统的端口实现针对应用程序的禁用、安装和卸载,本实施方式下,第一应用程序能够通过中间层直接实现应用程序的禁用、安装和卸载。其有效扩展了应用程序的功能多样性。In the related art, the disabling, installing, and uninstalling of the application can only be implemented by the operating system. Therefore, the disabling, installing, and uninstalling of the application can be implemented only through the port of the operating system. An application can directly disable, install, and uninstall applications through the middle tier. It effectively extends the functional diversity of the application.
具体实施过程中,为了实现针对其他应用程序的功能,需要确定所述其他应用程序为什么应用程序,故而,第一调用请求还可包括用于指示所述其他应用程序的第二程序标识。In a specific implementation process, in order to implement functions for other applications, it is necessary to determine why the other applications are applications, and therefore, the first call request may further include a second program identifier for indicating the other applications.
其中一种实施方式中,所述功能还可以包括以下至少之一:打开或关闭Wifi;打开或关闭移动网络;以及:打开或关闭蓝牙。In one embodiment, the function may further include at least one of: turning the Wifi on or off; turning the mobile network on or off; and: turning Bluetooth on or off.
其具体实施方式可以包括以下:打开或关闭Wifi的功能;打开或关闭移动网络的功能;打开或关闭蓝牙的功能;打开或关闭Wifi与移动网络的功能;打开或关闭Wifi与蓝牙的功能;打开或关闭移动网络与蓝牙的功能;以及同时具有打开或关闭Wifi、移动网络和蓝牙的功能。Specific implementations may include the following: turning on or off Wifi; turning the mobile network on or off; turning Bluetooth on or off; turning Wifi and mobile networks on or off; turning Wifi and Bluetooth on or off; Or turn off the mobile network and Bluetooth features; and have the ability to turn Wifi, mobile network and Bluetooth on or off.
现有的相关技术中,对Wifi、移动网络和蓝牙的打开或关闭,仅可以通过操作系统实现,所以,仅能通过操作系统的端口来实现Wifi、移动网络和蓝牙的打开和关闭,本实施方式下,第一应用程序能够通过中间层直接实现WiFi、移动网络和蓝牙的打开和关闭。其有效扩展了应用程序的功能多样性。In the related related art, the opening or closing of the Wifi, the mobile network, and the Bluetooth can only be implemented by the operating system, so the Wifi, the mobile network, and the Bluetooth can be turned on and off only through the port of the operating system. In this way, the first application can directly open and close WiFi, mobile network and Bluetooth through the middle layer. It effectively extends the functional diversity of the application.
其中一种实施方式中,所述功能还可以包括:所述操作系统的解锁信息的删除或添加。具体实施过程中,所述第一调用请求还可包括所述解锁信息。其有效扩展了应用程序的功能多样性。同时,操作系统的解锁信息的变更,也可理解为包括了解锁信息的删除与添加的功能。In an implementation manner, the function may further include: deleting or adding the unlocking information of the operating system. In a specific implementation process, the first call request may further include the unlocking information. It effectively extends the functional diversity of the application. At the same time, the change of the unlocking information of the operating system can also be understood as including the function of deleting and adding the unlocking information.
此外,针对不同的第一应用程序,其预设的可执行功能也可以是不同的,即预设应用程序集合中,也可携带有预设功能数据,预设功能数据用于表示预设程序集合中各应用程序对应的可执行功能,其可以为多个可执行功能,也可以为单个可执行功能。In addition, for different first applications, the preset executable functions may also be different, that is, in the preset application set, the preset function data may also be carried, and the preset function data is used to represent the preset program. An executable function corresponding to each application in the collection, which may be a plurality of executable functions or a single executable function.
可见,预设应用程序集合、对应的各应用程序的预设功能数据、预先存储的识别数据和验证数据,均可以为预先记载于移动终端的存储器中,以供处理器的调取使用的数据,具体可以理解为供中间层调取使用的数据。 It can be seen that the preset application set, the corresponding preset function data of each application, the pre-stored identification data, and the verification data may all be pre-recorded in the memory of the mobile terminal for the data retrieved by the processor. Specifically, it can be understood as data used by the middle layer for retrieval.
S22:所述中间层根据所述第一程序标识验证所述第一应用程序为预设应用程序集合中的应用程序。S22: The intermediate layer verifies, according to the first program identifier, that the first application is an application in a preset application set.
S23:所述中间层根据所述第一调用请求,生成第二调用请求。S23: The intermediate layer generates a second call request according to the first call request.
所述第二调用请求,可以理解为用于被操作系统识别从而完成功能调用的请求,可以包括所述功能信息以及所述操作系统预先设置的中间标识。中间标识,可以为任意的预先设置的标识,具体可以理解为证明该请求的发起者具有请求调用功能信息所指示功能的权限的标识。其中一种实施方式中,所述中间标识可以包括所述操作系统预先设置的身份识别号码UID与对应的签名。身份识别号码UID与对应的签名可以为操作系统预先确定的。The second call request may be understood as a request for being recognized by the operating system to complete a function call, and may include the function information and an intermediate identifier preset by the operating system. The intermediate identifier may be any pre-set identifier, which may be understood as an identifier that proves that the originator of the request has the right to request the function indicated by the function information. In an implementation manner, the intermediate identifier may include an identity identification number UID preset by the operating system and a corresponding signature. The identification number UID and the corresponding signature may be predetermined by the operating system.
由于针对不同的第一应用程序,其预设的可执行的功能也可以是不同的,具体实施过程中,步骤S22与步骤S23之间,还可以包括:The preset executable functions may also be different for different first applications. In the specific implementation process, between step S22 and step S23, the method may further include:
根据第一程序标识与预设功能数据,确定发送第一调用请求的第一应用程序预设的可执行功能;以及:确定功能信息所指示的功能为所述可执行功能。Determining, according to the first program identifier and the preset function data, an executable function preset by the first application that sends the first call request; and determining that the function indicated by the function information is the executable function.
其中一种实施方式中,若确定功能信息所指示的功能非所述可执行功能,或确定所述第一应用程序非预设应用程序集合中的应用程序。则可以反馈功能调用失败的信息。In one embodiment, if it is determined that the function indicated by the function information is not the executable function, or the application in the first application non-preset application set is determined. Then you can feedback the information that the function call failed.
通过以上实施方式,既可以验证第一应用程序,也可验证所指示的功能。进一步提高了功能的针对不同应用程序的区分设置,使得本实施例的功能实现更具有针对性,也进一步提高了应用程序功能实现的多样性。With the above embodiment, both the first application and the indicated function can be verified. The differentiated settings of the functions for different applications are further improved, so that the function implementation of the embodiment is more targeted, and the diversity of application function implementation is further improved.
S24:所述中间层将所述第二调用请求依次列入第一队列。S24: The middle layer sequentially includes the second call request in the first queue.
S25:所述中间层向所述操作系统发送所述第二调用请求,以使得所述操作系统在所述预设标识验证通过后执行所述功能信息指示的功能。具体实施过程中,所述中间层可以根据所述第一队列,依次向所述操作系统发送所述第二调用请求。S25: The intermediate layer sends the second call request to the operating system, so that the operating system performs the function indicated by the function information after the preset identifier is verified. In a specific implementation process, the intermediate layer may sequentially send the second call request to the operating system according to the first queue.
第一队列,可以理解为可列有第二调用请求,并依次向操作系统发送第二调用请求的队列。The first queue can be understood as a queue that can list the second call request and send the second call request to the operating system in turn.
该实施方式下,由于中间层可对应于不止一个第一应用程序,对应的功能可以是相关的,例如,其中一个第一应用程序发出的第一调用请求指示打开蓝牙,另一个第一应用程序发出的第一调用请求指示关闭蓝牙,则依次发送第二调用请求,可使得操作系统依次实现不同的功能,避免发生冲突或运行错误。In this embodiment, since the middle layer may correspond to more than one first application, the corresponding function may be related, for example, a first call request issued by one first application indicates that Bluetooth is turned on, and another first application The first call request sent indicates that the Bluetooth is turned off, and then the second call request is sent in turn, so that the operating system sequentially implements different functions to avoid conflicts or running errors.
操作系统接收到第二调用请求后,可以先对中间标识验证通过,然后执行所述功 能信息指示的功能。After receiving the second call request, the operating system may first pass the verification of the intermediate identifier, and then perform the work. A function that can indicate information.
本实施例提供的功能调用的数据处理方法,通过所述中间层接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能,以及所述中间层根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;由于中间层具有操作系统预先设置的中间标识,其具有向操作系统请求调用相应功能的权限,所以,通过所述中间层向所述操作系统发送所述第二调用请求,可以使得所述操作系统验证所述中间标识通过后执行所述功能信息指示的功能,完成了相应功能的调用,丰富了应用程序功能的多样性。The data processing method of the function call provided by the embodiment receives the first call request sent by the first application by the intermediate layer, where the first call request includes function information, and the function information is used to indicate the a function invoked by the first application, and the intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system; The middle layer has an intermediate identifier preset by the operating system, and has the right to request the operating system to invoke the corresponding function, so that the second call request is sent to the operating system by the intermediate layer, so that the operating system can be verified. After the intermediate identifier passes the function indicated by the function information, the calling of the corresponding function is completed, which enriches the diversity of the application function.
实施例3Example 3
图5是本发明一功能调用的数据处理方法的信令示意图;请参考图5,所述方法,包括:FIG. 5 is a schematic diagram of signaling of a data processing method of a function call according to the present invention; referring to FIG. 5, the method includes:
S31:第一应用程序生成第一调用请求。S31: The first application generates a first call request.
S32:第一应用程序向中间层发送第一调用请求。S32: The first application sends a first call request to the middle layer.
S33:中间层根据第一程序标识验证第一应用程序为预设应用程序集合中的应用程序。S33: The middle layer verifies the first application as an application in the preset application set according to the first program identifier.
S34:中间层根据第一调用请求,生成第二调用请求。S34: The middle layer generates a second call request according to the first call request.
S35:中间层将第二调用请求依次列入第一队列。S35: The middle layer sequentially includes the second call request in the first queue.
S36:中间层向操作系统发送第二调用请求。S36: The middle layer sends a second call request to the operating system.
S37:操作系统对中间标识验证通过。S37: The operating system passes the verification of the intermediate identifier.
S38:操作系统执行功能信息指示的功能。S38: The operating system performs the function indicated by the function information.
本实施例提供的功能调用的数据处理方法,通过所述中间层接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能,以及所述中间层根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;由于中间层具有操作系统预先设置的中间标识,其具有向操作系统请求调用相应功能的权限,所以,通过所述中间层向所述操作系统发送所述第二调用请求,可以使得所述操作系统验证所述中间标识通过后执行所述功能信息指示的功能,完成了相应功能的调用,丰富了应用程序功能的多样性。The data processing method of the function call provided by the embodiment receives the first call request sent by the first application by the intermediate layer, where the first call request includes function information, and the function information is used to indicate the a function invoked by the first application, and the intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system; The middle layer has an intermediate identifier preset by the operating system, and has the right to request the operating system to invoke the corresponding function, so that the second call request is sent to the operating system by the intermediate layer, so that the operating system can be verified. After the intermediate identifier passes the function indicated by the function information, the calling of the corresponding function is completed, which enriches the diversity of the application function.
实施例4 Example 4
图6是本发明一移动终端的结构示意图二;请参考图6,所述终端,也可理解为中间层,包括:FIG. 6 is a schematic structural diagram 2 of a mobile terminal according to the present invention; referring to FIG. 6, the terminal may also be understood as an intermediate layer, including:
接收模块401,用于接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能。The receiving module 401 is configured to receive a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application.
生成模块402,用于根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识。The generating module 402 is configured to generate a second calling request according to the first calling request, where the second calling request includes the function information and an intermediate identifier preset by the operating system.
发送模块403,用于向所述操作系统发送所述第二调用请求,以使得所述操作系统在所述中间标识验证通过后执行所述功能信息指示的功能。The sending module 403 is configured to send the second call request to the operating system, so that the operating system performs the function indicated by the function information after the intermediate identifier is verified.
实施例5Example 5
图7是本发明一移动终端的结构示意图三;请参考图7,所述终端,也可理解为中间层,包括:FIG. 7 is a schematic structural diagram 3 of a mobile terminal according to the present invention; referring to FIG. 7, the terminal may also be understood as an intermediate layer, including:
接收模块501,用于接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能。The receiving module 501 is configured to receive a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application.
生成模块503,用于根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识。The generating module 503 is configured to generate a second calling request according to the first calling request, where the second calling request includes the function information and an intermediate identifier preset by the operating system.
发送模块505,用于向所述操作系统发送所述第二调用请求,以使得所述操作系统在所述中间标识验证通过后执行所述功能信息指示的功能。The sending module 505 is configured to send the second call request to the operating system, so that the operating system performs the function indicated by the function information after the intermediate identifier is verified.
可选的,所述第一调用请求还包括用于表示所述第一应用程序的第一程序标识;所述终端,还包括:验证模块502,用于根据所述第一程序标识验证所述第一应用程序为预设应用程序集合中的应用程序。Optionally, the first call request further includes a first program identifier for indicating the first application, and the terminal further includes: a verification module 502, configured to verify, according to the first program identifier, The first application is an application in the preset application collection.
可选的,所述功能包括以下至少之一:禁用一个或多个其他应用程序;安装一个或多个其他应用程序;以及:卸载一个或多个其他应用程序。Optionally, the function comprises at least one of: disabling one or more other applications; installing one or more other applications; and: uninstalling one or more other applications.
可选的,所述第一调用请求和所述第二调用请求还包括用于指示所述其他应用程序的第二程序标识。Optionally, the first call request and the second call request further include a second program identifier for indicating the other application.
可选的,所述功能包括以下至少之一:打开或关闭Wifi;打开或关闭移动网络;以及:打开或关闭蓝牙。Optionally, the function includes at least one of: turning Wifi on or off; turning the mobile network on or off; and: turning Bluetooth on or off.
可选的,所述功能包括:所述操作系统的解锁信息的删除或添加。Optionally, the function includes: deleting or adding the unlocking information of the operating system.
可选的,所述第一调用请求和所述第二调用请求还包括所述解锁信息。Optionally, the first call request and the second call request further include the unlocking information.
可选的,所述中间标识包括所述操作系统预先设置的身份识别号码UID与对应的签名。 Optionally, the intermediate identifier includes an identity identification number UID preset by the operating system and a corresponding signature.
可选的,所述终端,还包括:队列模块504,用于将所述第二调用请求依次列入第一队列。发送模块505,还用于:根据所述第一队列,依次向所述操作系统发送所述第二调用请求。Optionally, the terminal further includes: a queue module 504, configured to sequentially include the second call request in the first queue. The sending module 505 is further configured to: according to the first queue, send the second call request to the operating system in sequence.
此外,所述终端,还可以包括:第一确定模块,用于确定发送第一调用请求的第一应用程序预设的可执行功能;以及:第二确定模块,用于确定功能信息所指示的功能为所述可执行功能。In addition, the terminal may further include: a first determining module, configured to determine an executable function preset by the first application that sends the first calling request; and: a second determining module, configured to determine, by the function information The function is the executable function.
本实施例提供的移动终端,通过所述中间层接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能以及所述中间层根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;由于中间层具有操作系统预先设置的中间标识,其具有向操作系统请求调用相应功能的权限,所以,通过所述中间层向所述操作系统发送所述第二调用请求,可以使得所述操作系统验证所述中间标识通过后执行所述功能信息指示的功能,完成了相应功能的调用,丰富了应用程序功能的多样性。The mobile terminal provided by the embodiment receives the first call request sent by the first application by using the intermediate layer, where the first call request includes function information, where the function information is used to indicate the first application The called function and the intermediate layer generate a second call request according to the first call request, the second call request includes the function information and an intermediate identifier preset by the operating system; a pre-set intermediate identifier having a right to request an operating system to invoke a corresponding function, so that the second call request is sent to the operating system by the intermediate layer, so that the operating system can verify that the intermediate identifier passes After the function indicated by the function information is executed, the calling of the corresponding function is completed, which enriches the diversity of the application function.
实施例6Example 6
图8是本发明一移动终端的结构示意图四。请参考图8,移动终端60,包括:处理器61以及存储器62;其中:FIG. 8 is a schematic structural diagram 4 of a mobile terminal according to the present invention. Referring to FIG. 8, the mobile terminal 60 includes: a processor 61 and a memory 62; wherein:
存储器62,用于存储计算机程序,该存储器还可以是flash(闪存)。The memory 62 is configured to store a computer program, and the memory may also be a flash memory.
处理器61,用于执行存储器存储的执行指令,以实现上述实施例1、实施例2与实施例3的方法中的各个步骤。具体可以参见前面方法实施例中的相关描述。The processor 61 is configured to execute execution instructions of the memory storage to implement the steps in the methods of the first embodiment, the second embodiment, and the third embodiment. For details, refer to the related description in the foregoing method embodiments.
可选地,存储器62既可以是独立的,也可以跟处理器61集成在一起。Alternatively, the memory 62 can be either stand-alone or integrated with the processor 61.
当所述存储器62是独立于处理器61之外的器件时,所述移动终端60还可以包括:When the memory 62 is a device other than the processor 61, the mobile terminal 60 may further include:
总线63,用于连接所述存储器62和处理器61。A bus 63 is provided for connecting the memory 62 and the processor 61.
实施例7Example 7
本实施例提供一种可读存储介质,可读存储介质中存储有执行指令,当终端的至少一个处理器执行该执行指令时,发送设备执行上述的各种实施方式提供的方法。The embodiment provides a readable storage medium. The readable storage medium stores execution instructions. When at least one processor of the terminal executes the execution instruction, the sending device performs the method provided by the various embodiments described above.
本申请还提供一种程序产品,该程序产品包括执行指令,该执行指令存储在可读存储介质中。终端的至少一个处理器可以从可读存储介质读取该执行指令,至少一个处理器执行该执行指令使得发送设备实施上述的各种实施方式提供的方法。The application also provides a program product comprising an execution instruction stored in a readable storage medium. At least one processor of the terminal can read the execution instructions from a readable storage medium, and the at least one processor executes the execution instructions such that the transmitting device implements the methods provided by the various embodiments described above.
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任 何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求书的保护范围为准。 The above description is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. It is to be understood by those skilled in the art that variations or substitutions are within the scope of the present invention. Therefore, the scope of protection of the present invention should be determined by the scope of the claims.

Claims (10)

  1. 一种功能调用的数据处理方法,应用于移动终端,所述移动终端中设置有第一应用程序、中间层与操作系统,其特征在于,所述方法包括:A data processing method for a function call is applied to a mobile terminal, where the mobile terminal is provided with a first application, an intermediate layer, and an operating system, and the method includes:
    所述中间层接收所述第一应用程序发送的第一调用请求,所述第一调用请求包括功能信息,所述功能信息用于指示所述第一应用程序调用的功能;Receiving, by the intermediate layer, a first call request sent by the first application, where the first call request includes function information, where the function information is used to indicate a function invoked by the first application;
    所述中间层根据所述第一调用请求,生成第二调用请求,所述第二调用请求包括所述功能信息以及所述操作系统预先设置的中间标识;The intermediate layer generates a second call request according to the first call request, where the second call request includes the function information and an intermediate identifier preset by the operating system;
    所述中间层向所述操作系统发送所述第二调用请求,以使得所述操作系统在所述中间标识验证通过后执行所述功能信息指示的功能。The intermediate layer sends the second call request to the operating system, so that the operating system performs the function indicated by the function information after the intermediate identifier verification is passed.
  2. 根据权利要求1所述的方法,其特征在于,所述第一调用请求还包括用于表示所述第一应用程序的第一程序标识;所述中间层根据所述第一调用请求,生成第二调用请求之前,还包括:根据所述第一程序标识验证所述第一应用程序为预设应用程序集合中的应用程序。The method according to claim 1, wherein the first call request further comprises a first program identifier for indicating the first application; the middle layer generates a first according to the first call request Before the request is invoked, the method further includes: verifying, according to the first program identifier, that the first application is an application in a preset application set.
  3. 根据权利要求1所述的方法,其特征在于,所述功能包括以下至少之一:The method of claim 1 wherein said function comprises at least one of:
    禁用一个或多个其他应用程序;Disable one or more other applications;
    安装一个或多个其他应用程序;Install one or more other applications;
    卸载一个或多个其他应用程序。Uninstall one or more other applications.
  4. 根据权利要求3所述的方法,其特征在于,所述第一调用请求和所述第二调用请求还包括用于指示所述其他应用程序的第二程序标识。The method of claim 3 wherein said first invocation request and said second invoking request further comprise a second program identification for indicating said other application.
  5. 根据权利要求1所述的方法,其特征在于,所述功能包括以下至少之一:The method of claim 1 wherein said function comprises at least one of:
    打开或关闭Wifi;Turn Wifi on or off;
    打开或关闭移动网络;Turn mobile network on or off;
    打开或关闭蓝牙。Turn Bluetooth on or off.
  6. 根据权利要求1所述的方法,其特征在于,所述功能包括:所述操作系统的解锁信息的删除或添加。The method according to claim 1, wherein the function comprises: deleting or adding unlocking information of the operating system.
  7. 根据权利要求6所述的方法,其特征在于,所述第一调用请求和所述第二调用请求还包括所述解锁信息。The method of claim 6, wherein the first invocation request and the second invocation request further comprise the unlocking information.
  8. 根据权利要求1至5任一项所述的方法,其特征在于,所述中间标识包括所述操作系统预先设置的身份识别号码UID与对应的签名。The method according to any one of claims 1 to 5, wherein the intermediate identifier comprises an identification number UID preset by the operating system and a corresponding signature.
  9. 根据权利要求1至5任一项所述的方法,其特征在于,所述中间层向所述操作 系统发送所述第二调用请求之前,还包括:The method according to any one of claims 1 to 5, wherein the intermediate layer is to the operation Before the system sends the second call request, the method further includes:
    所述中间层将所述第二调用请求依次列入第一队列;The middle layer sequentially includes the second call request in the first queue;
    所述中间层向所述操作系统发送所述第二调用请求,包括:Sending, by the intermediate layer, the second call request to the operating system, including:
    所述中间层根据所述第一队列,依次向所述操作系统发送所述第二调用请求。The intermediate layer sequentially sends the second call request to the operating system according to the first queue.
  10. 一种移动终端,所述移动终端包括处理器、存储器,所述存储器中存储有代码;所述处理器执行代码,以执行权利要求1至9任一项所述的方法。 A mobile terminal, comprising: a processor, a memory, wherein the memory stores a code; the processor executes code to perform the method of any one of claims 1 to 9.
PCT/CN2017/097700 2017-08-16 2017-08-16 Data processing method for function invoking, and mobile terminal WO2019033310A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/097700 WO2019033310A1 (en) 2017-08-16 2017-08-16 Data processing method for function invoking, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/097700 WO2019033310A1 (en) 2017-08-16 2017-08-16 Data processing method for function invoking, and mobile terminal

Publications (1)

Publication Number Publication Date
WO2019033310A1 true WO2019033310A1 (en) 2019-02-21

Family

ID=65361762

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/097700 WO2019033310A1 (en) 2017-08-16 2017-08-16 Data processing method for function invoking, and mobile terminal

Country Status (1)

Country Link
WO (1) WO2019033310A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12117971B2 (en) * 2019-03-06 2024-10-15 Nippon Telegraph And Telephone Corporation Content use system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060101408A1 (en) * 2004-10-20 2006-05-11 Nokia Corporation Terminal, method and computer program product for validating a software application
CN102438014A (en) * 2010-11-22 2012-05-02 微软公司 Back-end constrained delegation model
CN103377055A (en) * 2012-04-17 2013-10-30 腾讯科技(深圳)有限公司 Method and device for program running in mobile terminal
CN106355083A (en) * 2016-09-27 2017-01-25 武汉米企通网络科技有限公司 Method for authenticating installation software by control APP

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060101408A1 (en) * 2004-10-20 2006-05-11 Nokia Corporation Terminal, method and computer program product for validating a software application
CN102438014A (en) * 2010-11-22 2012-05-02 微软公司 Back-end constrained delegation model
CN103377055A (en) * 2012-04-17 2013-10-30 腾讯科技(深圳)有限公司 Method and device for program running in mobile terminal
CN106355083A (en) * 2016-09-27 2017-01-25 武汉米企通网络科技有限公司 Method for authenticating installation software by control APP

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12117971B2 (en) * 2019-03-06 2024-10-15 Nippon Telegraph And Telephone Corporation Content use system

Similar Documents

Publication Publication Date Title
US8904518B2 (en) Information processing device, information processing method, and program distribution system
CN104754552B (en) A kind of credible performing environment TEE initial methods and equipment
CN110855777B (en) Node management method and device based on block chain
CN109905398B (en) Mobile phone number replacement and binding verification method, device, equipment and storage medium
CN110363026B (en) File manipulation method, apparatus, device, system, and computer-readable storage medium
WO2014040461A1 (en) Access control method and device
JP2012084159A (en) Apparatus and methods for managing firmware verification on wireless device
WO2020177548A1 (en) Blockchain authority control method and device
CN103164260B (en) Application management system and method for mobile terminal
CN110138767B (en) Transaction request processing method, device, equipment and storage medium
CN111143023B (en) Resource changing method and device, equipment and storage medium
CN101895883B (en) A smart card and method supporting authentication algorithm update
CN114900320B (en) A TEE node authentication method, device, equipment and medium
WO2024092932A1 (en) Transaction execution method and blockchain node
CN116541046B (en) Energy storage system upgrading method and device, computer equipment and readable storage medium
CN104822127A (en) Bluetooth device, data channel real-time management and control method and system thereof
CN110247877B (en) A management method and terminal for offline management instructions
JP2023502820A (en) Program verification method and device, platform and user terminal, and online service system
CN112313651B (en) Cryptographic modules and methods for operating the same
CN108171063A (en) Method, terminal and the computer readable storage medium of access safety element
WO2019033310A1 (en) Data processing method for function invoking, and mobile terminal
CN106326723A (en) Method and device for certifying APK (Android Package) signature
CN118797721A (en) A smart contract virtual machine system and a smart contract execution method
CN112398908A (en) Block chain network node deleting method, system, storage medium and device
CN103559430A (en) Application account management method and device based on android system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17921499

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17921499

Country of ref document: EP

Kind code of ref document: A1