CN117851014A - Application program calling method and device, computer equipment and storage medium - Google Patents

Application program calling method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN117851014A
CN117851014A CN202410029774.0A CN202410029774A CN117851014A CN 117851014 A CN117851014 A CN 117851014A CN 202410029774 A CN202410029774 A CN 202410029774A CN 117851014 A CN117851014 A CN 117851014A
Authority
CN
China
Prior art keywords
application
application program
permission
program
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410029774.0A
Other languages
Chinese (zh)
Inventor
段朋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202410029774.0A priority Critical patent/CN117851014A/en
Publication of CN117851014A publication Critical patent/CN117851014A/en
Pending legal-status Critical Current

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention relates to the technical field of communication, is applied to a financial and scientific scene, and provides a calling method and device of an application program, computer equipment and a storage medium. The calling method of the application program comprises the following steps: receiving a call instruction associated with a first application program; responding to the calling instruction, and determining a second application program called by the calling instruction; determining an application type corresponding to the second application program according to the application information of the second application program; judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is the target application type; and sending a calling instruction to the second application program to call the second application program under the condition that the second application program has the application authority. In the embodiment of the application, the step of judging whether the first application program has the application authority is added, and the second application program is called only under the condition that the first application program has the application authority, so that the communication safety of the application electronic equipment is improved.

Description

Application program calling method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and apparatus for calling an application program, a computer device, and a storage medium.
Background
In the financial field, both parties involved in financial transactions may process the transaction through electronic devices, e.g., make electronic contracts, make electronic orders, etc.
At present, an operating system of the electronic equipment comprises an android system and an IOS system, and under the IOS system, part of applications can be directly called by bypassing application permission of the IOS system through an input tag for collecting user information, so that leakage of the user information is easy to cause, and further the communication security of the application electronic equipment is reduced.
Disclosure of Invention
The invention mainly aims to provide a calling method, a device, a computer device and a storage medium of an application program, and aims to solve the technical problem that the communication safety of application electronic equipment is reduced due to the leakage of user information caused by calling the application program without application permission.
In order to achieve the above object, the present invention provides a calling method of an application program, the method comprising:
receiving a call instruction associated with a first application program;
responding to the calling instruction, and determining a second application program called by the calling instruction;
determining an application type corresponding to the second application program according to the application information of the second application program;
judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is a target application type; the application permission is the permission for calling the second application program;
and sending the calling instruction to the second application program to call the second application program under the condition that the first application program has the application authority.
Optionally, before the determining whether the first application program has the application right, the method further includes:
under the condition that the application type corresponding to the second application program is an album application program, creating a view object;
after the determining whether the first application program has the application authority, the method further includes:
displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the album type application program.
Optionally, before the determining whether the first application program has the application right, the method further includes:
under the condition that the application type corresponding to the second application program is a camera application program, creating a view object;
after the determining whether the first application program has the application authority, the method further includes:
displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the camera application program.
Optionally, after the determining whether the first application program has the application right, the method further includes:
when the application type corresponding to the second application program is a file application program and the first application program does not have application permission, creating a view object;
displaying reminding information outwards through the view object; the reminding information is used for reminding a user of starting the application permission of the file application program.
Optionally, the determining whether the first application program has the application right includes:
inquiring the name of the first application program in a preset first mapping table; the first mapping table is used for representing the mapping relation between the application program name and the authority identifier;
if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is opened, determining that the first application program has the application permission;
and if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is not opened, determining that the first application program does not have the application permission.
Optionally, the application information includes a unique number of the application program, and the determining, according to the application information of the second application program, an application type corresponding to the second application program includes:
inquiring the number of the second application program in a preset second mapping table; the second mapping table is used for representing the mapping relation between the application program number and the application type;
and determining the application type obtained by inquiring in the second mapping table as the application type corresponding to the second application program.
Optionally, the application types corresponding to the second application program include, but are not limited to, an album application program, a camera application program, and a file application program.
In addition, in order to achieve the above object, the present invention also provides an application calling device, including:
the receiving module is used for receiving a calling instruction associated with the first application program;
the first determining module is used for responding to the calling instruction and determining a second application program called by the calling instruction;
the second determining module is used for determining the application type corresponding to the second application program according to the application information of the second application program;
the judging module is used for judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is the target application type; the application permission is the permission for calling the second application program; and the sending module is used for sending the calling instruction to the second application program so as to call the second application program under the condition that the first application program has the application permission.
In order to solve the above technical problems, the embodiments of the present application further provide a computer device, which adopts the following technical schemes:
the computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the calling method of the application program in any one of the embodiments of the application program when executing the computer program.
In order to solve the above technical problems, embodiments of the present application further provide a computer readable storage medium, which adopts the following technical solutions:
the computer readable storage medium stores a computer program which, when executed by a processor, implements the steps of the method for calling an application program according to any one of the embodiments of the present application.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
the invention provides a calling method and device of an application program, computer equipment and a storage medium. The calling method of the application program comprises the following steps: receiving a call instruction associated with a first application program; responding to the calling instruction, and determining a second application program corresponding to the calling instruction; determining an application type corresponding to the second application program according to the application information of the second application program; judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is the target application type; and sending a calling instruction to the second application program to call the target application program under the condition that the second application program has the application authority. In the embodiment of the application, under the condition that the first application program calls the second application program of the target application type, the step of judging whether the first application program has the application authority is added, and the second application program is called only under the condition that the first application program has the application authority, so that the leakage of user information caused by calling the application program without the application authority is avoided, and the communication safety of the application electronic equipment is improved.
Drawings
For a clearer description of the solution in the present application, a brief description will be given below of the drawings that are needed in the description of the embodiments of the present application, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of a method of invoking an application provided by an embodiment of the present invention;
FIG. 3 is a schematic structural view of one embodiment of a computer device according to the present application;
fig. 4 is a basic structural block diagram of the computer device of the present embodiment.
Detailed Description
The method for determining a data format provided in the embodiments of the present invention is applied to a data processing system, and all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application pertains unless defined otherwise; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description and claims of the present application and in the description of the figures above are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to better understand the technical solutions of the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social networking platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablet computers, electronic book readers, MP3 players (Moving Picture Experts Group Audio Layer III, dynamic video expert compression standard audio plane 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic video expert compression standard audio plane 4) players, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the method for calling the application program provided in the embodiment of the present application is generally executed by the server/terminal device, and accordingly, the device for calling the application program is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow chart of one embodiment of a method of invoking an application according to the present application is shown. The method and the device for acquiring and processing the related data can acquire and process the related data based on the artificial intelligence technology, wherein the calling method of the application program can be applied to the calling device of the application program. The calling method of the application program provided by the embodiment of the invention comprises the following steps:
s210, receiving a call instruction associated with the first application program.
In this step, a call instruction may be generated based on a user operation, where the call instruction is associated with the first application program and may be understood as an instruction for the first application program to call other application programs.
Optionally, the call instruction is an instruction generated by performing a related operation on the first application program.
Illustratively, in the financial arts, the call instruction may be an instruction associated with a financial class application, including but not limited to a payment application and a banking application.
S220, responding to the calling instruction, and determining a second application program called by the calling instruction.
In this step, after receiving the call instruction, the call instruction may be parsed, so as to determine an application program called by the call instruction, and determine the application program as the second application program.
Wherein the first application and the second application are different applications.
S230, determining the application type corresponding to the second application program according to the application information of the second application program.
In this step, application information of the second application program may be acquired, where the application information includes, but is not limited to, an application name, a unique number of the application program, and an application download time.
Further, according to the application information of the second application program, an application type corresponding to the target application program is determined. For a specific implementation of determining the application type corresponding to the target application, please refer to the following examples.
S240, judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is the target application type.
Optionally, the application types corresponding to the second application program include, but are not limited to, an album application program, a camera application program, and a file application program.
In this step, if the application type corresponding to the second application program is the target application type, it is determined whether the first application program has the application right, and in detail, how to determine whether the first application program has the application right is described in the following embodiments.
The application permission is permission for calling the second application program.
S250, when the first application program has the application authority, the calling instruction is sent to the second application program so as to call the second application program.
In this step, when it is determined that the first application program has the application right, a call instruction is sent to the second application program, and the call to the second application program is completed.
Optionally, in the case that it is determined that the first application program does not have the application right, no call instruction is sent to the second application program, that is, the second application program is not called.
The calling method of the application program provided by the embodiment of the application program comprises the following steps: receiving a call instruction associated with a first application program; responding to the calling instruction, and determining a second application program corresponding to the calling instruction; determining an application type corresponding to the second application program according to the application information of the second application program; judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is the target application type; and sending a calling instruction to the second application program to call the target application program under the condition that the second application program has the application authority. In the embodiment of the application, under the condition that the first application program calls the second application program of the target application type, the step of judging whether the first application program has the application authority is added, and the second application program is called only under the condition that the first application program has the application authority, so that the leakage of user information caused by calling the application program without the application authority is avoided, and the communication safety of the application electronic equipment is improved.
In addition, the calling method of the application program provided by the embodiment of the application program does not need to modify the front end code, so that the front end error report caused by function reconstruction can be avoided.
Optionally, before the determining whether the first application program has the application right, the method further includes:
under the condition that the application type corresponding to the second application program is an album application program, creating a view object;
after the determining whether the first application program has the application authority, the method further includes:
displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the album type application program.
In this embodiment, a uiiimagepicckercontroller class is created, and uiiimagepicckercontroller is a view controller for managing pictures and video files in a multimedia file library of a system. Creating a sub_imagePickerControllerViewWillApparer thread in the view controller. And when the application type corresponding to the second application program is an album application program, creating a view (view) object through the thread.
The album application program can be applied to bill programs in the financial field.
The method for creating the sub_imagePickerControllerViewWillApearthread is as follows: and creating a sub_ImagePickerControllerViewWillApparer thread by using a run time exchange ViewWillApparer method in the class method initialization of the view controller.
In this embodiment, when the first application program does not have the application right, it indicates that the first application program cannot call the album application program through the call instruction, the call operation is terminated, and the reminding information is displayed through the view object. The reminding information is used for reminding a user of starting application rights of the album type application program. Optionally, the reminding information includes but is not limited to text information, audio information and video information, and the album application is an album.
In this embodiment, during the process of calling the album application program by the first application program, a step of judging whether the first application program has application permission is added, and under the condition that the first application program does not have application permission, the calling operation is not executed, so that leakage of user information caused by calling the application program not having application permission is avoided, and the communication security of the application electronic device is improved.
Optionally, before the determining whether the first application program has the application right, the method further includes:
under the condition that the application type corresponding to the second application program is a camera application program, creating a view object;
after the determining whether the first application program has the application authority, the method further includes:
displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the camera application program.
In this embodiment, a uiiimagepicckercontroller class is created, and uiiimagepicckercontroller is a view controller for managing pictures and video files in a multimedia file library of a system. Creating a sub_imagePickerControllerViewWillApparer thread in the view controller. And under the condition that the application type corresponding to the second application program is a camera application program, creating a view object through the thread.
In this embodiment, when the first application program does not have the application right, it indicates that the first application program cannot call the camera application program through the call instruction, the call operation is terminated, and the reminding information is displayed through the view object. The reminding information is used for reminding a user of starting application permission of the camera application program. Optionally, the reminding information includes but is not limited to text information, audio information and video information.
In this embodiment, in the process that the first application program invokes the camera application program, a step of determining whether the first application program has application permission is added, and in the case that the first application program does not have application permission, the invoking operation is not executed, so that leakage of user information caused by invoking the application program not having application permission is avoided, and thus the security of application electronic device communication is improved.
Optionally, after the determining whether the first application program has the application right, the method further includes:
when the application type corresponding to the second application program is a file application program and the first application program does not have application permission, creating a view object;
displaying reminding information outwards through the view object; the reminding information is used for reminding a user of starting the application permission of the file application program.
In this embodiment, when the application type corresponding to the second application program is a file application program and the first application program does not have the application right, it indicates that the first application program cannot call the file application program through the call instruction, and then a view object is created through the sub_imagePickerControllerViewWillApparer thread, and a reminder is displayed through the view object. The reminding information is used for reminding a user of starting application permission of the file application program. Optionally, the reminding information includes but is not limited to text information, audio information and video information.
The file application program can be applied to an account book recording program in the financial field.
The specific implementation of creating the sub_imagePickerControllerViewWillApearthread can be referred to the above embodiments, and will not be described herein.
In this embodiment, in the process that the first application program calls the file application program, a step of judging whether the first application program has application permission is added, and in the case that the first application program does not have application permission, a call operation is not executed, so that leakage of user information caused by calling the application program not having application permission is avoided, and therefore the communication security of the application electronic device is improved.
Optionally, the determining whether the first application program has the application right includes:
inquiring the name of the first application program in a preset first mapping table; the first mapping table is used for representing the mapping relation between the application program name and the authority identifier;
if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is opened, determining that the first application program has the application permission;
and if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is not opened, determining that the first application program does not have the application permission.
In this embodiment, a first mapping table is preset, where the first mapping table is used to characterize a mapping relationship between an application name and a permission identifier.
In this embodiment, a name of a first application program is queried in a preset first mapping table, and a permission identifier corresponding to the first application program is obtained. If the permission identification indicates that the application permission is opened, determining that the first application program has the application permission; and if the permission identification indicates that the application permission is not opened, determining that the first application program does not have the application permission.
In this embodiment, since the first mapping table is used to characterize the mapping relationship between the application program name and the permission identifier, the first mapping table is used to query the name of the first application program, so that it can be accurately determined whether the first application program has the application permission.
Optionally, the application information includes a unique number of the application program, and the determining, according to the application information of the second application program, an application type corresponding to the second application program includes:
inquiring the number of the second application program in a preset second mapping table; the second mapping table is used for representing the mapping relation between the application program number and the application type;
and determining the application type obtained by inquiring in the second mapping table as the application type corresponding to the second application program.
In this embodiment, a second mapping table is preset, where the second mapping table is used to characterize a mapping relationship between an application name and a permission identifier.
In this embodiment, application information of an application program may be included, where the application information includes a unique number of the application program, the number of the second application program is queried in a preset second mapping table, and an application type obtained by querying in the second mapping table is determined as an application type corresponding to the second application program.
In this embodiment, since the second mapping table is used to characterize the mapping relationship between the application program number and the application type, the number of the second application program is queried through the second mapping table, so that the application type corresponding to the second application program can be determined.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the application provides an embodiment of an application calling device 300, where the embodiment of the device corresponds to the embodiment of the method shown in fig. 2, and the device may be specifically applied to various electronic devices.
The application program calling device 300 provided in the embodiment of the present invention, the application program calling device 300 includes:
a receiving module 310, configured to receive a call instruction associated with a first application program;
a first determining module 320, configured to determine, in response to the call instruction, a second application program invoked by the call instruction;
a second determining module 330, configured to determine an application type corresponding to the second application program according to the application information of the second application program;
a judging module 340, configured to judge whether the first application program has an application right if the application type corresponding to the second application program is a target application type; the application permission is the permission for calling the second application program; and the sending module 350 is configured to send the call instruction to the second application program to call the second application program if the first application program has the application right.
Optionally, the calling device 300 of the application program further includes:
the first newly-built module is used for newly building a view object under the condition that the application type corresponding to the second application program is an album application program;
the first display module is used for displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the album type application program.
Optionally, the calling device 300 of the application program further includes:
the second newly-built module is used for newly building a view object under the condition that the application type corresponding to the second application program is a camera application program;
the second display module is used for displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the camera application program.
Optionally, the calling device 300 of the application program further includes:
a third new building module, configured to build a view object when the application type corresponding to the second application program is a file application program and the first application program does not have an application right;
the third display module is used for displaying reminding information outwards through the view object; the reminding information is used for reminding a user of starting the application permission of the file application program.
Optionally, the determining module 340 is specifically configured to:
inquiring the name of the first application program in a preset first mapping table; the first mapping table is used for representing the mapping relation between the application program name and the authority identifier;
if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is opened, determining that the first application program has the application permission;
and if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is not opened, determining that the first application program does not have the application permission.
Optionally, the application information includes a unique number of the application program, and the second determining module 330 is specifically configured to:
inquiring the number of the second application program in a preset second mapping table; the second mapping table is used for representing the mapping relation between the application program number and the application type;
and determining the application type obtained by inquiring in the second mapping table as the application type corresponding to the second application program.
Optionally, the application types corresponding to the second application program include, but are not limited to, an album application program, a camera application program, and a file application program.
In the embodiment of the application, the step of judging whether the first application program has the application authority is added under the condition that the first application program calls the second application program of the target application type, and the second application program is called only under the condition that the first application program has the application authority, so that the communication safety of the application electronic equipment is improved.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 4, fig. 4 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 4 comprises a memory 41, a processor 42, a network interface 43 communicatively connected to each other via a system bus. It should be noted that only computer device 4 having components 41-43 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), programmable gate arrays (fields-Programmable Gate Array, FPGAs), digital processors (Digital Signal Processor, DSPs), embedded devices, etc.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 41 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 41 may be an internal storage unit of the computer device 4, such as a hard disk or a memory of the computer device 4. In other embodiments, the memory 41 may also be an external storage device of the computer device 4, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the computer device 4. Of course, the memory 41 may also comprise both an internal memory unit of the computer device 4 and an external memory device. In this embodiment, the memory 41 is generally used to store an operating system installed on the computer device 4 and various types of application software, such as program codes of calling methods of application programs, and the like. Further, the memory 41 may be used to temporarily store various types of data that have been output or are to be output.
The processor 42 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 42 is typically used to control the overall operation of the computer device 4. In this embodiment, the processor 42 is configured to execute a program code stored in the memory 41 or process data, such as a program code for executing a calling method of the application program.
The network interface 43 may comprise a wireless network interface or a wired network interface, which network interface 43 is typically used for establishing a communication connection between the computer device 4 and other electronic devices.
The present application also provides another embodiment, namely, a computer-readable storage medium storing a calling program of the application program, where the calling program of the application program is executable by at least one processor, so that the at least one processor performs the steps of the calling method of the application program as described above.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general purpose hardware online platform, and of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The subject application is operational with numerous general purpose or special purpose computer system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
It is apparent that the embodiments described above are only some embodiments of the present application, but not all embodiments, the preferred embodiments of the present application are given in the drawings, but not limiting the patent scope of the present application. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a more thorough understanding of the present disclosure. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing, or equivalents may be substituted for elements thereof. All equivalent structures made by the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the protection scope of the application.

Claims (10)

1. A method for calling an application program, comprising:
receiving a call instruction associated with a first application program;
responding to the calling instruction, and determining a second application program called by the calling instruction;
determining an application type corresponding to the second application program according to the application information of the second application program;
judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is a target application type; the application permission is the permission for calling the second application program;
and sending the calling instruction to the second application program to call the second application program under the condition that the first application program has the application authority.
2. The method of claim 1, wherein prior to determining whether the first application has application rights, the method further comprises:
under the condition that the application type corresponding to the second application program is an album application program, creating a view object;
after the determining whether the first application program has the application authority, the method further includes:
displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the album type application program.
3. The method of claim 1, wherein prior to determining whether the first application has application rights, the method further comprises:
under the condition that the application type corresponding to the second application program is a camera application program, creating a view object;
after the determining whether the first application program has the application authority, the method further includes:
displaying reminding information through the view object under the condition that the first application program does not have application permission; the reminding information is used for reminding a user of starting the application permission of the camera application program.
4. The method of claim 1, wherein after said determining whether the first application has application rights, the method further comprises:
when the application type corresponding to the second application program is a file application program and the first application program does not have application permission, creating a view object;
displaying reminding information outwards through the view object; the reminding information is used for reminding a user of starting the application permission of the file application program.
5. The method of claim 1, wherein the determining whether the first application has application rights comprises:
inquiring the name of the first application program in a preset first mapping table; the first mapping table is used for representing the mapping relation between the application program name and the authority identifier;
if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is opened, determining that the first application program has the application permission;
and if the permission identification obtained by inquiring in the first mapping table indicates that the application permission is not opened, determining that the first application program does not have the application permission.
6. The method according to claim 1, wherein the application information includes a unique number of an application program, and the determining, according to the application information of the second application program, an application type corresponding to the second application program includes:
inquiring the number of the second application program in a preset second mapping table; the second mapping table is used for representing the mapping relation between the application program number and the application type;
and determining the application type obtained by inquiring in the second mapping table as the application type corresponding to the second application program.
7. The method of any of claims 1-6, wherein the application type to which the second application corresponds includes, but is not limited to, an album-like application, a camera-like application, and a file-like application.
8. An application calling device, comprising:
the receiving module is used for receiving a calling instruction associated with the first application program;
the first determining module is used for responding to the calling instruction and determining a second application program called by the calling instruction;
the second determining module is used for determining the application type corresponding to the second application program according to the application information of the second application program;
the judging module is used for judging whether the first application program has application permission or not under the condition that the application type corresponding to the second application program is the target application type; the application permission is the permission for calling the second application program;
and the sending module is used for sending the calling instruction to the second application program so as to call the second application program under the condition that the first application program has the application permission.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method of invoking the application program according to any of claims 1 to 7 when the computer program is executed.
10. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the steps of the method of invoking an application program according to any of claims 1 to 7.
CN202410029774.0A 2024-01-08 2024-01-08 Application program calling method and device, computer equipment and storage medium Pending CN117851014A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410029774.0A CN117851014A (en) 2024-01-08 2024-01-08 Application program calling method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410029774.0A CN117851014A (en) 2024-01-08 2024-01-08 Application program calling method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117851014A true CN117851014A (en) 2024-04-09

Family

ID=90541396

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410029774.0A Pending CN117851014A (en) 2024-01-08 2024-01-08 Application program calling method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117851014A (en)

Similar Documents

Publication Publication Date Title
CN111414407A (en) Data query method and device of database, computer equipment and storage medium
CN111782304B (en) Paging loading data logic control method, device, computer equipment and medium
CN112416458A (en) Preloading method and device based on ReactNative, computer equipment and storage medium
CN111813418B (en) Distributed link tracking method, device, computer equipment and storage medium
CN113259342A (en) Login verification method, device, computer equipment and medium
CN112860662B (en) Automatic production data blood relationship establishment method, device, computer equipment and storage medium
CN113360172B (en) Application deployment method, device, computer equipment and storage medium
CN113283759B (en) Account risk portrait updating method, device, equipment and storage medium
CN114637672A (en) Automatic data testing method and device, computer equipment and storage medium
CN117851014A (en) Application program calling method and device, computer equipment and storage medium
CN113326462B (en) H5 page watermarking method, server, computer equipment and storage medium
CN117290019A (en) Interface calling method and device, computer equipment and storage medium
CN116894736A (en) Mail management method, device, computer equipment and storage medium
CN117499270A (en) Flow processing method and device, computer equipment and storage medium
CN116610354A (en) Parameter verification method, device, computer equipment and storage medium
CN117560414A (en) Micro-service calling method, system, computer equipment and storage medium
CN117331595A (en) Data updating method, device, computer equipment and storage medium
CN117435267A (en) Form loading method and device based on configuration file, computer equipment and medium
CN117667668A (en) Application analysis method, device, equipment and storage medium based on application upgrading
CN118113376A (en) Application program starting method for controlling miner lamp and related equipment
CN117271635A (en) List export method, device, computer equipment and storage medium
CN116206032A (en) Task verification method, device, computer equipment and medium thereof
CN113688140A (en) Medical data processing method and device, computer equipment and storage medium
CN116775193A (en) Page detection method, device, equipment and storage medium
CN116795511A (en) Unique identifier generation method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination