CN105867905A - Application program bug repairing method and device - Google Patents

Application program bug repairing method and device Download PDF

Info

Publication number
CN105867905A
CN105867905A CN201610162435.5A CN201610162435A CN105867905A CN 105867905 A CN105867905 A CN 105867905A CN 201610162435 A CN201610162435 A CN 201610162435A CN 105867905 A CN105867905 A CN 105867905A
Authority
CN
China
Prior art keywords
application program
functional module
utilization rate
patch file
repair information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610162435.5A
Other languages
Chinese (zh)
Inventor
陈浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Information Technology Beijing Co Ltd
Original Assignee
LeTV Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Information Technology Beijing Co Ltd filed Critical LeTV Information Technology Beijing Co Ltd
Priority to CN201610162435.5A priority Critical patent/CN105867905A/en
Publication of CN105867905A publication Critical patent/CN105867905A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/72Code refactoring

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an application program bug repairing method and device. The application program bug repairing method comprises the following steps: receiving and loading a patch file for repairing an application program bug; analyzing the patch file, and operating the repairing information in the analyzed patch file, and revising a functional module in an application program corresponding to the repairing information; and updating the functional module revised according to the repairing information. Therefore, the application program bug repairing method and device solves the problem that only the new version of the whole application program can be downloaded and updated by aiming at the application program which has bugs.

Description

A kind of vulnerability of application program restorative procedure and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of vulnerability of application program restorative procedure and dress Put.
Background technology
Along with the development of terminal, various application programs also arise at the historic moment.And these application programs were being applied Often due to imperfection in journey, a lot of problems occurs, thus cause such as blank screen, dodge and move back etc. phenomenon Generation.
At present, the various problems occurred for application program, the method generally used is exactly can be to application journey Sequence is modified to form new version, then downloads, runs, the problem version before replacing it.But It is that existing this mode terminal needs the whole application program after down loading updating, adds the behaviour of terminal Measure.The leak repairing time length of application program, efficiency are low simultaneously, and Consumer's Experience is excessively poor.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention be to propose a kind of vulnerability of application program restorative procedure and Device, solve can only download for the application program started a leak, to update whole described application program new The problem of version.
The vulnerability of application program restorative procedure provided based on the above-mentioned purpose embodiment of the present invention, including step:
Receive and download the patch file that vulnerability of application program is repaired;
Patch file described in parsing, runs the repair information in described patch file after resolving, to Functional module in the described application program that described repair information is corresponding is modified;
The described functional module modified according to described repair information is updated.
In certain embodiments, the patch file that described download vulnerability of application program is repaired includes:
Start network monitor process, when monitoring described network and being in non-moving data network state, then Download the patch file that vulnerability of application program is repaired.
In certain embodiments, before the patch file described in parsing, also include:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than Or equal to the minimum utilization rate preset;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
In certain embodiments, the described functional module modified according to described repair information is carried out more Time new, also include:
Obtain the electricity of terminal;
Judge whether less than the power threshold preset;If being not less than default power threshold, then will be according to institute State the described functional module that repair information modifies to be updated;If less than the power threshold preset, then Start electric quantity monitoring process, when monitoring described terminal power and being not less than default power threshold, then will It is updated according to the described functional module that described repair information is modified.
In certain embodiments, described to the function in the described application program corresponding with described repair information Before module is modified, also include:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute State functional module, the most do not revise described functional module.
On the other hand, present invention also offers a kind of vulnerability of application program prosthetic device, including:
Download unit, for receiving and download the patch file that vulnerability of application program is repaired;
Running unit, for resolving described patch file, after operation parsing in described patch file Repair information, modifies to the functional module in the described application program corresponding with described repair information;
Updating block, for carrying out the described functional module modified according to described repair information more Newly.
In certain embodiments, described download unit, it is additionally operable to:
Start network monitor process, when monitoring described network and being in non-moving data network state, then Download the patch file that vulnerability of application program is repaired.
In certain embodiments, described running unit, it is additionally operable to:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than Or equal to the minimum utilization rate preset;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
In certain embodiments, described updating block, it is additionally operable to:
Obtain the electricity of terminal;
Judge whether less than the power threshold preset;If being not less than default power threshold, then will be according to institute State the described functional module that repair information modifies to be updated;If less than the power threshold preset, then Start electric quantity monitoring process, when monitoring described terminal power and being not less than default power threshold, then will It is updated according to the described functional module that described repair information is modified.
In certain embodiments, the described application program that described running unit pair is corresponding with described repair information In functional module modify before, be additionally operable to:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute State functional module, the most do not revise described functional module.
From the above it can be seen that the vulnerability of application program restorative procedure of present invention offer and device, logical Cross and download the patch file that vulnerability of application program is repaired;Patch file described in parsing, runs after resolving Repair information in described patch file, in the described application program corresponding with described repair information Functional module is modified;The described functional module modified according to described repair information is carried out more Newly.Thus, it is possible to realize for the application program started a leak, can only leak part be carried out more Newly, it is to avoid replacement to whole application program, it is greatly optimized the service content of application program.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of vulnerability of application program restorative procedure in first embodiment of the invention;
Fig. 2 is that the present invention refers to the schematic flow sheet of vulnerability of application program restorative procedure in embodiment;
Fig. 3 is the structural representation of vulnerability of application program prosthetic device in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with tool Body embodiment, and referring to the drawings, the present invention is described in more detail.
According to the use situation of application program in terminal, when application program starts a leak, user can only pass through The new edition downloading this application program realized the renewal of legacy version originally, caused the leak repairing of application program to be imitated Rate is the lowest, and Consumer's Experience is excessively poor..
It should be noted that the statement of all uses " first " and " second " is equal in the embodiment of the present invention It is for the parameter of the entity or non-equal distinguishing two same names non-equal, it is seen that " first " " second ", only for the convenience of statement, should not be construed as the restriction to the embodiment of the present invention, subsequent implementation This is illustrated by example the most one by one.
Refering to shown in Fig. 1, show for the flow process of vulnerability of application program restorative procedure in first embodiment of the invention Being intended to, described vulnerability of application program restorative procedure includes:
Step 101, receives and downloads the patch file that vulnerability of application program is repaired.
In an embodiment, network monitor process can be started, when the network monitoring described terminal is in non- During mobile data network state, then download the patch file that vulnerability of application program is repaired.It is to say, This technical scheme can monitor the network state of described terminal unit, and intelligentized accomplishes when described end When the network state of end equipment is non-moving data network state, just can download vulnerability of application program amendment Patch file.Therefore, it can be greatly saved the network charges of terminal unit, improve network utilisation Rate, is simultaneously achieved the intellectuality that vulnerability of application program is repaired.
It addition, the patch file for leak repairing can be to be set to terminal by server active push Standby, naturally it is also possible to be sent inquiry request by terminal unit to server and obtain the patch of leak repairing File.
Step 102, the patch file described in parsing, runs the repairing in described patch file after resolving Information, the functional module of the described application program corresponding to this repair information is modified.
As embodiment, the patch file that analyzing step 101 is downloaded, this patch file just can be made to exist Run in different operating system, such as android, ios etc..Wherein, described patch literary composition Part refers to the file for storing application program patch instruction.
In one preferably embodiment, before resolving patch file, can first obtain and pre-set Application program utilization rate table.Wherein, described application program utilization rate table includes statistics application program Use frequency in the given time.Such as: the use frequency of application program within a time period.
Then, it is judged that the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is No more than or equal to the minimum utilization rate preset, if more than or equal to, the directly patch literary composition described in parsing Part.If less than, do not perform to resolve the operation of described patch file.Wherein, described minimum utilization rate It is to define one minimum utilization rate of application program, the i.e. utilization rate of application program minimum to make less than described By rate, then it is unworthy this application program is carried out leak repairing.It is thus possible to according to the patch downloaded The application program utilization rate that file is corresponding, decides whether to resolve this patch file.I.e. when an application When the utilization rate of program is the lowest, just the leak of this application program can not be repaired.
In another preferably embodiment, after the patch file described in resolving, obtain after resolving Patch file in repair information, determine the functional module that this application program is to be revised.Then, Transfer the functional module utilization rate table that this application program pre-sets.Wherein, described functional module uses Rate table includes each functional module of statistics application program use frequency in the given time.Afterwards, Whether the utilization rate of the described functional module that judgement is to be revised is zero, if not zero is run described in after parsing The repair information of this functional module in patch file, if zero does not operates.
It should be noted that can include at least one functional module in an application program, user is permissible Use corresponding functional module as required.If the utilization rate of a functional module is zero, then illustrate to use Family use this application program time the most this functional module is not operated, i.e. this functional module for For this user useless, the most just there is no need the leak to this functional module and carry out Repair.Thus, this embodiment point situation can carry out leak repairing to functional module, to a great extent Improve the efficiency that vulnerability of application program is repaired.
Further, when the utilization rate of described functional module to be revised is zero, then to this function mould Block is marked.Run resolve after the repair information of functional module in described patch file time, run into There is the functional module then not amendment of this labelling.
Step 103, is updated the described functional module modified according to this repair information.
As embodiment, before the functional module that have modified is updated, described terminal can be obtained Electricity.Next, it is determined whether less than the power threshold preset, if being not less than default power threshold, Directly the functional module of amendment will be updated.If less than the power threshold preset, starting electric quantity monitoring Process, when monitoring when described terminal power is not less than default power threshold then by the function mould to amendment Block is updated.Thus, when described terminal power height, at once amendment part is refreshed.Institute State terminal power low time, first start described application program, then refresh as electricity Gao Shizai, i.e. exist Also amendment part is refreshed while not affecting the described application program of normal startup.Such as: current Electricity is less than the power threshold preset, but has been higher than the power threshold preset through overcharge.
As an embodiment referred to, refering to shown in Fig. 2, described vulnerability of application program restorative procedure Specifically can use following steps:
Step 201, starts network monitor process.
Step 202, when the network monitoring described terminal is in non-moving data network state, then under Carry the patch file that vulnerability of application program is repaired.
Step 203, obtains the application program utilization rate table pre-set.
Wherein, described application program utilization rate table includes statistics application program making in the given time Use frequency.
Step 204, it is judged that the utilization rate of the application program that the leak repairing patch file downloaded is corresponding Whether more than or equal to the minimum utilization rate preset, if the most directly carrying out walking 205, the most directly exit This flow process.
Step 205, the patch file described in parsing.
Step 206, obtains the repair information in described patch file after resolving, determines this application program institute Functional module to be revised.
Step 207, transfers the functional module utilization rate table that this application program pre-sets.
Wherein, described functional module utilization rate table includes each functional module of statistics application program and exists Use frequency in the scheduled time.
Step 208, it is judged that whether the utilization rate of described functional module to be revised is zero, if not zero Carry out step 209, the most directly exit this flow process.
Step 209, after operation parsing, the repair information of this functional module in described patch file, repaiies this The functional module of the described application program that benefit information is corresponding is modified.
Step 210, obtains the electricity of described terminal.
Step 211, it may be judged whether less than the power threshold preset, if being not less than default power threshold, Directly carry out step 213, if less than the power threshold preset, carrying out step 212.
Step 212, starts electric quantity monitoring process, is not less than default electricity when monitoring described terminal power Step 213 is then carried out during amount threshold value.
Step 213, is updated the described functional module modified according to this repair information.
In another aspect of this invention, a kind of vulnerability of application program prosthetic device is additionally provided, such as Fig. 3 institute Showing, described vulnerability of application program prosthetic device includes download unit 301, the running unit 302 being sequentially connected with And updating block 303.Wherein, download unit 301 receives and downloads what vulnerability of application program was repaired Patch file, running unit 302 resolves described patch file, runs described patch literary composition after resolving Repair information in part, the functional module of the described application program corresponding to this repair information is modified. Finally, the described functional module modified according to this repair information is updated by updating block 303.
In one embodiment, described download unit 301 is additionally operable to start network monitor process, works as monitoring When network to described terminal is in non-moving data network state, then download what vulnerability of application program was repaired Patch file.It is to say, this technical scheme can monitor the network state of described terminal unit, and Intelligentized accomplishing just can be below when the network state of described terminal unit is non-moving data network state Carry the patch file of vulnerability of application program amendment.
It addition, the patch file for leak repairing can be to terminal unit by server active push Download unit 301.It is of course also possible to sent inquiry by the download unit 301 of terminal unit to server Asking, being then downloaded when there is the leak repairing patch file of described application program.
In another embodiment, running unit 302, before resolving patch file, can first obtain The application program utilization rate table pre-set.Then, it is judged that the leak repairing patch file downloaded Whether the utilization rate of corresponding application program is more than or equal to the minimum utilization rate preset, if the most directly solving Patch file described in analysis.Do not perform to resolve the operation of described patch file.It is thus possible to root According to the application program utilization rate that the patch file downloaded is corresponding, decide whether to resolve this patch file. I.e. when the utilization rate of an application program is the lowest, just the leak of this application program can not be repaiied Mend.
Further, after described running unit 302 resolves patch file, it is also possible to obtain and resolve Repair information in rear patch file, determines the functional module that this application program is to be revised.Then, Transfer the functional module utilization rate table that this application program pre-sets.The described functional module that judgement is to be revised Utilization rate whether be zero, if not zero run resolve after this functional module in described patch file Repair information, if zero does not operates.Preferably, when the utilization rate of described functional module to be revised When being zero, then this functional module is marked.Function mould in described patch file after running parsing During the repair information of block, run into the functional module then not amendment with this labelling.
It addition, described updating block 303 is before being updated the functional module that have modified, permissible Obtain the electricity of described terminal.Next, it is determined whether less than the power threshold preset, if being not less than default Power threshold then will directly the functional module of amendment be updated.If less than the power threshold preset, Start electric quantity monitoring process, when monitoring when described terminal power is not less than default power threshold then by right The functional module of amendment is updated.Thus, when described terminal power height, at once amendment part is entered Row refreshes.When described terminal power is low, first starts described application program, then enter as electricity Gao Shizai Row refreshes, and is i.e. also brushed amendment part while not affecting the described application program of normal startup Newly.
It should be noted that in being embodied as of vulnerability of application program prosthetic device of the present invention Hold, be described in detail in vulnerability of application program restorative procedure described above, therefore in repeating at this Hold and no longer illustrate.
In sum, the vulnerability of application program restorative procedure of present invention offer, device, creatively utilize Patch file is repaired for the leak of application program;And, it is not necessary to user manually downloads should By the redaction of program, the mode replacing legacy version by redaction realizes leak repairing;And, simplify Leak repairing process and the operating process of user, decrease the repairing time, improve repairing efficiency;Tool There is extensive, great dissemination;Finally, whole described vulnerability of application program restorative procedure and device Compact, it is easy to control.
Those of ordinary skill in the field are it is understood that the discussion of any of the above embodiment is merely illustrative , it is not intended that hint the scope of the present disclosure (including claim) is limited to these examples;At this Under bright thinking, between the technical characteristic in above example or different embodiment, group can also be carried out Closing, step can realize with random order, and there is the many of the different aspect of the present invention as above Other change, for they not offers in details simple and clear.
It addition, for simplifying explanation and discussing, and in order to obscure the invention, provided Accompanying drawing in can illustrate or can not illustrate with integrated circuit (IC) chip and other parts known Power supply/grounding connection.Furthermore, it is possible to illustrate device in block diagram form, in order to avoid making the present invention be difficult to Understand, and this have also contemplated that following facts, i.e. the details about the embodiment of these block diagram arrangements is Depend highly on will implement the present invention platform (that is, these details should be completely in this area skill In the range of the understanding of art personnel).Elaborating that detail (such as, circuit) is to describe showing of the present invention In the case of example embodiment, it will be apparent to those skilled in the art that can there is no this In the case of a little details or these details change in the case of implement the present invention.Therefore, These descriptions are considered as illustrative and not restrictive.
Although invention has been described to have been incorporated with the specific embodiment of the present invention, but according to front The description in face, a lot of replacements, amendment and the modification of these embodiments are for those of ordinary skills Will be apparent from.Such as, other memory architecture (such as, dynamic ram (DRAM)) can The embodiment discussed with use.
Embodiments of the invention be intended to fall within the broad range of claims all so Replacement, amendment and modification.Therefore, all within the spirit and principles in the present invention, any province done Summary, amendment, equivalent, improvement etc., should be included within the scope of the present invention.

Claims (10)

1. a vulnerability of application program restorative procedure, it is characterised in that include step:
Receive and download the patch file that vulnerability of application program is repaired;
Patch file described in parsing, runs the repair information in described patch file after resolving, to Functional module in the described application program that described repair information is corresponding is modified;
The described functional module modified according to described repair information is updated.
Method the most according to claim 1, it is characterised in that described download vulnerability of application program is repaiied The patch file mended includes:
Start network monitor process, when monitoring described network and being in non-moving data network state, under Carry the patch file that vulnerability of application program is repaired.
Method the most according to claim 1 and 2, it is characterised in that the patch literary composition described in parsing Before part, also include:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than Or equal to presetting minimum utilization rate;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
Method the most according to claim 1, it is characterised in that will carry out according to described repair information When the described functional module of amendment is updated, also include:
Obtain the electricity of terminal;
Judge whether more than or equal to the power threshold preset;If more than or equal to the power threshold preset, Then the described functional module modified according to described repair information is updated;If less than the electricity preset Amount threshold value, then start electric quantity monitoring process, when monitoring described terminal power more than or equal to the electricity preset During amount threshold value, the more described functional module modified according to described repair information is updated.
Method the most according to claim 1, it is characterised in that described to described repair information pair Before functional module in the described application program answered is modified, also include:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute State functional module, the most do not revise described functional module.
6. a vulnerability of application program prosthetic device, it is characterised in that including:
Download unit, for receiving and download the patch file that vulnerability of application program is repaired;
Running unit, for resolving described patch file, after operation parsing in described patch file Repair information, modifies to the functional module in the described application program corresponding with described repair information;
Updating block, for carrying out the described functional module modified according to described repair information more Newly.
Device the most according to claim 6, it is characterised in that described download unit, is additionally operable to:
Start network monitor process, when monitoring described network and being in non-moving data network state, then Download the patch file that vulnerability of application program is repaired.
8. according to the device described in claim 6 or 7, it is characterised in that described running unit, also For:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than Or equal to the minimum utilization rate preset;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
Device the most according to claim 6, it is characterised in that described updating block, is additionally operable to:
Obtain the electricity of terminal;
Judge whether more than or equal to the power threshold preset;If more than or equal to the power threshold preset, Then the described functional module modified according to described repair information is updated;If less than the electricity preset Amount threshold value, then start electric quantity monitoring process, when monitoring described terminal power more than or equal to the electricity preset During amount threshold value, the more described functional module modified according to described repair information is updated.
Device the most according to claim 6, it is characterised in that described running unit pair is with described Before functional module in the described application program that repair information is corresponding is modified, it is additionally operable to:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute State functional module, the most do not revise described functional module.
CN201610162435.5A 2016-03-21 2016-03-21 Application program bug repairing method and device Pending CN105867905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610162435.5A CN105867905A (en) 2016-03-21 2016-03-21 Application program bug repairing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610162435.5A CN105867905A (en) 2016-03-21 2016-03-21 Application program bug repairing method and device

Publications (1)

Publication Number Publication Date
CN105867905A true CN105867905A (en) 2016-08-17

Family

ID=56625269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610162435.5A Pending CN105867905A (en) 2016-03-21 2016-03-21 Application program bug repairing method and device

Country Status (1)

Country Link
CN (1) CN105867905A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106649091A (en) * 2016-10-18 2017-05-10 厦门美图移动科技有限公司 Method and device for detecting whether application can be normally used, and mobile terminal
CN107423097A (en) * 2017-07-28 2017-12-01 北京明朝万达科技股份有限公司 The management method and device of a kind of application program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101944032A (en) * 2009-07-03 2011-01-12 华为技术有限公司 Microware updating method, client, server and system
CN103745158A (en) * 2014-01-26 2014-04-23 北京奇虎科技有限公司 Method and device for repairing system bugs
WO2014161278A1 (en) * 2013-04-03 2014-10-09 中兴通讯股份有限公司 Mobile terminal and upgrade method therefor
CN104423985A (en) * 2013-08-30 2015-03-18 联想(北京)有限公司 Method and device for noticing update of applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101944032A (en) * 2009-07-03 2011-01-12 华为技术有限公司 Microware updating method, client, server and system
WO2014161278A1 (en) * 2013-04-03 2014-10-09 中兴通讯股份有限公司 Mobile terminal and upgrade method therefor
CN104423985A (en) * 2013-08-30 2015-03-18 联想(北京)有限公司 Method and device for noticing update of applications
CN103745158A (en) * 2014-01-26 2014-04-23 北京奇虎科技有限公司 Method and device for repairing system bugs

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106649091A (en) * 2016-10-18 2017-05-10 厦门美图移动科技有限公司 Method and device for detecting whether application can be normally used, and mobile terminal
CN106649091B (en) * 2016-10-18 2019-04-02 厦门美图移动科技有限公司 It is a kind of detection application can normal use method, apparatus and mobile terminal
CN107423097A (en) * 2017-07-28 2017-12-01 北京明朝万达科技股份有限公司 The management method and device of a kind of application program
CN107423097B (en) * 2017-07-28 2019-02-22 北京明朝万达科技股份有限公司 A kind of management method and device of application program

Similar Documents

Publication Publication Date Title
CN102622241B (en) A kind of method for upgrading software and device
CN103701856B (en) A kind of method that definition and terminal device obtain AKU
CN105677404A (en) Zookeeper based configuration updating method and device
CN104866307B (en) The restorative procedure and device of a kind of application program
CN106055334B (en) Code management system and method
CN106707848A (en) Control program organization structure of control system and download method
CN105528225A (en) Application loading method and loading apparatus
CN106648787A (en) Resource updating method and terminal
CN105843613A (en) Method and apparatus for updating user interface layout of application
CN108228810A (en) List linkage configuration method and system and list update method and system
CN109358887A (en) A kind of the online upgrading method, apparatus and system of SCM program
CN109918113A (en) Multiple/hot update method of IOS application hot repair, server and storage medium
CN109324544A (en) The configuration of entire car controller hardware and software platform and integrated Compilation Method and system
CN105867905A (en) Application program bug repairing method and device
CN105718259A (en) Eclipse based rapid component plugging development method
CN109358865A (en) A kind of industrial vehicle car networking instrument and upgrade method with remote upgrade function
CN110471693A (en) Application issued, operation method and equipment
CN108255735A (en) Associated environment test method, electronic device and computer readable storage medium
CN105335201A (en) Application software updating method and device
CN111142922B (en) Application program updating method, device, terminal and server
CN109636664A (en) A kind of distribution system, distribution main website and its point table model update method
CN114647519A (en) Data transmission method and device between native platform and Flutter platform and storage medium
CN110262828A (en) System business module configuration method, system, readable storage medium storing program for executing and equipment
CN102629198B (en) On-demand remote execution method of computational logic in software application
CN101267645B (en) Automatic test method and system for service flow software development of W base station

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160817

WD01 Invention patent application deemed withdrawn after publication