CN105867905A - Application program bug repairing method and device - Google Patents
Application program bug repairing method and device Download PDFInfo
- Publication number
- CN105867905A CN105867905A CN201610162435.5A CN201610162435A CN105867905A CN 105867905 A CN105867905 A CN 105867905A CN 201610162435 A CN201610162435 A CN 201610162435A CN 105867905 A CN105867905 A CN 105867905A
- Authority
- CN
- China
- Prior art keywords
- application program
- functional module
- utilization rate
- patch file
- repair information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000008439 repair process Effects 0.000 claims description 44
- 238000012544 monitoring process Methods 0.000 claims description 21
- 230000005611 electricity Effects 0.000 claims description 15
- 230000008569 process Effects 0.000 claims description 12
- 238000012546 transfer Methods 0.000 claims description 7
- 230000006870 function Effects 0.000 description 6
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000002372 labelling Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/72—Code refactoring
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an application program bug repairing method and device. The application program bug repairing method comprises the following steps: receiving and loading a patch file for repairing an application program bug; analyzing the patch file, and operating the repairing information in the analyzed patch file, and revising a functional module in an application program corresponding to the repairing information; and updating the functional module revised according to the repairing information. Therefore, the application program bug repairing method and device solves the problem that only the new version of the whole application program can be downloaded and updated by aiming at the application program which has bugs.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of vulnerability of application program restorative procedure and dress
Put.
Background technology
Along with the development of terminal, various application programs also arise at the historic moment.And these application programs were being applied
Often due to imperfection in journey, a lot of problems occurs, thus cause such as blank screen, dodge and move back etc. phenomenon
Generation.
At present, the various problems occurred for application program, the method generally used is exactly can be to application journey
Sequence is modified to form new version, then downloads, runs, the problem version before replacing it.But
It is that existing this mode terminal needs the whole application program after down loading updating, adds the behaviour of terminal
Measure.The leak repairing time length of application program, efficiency are low simultaneously, and Consumer's Experience is excessively poor.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention be to propose a kind of vulnerability of application program restorative procedure and
Device, solve can only download for the application program started a leak, to update whole described application program new
The problem of version.
The vulnerability of application program restorative procedure provided based on the above-mentioned purpose embodiment of the present invention, including step:
Receive and download the patch file that vulnerability of application program is repaired;
Patch file described in parsing, runs the repair information in described patch file after resolving, to
Functional module in the described application program that described repair information is corresponding is modified;
The described functional module modified according to described repair information is updated.
In certain embodiments, the patch file that described download vulnerability of application program is repaired includes:
Start network monitor process, when monitoring described network and being in non-moving data network state, then
Download the patch file that vulnerability of application program is repaired.
In certain embodiments, before the patch file described in parsing, also include:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag
Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than
Or equal to the minimum utilization rate preset;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
In certain embodiments, the described functional module modified according to described repair information is carried out more
Time new, also include:
Obtain the electricity of terminal;
Judge whether less than the power threshold preset;If being not less than default power threshold, then will be according to institute
State the described functional module that repair information modifies to be updated;If less than the power threshold preset, then
Start electric quantity monitoring process, when monitoring described terminal power and being not less than default power threshold, then will
It is updated according to the described functional module that described repair information is modified.
In certain embodiments, described to the function in the described application program corresponding with described repair information
Before module is modified, also include:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould
Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute
State functional module, the most do not revise described functional module.
On the other hand, present invention also offers a kind of vulnerability of application program prosthetic device, including:
Download unit, for receiving and download the patch file that vulnerability of application program is repaired;
Running unit, for resolving described patch file, after operation parsing in described patch file
Repair information, modifies to the functional module in the described application program corresponding with described repair information;
Updating block, for carrying out the described functional module modified according to described repair information more
Newly.
In certain embodiments, described download unit, it is additionally operable to:
Start network monitor process, when monitoring described network and being in non-moving data network state, then
Download the patch file that vulnerability of application program is repaired.
In certain embodiments, described running unit, it is additionally operable to:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag
Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than
Or equal to the minimum utilization rate preset;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
In certain embodiments, described updating block, it is additionally operable to:
Obtain the electricity of terminal;
Judge whether less than the power threshold preset;If being not less than default power threshold, then will be according to institute
State the described functional module that repair information modifies to be updated;If less than the power threshold preset, then
Start electric quantity monitoring process, when monitoring described terminal power and being not less than default power threshold, then will
It is updated according to the described functional module that described repair information is modified.
In certain embodiments, the described application program that described running unit pair is corresponding with described repair information
In functional module modify before, be additionally operable to:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould
Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute
State functional module, the most do not revise described functional module.
From the above it can be seen that the vulnerability of application program restorative procedure of present invention offer and device, logical
Cross and download the patch file that vulnerability of application program is repaired;Patch file described in parsing, runs after resolving
Repair information in described patch file, in the described application program corresponding with described repair information
Functional module is modified;The described functional module modified according to described repair information is carried out more
Newly.Thus, it is possible to realize for the application program started a leak, can only leak part be carried out more
Newly, it is to avoid replacement to whole application program, it is greatly optimized the service content of application program.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of vulnerability of application program restorative procedure in first embodiment of the invention;
Fig. 2 is that the present invention refers to the schematic flow sheet of vulnerability of application program restorative procedure in embodiment;
Fig. 3 is the structural representation of vulnerability of application program prosthetic device in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with tool
Body embodiment, and referring to the drawings, the present invention is described in more detail.
According to the use situation of application program in terminal, when application program starts a leak, user can only pass through
The new edition downloading this application program realized the renewal of legacy version originally, caused the leak repairing of application program to be imitated
Rate is the lowest, and Consumer's Experience is excessively poor..
It should be noted that the statement of all uses " first " and " second " is equal in the embodiment of the present invention
It is for the parameter of the entity or non-equal distinguishing two same names non-equal, it is seen that " first "
" second ", only for the convenience of statement, should not be construed as the restriction to the embodiment of the present invention, subsequent implementation
This is illustrated by example the most one by one.
Refering to shown in Fig. 1, show for the flow process of vulnerability of application program restorative procedure in first embodiment of the invention
Being intended to, described vulnerability of application program restorative procedure includes:
Step 101, receives and downloads the patch file that vulnerability of application program is repaired.
In an embodiment, network monitor process can be started, when the network monitoring described terminal is in non-
During mobile data network state, then download the patch file that vulnerability of application program is repaired.It is to say,
This technical scheme can monitor the network state of described terminal unit, and intelligentized accomplishes when described end
When the network state of end equipment is non-moving data network state, just can download vulnerability of application program amendment
Patch file.Therefore, it can be greatly saved the network charges of terminal unit, improve network utilisation
Rate, is simultaneously achieved the intellectuality that vulnerability of application program is repaired.
It addition, the patch file for leak repairing can be to be set to terminal by server active push
Standby, naturally it is also possible to be sent inquiry request by terminal unit to server and obtain the patch of leak repairing
File.
Step 102, the patch file described in parsing, runs the repairing in described patch file after resolving
Information, the functional module of the described application program corresponding to this repair information is modified.
As embodiment, the patch file that analyzing step 101 is downloaded, this patch file just can be made to exist
Run in different operating system, such as android, ios etc..Wherein, described patch literary composition
Part refers to the file for storing application program patch instruction.
In one preferably embodiment, before resolving patch file, can first obtain and pre-set
Application program utilization rate table.Wherein, described application program utilization rate table includes statistics application program
Use frequency in the given time.Such as: the use frequency of application program within a time period.
Then, it is judged that the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is
No more than or equal to the minimum utilization rate preset, if more than or equal to, the directly patch literary composition described in parsing
Part.If less than, do not perform to resolve the operation of described patch file.Wherein, described minimum utilization rate
It is to define one minimum utilization rate of application program, the i.e. utilization rate of application program minimum to make less than described
By rate, then it is unworthy this application program is carried out leak repairing.It is thus possible to according to the patch downloaded
The application program utilization rate that file is corresponding, decides whether to resolve this patch file.I.e. when an application
When the utilization rate of program is the lowest, just the leak of this application program can not be repaired.
In another preferably embodiment, after the patch file described in resolving, obtain after resolving
Patch file in repair information, determine the functional module that this application program is to be revised.Then,
Transfer the functional module utilization rate table that this application program pre-sets.Wherein, described functional module uses
Rate table includes each functional module of statistics application program use frequency in the given time.Afterwards,
Whether the utilization rate of the described functional module that judgement is to be revised is zero, if not zero is run described in after parsing
The repair information of this functional module in patch file, if zero does not operates.
It should be noted that can include at least one functional module in an application program, user is permissible
Use corresponding functional module as required.If the utilization rate of a functional module is zero, then illustrate to use
Family use this application program time the most this functional module is not operated, i.e. this functional module for
For this user useless, the most just there is no need the leak to this functional module and carry out
Repair.Thus, this embodiment point situation can carry out leak repairing to functional module, to a great extent
Improve the efficiency that vulnerability of application program is repaired.
Further, when the utilization rate of described functional module to be revised is zero, then to this function mould
Block is marked.Run resolve after the repair information of functional module in described patch file time, run into
There is the functional module then not amendment of this labelling.
Step 103, is updated the described functional module modified according to this repair information.
As embodiment, before the functional module that have modified is updated, described terminal can be obtained
Electricity.Next, it is determined whether less than the power threshold preset, if being not less than default power threshold,
Directly the functional module of amendment will be updated.If less than the power threshold preset, starting electric quantity monitoring
Process, when monitoring when described terminal power is not less than default power threshold then by the function mould to amendment
Block is updated.Thus, when described terminal power height, at once amendment part is refreshed.Institute
State terminal power low time, first start described application program, then refresh as electricity Gao Shizai, i.e. exist
Also amendment part is refreshed while not affecting the described application program of normal startup.Such as: current
Electricity is less than the power threshold preset, but has been higher than the power threshold preset through overcharge.
As an embodiment referred to, refering to shown in Fig. 2, described vulnerability of application program restorative procedure
Specifically can use following steps:
Step 201, starts network monitor process.
Step 202, when the network monitoring described terminal is in non-moving data network state, then under
Carry the patch file that vulnerability of application program is repaired.
Step 203, obtains the application program utilization rate table pre-set.
Wherein, described application program utilization rate table includes statistics application program making in the given time
Use frequency.
Step 204, it is judged that the utilization rate of the application program that the leak repairing patch file downloaded is corresponding
Whether more than or equal to the minimum utilization rate preset, if the most directly carrying out walking 205, the most directly exit
This flow process.
Step 205, the patch file described in parsing.
Step 206, obtains the repair information in described patch file after resolving, determines this application program institute
Functional module to be revised.
Step 207, transfers the functional module utilization rate table that this application program pre-sets.
Wherein, described functional module utilization rate table includes each functional module of statistics application program and exists
Use frequency in the scheduled time.
Step 208, it is judged that whether the utilization rate of described functional module to be revised is zero, if not zero
Carry out step 209, the most directly exit this flow process.
Step 209, after operation parsing, the repair information of this functional module in described patch file, repaiies this
The functional module of the described application program that benefit information is corresponding is modified.
Step 210, obtains the electricity of described terminal.
Step 211, it may be judged whether less than the power threshold preset, if being not less than default power threshold,
Directly carry out step 213, if less than the power threshold preset, carrying out step 212.
Step 212, starts electric quantity monitoring process, is not less than default electricity when monitoring described terminal power
Step 213 is then carried out during amount threshold value.
Step 213, is updated the described functional module modified according to this repair information.
In another aspect of this invention, a kind of vulnerability of application program prosthetic device is additionally provided, such as Fig. 3 institute
Showing, described vulnerability of application program prosthetic device includes download unit 301, the running unit 302 being sequentially connected with
And updating block 303.Wherein, download unit 301 receives and downloads what vulnerability of application program was repaired
Patch file, running unit 302 resolves described patch file, runs described patch literary composition after resolving
Repair information in part, the functional module of the described application program corresponding to this repair information is modified.
Finally, the described functional module modified according to this repair information is updated by updating block 303.
In one embodiment, described download unit 301 is additionally operable to start network monitor process, works as monitoring
When network to described terminal is in non-moving data network state, then download what vulnerability of application program was repaired
Patch file.It is to say, this technical scheme can monitor the network state of described terminal unit, and
Intelligentized accomplishing just can be below when the network state of described terminal unit is non-moving data network state
Carry the patch file of vulnerability of application program amendment.
It addition, the patch file for leak repairing can be to terminal unit by server active push
Download unit 301.It is of course also possible to sent inquiry by the download unit 301 of terminal unit to server
Asking, being then downloaded when there is the leak repairing patch file of described application program.
In another embodiment, running unit 302, before resolving patch file, can first obtain
The application program utilization rate table pre-set.Then, it is judged that the leak repairing patch file downloaded
Whether the utilization rate of corresponding application program is more than or equal to the minimum utilization rate preset, if the most directly solving
Patch file described in analysis.Do not perform to resolve the operation of described patch file.It is thus possible to root
According to the application program utilization rate that the patch file downloaded is corresponding, decide whether to resolve this patch file.
I.e. when the utilization rate of an application program is the lowest, just the leak of this application program can not be repaiied
Mend.
Further, after described running unit 302 resolves patch file, it is also possible to obtain and resolve
Repair information in rear patch file, determines the functional module that this application program is to be revised.Then,
Transfer the functional module utilization rate table that this application program pre-sets.The described functional module that judgement is to be revised
Utilization rate whether be zero, if not zero run resolve after this functional module in described patch file
Repair information, if zero does not operates.Preferably, when the utilization rate of described functional module to be revised
When being zero, then this functional module is marked.Function mould in described patch file after running parsing
During the repair information of block, run into the functional module then not amendment with this labelling.
It addition, described updating block 303 is before being updated the functional module that have modified, permissible
Obtain the electricity of described terminal.Next, it is determined whether less than the power threshold preset, if being not less than default
Power threshold then will directly the functional module of amendment be updated.If less than the power threshold preset,
Start electric quantity monitoring process, when monitoring when described terminal power is not less than default power threshold then by right
The functional module of amendment is updated.Thus, when described terminal power height, at once amendment part is entered
Row refreshes.When described terminal power is low, first starts described application program, then enter as electricity Gao Shizai
Row refreshes, and is i.e. also brushed amendment part while not affecting the described application program of normal startup
Newly.
It should be noted that in being embodied as of vulnerability of application program prosthetic device of the present invention
Hold, be described in detail in vulnerability of application program restorative procedure described above, therefore in repeating at this
Hold and no longer illustrate.
In sum, the vulnerability of application program restorative procedure of present invention offer, device, creatively utilize
Patch file is repaired for the leak of application program;And, it is not necessary to user manually downloads should
By the redaction of program, the mode replacing legacy version by redaction realizes leak repairing;And, simplify
Leak repairing process and the operating process of user, decrease the repairing time, improve repairing efficiency;Tool
There is extensive, great dissemination;Finally, whole described vulnerability of application program restorative procedure and device
Compact, it is easy to control.
Those of ordinary skill in the field are it is understood that the discussion of any of the above embodiment is merely illustrative
, it is not intended that hint the scope of the present disclosure (including claim) is limited to these examples;At this
Under bright thinking, between the technical characteristic in above example or different embodiment, group can also be carried out
Closing, step can realize with random order, and there is the many of the different aspect of the present invention as above
Other change, for they not offers in details simple and clear.
It addition, for simplifying explanation and discussing, and in order to obscure the invention, provided
Accompanying drawing in can illustrate or can not illustrate with integrated circuit (IC) chip and other parts known
Power supply/grounding connection.Furthermore, it is possible to illustrate device in block diagram form, in order to avoid making the present invention be difficult to
Understand, and this have also contemplated that following facts, i.e. the details about the embodiment of these block diagram arrangements is
Depend highly on will implement the present invention platform (that is, these details should be completely in this area skill
In the range of the understanding of art personnel).Elaborating that detail (such as, circuit) is to describe showing of the present invention
In the case of example embodiment, it will be apparent to those skilled in the art that can there is no this
In the case of a little details or these details change in the case of implement the present invention.Therefore,
These descriptions are considered as illustrative and not restrictive.
Although invention has been described to have been incorporated with the specific embodiment of the present invention, but according to front
The description in face, a lot of replacements, amendment and the modification of these embodiments are for those of ordinary skills
Will be apparent from.Such as, other memory architecture (such as, dynamic ram (DRAM)) can
The embodiment discussed with use.
Embodiments of the invention be intended to fall within the broad range of claims all so
Replacement, amendment and modification.Therefore, all within the spirit and principles in the present invention, any province done
Summary, amendment, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (10)
1. a vulnerability of application program restorative procedure, it is characterised in that include step:
Receive and download the patch file that vulnerability of application program is repaired;
Patch file described in parsing, runs the repair information in described patch file after resolving, to
Functional module in the described application program that described repair information is corresponding is modified;
The described functional module modified according to described repair information is updated.
Method the most according to claim 1, it is characterised in that described download vulnerability of application program is repaiied
The patch file mended includes:
Start network monitor process, when monitoring described network and being in non-moving data network state, under
Carry the patch file that vulnerability of application program is repaired.
Method the most according to claim 1 and 2, it is characterised in that the patch literary composition described in parsing
Before part, also include:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag
Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than
Or equal to presetting minimum utilization rate;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
Method the most according to claim 1, it is characterised in that will carry out according to described repair information
When the described functional module of amendment is updated, also include:
Obtain the electricity of terminal;
Judge whether more than or equal to the power threshold preset;If more than or equal to the power threshold preset,
Then the described functional module modified according to described repair information is updated;If less than the electricity preset
Amount threshold value, then start electric quantity monitoring process, when monitoring described terminal power more than or equal to the electricity preset
During amount threshold value, the more described functional module modified according to described repair information is updated.
Method the most according to claim 1, it is characterised in that described to described repair information pair
Before functional module in the described application program answered is modified, also include:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould
Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute
State functional module, the most do not revise described functional module.
6. a vulnerability of application program prosthetic device, it is characterised in that including:
Download unit, for receiving and download the patch file that vulnerability of application program is repaired;
Running unit, for resolving described patch file, after operation parsing in described patch file
Repair information, modifies to the functional module in the described application program corresponding with described repair information;
Updating block, for carrying out the described functional module modified according to described repair information more
Newly.
Device the most according to claim 6, it is characterised in that described download unit, is additionally operable to:
Start network monitor process, when monitoring described network and being in non-moving data network state, then
Download the patch file that vulnerability of application program is repaired.
8. according to the device described in claim 6 or 7, it is characterised in that described running unit, also
For:
Obtain the application program utilization rate table pre-set;Wherein, described application program utilization rate table bag
Containing application program use frequency in the given time;
Judge whether the utilization rate of the application program that the leak repairing patch file downloaded is corresponding is more than
Or equal to the minimum utilization rate preset;
If more than or equal to described minimum utilization rate, the most directly patch file described in parsing;
If less than described minimum utilization rate, not performing to resolve the operation of described patch file.
Device the most according to claim 6, it is characterised in that described updating block, is additionally operable to:
Obtain the electricity of terminal;
Judge whether more than or equal to the power threshold preset;If more than or equal to the power threshold preset,
Then the described functional module modified according to described repair information is updated;If less than the electricity preset
Amount threshold value, then start electric quantity monitoring process, when monitoring described terminal power more than or equal to the electricity preset
During amount threshold value, the more described functional module modified according to described repair information is updated.
Device the most according to claim 6, it is characterised in that described running unit pair is with described
Before functional module in the described application program that repair information is corresponding is modified, it is additionally operable to:
Transfer the functional module utilization rate table that described application program pre-sets;Wherein, described function mould
Block utilization rate table includes each functional module of application program use frequency in the given time;
Whether the utilization rate of described functional module to be revised described in judging is zero, if not zero amendment institute
State functional module, the most do not revise described functional module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610162435.5A CN105867905A (en) | 2016-03-21 | 2016-03-21 | Application program bug repairing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610162435.5A CN105867905A (en) | 2016-03-21 | 2016-03-21 | Application program bug repairing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105867905A true CN105867905A (en) | 2016-08-17 |
Family
ID=56625269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610162435.5A Pending CN105867905A (en) | 2016-03-21 | 2016-03-21 | Application program bug repairing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105867905A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106649091A (en) * | 2016-10-18 | 2017-05-10 | 厦门美图移动科技有限公司 | Method and device for detecting whether application can be normally used, and mobile terminal |
CN107423097A (en) * | 2017-07-28 | 2017-12-01 | 北京明朝万达科技股份有限公司 | The management method and device of a kind of application program |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101944032A (en) * | 2009-07-03 | 2011-01-12 | 华为技术有限公司 | Microware updating method, client, server and system |
CN103745158A (en) * | 2014-01-26 | 2014-04-23 | 北京奇虎科技有限公司 | Method and device for repairing system bugs |
WO2014161278A1 (en) * | 2013-04-03 | 2014-10-09 | 中兴通讯股份有限公司 | Mobile terminal and upgrade method therefor |
CN104423985A (en) * | 2013-08-30 | 2015-03-18 | 联想(北京)有限公司 | Method and device for noticing update of applications |
-
2016
- 2016-03-21 CN CN201610162435.5A patent/CN105867905A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101944032A (en) * | 2009-07-03 | 2011-01-12 | 华为技术有限公司 | Microware updating method, client, server and system |
WO2014161278A1 (en) * | 2013-04-03 | 2014-10-09 | 中兴通讯股份有限公司 | Mobile terminal and upgrade method therefor |
CN104423985A (en) * | 2013-08-30 | 2015-03-18 | 联想(北京)有限公司 | Method and device for noticing update of applications |
CN103745158A (en) * | 2014-01-26 | 2014-04-23 | 北京奇虎科技有限公司 | Method and device for repairing system bugs |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106649091A (en) * | 2016-10-18 | 2017-05-10 | 厦门美图移动科技有限公司 | Method and device for detecting whether application can be normally used, and mobile terminal |
CN106649091B (en) * | 2016-10-18 | 2019-04-02 | 厦门美图移动科技有限公司 | It is a kind of detection application can normal use method, apparatus and mobile terminal |
CN107423097A (en) * | 2017-07-28 | 2017-12-01 | 北京明朝万达科技股份有限公司 | The management method and device of a kind of application program |
CN107423097B (en) * | 2017-07-28 | 2019-02-22 | 北京明朝万达科技股份有限公司 | A kind of management method and device of application program |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103701856B (en) | A kind of method that definition and terminal device obtain AKU | |
CN104866307B (en) | The restorative procedure and device of a kind of application program | |
CN105677404A (en) | Zookeeper-based configuration updating method and device | |
CN107506219A (en) | A kind of general version upgrade method based on android system | |
CN106707848A (en) | Control program organization structure of control system and download method | |
CN106648787A (en) | Resource updating method and terminal | |
CN105528225A (en) | Application loading method and loading apparatus | |
CN105843613A (en) | Method and apparatus for updating user interface layout of application | |
CN108228810A (en) | List linkage configuration method and system and list update method and system | |
CN109358887A (en) | A kind of the online upgrading method, apparatus and system of SCM program | |
CN109918113A (en) | Multiple/hot update method of IOS application hot repair, server and storage medium | |
CN109324544A (en) | The configuration of entire car controller hardware and software platform and integrated Compilation Method and system | |
CN105867905A (en) | Application program bug repairing method and device | |
CN109358865A (en) | A kind of industrial vehicle car networking instrument and upgrade method with remote upgrade function | |
CN110471693A (en) | Application issued, operation method and equipment | |
CN105335201A (en) | Application software updating method and device | |
CN111142922B (en) | Application program updating method, device, terminal and server | |
CN109636664A (en) | A kind of distribution system, distribution main website and its point table model update method | |
CN114647519A (en) | Data transmission method and device between native platform and Flutter platform and storage medium | |
CN110262828A (en) | System business module configuration method, system, readable storage medium storing program for executing and equipment | |
CN102629198B (en) | On-demand remote execution method of computational logic in software application | |
CN101267645B (en) | Automatic test method and system for service flow software development of W base station | |
CN105677422A (en) | Method for renewing monitoring program, application and subsequent renewing application at same time | |
CN106201584A (en) | Version upgrading method and terminal unit | |
CN112230848A (en) | NVM automatic configuration method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160817 |