CN108133125A - The access method and system of a kind of application program - Google Patents

The access method and system of a kind of application program Download PDF

Info

Publication number
CN108133125A
CN108133125A CN201810044407.2A CN201810044407A CN108133125A CN 108133125 A CN108133125 A CN 108133125A CN 201810044407 A CN201810044407 A CN 201810044407A CN 108133125 A CN108133125 A CN 108133125A
Authority
CN
China
Prior art keywords
access
user
target
application program
thresholds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810044407.2A
Other languages
Chinese (zh)
Inventor
芦正帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Net Letter Cloud Suit Mdt Infotech Ltd
Original Assignee
Beijing Net Letter Cloud Suit Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Net Letter Cloud Suit Mdt Infotech Ltd filed Critical Beijing Net Letter Cloud Suit Mdt Infotech Ltd
Priority to CN201810044407.2A priority Critical patent/CN108133125A/en
Publication of CN108133125A publication Critical patent/CN108133125A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of access method of application program, applied to the application layer of destination application, including:When receiving access request of the user to the destination application, access rule corresponding with the access request is obtained;According to the access rule, the access thresholds range of each object to be measured application program that the destination application includes is obtained respectively, obtains access thresholds collection;The corresponding target critical value of the user is obtained, judges that the access thresholds are concentrated and includes the target critical value with the presence or absence of a target access threshold range;When it is present, the user is enabled to access object to be measured application program corresponding with the target access threshold range.The above method is applied in application layer, and corresponding a variety of access rules distinguish user, and it is relatively single to avoid the rule distinguished in the prior art, it is difficult to the differentiation of user the problem of.

Description

The access method and system of a kind of application program
Technical field
The present invention relates to functional test field more particularly to the access methods and system of a kind of application program.
Background technology
For application program, when the demand of user changes, need to be updated it, be updated at least one A beta version application program, but do not ensure that the beta version application program can meet user demand, therefore, can select according to According to user data such as the ownership place of user, source, genders, user is distinguished.A part of user is continuing with existing application Program, a part of user begin to use beta version application program, if what user oppose to anticipate to beta version application program without See, then gradually expanded scope all moves to all users above beta version application program to come.It is carried out above by user The method for distinguishing to access different editions application program, it is ensured that the stabilization of application program timely finds, adjusts using journey The problem of sequence.
Inventor carries out the study found that the differentiation of existing user is in O&M the access process of existing application program The processing that level carries out, since the granularity of O&M level user data is thicker, the rule of differentiation is relatively single, therefore, to user Differentiation it is difficult.
Invention content
In view of this, the present invention provides a kind of access method and system of application program, existing in the prior art to solve The differentiation of user be the processing carried out in O&M level, since the granularity of O&M level user data is thicker, the rule of differentiation It is then relatively single, therefore, it is difficult to the differentiation of user the problem of, concrete scheme is as follows:
A kind of access method of application program, applied to the application layer of destination application, including:
When receiving access request of the user to the destination application, visit corresponding with the access request is obtained Ask rule;
According to the access rule, each object to be measured application program that the destination application includes is obtained respectively Access thresholds range obtains access thresholds collection;
The corresponding target critical value of the user is obtained, judges that the access thresholds are concentrated with the presence or absence of a target access Threshold range includes the target critical value;
When it is present, the user is enabled to access object to be measured application program corresponding with the target access threshold range.
Above-mentioned method, it is preferred that further include:
When it be not present, the user is enabled to access default objects application program.
Above-mentioned method, it is preferred that according to the access rule, obtain respectively the destination application include it is each The access thresholds range of object to be measured application program obtains access thresholds collection and includes:
According to the access rule, access rule library corresponding with the access rule is determined;
For each object to be measured application program, searched and object to be measured application program pair in the access rule library The access thresholds range answered;
By access thresholds range storage to access threshold set.
Above-mentioned method, it is preferred that obtain the corresponding target critical value of the user, judge that the access thresholds concentration is It is no to include there are a target access threshold range comprising the target critical value:
The user is parsed, obtains the corresponding each key value of the target user;
It is searched and the matched target critical value of the access rule in each key value;
The access thresholds collection is traversed, judges whether that a target access threshold range includes the target critical Value.
Above-mentioned method, it is preferred that further include:
When the END instruction for detecting the access request, the access feedback result of the user is obtained.
A kind of access system of application program, applied to the application layer of destination application, including:
First acquisition module for when receiving access request of the user to the destination application, obtains and institute State the corresponding access rule of access request;
Second acquisition module, for according to the access rule, obtain respectively the destination application include it is each The access thresholds range of object to be measured application program, obtains access thresholds collection;
Judgment module for obtaining the corresponding target critical value of the user, judges whether the access thresholds concentration deposits The target critical value is included in a target access threshold range;
First access modules, it is corresponding with the target access threshold range for the user when it is present, to be enabled to access Object to be measured application program.
Above-mentioned system, it is preferred that further include:
Second access modules, for the user when it be not present, to be enabled to access default objects application program.
Above-mentioned system, it is preferred that second acquisition module includes:
Determination unit, for according to the access rule, determining access rule library corresponding with the access rule
First searching unit, for being directed to each object to be measured application program, in the access rule library search with The corresponding access thresholds range of object to be measured application program;
Storage unit, for storing the access thresholds range to access threshold set.
Above-mentioned system, it is preferred that the judgment module includes:
Resolution unit for parsing the user, obtains the corresponding each key value of the target user;
Second searching unit, for being searched and the matched target critical of the access rule in each key value Value;
Judging unit for traversing the access thresholds collection, judges whether that a target access threshold range includes The target critical value.
Above-mentioned system, it is preferred that further include:
Third acquisition module, for when the END instruction for detecting the access request, obtaining the access of the user Feedback result.
Compared with prior art, the present invention includes advantages below:
The invention discloses a kind of access method of application program, applied to the application layer of destination application, including:When When receiving access request of the user to the destination application, access rule corresponding with the access request is obtained;According to According to the access rule, the access thresholds model of each object to be measured application program that the destination application includes is obtained respectively It encloses, obtains access thresholds collection;The corresponding target critical value of the user is obtained, judges that the access thresholds are concentrated with the presence or absence of one A target access threshold range includes the target critical value;When it is present, the user is enabled to access and the target access threshold It is worth the corresponding object to be measured application program of range.The above method is applied in application layer, and corresponding a variety of access rules carry out user Distinguish, avoid distinguish in the prior art rule it is relatively single, it is difficult to the differentiation of user the problem of.
Certainly, it implements any of the products of the present invention and does not necessarily require achieving all the advantages described above at the same time.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of access method flow chart of application program disclosed in the embodiment of the present application;
Fig. 2 is a kind of another method flow diagram of the access method of application program disclosed in the embodiment of the present application;
Fig. 3 is a kind of another method flow diagram of the access method of application program disclosed in the embodiment of the present application;
Fig. 4 is a kind of access system structure diagram of application program disclosed in the embodiment of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work Embodiment shall fall within the protection scope of the present invention.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the present invention. A variety of modifications of these embodiments will be apparent for those skilled in the art, it is as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and the principles and novel features disclosed herein phase one The most wide range caused.
The present invention provides a kind of access method of application program, the access method can be applied in AB tests or ash It spends in issuing process, wherein, the AB tests refer to makes two (A/B) or multiple (A/B/n) for Web or App interfaces or flow Version in same time dimension, allows access these versions that the visitor group of constituent identical (similar) is random, collects respectively The user experience data and business datum of each group, ultimate analysis evaluate best version and formally use;The gray scale publication is again Name canary publication, refers between black and white, a kind of published method that can be seamlessly transitted.A/B can be carried out on it Testing allows a part of user to continue to use product characteristic A, a part of user starts to use product characteristic B, if user does not have B There is any opposing views, then gradually expanded scope all moves to all users above B to come.Gray scale publication can ensure whole The stabilization of system system, can find, adjustment problem when initial gray, to ensure its disturbance degree.The method is held Row main body can be with the access test platform of application program or processor etc., in the embodiment of the present invention by taking the process of AB tests as an example It illustrates, the flow of the access method is as shown in Figure 1, including step:
S101, when receiving access request of the user to the destination application, obtain with the access request pair The access rule answered;
In the embodiment of the present invention, the intended application is the current application program for carrying out AB tests, described to apply journey There are multiple object to be measured application programs and a default objects application program for sequence.Carry out destination application access it Before, can an access rule be determined for the destination application in advance, the access rule can be individual one, Can be that multiple individual access rules carry out the access rule of combination that logic budget obtains, each access rule is stored in In one preset access rule list.
S102, according to the access rule, obtain each object to be measured application that the destination application includes respectively The access thresholds range of program, obtains access thresholds collection;
In the embodiment of the present invention, access rule is different, and the corresponding access thresholds of same object to be measured application program are not yet It is identical, it is determined that after access rule, to obtain each object to be measured application program that the destination application includes respectively Access thresholds range, wherein, the access thresholds may range from specific threshold value, threshold interval or a threshold value and threshold value The combination in section.
S103, the corresponding target critical value of the user is obtained, judges that the access thresholds are concentrated with the presence or absence of a mesh It marks access thresholds range and includes the target critical value;
In the embodiment of the present invention, after access rule is determined, need acquisition user corresponding with the access rule Target critical value, the target critical value are the user informations distributed in advance for each user, for a user, are often increased newly One access rule all can be that user distributes a user information corresponding with the access rule.
S104, when it is present enables the user access object to be measured application corresponding with the target access threshold range Program.
In the embodiment of the present invention, if the access thresholds concentrate there are a target access threshold ranges to include the target Key value enables the user access object to be measured application program corresponding with the target access threshold range.
In the embodiment of the present invention, further include:When it be not present, the user is enabled to access default objects application program.
In the embodiment of the present invention, each access thresholds range that the access thresholds collection includes is misaligned, in this way may be used To ensure, in user's access target application program, an object to be measured application program or default objects application journey can only be accessed Sequence
In the embodiment of the present invention, the access rule is:User's white list, user group white list, percentage divide and with Four kinds of machine value either the logical combination logical combination in Arbitrary Sets can be carry out with or or operation.
In the embodiment of the present invention, object to be measured application program can be that destination application adds certain new new functions May also be algorithm or processing mode are updated on the original basis.
In the embodiment of the present invention, further include:When the END instruction for detecting the access request, obtain the user's Access feedback result.The purpose for obtaining feedback result is feedback of each user of analysis to different object to be measured application programs, according to According to the feedback result, which object to be measured application program is determined for preferred application or according to the feedback result, Destination application to be measured is improved.
In the embodiment of the present invention, the access process of above-mentioned destination application is applied in application layer, is seven layers of osi model Layer 7.Application layer directly and application programming interfaces and provides common network english teaching.Application layer is also sent out to expression layer Go out request.Application layer is the top of open system, is directly to provide service for application process.It is multiple in realization that it, which is acted on, While system application process is in communication with each other, a series of service needed for business processings is completed.
The invention discloses a kind of access method of application program, applied to the application layer of destination application, including:When When receiving access request of the user to the destination application, access rule corresponding with the access request is obtained;According to According to the access rule, the access thresholds model of each object to be measured application program that the destination application includes is obtained respectively It encloses, obtains access thresholds collection;The corresponding target critical value of the user is obtained, judges that the access thresholds are concentrated with the presence or absence of one A target access threshold range includes the target critical value;When it is present, the user is enabled to access and the target access threshold It is worth the corresponding object to be measured application program of range.The above method is applied in application layer, and corresponding a variety of access rules carry out user Distinguish, avoid distinguish in the prior art rule it is relatively single, it is difficult to the differentiation of user the problem of.
In the embodiment of the present invention, according to the access rule, obtain that the destination application includes respectively each treats The access thresholds range of destination application is surveyed, obtains the method flow of access thresholds collection as shown in Fig. 2, including step:
S201, according to the access rule, determine access rule library corresponding with the access rule;
In the embodiment of the present invention, the access rule is parsed, determines that the access rule is individual one or multiple The logical combination of individual access rule.The principle of differentiation:Whether judge in the access rule comprising logical operator.
In the embodiment of the present invention, for each access rule, each object to be measured application program can correspond to One access thresholds range corresponding with the access rule, will different object to be measured applications corresponding from same access rule The access thresholds range of program is all stored in access rule library corresponding with the access rule.The access rule library Zhong Bao Title and access thresholds range corresponding with the object to be measured application program containing the object to be measured application program.Wherein, Access thresholds range is user oneself setting, when user, which sets, to complete, by access thresholds range storage to corresponding access In rule base.
S202, for each object to be measured application program, searched and object to be measured application in the access rule library The corresponding access thresholds range of program;
In the embodiment of the present invention, for each object to be measured application program, according to the object to be measured application program Title in the access rule library, searches access thresholds range corresponding with the access rule.
S203, the access thresholds range is stored to access threshold set.
In the embodiment of the present invention, the corresponding target critical value of the user is obtained, whether judges the access thresholds concentration There are a target access threshold ranges to include the method flow of the target critical value as shown in figure 3, including step:
S301, the parsing user, obtain the corresponding each key value of the target user;
In the embodiment of the present invention, the user is parsed, obtains the corresponding each key value of the user.Each key It is worth to be corresponding from different access rules respectively, an access rule corresponds to a specific key value.
S302, it is searched and the matched target critical value of the access rule in each key value;
In the embodiment of the present invention, according to the title of the access rule, searched and the visit in each key value Ask the corresponding target critical value of title of rule.
S303, the traversal access thresholds collection, judge whether that a target access threshold range includes the target Key value.
In the embodiment of the present invention, the access thresholds collection is traversed, each access for respectively concentrating the access thresholds Threshold range is used as access thresholds range to be judged, is visited in access thresholds range to be judged described in judgement with the presence or absence of a target Ask that threshold range includes the target critical value.When it is present, the user is enabled to access and the target access threshold range pair The object to be measured application program answered.
In the embodiment of the present invention, respectively using the access rule as:User's white list, user group white list, percentage are gesticulated Divide and the access process of destination application is illustrated for four kinds of random value.
In the embodiment of the present invention, if the access rule is user's white list, user's white list is to pass through User ID The differentiation for the threshold value that accesses, the target critical value are User ID.If the current corresponding threshold value of object to be measured application program Ranging from:User ID is respectively 1,2,3, then user of the User ID in 1,2,3 can just access the function, and other users access Less than this function.
In the embodiment of the present invention, user group white list only requires user group ID in the range of corresponding access thresholds, other It is identical with the access process of user's white list.One ID of each users to share in the user group, a user group packet Containing multiple users with a certain same characteristic features.The target critical value is user group ID.When the ID meets corresponding threshold value model When enclosing, another user's group access object to be measured application program corresponding with the threshold range.
In the embodiment of the present invention, if the access rule is divided for percentage, the target critical value is User ID.If it visits It is less than 10% to ask threshold range, and User ID is respectively 10001 and 10020, and User ID modular arithmetic 100 obtains 1 and 20,1<10< 20, then 10001 this user are just in the range of, and 10020 in the range of.
In the embodiment of the present invention, if the access rule is random value, access thresholds are ranging from less than 20, and the target is closed Key assignments is random value.The random value is randomly assigned by random value function for each user, and only corresponding random value is small User in 20 could access object to be measured application program corresponding with the access thresholds.
In the embodiment of the present invention, if the access rule is the logical combination of above-mentioned several independent access rules, for Each object to be measured application program preferentially parses the corresponding logic of the access rule, according to the logic to the access The each independent access rule included in rule carries out logical operation, obtains accessing corresponding access thresholds range, according to institute Access thresholds range is stated, determines ownership goal key value, when the target pass that the user is included there are an access thresholds range During key assignments, the another user accesses the corresponding object to be measured application program of the access thresholds range.
Corresponding with the access method of above-mentioned application program, the present invention also provides a kind of access systems of application program System, the structure diagram of the access system is as shown in figure 4, including step:
First acquisition module 401, the second acquisition module 402,403 and first access modules 404 of judgment module.
Wherein
First acquisition module 401, for when receiving access request of the user to the destination application, obtaining Take access rule corresponding with the access request;
Second acquisition module 402, for according to the access rule, obtaining the destination application respectively and including Each object to be measured application program access thresholds range, obtain access thresholds collection;
The judgment module 403 for obtaining the corresponding target critical value of the user, judges that the access thresholds are concentrated The target critical value is included with the presence or absence of a target access threshold range;
First access modules 404, for the user when it is present, to be enabled to access and the target access threshold range Corresponding object to be measured application program.
The invention discloses a kind of access system of application program, applied to the application layer of destination application, including:When When receiving access request of the user to the destination application, access rule corresponding with the access request is obtained;According to According to the access rule, the access thresholds model of each object to be measured application program that the destination application includes is obtained respectively It encloses, obtains access thresholds collection;The corresponding target critical value of the user is obtained, judges that the access thresholds are concentrated with the presence or absence of one A target access threshold range includes the target critical value;When it is present, the user is enabled to access and the target access threshold It is worth the corresponding object to be measured application program of range.Above-mentioned system is applied in application layer, corresponding a variety of access rules to user into Row distinguish, avoid distinguish in the prior art rule it is relatively single, it is difficult to the differentiation of user the problem of.
In the embodiment of the present invention, the application program accesses system and further includes:
Second access modules 405, for the user when it be not present, to be enabled to access default objects application program.
In the embodiment of the present invention, second acquisition module 402 includes:
Determination unit 406, the first searching unit 407 and storage unit 408.
Wherein,
The determination unit 406, for according to the access rule, determining access rule library corresponding with the access rule
First searching unit 407, for being directed to each object to be measured application program, in the access rule library Search access thresholds range corresponding with object to be measured application program;
The storage unit 408, for storing the access thresholds range to access threshold set
In the embodiment of the present invention, the judgment module 403 includes:
Resolution unit 409, the second searching unit 410 and judging unit 411.
Wherein,
The resolution unit 409 for parsing the user, obtains the corresponding each key value of the target user;
Second searching unit 410, for being searched and the matched mesh of the access rule in each key value Mark key value;
The judging unit 411 for traversing the access thresholds collection, judges whether a target access threshold value model It encloses comprising the target critical value.
In the embodiment of the present invention, the application program accesses system, further includes:
Third acquisition module 412, for when the END instruction for detecting the access request, obtaining the visit of the user Ask feedback result.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference from other examples, and just to refer each other for identical similar part between each embodiment. For device class embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only include that A little elements, but also including other elements that are not explicitly listed or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except also there are other identical elements in the process, method, article or apparatus that includes the element.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit is realized can in the same or multiple software and or hardware during invention.
As seen through the above description of the embodiments, those skilled in the art can be understood that the present invention can It is realized by the mode of software plus required general hardware platform.Based on such understanding, technical scheme of the present invention essence On the part that the prior art contributes can be embodied in the form of software product in other words, the computer software product It can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, be used including some instructions so that a computer equipment (can be personal computer, server either network equipment etc.) performs the certain of each embodiment of the present invention or embodiment Method described in part.
The access method and system of a kind of application program provided by the present invention are described in detail above, herein It applies specific case to be expounded the principle of the present invention and embodiment, the explanation of above example is only intended to help Understand the method and its core concept of the present invention;Meanwhile for those of ordinary skill in the art, thought according to the present invention, There will be changes in specific embodiments and applications, in conclusion the content of the present specification should not be construed as to this The limitation of invention.

Claims (10)

1. a kind of access method of application program, which is characterized in that applied to the application layer of destination application, including:
When receiving access request of the user to the destination application, obtain access corresponding with the access request and advise Then;
According to the access rule, the access of each object to be measured application program that the destination application includes is obtained respectively Threshold range obtains access thresholds collection;
The corresponding target critical value of the user is obtained, judges that the access thresholds are concentrated with the presence or absence of a target access threshold value Range includes the target critical value;
When it is present, the user is enabled to access object to be measured application program corresponding with the target access threshold range.
2. it according to the method described in claim 1, it is characterized in that, further includes:
When it be not present, the user is enabled to access default objects application program.
3. according to the method described in claim 1, it is characterized in that, according to the access rule, obtaining the target respectively should The access thresholds range of each object to be measured application program included with program, obtains access thresholds collection and includes:
According to the access rule, access rule library corresponding with the access rule is determined;
For each object to be measured application program, searched in the access rule library corresponding with object to be measured application program Access thresholds range;
By access thresholds range storage to access threshold set.
4. according to the method described in claim 1, it is characterized in that, obtain the corresponding target critical value of the user, institute is judged Access thresholds concentration is stated with the presence or absence of a target access threshold range comprising the target critical value to include:
The user is parsed, obtains the corresponding each key value of the target user;
It is searched and the matched target critical value of the access rule in each key value;
The access thresholds collection is traversed, judges whether that a target access threshold range includes the target critical value.
5. it according to the method described in claim 1, it is characterized in that, further includes:
When the END instruction for detecting the access request, the access feedback result of the user is obtained.
6. a kind of access system of application program, which is characterized in that applied to the application layer of destination application, including:
First acquisition module, for when receiving access request of the user to the destination application, obtaining and the visit Ask request corresponding access rule;
Second acquisition module, for according to the access rule, obtain respectively the destination application include it is each to be measured The access thresholds range of destination application, obtains access thresholds collection;
Judgment module for obtaining the corresponding target critical value of the user, judges that the access thresholds are concentrated with the presence or absence of one A target access threshold range includes the target critical value;
First access modules, it is corresponding to be measured with the target access threshold range for the user when it is present, to be enabled to access Destination application.
7. system according to claim 6, which is characterized in that further include:
Second access modules, for the user when it be not present, to be enabled to access default objects application program.
8. system according to claim 6, which is characterized in that second acquisition module includes:
Determination unit, for according to the access rule, determining access rule library corresponding with the access rule
First searching unit, for being directed to each object to be measured application program, in the access rule library search with it is to be measured The corresponding access thresholds range of destination application;
Storage unit, for storing the access thresholds range to access threshold set.
9. system according to claim 6, which is characterized in that the judgment module includes:
Resolution unit for parsing the user, obtains the corresponding each key value of the target user;
Second searching unit, for being searched and the matched target critical value of the access rule in each key value;
For traversing the access thresholds collection, it is described to judge whether that a target access threshold range includes for judging unit Target critical value.
10. system according to claim 6, which is characterized in that further include:
Third acquisition module, for when the END instruction for detecting the access request, obtaining the access of user feedback As a result.
CN201810044407.2A 2018-01-17 2018-01-17 The access method and system of a kind of application program Pending CN108133125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810044407.2A CN108133125A (en) 2018-01-17 2018-01-17 The access method and system of a kind of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810044407.2A CN108133125A (en) 2018-01-17 2018-01-17 The access method and system of a kind of application program

Publications (1)

Publication Number Publication Date
CN108133125A true CN108133125A (en) 2018-06-08

Family

ID=62400717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810044407.2A Pending CN108133125A (en) 2018-01-17 2018-01-17 The access method and system of a kind of application program

Country Status (1)

Country Link
CN (1) CN108133125A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241704A (en) * 2018-07-12 2019-01-18 阿里巴巴集团控股有限公司 The gray scale dissemination method and device of new script
CN111290799A (en) * 2020-02-06 2020-06-16 北京字节跳动网络技术有限公司 Component loading method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812848A (en) * 2012-11-15 2014-05-21 腾讯科技(深圳)有限公司 Internal test method of application program, client and server
CN105373402A (en) * 2015-10-29 2016-03-02 努比亚技术有限公司 Device and method for software upgrading gated launch
CN106066791A (en) * 2016-05-25 2016-11-02 合网络技术(北京)有限公司 The gray scale dissemination method of application and device
CN106095426A (en) * 2016-06-07 2016-11-09 中国建设银行股份有限公司 The system of Mobile solution, method are provided

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103812848A (en) * 2012-11-15 2014-05-21 腾讯科技(深圳)有限公司 Internal test method of application program, client and server
CN105373402A (en) * 2015-10-29 2016-03-02 努比亚技术有限公司 Device and method for software upgrading gated launch
CN106066791A (en) * 2016-05-25 2016-11-02 合网络技术(北京)有限公司 The gray scale dissemination method of application and device
CN106095426A (en) * 2016-06-07 2016-11-09 中国建设银行股份有限公司 The system of Mobile solution, method are provided

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241704A (en) * 2018-07-12 2019-01-18 阿里巴巴集团控股有限公司 The gray scale dissemination method and device of new script
CN111290799A (en) * 2020-02-06 2020-06-16 北京字节跳动网络技术有限公司 Component loading method and device, electronic equipment and storage medium
CN111290799B (en) * 2020-02-06 2023-09-19 北京字节跳动网络技术有限公司 Component loading method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
Ding Applying weighted PageRank to author citation networks
Behroozi et al. Major mergers going Notts: challenges for modern halo finders
Wallace et al. A new approach for detecting scientific specialties from raw cocitation networks
CN103902653B (en) A kind of method and apparatus for building data warehouse table genetic connection figure
EP2950507A1 (en) Method and system for storing distributed graph data
US20090106207A1 (en) Method for restricting access to search results and a search engine supporting the method
KR20090073181A (en) Automatic generator and updater of faqs
CN102663054B (en) A kind of method and device determining weight of website
US9471696B2 (en) Methods and systems for pathing analysis
US20080270549A1 (en) Extracting link spam using random walks and spam seeds
US20110313978A1 (en) Plan-based compliance score computation for composite targets/systems
CN104767653B (en) A kind of method and apparatus of network interface monitoring
US20090119291A1 (en) Microhubs and its applications
CN110245280A (en) Identify method, apparatus, storage medium and the electronic equipment of web crawlers
CN107229392A (en) A kind of method for showing interface and system
CN101441657A (en) Caller intent recognition system and method and caller intent recognition platform
US8688612B2 (en) Method and device for saving triple for verifying reason and incremental reasoning, and method and device for reason-dependent indexing appropriate for same
US7647325B2 (en) Hardware and software identifier categorization and review
CN108133125A (en) The access method and system of a kind of application program
CN109815712A (en) User right management-control method, device, computer installation and readable storage medium storing program for executing
Karimi et al. Geocoding recommender: an algorithm to recommend optimal online geocoding services for applications
US20110231415A1 (en) Web page searching system and method using access time and frequency
Zhang et al. Day-to-day rerouting modeling and analysis with absolute and relative bounded rationalities
Šubelj et al. Intermediacy of publications
CN108154024A (en) A kind of data retrieval method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180608

RJ01 Rejection of invention patent application after publication